paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1606.02319 | 1 | 1606 | 2016-06-07T20:10:20 | Community detection in networks: Modularity optimization and maximum likelihood are equivalent | [
"cs.SI",
"physics.soc-ph"
] | We demonstrate an exact equivalence between two widely used methods of community detection in networks, the method of modularity maximization in its generalized form which incorporates a resolution parameter controlling the size of the communities discovered, and the method of maximum likelihood applied to the special case of the stochastic block model known as the planted partition model, in which all communities in a network are assumed to have statistically similar properties. Among other things, this equivalence provides a mathematically principled derivation of the modularity function, clarifies the conditions and assumptions of its use, and gives an explicit formula for the optimal value of the resolution parameter. | cs.SI | cs |
Modularity optimization and maximum likelihood are equivalent
Community detection in networks:
Department of Physics and Center for the Study of Complex Systems, University of Michigan, Ann Arbor, MI 48109
M. E. J. Newman
We demonstrate an exact equivalence between two widely used methods of community detection
in networks, the method of modularity maximization in its generalized form which incorporates a
resolution parameter controlling the size of the communities discovered, and the method of max-
imum likelihood applied to the special case of the stochastic block model known as the planted
partition model, in which all communities in a network are assumed to have statistically similar
properties. Among other things, this equivalence provides a mathematically principled derivation
of the modularity function, clarifies the conditions and assumptions of its use, and gives an explicit
formula for the optimal value of the resolution parameter.
I.
INTRODUCTION
maximization.
Community detection, sometimes called network clus-
tering, is the division of the nodes of an observed network
into groups such that connections are dense within groups
but sparser between them [1–3]. Not all networks support
such divisions, but many do, and the existence of good
divisions is often taken as a hint of underlying semantic
structure or possible mechanisms of network formation,
making community detection a useful tool for interpret-
ing network data.
The development of methods or algorithms to perform
community detection on empirical networks has been a
popular pursuit among researchers in physics, mathe-
matics, statistics, and computer science-a tremendous
number of such algorithms have been published in the
last decade or so [1–4].
In this paper we study two of
the most popular and widely used methods for commu-
nity detection in simple undirected networks, the method
of modularity maximization and the method of maxi-
mum likelihood as applied to the stochastic block model.
Building on previous work by ourselves and others [5–
7], we show that, different though they at first appear,
these two methods are in fact exactly equivalent, for ap-
propriate choices of models and parameters, which we
specify. This sheds light in particular on the modular-
ity maximization method, which is generally motivated
with heuristic arguments [8–10] (although there are some
rigorous results [11, 12]). Our results provide a rigor-
ous derivation for the modularity and demonstrate that
modularity maximization is optimal under appropriate
conditions, but also highlight the method's limitations.
In particular, we show that modularity maximization ef-
fectively assumes that communities in a network are sta-
tistically similar, and it is not guaranteed to give good
results for networks where this is not true.
II. COMMUNITY DETECTION
We begin by describing the two methods of commu-
nity detection that we study, in their most widely ac-
cepted forms, beginning with the method of modularity
A. Modularity maximization
Modularity maximization is perhaps the most widely
used method for community detection for networks. It
operates by defining a benefit function, called the modu-
larity, that measures the quality of divisions of a network
into communities. One optimizes this benefit function
over possible divisions of the network of interest to find
the one that gives the highest score, taking this to be the
definitive division of the network. Since the number of
possible divisions of a network is exponentially large, we
normally cannot perform the optimization exhaustively,
so we turn instead to approximate optimization meth-
ods, of which many have been tried, including greedy
algorithms [9, 13], extremal optimization [14], spectral
relaxation [15], genetic algorithms [16], simulated an-
nealing [17, 18], and belief propagation [7]. The popular
Louvain algorithm for community detection [19], which
is built into a number of network analysis software pack-
ages, uses a multiscale modularity optimization scheme
and is one of the fastest community detection methods
in practice.
The definition of the modularity function is straight-
forward [8]. We desire a benefit function which, given
a network and a candidate division of that network into
groups, returns a score that is larger if the division is a
"good" one and smaller if it is "bad." The heuristic no-
tion used to define the modularity is that a good division
is one that places most of the edges of a network within
groups and only a few of them between groups.
Let us represent our network by its adjacency matrix.
For an undirected network of n nodes the adjacency ma-
trix A is the real symmetric n × n matrix with elements
Aij = 1 if there is an edge between nodes i and j and
0 otherwise. Further, let us consider a division of the
network into q nonoverlapping groups, numbered (in any
order) from 1 to q, and let us denote by gi the num-
ber of the group to which node i is assigned. Thus the
complete vector g of group assignments specifies the di-
vision of the network. Then the number of edges that
fall within groups, for this particular division, is equal to
1
2 Pij Aij δgigj , where δij is the Kronecker delta and the
leading factor of a half prevents double counting of edges.
The number of in-group edges alone, however, is not a
good measure of the quality of a division, since it can be
trivially maximized by putting all the nodes in one of the
q groups and none in any of the others. This would put
100% of edges inside groups but clearly doesn't consti-
tute a useful division of the network. Instead, therefore,
modularity measures not just the number of edges within
groups but the difference between that number and the
expected number of such edges, were edges placed at ran-
dom within the network.
Suppose we take our observed network and random-
ize the positions of its edges. We keep the total num-
ber of edges the same but we reposition them between
the nodes at random,
in a manner to be determined
shortly. And suppose that, following this randomization,
the probability that nodes i and j are connected by an
edge is Pij . Then the expected number of edges within
groups, post-randomization, is 1
ularity is then proportional to the actual minus expected
number of edges thus:
2 Pij Pij δgigj . The mod-
Q =
=
1
2 Xij
m(cid:18) 1
2 Xij
Aijδgigj − 1
2m Xij (cid:0)Aij − Pij(cid:1)δgigj
1
Pijδgigj(cid:19)
(1)
where m is the total number of edges in the network and
is included here by convention only-it makes Q equal
to a fraction of edges rather than an absolute number,
which makes modularity values more easily comparable
between networks of different sizes. For the purposes of
maximizing the modularity, which is our main concern
here, the factor of m makes no difference at all. The posi-
tion of the maximum does not depend on overall constant
factors.
Note that if we now put all nodes in the same group,
then δgigj = 1 for all i, j and
Q =
1
2m Xij (cid:0)Aij − Pij(cid:1) = 0,
(2)
since, as we have said, the number of edges in the net-
work is held constant during randomization, and hence
Pij Pij = Pij Aij = 2m. Thus we no longer get a high
modularity score for putting all nodes in a single group
together. The maximum of modularity occurs for some
other (nontrivial) division of the nodes, which we take to
be the best division of the network. This is the method
of modularity maximization.
It remains to determine what Pij is. The value de-
pends on the particular scheme we use to randomize the
positions of the edges. The simplest scheme would be
just to reposition the edges uniformly at random, every
position having the same probability as every other. For
a network of n nodes there are (cid:0)n
2(cid:1) places to put an edge,
and hence the probability of filling any of them with one
of the m edges is
2
(3)
Pij =
m
.
(cid:0)n
2(cid:1)
probability, but normally m ≪ (cid:0)n
(Technically this is the expected number of edges not the
2(cid:1) so that probability
and expected number are essentially the same.)
In practice, however, this choice does not work very
well because it fails to respect the degrees of the nodes
in the network. The probabilities of connections between
nodes depend strongly on the total number of connec-
tions nodes have-their degrees-with nodes of high de-
gree being much more likely to be connected than nodes
of low degree. For reasons that will become clear in this
paper, it is important to include this effect in the defini-
tion of modularity if things are to work correctly.
Instead, therefore, we consider a constrained random-
ization of the edges in the network in which we preserve
the degree of every node, but otherwise position the edges
at random. This kind of randomization is well known in
the study of networks: it gives rise to the random graph
ensemble known as the configuration model [20, 21]. Af-
ter randomization, the probability of connection between
two nodes is equal to
Pij =
kikj
2m
,
(4)
where ki = Pj Aij is the degree of node i and m is once
again the number of edges in the network. (Again, this is
technically the expected number of edges, but the prob-
ability and expected number are essentially the same.)
This is the choice that is most commonly used in the
definition of the modularity. With this choice the modu-
larity is given by
Q =
1
2m Xij
(cid:18)Aij −
kikj
2m (cid:19)δgigj ,
(5)
which is the form in which it is most commonly written.
There is a further twist, however, because even this def-
inition does not always work well. As shown by Fortunato
and Barth´el´emy [22], community detection by modularity
maximization using the definition of (5), while it works
in many situations, has one specific shortcoming: it is un-
able to find community structure in large networks with
many small communities.
In particular, if the number
of communities in a network is greater than about √2m,
then the maximum modularity will not correspond to the
correct division. The maximum will instead tend to com-
bine communities into larger groups and fail to resolve
the smallest divisions in the network.
To address this problem, Reichardt and Bornholdt [10]
proposed a generalized modularity function
Q(γ) =
1
2m Xij
(cid:18)Aij − γ
kikj
2m (cid:19)δgigj .
(6)
When the parameter γ = 1, this is the same as the
traditional modularity of Eq. (5), but other choices al-
low us to vary the relative weight given to the observed
and randomized edge terms. If one places more weight
on the observed edge term (by making γ smaller), the
maximum modularity division favors, and the method
therefore tends to find, larger communities. If one places
more weight on the randomized edge term (larger γ), the
method finds smaller communities. There has not previ-
ously been any fundamental theory dictating what value
of γ one should use, but this is one of the questions on
which we will shed light in this paper.
B. Statistical inference
The other method of community detection we con-
sider is the method of statistical inference, as applied
to the stochastic block model and its variants. With this
method, one fits a generative model of a network to ob-
served network data, and the parameters of the fit tell us
about the structure of the network in much the same way
that fitting a straight line through a set of data points
tells us about their slope.
The model most commonly used in this context is the
so-called stochastic block model, which is a random graph
model of a network with community structure [12, 23, 24].
One takes some number n of nodes, initially without any
edges, and divides them into q groups in some way, with
gi being the group to which node i is assigned, as pre-
viously. Then one places edges between nodes indepen-
dently at random, with the probability, which we de-
note ωrs, of an edge between a particular pair of nodes
depending on the groups r and s to which the nodes be-
long. Thus there is a symmetric q × q matrix of parame-
ters ωrs which determine the probabilities of edges within
and between every pair of groups.
If the diagonal ele-
ments ωrr of this matrix are larger than the off-diagonal
elements, then networks generated by the model have a
higher probability of edges within groups than between
them and hence have traditional community structure.
In fact, the stochastic block model is often studied in
a slightly different formulation in which one places not
just a single edge between any pair of nodes but a Pois-
son distributed number of edges with mean ωrs. Thus ωrs
is the expected number, rather than the probability, of
edges between nodes in groups r and s, and the networks
generated by the model can in principle have multiedges,
meaning there can be more than one edge between the
same pair of nodes. Moreover, one typically also allows
the network to contain self-edges, edges that connect a
node to itself, which are also Poisson distributed in num-
ber, with mean 1
2 ωrr for a node in group r. (The factor of
half is included solely because it makes the algebra sim-
pler.) The inclusion of multiedges and self-edges in the
model is unrealistic in the sense that most network data
encountered in the real world contain neither. However,
most real-world networks are also very sparse, meaning
3
that only a tiny fraction of all possible edges that could
exist actually do, and hence the values of the edge prob-
abilities ωrs are very small. In this situation, the density
of multiedges and self-edges in the network will itself be
small and the Poisson version of the model is virtually in-
distinguishable from the first (Bernoulli) version defined
above. At the same time, the Poisson version is techni-
cally easier to handle than the Bernoulli version. In this
paper we use the Poisson version. Similar results can be
derived for the Bernoulli version, but the formulas are
more complicated and the end result is little different.
The definition of the model above is in terms of its use
to generate networks. As applied to community detec-
tion, however, the model is used in the "reverse" direc-
tion to infer structure by fitting it to data. In this con-
text, one hypothesizes that an observed network, with
adjacency matrix A, was generated from the stochastic
block model, and attempts to work out what values of the
model parameters must have been used in the generation.
The parameters in this case are the edge probabilities ωrs
and the group memberships gi.
Given particular values of the parameters we can write
down the probability, or likelihood, that the observed
network was generated from the block model thus:
P (AΩ, g) = Yi
2 ωgigi)Aii/2
( 1
( 1
2 Aii)!
e−ωgi gi /2Yi<j
ωAij
gigj
Aij !
e−ωgi gj ,
(7)
where Ω denotes the complete matrix of values ωrs and
we have adopted the standard convention that a self-
edge is represented by a diagonal adjacency matrix ele-
ment Aii = 2 (and not 1 as one might at first imagine).
The position of the maximum of this quantity with
respect to Ω and g tells us the values of the parameters
most likely to have generated the observed network. Typ-
ically we are interested only in the group assignments g,
which tell us how the network divides into groups. The
probabilities Ω are usually uninteresting and can be dis-
carded once the likelihood has been maximized.
Alternatively (and usually more conveniently), we can
maximize the logarithm of the likelihood:
logP (AΩ, g)
= Xi (cid:2) 1
2 ωgigj(cid:1) − 1
2 ωgigj − log(cid:0) 1
2 Aii log(cid:0) 1
+Xi<j(cid:0)Aij log ωgigj − ωgigj − log Aij !(cid:1).
2 Aij !(cid:1)(cid:3)
(8)
2 , log( 1
2 Aii log 1
The terms 1
2 Aij!), and log Aij ! are all in-
dependent of the parameters and do not affect the posi-
tion of the maximum, so they can be ignored, and the
log-likelihood then simplifies to
log P (AΩ, g) = 1
2 Xij (cid:0)Aij log ωgigj − ωgigj(cid:1).
(9)
The optimal division of the network into communities is
then given by maximizing this quantity with respect to
both g and Ω.
C. Degree-corrected block model
As with the modularity, however, this is not the whole
story. This approach fares poorly when applied to most
real-world networks because it doesn't respect the node
degrees in the network. The stochastic block model as
described here (in either Bernoulli or Poisson versions)
generates networks that have a Poisson degree distribu-
tion, which is very different from the broad distributions
seen in empirical networks. This means that, typically,
the model does not fit observed networks well for any
choice of parameter values. It's as if one were trying to
fit a straight line through an inherently curved set of data
points. Even the best fit of such a line will not be a good
fit. There are no good fits when the model you are fitting
is simply wrong.
The conventional solution to this problem,
in the
present situation, is to use a slightly different model, the
degree-corrected block model [25], which can fit networks
with any degree distribution. In this model the nodes are
again assigned to groups gi and edges placed indepen-
dently at random between them, but now the expected
number of edges between nodes i and j is (kikj/2m)ωrs
(where as before r, s are the groups to which the nodes
belong and ki, kj are the degrees) or a half that number
for self-edges. The factor of 2m in the denominator is op-
tional, but convenient since, as we have said, kikj/2m is
the probability of an edge in the configuration model and
hence, with this definition, ωrs quantifies the probability
of edges relative to the configuration model.
Following the same line of reasoning as before, and
again neglecting constants that have no effect on the po-
sition of the likelihood maximum, the log-likelihood for
this model is
log P (AΩ, g) = 1
2 Xij
(cid:18)Aij log ωgigj −
kikj
2m
ωgigj(cid:19). (10)
Community detection now involves the maximization
of this quantity with respect to the parameters Ω, g to
find the best fit of the model to the observed network.
This maximization can be achieved in a number of ways.
As with the modularity, there are too many possible
group assignments g to maximize exhaustively on any
but the smallest of networks, but researchers have suc-
cessfully applied a variety of approximate methods, in-
cluding label switching algorithms [12], Kernighan–Lin
style greedy algorithms [25, 26], spectral methods [6],
Monte Carlo [24, 27], and belief propagation [28, 29].
III. THE PLANTED PARTITION MODEL AND
MODULARITY MAXIMIZATION
4
the context of work on spectral algorithms [5, 6] and it
has also been discussed by Zhang and Moore [7] in the
context of work on finite-temperature ensembles of graph
partitions. Building on these works, our purpose in this
paper is to make explicit the exact equivalence of the two
approaches and investigate some of its consequences.
The planted partition model [30, 31] is a special case of
the stochastic block model in which the parameters ωrs
describing the community structure take only two differ-
ent values:
ωrs = (cid:26) ωin
ωout
if r = s,
if r 6= s.
(11)
This is a less flexible model than the full stochastic block
model. It effectively assumes that all communities in the
network are similar in the sense of having the same in-
group and between-group connection rates. Nonetheless,
for networks that do have this property, fits to the model
should recover the community structure accurately, and
indeed it has been proved that such fits are optimal in
that case [28, 32, 33].
In practice, if one wanted to apply the planted parti-
tion model, one should in almost all cases use a degree-
corrected version of the kind described in Section II C.
Let us explore the form of the log-likelihood, Eq. (10),
for such a model. Following [5, 6] we note that Eq. (11)
implies that
ωrs = (ωin − ωout)δrs + ωout,
log ωrs = (log ωin − log ωout)δrs + log ωout,
(12)
(13)
where δrs is the Kronecker delta, as previously. Sub-
stituting these forms into Eq. (10), we find the log-
likelihood for the degree-corrected planted partition
model to be
log P (AΩ, g) = 1
Aij(cid:20)δgigj log
ωin
ωout
+ log ωout(cid:21)
2 Xij
2 Xij
− 1
(cid:18)Aij −
kikj
2m (cid:2)(ωin − ωout)δgigj + ωout(cid:3)
2m (cid:19)δgigj
(ωin − ωout)
kikj
(log ωin − log ωout)
= 1
2 log
ωin
ωout Xij
+ m(cid:0)ωout + log ωout(cid:1)
(cid:18)Aij − γ
2m (cid:19)δgigj + C,
kikj
= B
1
2m Xij
(14)
where B and C are constants that depend on ωin and
ωout but not on g, and
γ =
ωin − ωout
log ωin − log ωout
.
(15)
We now come to the central result of this paper, the
equivalence of modularity maximization to a particular
case of the maximum likelihood method described above.
We previously discussed a version of this equivalence in
We have also made use of Pij Aij = Pi ki = 2m in the
second equality of (14).
To perform community detection, one would now max-
imize this expression with respect to both the group as-
signments gi and the parameters ωin and ωout. But sup-
pose for a moment that we already know the correct val-
ues of ωin and ωout, leaving us only to maximize with re-
spect to the group assignments. Comparing Eq. (14) with
Eq. (6), we see that, apart from overall constants, (14) is
precisely the generalized modularity Q(γ), and hence the
likelihood and the modularity have their maxima with
respect to the gi in the same place. Thus community de-
tection by maximization of the likelihood for the planted
partition model with known values of ωin and ωout is
equivalent to maximizing the generalized modularity for
the appropriate value of γ, given by Eq. (15). (We leave
it as a exercise for the reader to show that a similar
equivalence applies-with the same value of γ-between
maximizing the likelihood for the non-degree-corrected
stochastic block model and the modularity when one
makes the choice (3) for Pij .)
Among other things, this result tells us what the cor-
rect value of the resolution parameter γ is for the gen-
eralized modularity, an issue that has hitherto been un-
decided. The correct value is given by Eq. (15). An
immediate corollary is that in most cases the conven-
tional choice γ = 1, corresponding to the original, non-
generalized modularity function of Eq. (5), is not correct.
Unfortunately, however, we cannot normally employ
Eq. (15) directly to calculate γ, since we do not know
the values of the parameters ωin and ωout. We present
one possible solution to this problem in Section III A, but
for the moment let us proceed under the assumption that
we know the correct value of γ.
The equivalence between modularity maximization
and maximum-likelihood methods has a number of imme-
diate implications. First of all, it provides a derivation of
the modularity that is more rigorous and principled than
the usual heuristic arguments: modularity maximization
(with the correct choice of γ) is equivalent to fitting a
network to a degree-corrected version of the planted par-
tition model using the method of maximum likelihood. It
also explains why the standard degree-dependent choice,
Eq. (4), for the definition of the modularity is better than
the uniform choice of Eq. (3).
It is for the same rea-
son that the degree-corrected block model is the correct
choice for the analysis of most real-world networks: the
uniform choice effectively assumes a network with a Pois-
son degree distribution, which is a poor approximation to
most empirical networks. The degree-dependent choice,
by contrast, fits networks of any degree distribution.
The
equivalence
of modularity and maximum-
likelihood methods also implies that modularity maxi-
mization is a consistent method of community detection,
i.e., that under suitable conditions it will correctly and
without bias find community structure where present.
This follows because maximum-likelihood fits to stochas-
tic block models are also known to be consistent: when
the maximum-likelihood method is applied to networks
that were themselves generated from the same block
model (either the traditional or degree-corrected model),
it will return correct assignments of nodes to groups in
5
the limit of large node degrees [12]. The consistency of
modularity maximization has been demonstrated previ-
ously by other means [7, 34], but the equivalence with
likelihood maximization makes the physical intuition be-
hind it particularly clear.
A further point of interest is that while the value of γ in
Eq. (15) is always positive, regardless of the values of ωin
and ωout, the value of the constant B = m log(ωin/ωout)
in Eq. (14) changes sign depending on which of ωin and
ωout is larger. This means that maximization of the like-
lihood becomes equivalent to minimization of the mod-
ularity when ωout > ωin, i.e., when the network has so-
called disassortative structure, in which connections are
more common between groups than within them. The
minimization of modularity to find such structure has
been proposed previously on heuristic grounds [35], but
the derivation here gives a rigorous foundation for the
procedure.
On the other hand, the equivalence of maximum like-
lihood and maximum modularity methods also reveals
some hidden assumptions and limitations of the modu-
larity. The planted partition model, with its assumption,
Eq. (11), that the edge parameters ωrs take the same
values for every community, is less powerful than the full
stochastic block model and modularity maximization is
similarly less powerful as a result. In effect, modularity
maximization assumes all communities in a network to
be statistically similar. This may be a good assumption
in some networks, but there are certainly examples where
it is not, and we would expect the modularity maximiza-
tion method to perform less well in such cases than more
general methods.
Some variants of the maximum-likelihood method also
include additional parameters that allow for heteroge-
neous group sizes, but the version used here, to which
modularity maximization is equivalent, includes no such
embellishments, meaning that modularity maximization
implicitly favors groups of uniform size, which could also
hurt performance.
A. Value of the resolution parameter
A drawback of the equivalence we have demonstrated
is that it applies only when we use the correct value of
the resolution parameter γ, which normally we do not
know. One can, however, make an empirical estimate of
the value of γ using an iterative scheme as follows.
First, one makes an initial guess about the value of γ.
This guess need not be particularly accurate: γ = 1 usu-
ally works fine. Then one finds the communities in the
network by modularity maximization using this choice.
This gives us some set of assignments gi of nodes to
groups-likely not optimal-from which we can then
make an estimate of the parameters ωin and ωout by not-
ing that the expected total number of in-group edges min
γ
r
e
t
e
m
a
r
a
p
n
o
i
t
u
l
o
s
e
R
3
2
1
0
Estimated value
True value
4
6
8
10
12
14
Number of communities q
FIG. 1: Resolution parameter γ, estimated using the method
described here, for a set of synthetic networks with varying
numbers of communities. The networks were generated using
the standard (non-degree-corrected) planted partition model
with q equally sized groups of 250 nodes each and parame-
ters ωin and ωout chosen so that each node has an average
of 16 connections within its own group and 8 to every other
group. Modularity was maximized using simulated annealing.
The circles represent the estimated values of γ and the solid
line represents the true values calculated from Eq. (15).
in the (degree-corrected) planted partition model is
min = 1
2 Xr Xij
kikj
2m
ωrrδgi,rδgj ,r =
ωin
4m Xr
κ2
r,
(16)
where κr = Pi kiδgi,r is the sum of the degrees of the
nodes in group r. Hence we can estimate ωin from
ωin =
,
(17)
2min
r/2m
Pr κ2
using the observed value of min as an estimate of the
expected value. Similarly for ωout we have
ωout =
2mout
Pr6=s κrκs/2m
=
2m − 2min
2m −Pr κ2
r/2m
,
(18)
where mout is the number of edges running between dis-
tinct groups.
Using these estimates of ωin and ωout we can now cal-
culate a new value of γ from Eq. (15). Then we repeat
the process, maximizing the modularity and recalculat-
ing ωin, ωout, and γ until we achieve convergence. The
consistency of modularity maximization, mentioned ear-
lier, implies that this procedure should converge to the
correct value of γ (and the correct community structure)
for sufficiently dense networks that actually are generated
from the planted partition model. For all other networks
(meaning, in practice, for all real-world applications of
the method) we have no formal guarantees of correctness
or convergence, though the same is also true of all other
Network
Karate club
Dolphin social network
Political blogs
Books about politics
Characters from Les Miserables
American college football
Jazz collaborations
Email messages
6
n
m q
γ
34
62
2 0.78
78
2 0.59
159
2 0.67
1225 16780
2 0.59
441
254
6 1.36
614 11 2.27
2742 16 1.19
5451 26 3.63
105
77
115
198
1133
TABLE I: Number of nodes n, number of edges m, number of
communities q, and estimated value of the resolution parame-
ter γ for a range of networks studied in the previous literature.
The networks are the karate club network of Zachary [36],
the dolphin social network of Lusseau et al. [37], the network
of political weblogs studied by Adamic and Glance [38], the
network of books about politics studied by Krebs (unpub-
lished, but see for instance [15]), the network of interactions
between fictional characters in the novel Les Miserables by
Victor Hugo [8], the network of regular season games between
Division I-A college football teams in the year 2000 [8], the
network of collaborations between jazz musicians studied by
Gleiser and Danon [39], and the network of email messages
between university students of Ebel et al. [40]. The value of q
used for each network is the generally accepted one, except
for the last two networks, for which there does not appear
to be a consensus. For these two networks we estimate the
number of communities using the inference method of [41].
methods of community detection, including, but not lim-
ited to, community detection by statistical inference.
One might imagine that this would not be a very effi-
cient method for calculating γ: it requires repeated max-
imization of different modularity functions until the cor-
rect value of γ is reached. In practice, however, we have
found that it converges very quickly. In most cases we
have examined, γ is calculated to within a few percent
after just one iteration, and in no case have we found a
need for more than ten iterations, so the method may
in fact be quite serviceable. Figure 1 shows an example
application to a set of artificially generated ("synthetic")
networks for which the true value of γ is known and,
as the figure shows, the algorithm is able to determine
that value accurately in every case. Table I gives val-
ues of γ calculated using the algorithm for a number of
real-world networks that have been used as test cases in
previous community detection studies.
The values of γ vary in size, but there is an overall
trend towards larger values in networks with larger num-
bers of communities, both among the synthetic networks
and the real ones. This is perhaps not unexpected given
that the resolution parameter γ was originally introduced
precisely in order to deal with networks with larger num-
bers of communities. Recall that larger values of γ, and
specifically values larger than the traditional value of 1,
are needed in networks where the number of communi-
ties exceeds the resolution limit at √2m. None of the
networks studied here approach this limit, but nonethe-
less we should not find it surprising that the larger values
of q in both Fig. 1 and Table I are best treated using val-
ues γ > 1.
Whether the algorithm given here is in fact a useful
one in practice is a debatable point. As we have shown, it
does no more than the likelihood maximization method,
and the latter in principle gives better results, since it
does not assume that all groups are statistically simi-
lar. Modularity maximization does have the advantage
of being less nonlinear than maximum-likelihood meth-
ods, which allows for some faster algorithms such as spec-
tral [6, 15] and multiscale [19] algorithms. Still, the re-
sults derived here are primarily of interest not because
of the algorithms they suggest, but because of the light
they shed on the strengths and weaknesses of modularity
maximization.
7
nity detection, as applied to the degree-corrected planted
partition model. The equivalence between the two ap-
proaches highlights some weaknesses of the modularity
maximization method: the method assumes all commu-
nities to have statistically similar properties, which may
not be the case, and it also contains an undetermined
parameter γ. Most often this parameter is assumed to
take the value 1, but we have shown that this assump-
tion is normally not correct and given an explicit formula
for the correct value, along with a simple algorithm for
computing it on observed networks.
Acknowledgments
IV. CONCLUSIONS
We have shown that modularity maximization is a spe-
cial case of the maximum likelihood method of commu-
The author thanks Aaron Clauset, Travis Martin, Cris
Moore, and Cosma Shalizi for useful comments. This
research was supported in part by the US National Sci-
ence Foundation under grants DMS–1107796 and DMS–
1407207.
[1] M. A. Porter, J.-P. Onnela, and P. J. Mucha, Communi-
ties in networks. Notices of the American Mathematical
Society 56, 1082–1097 (2009).
[2] S. Fortunato, Community detection in graphs. Phys. Rep.
486, 75–174 (2010).
[3] M. E. J. Newman, Communities, modules and large-scale
structure in networks. Nature Physics 8, 25–31 (2012).
[4] M. Coscia, F. Giannotti, and D. Pedreschi, A classifica-
tion for community discovery methods in complex net-
works. Statistical Analysis and Data Mining 4, 512–546
(2011).
[5] M. E. J. Newman, Community detection and graph par-
titioning. Europhys. Lett. 103, 28003 (2013).
[6] M. E. J. Newman, Spectral methods for network commu-
nity detection and graph partitioning. Phys. Rev. E 88,
042822 (2013).
[7] P. Zhang and C. Moore, Scalable detection of statistically
significant communities and hierarchies, using message
passing for modularity. Proc. Natl. Acad. Sci. USA 111,
18144–18149 (2014).
[8] M. E. J. Newman and M. Girvan, Finding and evaluat-
ing community structure in networks. Phys. Rev. E 69,
026113 (2004).
[9] M. E. J. Newman, Fast algorithm for detecting com-
munity structure in networks. Phys. Rev. E 69, 066133
(2004).
[10] J. Reichardt and S. Bornholdt, Statistical mechanics of
community detection. Phys. Rev. E 74, 016110 (2006).
[11] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hoe-
fer, Z. Nikoloski, and D. Wagner, On finding graph clus-
terings with maximum modularity. In Proceedings of the
33rd International Workshop on Graph-Theoretic Con-
cepts in Computer Science, number 4769 in Lecture Notes
in Computer Science, Springer, Berlin (2007).
[12] P. J. Bickel and A. Chen, A nonparametric view of
network models and Newman–Girvan and other modu-
larities. Proc. Natl. Acad. Sci. USA 106, 21068–21073
(2009).
[13] A. Clauset, M. E. J. Newman, and C. Moore, Finding
community structure in very large networks. Phys. Rev.
E 70, 066111 (2004).
[14] J. Duch and A. Arenas, Community detection in complex
networks using extremal optimization. Phys. Rev. E 72,
027104 (2005).
[15] M. E. J. Newman, Modularity and community structure
in networks. Proc. Natl. Acad. Sci. USA 103, 8577–8582
(2006).
[16] L. Shuzhuo, C. Yinghui, D. Haifeng, and M. W. Feld-
man, A genetic algorithm with local search strategy for
improved detection of community structure. Complexity
15(4), 53–60 (2010).
[17] R. Guimer`a, M. Sales-Pardo, and L. A. N. Amaral, Mod-
ularity from fluctuations in random graphs and complex
networks. Phys. Rev. E 70, 025101 (2004).
[18] A. Medus, G. Acuna, and C. O. Dorso, Detection of com-
munity structures in networks via global optimization.
Physica A 358, 593–604 (2005).
[19] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and
E. Lefebvre, Fast unfolding of communities in large net-
works. J. Stat. Mech. 2008, P10008 (2008).
[20] M. Molloy and B. Reed, A critical point for random
graphs with a given degree sequence. Random Structures
and Algorithms 6, 161–179 (1995).
[21] M. E. J. Newman, S. H. Strogatz, and D. J. Watts, Ran-
dom graphs with arbitrary degree distributions and their
applications. Phys. Rev. E 64, 026118 (2001).
[22] S. Fortunato and M. Barth´elemy, Resolution limit in
community detection. Proc. Natl. Acad. Sci. USA 104,
8
36–41 (2007).
[23] P. W. Holland, K. B. Laskey, and S. Leinhardt, Stochas-
tic blockmodels: Some first steps. Social Networks 5,
109–137 (1983).
[24] K. Nowicki and T. A. B. Snijders, Estimation and predic-
tion for stochastic blockstructures. J. Amer. Stat. Assoc.
96, 1077–1087 (2001).
[25] B. Karrer and M. E. J. Newman, Stochastic blockmodels
and community structure in networks. Phys. Rev. E 83,
016107 (2011).
[26] B. W. Kernighan and S. Lin, An efficient heuristic proce-
dure for partitioning graphs. Bell System Technical Jour-
nal 49, 291–307 (1970).
[27] T. P. Peixoto, Efficient monte carlo and greedy heuristic
for the inference of stochastic block models. Phys. Rev.
E 89, 012804 (2014).
[28] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, In-
ference and phase transitions in the detection of modules
in sparse networks. Phys. Rev. Lett. 107, 065701 (2011).
[29] X. Yan, C. R. Shalizi, J. E. Jensen, F. Krzakala,
C. Moore, L. Zdeborova, P. Zhang, and Y. Zhu, Model se-
lection for degree-corrected block models. J. Stat. Mech.
2014, P05007 (2014).
[30] A. Condon and R. M. Karp, Algorithms for graph par-
titioning on the planted partition model. Random Struc-
tures and Algorithms 18, 116–140 (2001).
[31] F. McSherry, Spectral partitioning of random graphs. In
Proceedings of the 42nd IEEE Symposium on the Foun-
dations of Computer Science, pp. 529–537, Institute of
Electrical and Electronics Engineers, New York (2001).
[32] L. Massouli´e, Community detection thresholds and the
weak ramanujan property. In Proceedings of the 46th An-
nual ACM Symposium on the Theory of Computing, pp.
529–694–703, Associate of Computing Machinery, New
York (2014).
[33] E. Mossel, J. Neeman, and A. Sly, Reconstruction and es-
timation in the planted partition model. Probability The-
ory and Related Fields 162, 431–461 (2015).
[34] Y. Zhao, E. Levina, and J. Zhu, Consistency of com-
munity detection in networks under degree-corrected
stochastic block models. Annals of Statistics 40, 2266–
2292 (2011).
[35] M. E. J. Newman, Finding community structure in net-
works using the eigenvectors of matrices. Phys. Rev. E
74, 036104 (2006).
[36] W. W. Zachary, An information flow model for conflict
and fission in small groups. Journal of Anthropological
Research 33, 452–473 (1977).
[37] D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase,
E. Slooten, and S. M. Dawson, The bottlenose dolphin
community of Doubtful Sound features a large propor-
tion of long-lasting associations. Can geographic isola-
tion explain this unique trait? Behavioral Ecology and
Sociobiology 54, 396–405 (2003).
[38] L. A. Adamic and N. Glance, The political blogosphere
and the 2004 US election. In Proceedings of the WWW-
2005 Workshop on the Weblogging Ecosystem (2005).
[39] P. Gleiser and L. Danon, Community structure in jazz.
Advances in Complex Systems 6, 565–573 (2003).
[40] H. Ebel, L.-I. Mielsch, and S. Bornholdt, Scale-free topol-
ogy of e-mail networks. Phys. Rev. E 66, 035103 (2002).
[41] M. E. J. Newman and G. Reinert, Estimating the number
of communities in a network. Preprint arXiv:1605.02753
(2016).
|
1104.0319 | 1 | 1104 | 2011-04-02T14:49:36 | Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure | [
"cs.SI",
"physics.soc-ph"
] | Much of the past work in network analysis has focused on analyzing discrete graphs, where binary edges represent the "presence" or "absence" of a relationship. Since traditional network measures (e.g., betweenness centrality) utilize a discrete link structure, complex systems must be transformed to this representation in order to investigate network properties. However, in many domains there may be uncertainty about the relationship structure and any uncertainty information would be lost in translation to a discrete representation. Uncertainty may arise in domains where there is moderating link information that cannot be easily observed, i.e., links become inactive over time but may not be dropped or observed links may not always corresponds to a valid relationship. In order to represent and reason with these types of uncertainty, we move beyond the discrete graph framework and develop social network measures based on a probabilistic graph representation. More specifically, we develop measures of path length, betweenness centrality, and clustering coefficient---one set based on sampling and one based on probabilistic paths. We evaluate our methods on three real-world networks from Enron, Facebook, and DBLP, showing that our proposed methods more accurately capture salient effects without being susceptible to local noise, and that the resulting analysis produces a better understanding of the graph structure and the uncertainty resulting from its change over time. | cs.SI | cs | Methods to Determine Node Centrality and Clustering
in Graphs with Uncertain Structure
Joseph J. Pfeiffer, III
Department of Computer Science
Purdue University
West Lafayette, IN 47907
[email protected]
Jennifer Neville
Departments of Computer Science and Statistics
Purdue University
West Lafayette, IN 47909
[email protected]
1
1
0
2
r
p
A
2
]
I
S
.
s
c
[
1
v
9
1
3
0
.
4
0
1
1
:
v
i
X
r
a
Abstract
Much of the past work in network analysis has focused on
analyzing discrete graphs, where binary edges represent the
"presence" or "absence" of a relationship. Since traditional
network measures (e.g., betweenness centrality) utilize a dis-
crete link structure, complex systems must be transformed
to this representation in order to investigate network prop-
erties. However, in many domains there may be uncertainty
about the relationship structure and any uncertainty informa-
tion would be lost in translation to a discrete representation.
Uncertainty may arise in domains where there is moderating
link information that cannot be easily observed, i.e., links be-
come inactive over time but may not be dropped or observed
links may not always corresponds to a valid relationship. In
order to represent and reason with these types of uncertainty,
we move beyond the discrete graph framework and develop
social network measures based on a probabilistic graph rep-
resentation. More specifically, we develop measures of path
length, betweenness centrality, and clustering coefficient --
one set based on sampling and one based on probabilistic
paths. We evaluate our methods on three real-world networks
from Enron, Facebook, and DBLP, showing that our proposed
methods more accurately capture salient effects without being
susceptible to local noise, and that the resulting analysis pro-
duces a better understanding of the graph structure and the
uncertainty resulting from its change over time.
Introduction
Much of the past work in network analysis has focused
on analyzing discrete graphs, where entities are repre-
sented as nodes and binary edges represent the "pres-
ence" or "absence" of a relationship between entities.
Complex systems of relationships are first transformed to
a discrete graph representation (e.g., a friendship graph)
and then the connectivity properties of
these graphs
are used to investigate and understand the characteris-
tics of the system. For example, network measures such
as the average shortest path length and clustering coef-
ficient have been used to explore the properties of bio-
logical and information networks (Watts and Strogatz 1998;
Leskovec, Kleinberg, and Faloutsos 2005), while measures
such as centrality have been used for determining the
Copyright c(cid:13) 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
most important and/or influential people in social networks
(Freeman 1977; Bonacich 1987).
The main limitation of measures defined for a discrete
representation is that they cannot easily be applied to rep-
resent and reason about uncertainty in the link structure.
Link uncertainty may arise in domains where graphs evolve
over time, as links observed at a earlier time may no longer
be present or active at the the time of analysis. For exam-
ple in online social networks, users articulate "friendships"
with other users and these links often persist over time, re-
gardless of whether the friendship is maintained. This can
result in uncertainty about whether an observed friendship
link is still active at some later point in time. In addition,
there may be uncertainty with respect to the strength of the
articulated relationships (Xiang, Neville, and Rogati 2010),
which can result in uncertainty about whether an observed
relationship will be used to transmit information and/or in-
fluence. Furthermore, there are other network domains (e.g.,
gene/protein networks) where relationships can only be in-
directly observed so there is uncertainty about whether an
observed edge (e.g., protein interaction) actually indicates
the presence of a valid relationship.
In this work, we formulate a probabilistic graph represen-
tation to analyze domains with these types of uncertainty
and develop analogues for three standard discrete graph
measures -- average shortest path length, betweenness cen-
trality, and clustering coefficient -- in the probabilistic set-
ting. Specifically, we use probabilities on graph edges to
represent link uncertainty and consider the distribution of
possible (discrete) graphs that they define, then we develop
measures that consider the properties of the graph popula-
tion defined by this distribution.
Our first set of measures compute expected values over
the distribution of graphs, sampling a set of discrete graphs
from this distribution in order to efficiently approximate the
path length, centrality, and clustering measures. We then de-
velop a second set of measures that can be directly computed
from the probabilities, which removes the need for graph
sampling. The second approach also affords us the oppor-
tunity to consider more than just shortest paths in the net-
work. We note that previous focus on shortest paths is due
in part to an implicit belief that short paths are more likely
to result in successful transfer of information and/or influ-
ence between two nodes. This has led other works to gener-
alize shortest paths to the probabilistic domain for their own
purposes (Potamias et al. 2009). However, in a probabilistic
framework we can also directly compute the likelihood of a
path and consider the most probable paths, which are likely
to facilitate information flow in the network.
With probabilistic paths, we also introduce a prior to in-
corporate the belief that the probability of successful in-
formation transfer is a function of path length -- since the
existence of a relationship does not necessarily mean that
information/influence will be passed across the edge. This
formulation, which models the likelihood of information
spread throughout the graph, is consistent with the finding in
(Onnela et al. 2007), which identified that constricting and
relaxing the flow along the edges in the network was neces-
sary to model the true patterns of information diffusion in an
evolving communication graph.
We evaluate our measures on three real world networks:
Enron email, Facebook micro communications, and DBLP
coauthorships. In these datasets, the network transactions
are each associated with timestamps (e.g., email date). Thus
we are able to compute the local (node-level) and aggregate
(graph-level) measures at multiple time steps, where at each
time step t we consider the network information available
up to and including t. We compare against two different ap-
proaches that use the discrete representation: an aggregate
approach, which unions all previous transactions (up to t)
into a discrete graph, and a slice approach, where only trans-
actions from a small window (i.e., [t − δ, t]) are included
in the discrete representation. For our methods, we estimate
edge probabilities from the transactions observed up to t,
weighting each transaction with an exponential decay func-
tion. Our analysis shows that our proposed methods more ac-
curately capture the salient changes in graph structure com-
pared to the discrete methods without being susceptible to
local, temporal noise. Thus the resulting analysis produces
a better understanding of the graph structure and its change
over time.
Related Work
The notion of probabilistic graphs have been studied pre-
viously, notably by (Frank 1969), (Hua and Pei 2010) and
(Potamias et al. 2009). (Frank 1969) showed how for graphs
with probability distributions over the weights for each
edge, Monte Carlo methods can be used to sample to de-
termine the shortest path probabilities between the edges.
(Hua and Pei 2010) then extends this to find the shortest
weighted paths most likely to complete within a certain
time constraint (e.g., the shortest distance across town in
under half an hour). In (Potamias et al. 2009), the most
probable shortest paths are used to estimate the k-nearest
neighbors in the graph for a particular node. Although
(Potamias et al. 2009) draws sample graphs based on likeli-
hood (i.e., sampling each edge according to its probability),
in their estimate of the shortest path distribution they weight
each sample graph based on its probability, which is incor-
rect unless the samples are drawn uniformly at random from
the distribution. In this work, we sample in the same manner
as (Potamias et al. 2009), but weight each sample uniformly
in our expectation calculations -- since, when the graphs are
drawn from the distribution based on their likelihood, the
graphs with higher likelihood are more likely to be sampled.
There has also been some recent work that has devel-
oped measures for time-evolving graphs, e.g., to identify
the most central nodes throughout time (Tang et al. 2010)
and identify the edges that maximize communication
over time (Kossinets, Kleinberg, and Watts 2008). However,
these works fail to account for the uncertainty in both the
link structure and the the communication across links (as
users are unlikely to propagate all information across a sin-
gle edge). Our use of a probabilistic graph framework and
transmission prior address these two cases of uncertainty.
Sampling Probabilistic Graphs
Let G = hV, Ei, be a graph where V is a collection
of nodes and E ∈ V × V is the set of edges, or re-
lationships, between the nodes. In order to represent and
reason about relationship uncertainty, we associate each
edge eij (which connects node vi and vj) with a prob-
ability P (eij). Then we can define G to be a distribu-
tion of discrete, unweighted graphs. Assuming indepen-
dence among edges, the probability of a graph G ∈ G
is: P (G) = Qeij ∈E P (eij )Qeij /∈E [1 − P (eij)]. Since we
have assumed edge independence, we can sample a graph
GS from G by sampling edges independently according to
their probabilities P (eij ). Based on this, we can develop
methods to compute the expected shortest path lengths, be-
tweenness centrality rankings, and clustering coefficients us-
ing sampling.
ij
Probabilistic Average Shortest Path Length Let ρij =
{vk1, vk2 , ..., vkq } refer to a path of q vertices connecting
two vertices vi and vj, i.e., vk1 = vi and vkq = vj, and from
each vertex to the next there exists an edge: ekiki+1 ∈ E
for i = [1, q − 1]. Let V (ρij ) and E(ρij) refer to the
set of vertices and edges respectively, in the path and let
ρij = E(ρij ) refer to the length of the path. Assum-
ing connected graphs, for every unweighted graph G =
hV, Ei ∈ G there exists a shortest path ρmin
between ev-
, we
ery pair of nodes vi, vj ∈ V . Letting SPij = ρmin
can then define the average shortest path length in G as:
SP(G) =
ij
V ·(V −1)Pi∈V Pj∈V ;j6=i SPij.
Now, when there is uncertainty about the edges in G, we
can compute the expected average shortest path length by
considering the distribution of graphs G. For any reasonable
sized graph, the distribution G will be intractable to enumer-
ate explicitly, so instead we sample from G to approximate
the expected value. More specifically, we sample a graph
Gs by sampling edges uniformly at random according to
their edge probabilities P (eij ). Each graph that we sample
in this manner has equal likelihood, thus we can draw m
sample graphs GS = {G1, ..., Gm} and calculate the ex-
pected shortest path length with the following:
1
EG(cid:2) SP(cid:3) = XG∈G
SP(G) · P (G) ≃
1
m Xm
SP(Gm)
(1)
Since the sampled graphs are unweighted,
O (V E)
time
to
compute SP for
it
each
takes
sam-
ple (Brandes 2001). This results in an overall cost of
O (m · V E) to compute EG(cid:2) SP(cid:3).
Sampled Centrality Betweenness centrality for a node vi
is defined to be the number of shortest paths between other
pairs of nodes which pass through vi: BCi = {ρmin
jk ∈
G : vi ∈ V (ρjk) ∧ i 6= j, k}. Vertices that contribute
to the existence of many shortest paths will have a higher
BC score than other nodes that contribute to fewer shortest
paths, thus BC is used a measure of importance or centrality
in the network. It is difficult to directly compare BC values
across graphs since the number of shortest paths varies with
graph size and connectivity. Thus, typically analysis focuses
on betweenness centrality rankings (BCR), where the nodes
are ranked in descending order of their BC scores and the
node with the highest BC score is given a BCR of 1.
As discussed above, we can compute the shortest paths
for each unweighted graph G ∈ G, then we can also com-
pute the BCR values for each unweighted graph G ∈ G. We
denote BCRi(G) as the betweenness centrality ranking for
node vi in G. Then we can approximate the expected BCR
for each node by sampling a set of m graphs from G:
EG[BCRi] ≃
1
m Xm
BCRi(Gm)
(2)
Again, since the sampled graphs are unweighted,
it
takes O (V E) time to compute the BCR for each
sample (Brandes 2001), resulting in an overall cost of
O (m · V E).
together
its clustering coefficient
1
Sampled Clustering Coefficients Clustering coefficient
is a measure of how the nodes
in a graph clus-
(Watts and Strogatz 1998). For a node vi
ter
with Ni = {vj1 , ..., vjn } neighbors
(e.g., eij1 ∈
is defined as CCi =
E),
IE(ejk), where IE is an
Ni(Ni−1) Pvj ∈Ni Pvk∈Ni,k6=j
indicator function which returns 1 if vj is connected to vk.
CC can be thought of as the fraction connected pairs of
neighbors of vi. We denote CCi(G) as the clustering coeffi-
cient for node vi in graph G. Similar to paths, we can com-
pute clustering coefficients for every graph G ∈ G. Thus we
can approximate the expected CC for each node by sampling
a set of m graphs from G:
EG[CCi] ≃
1
m Xm
CCi(Gm)
(3)
Under the assumption that the maximum degree in the graph
can be bounded by a fixed constant (which is typical for
sparse social networks), we can compute the clustering coef-
ficient for a single graph in O(V ) time (i.e., O(1) for each
node), which results in an overall cost of O(m · V ).
Probabilistic Path Length
In the previous section, we discussed how to extend the dis-
crete notions of shortest paths and centrality into a prob-
abilistic graph framework via expected values, and we
showed how to estimate approximate values using sampling.
While our sampling-based measures are valid and give in-
formative results (see section 6 for details), they have two
limitations which restrict their applicability.
samples
First, the effectiveness of the approximation depends
on the number of
from G. We note that
(Potamias et al. 2009) used a Hoeffding Inequality to show
that relatively few samples are needed to compute an accu-
rate estimate of independent shortest paths in probabilistic
graphs. However, since our the calculation of BCR is based
on the joint occurrence of shortest paths in the graph, this
bound will not hold for our measures.
Second, since the expectation is over possible worlds (i.e.,
G ∈ G), the focus on shortest paths may no longer be the
best way to capture node importance. We note that in the
discrete framework, where all edges are equally likely, the
use of shortest paths as a proxy for importance implies a
prior belief that shorter paths are more likely to be used suc-
cessfully to transfer information and/or influence in the net-
work. In domains with link uncertainty, the flow of infor-
mation/influence will depend on both the existence of paths
in the network and the use of those paths for communica-
tion/transmission. In a probabilistic framework, we have an
opportunity to explicitly incorporate the latter, by encoding
our prior beliefs about transmission likelihood into mea-
sures of node importance. Furthermore, although a prob-
abilistic representation enables analysis of more than just
shortest paths, as we note above, even to capture shortest
paths the sampling methods described previously may need
many samples to accurately estimate the joint existence of
shortest paths. Thus, a measure that explicitly uses the edge
probabilities to calculate most probable paths may more ac-
curately highlight nodes that serve to connect many parts of
the network. We discuss each of these issues more below.
Most Probable Paths To begin, we extend the notion
of discrete paths to probabilistic paths in our framework.
Specifically, we can calculate the probability of the exis-
tence of a path ρij as follows (again assuming edge inde-
pendence): P (ρij ) = Qeuv ∈E(ρij ) P (euv). Using the path
probabilities, we can now describe the notion of the most
probable path. Given two nodes vi, vj, the most proba-
ble path path is simply the one with maximum likelihood:
ij = argmax P (ρij). We can compute the most likely
ρML
paths in much the same way that shortest paths are computed
on weighted discrete graphs, by applying Dijkstra's short-
est path algorithm, but instead of expanding on the shortest
path, we expand the most probable path. Thus, all most prob-
able paths can be calculated in O(cid:16)V E + V 2 log V (cid:17).
Transmission Prior Previous focus on shortest paths for
assessing centrality points to an implicit assumption that
if an edge connects two nodes that it can be successfully
used for transmission of information and/or influence in the
network. Although there has been work both in maximiz-
ing the spread of information in a network through the use
of central nodes (Boragatti 2005; Newman 2005) and in the
study of information propagation through the use of trans-
mission probabilities (Goldenberg, Libai, and Muller 2001),
there has been little prior work that has incorporated trans-
mission probabilities into node centrality measures. Cen-
trality measures based on random walks and eigenvec-
tors (Newman 2005) implicitly penalize longer paths as they
consider all paths between nodes in the network. However,
in our framework we can incorporate transmission probabili-
ties to penalize the probabilities of longer paths in the graph,
in order to more accurately capture the role nodes play in the
spread of information across multiple paths in the network.
Consider the case where there is one path of nine peo-
ple where each edge has high probability of existence (e.g.,
0.95) and another path of three people where the edge prob-
abilities are all moderate (e.g., 0.70), both ending at node
v. Here, the longer path is more likely to exist than the
shorter path, but in this example we are more interested in
which path is used to transfer a virus to v. Even when an
edge exists (i.e., the relationship is active), the virus will not
be passed with certainty to the next node, thus the trans-
mission probability is independent of the edge probability.
Moreover, when the transmission probability is less than 1,
it is more likely that the virus will be transmitted across the
shorter path, since the longer path presents more opportuni-
ties for the virus to be dropped. This provides additional in-
sight as to why shortest paths have always been considered
important -- there is generally a higher likelihood of trans-
mission if it is passed through fewer nodes in the network.
To incorporate transmission likelihood into our proba-
bilistic paths, we assign a probability β of success for every
step in a particular path -- corresponding to the probability
that information is transmitted across an edge and is received
by the neighboring node. If we denote l to be the length of
a path ρ, and s to be the number of successful transmissions
along the path, we can use a binomial distribution to repre-
sent the transmission probability across ρ with:
SBin(sβ) = Bin(s = ll, β) = βl
Here SBin corresponds to the case where the transmission
always succeeds (i.e., across all edges in ρ). Using this bi-
nomial distribution as a prior allows us to represent the ex-
pected probability of information spread in an intuitive man-
ner, giving us a parameter β which we can adjust to fit
our expectations for the information spread in the graph.
Note that setting β = 1 is equivalent to the most proba-
ble paths discussed earlier. The prior effectively handicaps
longer paths through the graph. Although, there is a correla-
tion between shortest (certain) paths and handicapped (un-
certain) paths, these formulations are not equivalent, since
the latter produces a different set of paths when the shortest
paths have low probability of existence.
ML Handicapped Paths Now that we have both the no-
tion of a probabilistic path, and an appropriate prior for
modeling the probability of information spreading along the
edges in the path, we can formulate the maximum likelihood
handicapped path between two nodes vi and vj to be:
ρMLH
ij
= argmax
ρij
[P (ρij) · SBin( ρij β)]
(4)
To compute the most likely handicapped (MLH) paths, we
follow the same formulation as the most probable paths,
keeping track of the path length and posterior at each point.
In the MLH formulation, probable paths are weighted by
likelihood of transmission, thus nodes that lie on paths that
are highly likely and relatively short, will have a high BC
ranking. To calculate BCR ranking based on MLH paths,
we can use a weighted betweenness centrality algorithm.
Specifically, we modify Brandes' algorithm (Brandes 2001)
to start with the path that has the lowest probability of occur-
rence to be the one to backtrack from, enabling computation
of the betweenness centrality in O(cid:16)V E + V 2 log V (cid:17).
Comparison with Discrete Graphs
The formulation of MLH Paths has inherent benefits, most
notably with its direct connection to the previously well-
studied notions of shortest paths and betweenness central-
ity in discrete graphs. In fact, we can view a discrete graph
G as being a special case of probabilistic graph with edge
probabilities:
(5)
P (eij) = (cid:26)1
0
if an edge exists
if the edge does not exist
ij
We denote the distribution of graphs defined by these prob-
abilities as G1. Note that the only graph in G1 with non-zero
probability is G -- since if an edge exists in a discrete graph,
then it exists with complete certainty, likewise, if an edge is
not present, we are certain it does not exist, thus P (G) = 1.
Theorem 1. For every pair of nodes vi and vj, the shortest
path in the discrete graph (ρij ∈ G) is equal to the most
probable path discovered by the MLH algorithm (ρMLH
∈
G1), for 0 < β < 1.
Proof. In G1 every P (eij) is either 1 or 0, thus every case
where P (ρij ) > 0 is precisely P (ρij) = 1. If we choose
the shortest path from the discrete graph, it will have length
l∗ = ρij , and the MLH probability for the same path will
be βl∗. Clearly, if a longer path were chosen by MLH, its
probability would be less than βl∗ , and we know that no
shorter paths exist -- since all paths shorter than ρij would
involve an edge than did not exist in G and thus would have
probability 0 .
Corollary 1. The betweenness centrality using shortest
paths on a discrete graph G can be equivalently calculated
with most probable handicapped paths over G1, where edge
probabilities are defined by Equation 5.
Proof. This follows directly from Thm 1.
Probabilistic Clustering Coefficient
We now outline a probabilistic measure of clustering
coefficient that can be computed without
the need for
sampling. If we assume independence between edges,
the probability of a triangle's existence is equal to the
product of the probabilities of the three sides. The ex-
pected number of triangles is then the sum of the tri-
angles probabilities that
include a given node vi. De-
to be the expected triangles including vi:
noting Tri
[P (eij) · P (eki) · P (ejk)]. De-
noting Coi to be the expected combinations (i.e., coexist-
ing pairs) of the neighbors of vi, we then get: EG [Coi] =
EG [Tri] =Pvj ,vk∈Ni,vj 6=vk
[P (eij ) · P (eki)]. We can then define the
Pvj ,vk∈Ni,vj 6=vk
probabilistic clustering coefficient to be the expectation of
the ratio Tri/Coi, and approximate it via a first order Taylor
expansion (Elandt-Johnson and Johnson 1980):
CCi = EG (cid:20) Tri
Coi(cid:21) ≈
EG [Tri]
EG [Coi]
(6)
Assuming again that the maximum degree in the graph
can be bounded by a fixed constant, we can compute the
probabilistic clustering coefficient in O(V ) time (O(1) for
each node). Additionally, the probabilistic approximation to
the clustering coefficient shares connections with the tradi-
tional clustering coefficients on discrete graphs.
Theorem 2. The probabilistic clustering coefficients com-
puted in G1, with probabilities defined by 5 for a discrete
graph G, are equal to the discrete clustering coefficients cal-
culated on G.
Proof. Any triangle from G has probability 1 in G1, while
any non-triangle in G clearly has probability 0. The same is
true for the combinations of pairs of neighbors. As such, the
sums of the numerators and denominators will be equal for
both clustering coefficient.
Experiments
To investigate the performance of our proposed MLH and
sampling methods for average path length, betweenness
centrality and clustering coefficient, we compare to tradi-
tional baseline social network measures on data from Enron,
DBLP, and Facebook. These datasets all consist of time-
stamped transactions among people (e.g., email, joint au-
thorship). We will use the temporal activity information to
derive probabilities for use in our methods, and evaluate our
measures at multiple time steps to show the evolution of
measures in the three datasets.
analysis we first use
Datasets
For our
the Enron dataset
(Shetty and Adibi 2004). The advantage to this dataset
is that it allows us to understand the effects of our prob-
abilistic measures because key events and central people
have been well documented (Marks ). We consider the
subset of the data comprised of the emails sent between
employees, resulting in a dataset with 50,572 emails among
151 employees.
Our second dataset is a sample from the DBLP computer
science citation database. We considered the set of authors
who had published more than 75 papers in the timeframe
1967-2006, and the coauthor relationships between them.
The resulting subset of data consisted of 1,384 nodes, with
23,748 co-authors relationships.
Our third dataset is from the Purdue University Facebook
network. Specifically we consider one year's worth of wall-
to-wall postings between users in the class of 2011 subnet-
work. The sample has 2,648 nodes with 59,565 messages.
Methodology
We compare four network measures for each timestep t in
each dataset. When evaluating at time t, each method is able
to utilize the graph edges that have occurred up to and in-
cluding t. As baselines, we compare to (1) an aggregate
method, which at a particular time t computes standard mea-
sures for discrete graphs (e.g., BCR) on the union of edges
that have occurred up to and including t, and (2) a time slice
method, which again computes the standard measures, but
only considers the set of edges that occur within the time
window [t − δ, t]. For the Enron and Facebook, we used
δ = 14 days and for DBLP, we considered δ = 1 year.
We then compare to the sampling and MLH measures.
For both the probabilistic methods, we need a measure of
relationship strength to use as probabilities in our model.
Although any notion of relationship strength can be substi-
tuted at this step, in this work we utilize a measure of re-
lationship strength based on decayed message counts. More
specifically, we define two separate and distinct notions of
connection between nodes: edges and messages. We define
an edge eij to be the unobservable probabilistic connection
between two nodes, indicating whether the nodes have an
active relationship. This is in contrast to messages: a mes-
sage mij is a concrete and directly measurable communica-
tion between two nodes vi and vj, such as a wall posting or
email, occurring at a specific time, which we denote t(mij ).
We define the probability of of nodes vi and vj having an
active relationship at the current timestep tnow, based on
observing a message at time t(mij ), to be the exponential
decay of a particular message:
(tnow − t (mij))(cid:27)
P (cid:0)et
Note that the scaling parameter λ refers to the adjustment
of the basic time unit (e.g. 7 days to 1 week), not the rate
parameter which defines the exponential probability density
function, which in this case is 1. This allows for assigning
a probability of 1 to the case when t (mij) = tnow, but it
also assigns reasonable probabilities (i.e., slows the decay)
for messages that happened in the recent past, which could
still indicate active relationships.
ij mij(cid:1) = Exp (mijtnow, λ) = exp(cid:26)−
1
λ
Now, we assume we have k messages between vi and
vj, and any of the messages m1
ij can contribute to
the relationship strength, which is defined to be 1 minus the
probability that none of them contribute:
ij, . . . , mk
ijm1
ij, . . . , mk
P (cid:0)et
ij(cid:1) = 1 −Yk (cid:0)1 − Exp(cid:0)mk
ijtnow(cid:1)(cid:1)
In order to choose a scaling parameter λ for the expo-
nential decay, we measured the average correlation from the
sampling method BCR against the time slice ranking and ag-
gregate method for each Enron employee, for different val-
ues of λ (see Figure 1.a). Note that a λ close to 0 corresponds
to 'forgetting' a transaction quickly and is highly correlated
with the slice method, while a large λ corresponds to 're-
membering' a transaction for a long time, giving it high cor-
relation with the aggregate method. In order to balance be-
tween short term change and long term trends we set λ to a
'middle ground' with λ = 28 days. This applies to both the
Enron and Facebook datasets. For DBLP, where we evaluate
n
o
i
t
a
l
e
r
r
o
C
1
0.8
0.6
0.4
0.2
0
Aggregate / Sample
Slice / Sample
Slice / Aggregate
101
103
Scaling Parameter λ (Days)
102
(a)
n
o
i
t
a
l
e
r
r
o
C
1
0.8
0.6
0.4
0.2
0
Sampling
Aggregate
Slice
0
50
100
0
50
100
s
g
n
i
k
n
a
R
e
c
i
l
S
0
50
100
s
g
n
i
k
n
a
R
e
t
a
g
e
r
g
g
A
.
)
3
=
β
(
s
g
n
i
k
n
a
R
L
M
0.2
0.4
Handicap Parameter β
0.6
0.8
(b)
1
150
150
100
50
Sample Rankings
(c)
0
150
150
100
50
Sample Rankings
(d)
0
150
150
100
50
Sample Rankings
0
(e)
Figure 1: (a) Correlation between methods for varying values of λ. (b) Correlation of MLH with other methods as β is varied.
(c-e) Correlations of Enron employee BCRs across methods, for the time segment ending August 24th, 2001
yearly, λ is set to 2 years to keep the ratio between time slice
and λ consistent between Facebook, Enron, and DBLP.
In order to choose a value for the β parameter in the MLH
method, we measured the average correlation of the BCR
from the MLH method and compared them to the sampling,
aggregate, and slice rankings for different values of β. We
can see in Figure 1.b that as long as β is non-zero, it has
minimal effect on the correlations. For the experiments re-
ported in this paper, we set β = .3. Note that omission of
the prior (i.e., β = 1) in will make the MLH paths similar to
the slice paths, with added paths between vertices which are
disjoint in a particular time slice.
The final parameter setting is the number of samples to
consider in each of sampling-based measures. Earlier we
discussed how we are computing the joint instances of short-
est paths, and that the bound by (Potamias et al. 2009) does
not hold. Due of this, we exploit the small size of the En-
ron dataset and take 10,000 samples; however, with the two
larger graphs we use a smaller sample size of 200 in order to
make the experiments tractable.
Method Correlations on Enron Data
In order to illustrate the differences between the four meth-
ods, we analyze their respective BCR on the Enron data for
the time window ending August 14th, 2001. Figure 1.c-e
shows the correlations of employee BCR across a pair of
methods: points on the diagonal green line indicate 'perfect'
correlation between the rankings of two methods.
Figure 1.c shows that the MLH method closely matches
the sampling method, with only a few nodes varying from
the diagonal. However, a large number of nodes that the sam-
pling method determines to have high centrality are missed
by the slice method, due to the slice's inability to see transac-
tions that occurred prior to the evaluation time window. Ad-
ditionally, we note that August 14th, 2001 is relatively late
in the Enron timeline, which results in the aggregate method
having little correlation with the sampling method, since the
more recent changes are washed out by past transactions in
the aggregate approach.
Local Trend Analysis
Lay and Skilling Here, we analyze two key figures at En-
ron: Kenneth Lay and Jeffery Skilling. These two were cen-
tral to the Enron scandal -- as first Lay, then Skilling, and
then Lay again, assumed the position of CEO. We can an-
alyze the BCR for Lay and Skilling during these transition
periods, as we expect large changes to affect both of them.
(a)
(c)
(b)
(d)
Figure 2: BCR of Lay and Skilling over time. Red lines in-
dicate Skilling's CEO announcement and resignation.
The first event we consider (marked by a vertical red line
in Figure 2) is December 13th 2000, when it was announced
that Skilling would assume the CEO position at Enron, with
Lay retiring but remaining as a chairman (Marks ). In Fig-
ure 2.a, both the sampling method and the MLH method
identify a spike in BCR for both Lay and Skilling directly
before the announcement. This is not surprising, as presum-
ably Skilling and Lay were informing the other executives
about the transition that was about to be announced.
The time slice method (2.c) produces no change in Lay's
BCR, despite his central role in the transition. Skilling shows
a few random spikes of BCR, which illustrates the variance
associated with using the time slices. The aggregate model
(2.d) fails to reduce Skilling's BCR to the expected levels
following the announcement -- this is fairly early in time and
we are already seeing the aggregate method's inability to
track current events based on its union of all past transac-
tions. Both the sampling method and the MLH methods cap-
ture this; MLH has him return to an extremely low centrality,
while sampling has fairly low with some variance.
The second event we consider (marked by the 2nd verti-
cal red line in Figure 2) is August 14th 2001, when, seven
months after initially taking the CEO position, Skilling ap-
proached Lay about resigning (Marks ). During the entirety
of Skilling's tenure, we see that Lay has a slight effect on
the sample rankings but is not what would be considered
a 'central' node. Not surprisingly, Skilling has a fairly high
centrality during his time as CEO; both the sampling method
and MLH method capture this.
.
)
3
=
β
(
s
g
n
i
k
n
a
R
L
M
0
500
1000
1500
2000
2500
v
a
v
c
3000
03/08
06/08
09/08
Date
(b)
v
b
12/08
03/09
0
500
1000
1500
2000
2500
s
g
n
i
k
n
a
R
e
c
i
l
S
v
a
v
c
v
b
3000
03/08
06/08
0
500
1000
1500
2000
2500
s
g
n
i
k
n
a
R
e
t
a
g
e
r
g
g
A
v
a
v
c
12/08
03/09
09/08
Date
(d)
v
b
3000
03/08
06/08
12/08
03/09
09/08
Date
(f)
(a)
(c)
(e)
Figure 3: (a,c,e) BCR of Kitchen and Lavorato. (b,d,e) BCR
for 3 nodes in the Purdue Facebook network.
Prior to the announcement of Lay's takeover as CEO, the
slice method still had no weight on him, despite his previous
involvement with the first transition. Also, we note that the
sampling, MLH, and slice methods all agree that after Lay's
initial spike from the Skilling resignation, he resumes hav-
ing a lower centrality, which the aggregate method misses.
In general, the sampling method seems to mirror the slice
method, albeit with less variance, but it not as smooth as
the MLH method, indicating the utility of considering most
probable paths.
and
(Shetty and Adibi 2004)
John Lavorato, who were
Kitchen and Lavorato Next we
analyze Louise
execu-
Kitchen
for Enron Americas,
tives
which was
the wholesale trading section of Enron
(Raghavan, Kranhold, and Barrionuevo ). They are notable
because of the extraordinarily high bonuses they received as
Enron was being investigated, and were also found to have
a high temporal betweenness centrality using the method
defined by (Tang et al. 2010). We can see in Figure 3 (a,c,e)
the rankings of Kitchen and Lavorato, and can see the bene-
fit of using the probabilistic framework's ability to key in on
centralities at specific times, rather than using the temporal
definition through time proposed by (Tang et al. 2010). We
see that while Lavorato might have gotten a large bonus,
he is only important during Skilling's tenure as CEO; his
centrality drops noticeably otherwise. On the other hand,
Kitchen had extremely high rankings throughout.
Here, we see that the slice method exhibits high variabil-
ity, especially with Kitchen, while the aggregate cannot rec-
ognize Lavorato's lack of importance after Skilling's depar-
ture. The MLH method is able to smoothly capture Kitchen's
centrality, while keeping Lavorato important solely during
Skilling's CEO tenure.
Facebook Centrality Unlike the Enron dataset, the Pur-
due Facebook dataset does not have well-established ground
truths, where we can use the known characteristics and be-
haviors of particular nodes for evaluation. However, we can
examine aspects of a few representative nodes to illustrate
the problems that lie with usage of the aggregate or static
methods. First, we can see from Figure 3.d that va (red) has
a consistently high ranking in the slice method, which the
MLH method captures (3b). However, this person has a de-
clining ranking in the aggregate method, as the aggregate is
unable to capture current events -- past information in the ag-
gregate graph results in many paths that bypass va, missing
this central node in later timesteps.
The next person we consider is denoted by vb (green). In
3.d, we can see that the slice method initially identifies this
person as having high centrality, then their BCR bottoms
out, and then peaks a few times again approximately mid-
way through the timeline. The MLH method also initially
identify vb as central, with a degradation over time. In con-
trast, the aggregate method fails to detect the inactivity later
in the timeframe and continues to give vb a high centrality
ranking throughout the entire time window.
The final person we consider is denoted by vc (blue) in
Figure 3. We can see in 3.d that the slice method exhibits
large variability for vc, but that there are many slices in the
middle to end of the timeframe where the node is identified
as highly central. The aggregate method is unaware of this
activity and ranks vc at a relatively low level throughout the
timeseries. In contrast, the MLH method is able to recognize
the node's growing importance as time evolves, and do so
much more smoothly than the slice method (3.d). In doing
so, the MLH method can find instances of high centrality
when both discrete methods fail.
Global Trend Analysis
In Figure 4, we report the average path lengths for the var-
ious measures: MLH paths, probabilistic shortest paths, the
aggregate shortest paths and the slice shortest paths. Ad-
ditionally, we report the average sampled clustering coef-
ficient, the clustering coefficient approximation, and the ag-
gregate and slice discrete clustering coefficients. These are
done for each of the three datasets through time, and we
investigate changes in these global statistics to understand
what, if any, changes occur with respect to the small world
network structure of the data (Watts and Strogatz 1998).
In Figures 4.a,c,e, we show the clustering coefficients for
each of the three datasets. The aggregate graph significantly
overestimates the amount of current clustering in the graph,
while the slice method is highly variable, especially for En-
ron. In general, both probabilistic measures are in between
the two extremes, balancing the effects of recent data and
decreasing the long term effect of past information, with the
MLH performing similarly to the sampled clustering coeffi-
cient, and even better on DBLP, where sampling undercuts
the clustering (likely due to small sample size).
0.6
Aggregate
Slice
Sampling
ML
C
C
n
o
r
n
E
0.3
7
6
5
4
3
2
1
h
t
g
n
e
L
h
t
a
P
n
o
r
n
E
Aggregate
Slice
Sampling
ML
09/21/01
07/05/02
03/07/00
12/13/00
Date
(a)
Aggregate
Slice
Sampling
ML
0
05/11/99
0.3
0.2
0.1
C
C
P
L
B
D
0
05/11/99
14
12
10
8
6
4
2
h
t
g
n
e
L
h
t
a
P
P
L
B
D
09/21/01
07/05/02
03/07/00
12/13/00
Date
(b)
Aggregate
Slice
Sampling
ML
0
1967
1976
1986
Date
(c)
1996
2006
0
1967
1976
1996
2006
1986
Date
(d)
Aggregate
Slice
Sampling
ML
0.2
0.1
C
C
k
o
o
b
e
c
a
F
15
10
5
h
t
g
n
e
L
h
t
a
P
k
o
o
b
e
c
a
F
0
03/08
12/08
03/09
06/08
09/08
Date
(e)
0
03/08
Aggregate
Slice
Sampling
ML
12/08
03/09
06/08
09/08
Date
(f)
Figure 4: Average path lengths and clustering coefficients
for Enron (a,b), DBLP (c,d) and Facebook (e,f).
of
these
Next,
diameter
small world
in Figures 4.b,d,f, we examine the shrink-
networks
ing
the
(Leskovec, Kleinberg, and Faloutsos 2005).
aggregate underestimates the path length at a current point
in time. We can see that the most probable paths closely
follows the sampling results, with both lying between the
slice and aggregate measures while avoiding the variability
of the slice method.
Here,
Conclusions
In this paper we investigated the problem of calculating cen-
trality and clustering in an uncertain network, and analyzed
our methods using time evolving networks. We demon-
strated the limitation of using an aggregate graph represen-
tation to capture uncertainty in the network structure due to
changes over time, as well as the limitation of using a slice-
based representation due to its extreme variability. We in-
troduced sampling-based measures for average shortest path
and betweenness centrality, as well as measures based on
the most probable paths, which are more intuitive for cap-
turing network flow. We also outlined exact methods for the
computation of most probable paths (and by extention, most
probable betweenness centrality), and incorporated the no-
tion of transmission probability. Additionally, we developed
a probabilistic clustering coefficient and gave a first order
Taylor expansion approximation for computation.
We provided empirical evidence on the Enron, DBLP, and
Facebook datasets showing the sampling and MLH's intu-
itive centrality rankings for the Enron employees and Face-
book members, as well as the global properties for all three.
The probabilistic centrality and clustering formulations are
inherently smoother than the measures computed from dis-
cretized time slices, however they can reason about likely
change in graph structure due to changes over time, un-
like the aggregate method, which includes all past infor-
mation. We see the MLH formulation is smoother than the
sampling method, indicating that the most probable paths
through the graph may be more important to consider than
shortest paths. Finally, we note that our experiments used
a relatively simple estimate of relationship strength for the
edge probabilities in the network. In future work we will in-
vestigate alternative formulations of edge uncertainty.
Acknowledgements
This material is based in part upon work supported by the In-
telligence Advanced Research Projects Activity (IARPA) via Air
Force Research Laboratory contract number FA8650-10-C-7060.
The U.S. Government is authorized to reproduce and distribute
reprints for Government purposes notwithstanding any copyright
annotation thereon. Disclaimer: The views and conclusions con-
tained herein are those of the authors and should not be interpreted
as necessarily representing the official policies or endorsements,
either expressed or implied, of IARPA, AFRL or the U.S. Govern-
ment. Pfeiffer is supported by a Purdue University Frederick N.
Andrews Fellowship.
References
[Bonacich 1987] Bonacich, P. 1987. Power and Centrality: A Fam-
ily of Measures. The American Journal of Sociology 92(5):1170 --
1182.
[Boragatti 2005] Boragatti, S. P. 2005. Centrality and Network
flow. Social Networks (27):55 -- 71.
[Brandes 2001] Brandes, U. 2001. A faster algorithm for between-
ness centrality. Journal of Mathematical Sociology 25:163 -- 177.
[Elandt-Johnson and Johnson 1980] Elandt-Johnson, R. C., and
Johnson, N. L. 1980. Survival models and data analysis. John
Wiley & Sons, New York :.
[Frank 1969] Frank, H. 1969. Shortest paths in probabilistic graphs.
In Operations Research, Vol. 17, No. 4 (Jul. - Aug., 1969), pp. 583-
599.
[Freeman 1977] Freeman, L. C. 1977. A set of measures of central-
ity based on betweenness. Sociometry 40(1):35 -- 41.
[Goldenberg, Libai, and Muller 2001] Goldenberg, J.; Libai, B.;
and Muller, E. 2001. Talk of the Network: A Complex Systems
Look at the Underlying Process of Word-of-Mouth. Marketing Let-
ters.
[Hua and Pei 2010] Hua, M., and Pei, J. 2010. Probabilistic path
queries in road networks: traffic uncertainty aware path selection.
In EDBT, 347 -- 358.
[Kossinets, Kleinberg, and Watts 2008] Kossinets, G.; Kleinberg,
J.; and Watts, D. 2008. The structure of information pathways
in a social communication network. In KDD '08, 435 -- 443.
[Leskovec, Kleinberg, and Faloutsos 2005] Leskovec,
J.; Klein-
berg, J.; and Faloutsos, C. 2005. Graphs over time: Densification
laws, shrinking diameters and possible explanations. In In KDD,
177 -- 187.
[Marks ] Marks, R. Enron timeline. http://www.agsm.edu.au/bobm/
teaching/BE/Enron/timeline.html.
[Newman 2005] Newman, M. J. 2005. A measure of betweenness
centrality based on random walks. Social Networks 27(1):39 -- 54.
[Onnela et al. 2007] Onnela, J.-P.; Saramki, J.; Hyvnen, J.; Szab,
G.; Lazer, D.; Kaski, K.; Kertsz, J.; and Barabsi, A.-L. 2007. Struc-
ture and tie strengths in mobile communication networks. Proc
Natl Acad Sci U S A 104(18):7332 -- 6.
[Potamias et al. 2009] Potamias, M.; Bonchi, F.; Gionis, A.; and
Kollios, G. 2009. Nearest-neighbor queries in probabilistic graphs.
[Raghavan, Kranhold, and Barrionuevo ] Raghavan, A.; Kranhold,
K.; and Barrionuevo, A. Full speed ahead: How enron bosses cre-
ated a culture of pushing limits. http://academic.udayton.edu/
lawrenceulrich/EnronBossesCreatingCulture.htm.
[Shetty and Adibi 2004] Shetty, J., and Adibi, J. 2004. The enron
email dataset database schema and brief statistical report.
[Tang et al. 2010] Tang, J.; Musolesi, M.; Mascolo, C.; Latora, V.;
and Nicosia, V. 2010. Analysing information flows and key medi-
ators through temporal centrality metrics. In SNS'10.
[Watts and Strogatz 1998] Watts, D.
J., and Strogatz, S. H.
1998. Collective dynamics of 'small-world' networks. Nature
393(6684):440 -- 442.
[Xiang, Neville, and Rogati 2010] Xiang, R.; Neville, J.; and Ro-
gati, M. 2010. Modeling relationship strength in online social
networks. In WWW 2010.
|
1605.08409 | 1 | 1605 | 2016-05-26T19:13:38 | Agent-based model of information spread in social networks | [
"cs.SI",
"physics.soc-ph"
] | We propose evolution rules of the multiagent network and determine statistical patterns in life cycle of agents - information messages. The main discussed statistical pattern is connected with the number of likes and reposts for a message. This distribution corresponds to Weibull distribution according to modeling results. We examine proposed model using the data from Twitter, an online social networking service. | cs.SI | cs | Agent-based model of information spread in social networks
D.V. Lande a,b, A.M. Hraivoronska a, B.O. Berezin a
a Institute for Information Recording NASU, Kiev, Ukraine
b NTUU "Kyiv Polytechnic Institute", Kiev, Ukraine
We propose evolution rules of the multiagent network and determine statistical patterns in
life cycle of agents – information messages. The main discussed statistical pattern is connected with
the number of likes and reposts for a message. This distribution corresponds to Weibull distribution
according to modeling results. We examine proposed model using the data from Twitter, an online
social networking service.
Keywords: social network, modeling, Weibull distribution, agent-based system, information
spread.
Introduction
The flows of information have a strong influence on opinion formation and
other processes in the society. Today social networks play a fundamental role as a
medium for the information spread. These facts motivate to explore mechanisms of
creation of information flows and influence on them. Dealing with this requires
focusing attention on modeling and finding laws or patterns in the spread of
information [1].
In this article we present an agent-based model of information spread. The
agent in this model is an information message [2]. A message published in social
network may cause different types of public reaction. This model involves types of
reaction such as positive or negative comments, respect or protest (we will call it
like/dislike); message may be shared or copied (repost); also one message may have a
link to another one (link). The evolution of the agent is controlled by mentioned
above types of reaction. The main attribute of the agent is ―energy‖ (E); that is
representation of current relevance of the message or a degree of interest to the topic
of the message by people. Naturally, a positive reaction or appearance of link to the
message cause increase of energy. In opposite way, energy decreases when the
1
message gets negative feedback. Anyway, energy tends to decrease because
information eventually becomes outdated.
The agent specification
More precisely the rules of agent evolution are as follows. Each agent appears
with the initial energy (E0) and dies when its energy becomes 0. The energy varies
during the agent's life cycle depending on the types of reaction. Let us list them all
and their impact on the energy:
like: energy is incremented;
dislike: energy is decremented;
repost: energy is increased by 2;
reference: energy is incremented;
In addition the energy is decremented at every time step (we consider the
evolution in discrete time).
On the other hand, the more relevance of the message, the more likely people
respond and express their opinion about information in this message. It is assumed
the probability to get some response depends on current energy of agent. We
introduce the probability of getting certain reaction for the agent with energy E as
follows
.
We denote by initial parameters of the model, and by some
monotone nondecreasing function from to [0, 1].
The simulation of information spread
Earlier we introduced the evolution rules for the agent. The information flow
consists of the set of such agents. We simulate the dynamics of the whole information
flow as follows. At the initial time only one agent exists. New agents may appear in
two ways. Firstly there is a probability of spontaneous generation ( ). It means that
new agent may appear with probability at every time step. Such appearance
2
corresponds to the publishing new information by somebody. Secondly a copy of
existing agent may be created (repost).
Here we describe the life cycle of one agent in terms of variation of its energy.
Let denote the value of energy at time t. Suppose is the random variable such
that
(
)
(
)
(
) (
)
Let us denote
. Then we have
It follows that we can consider a change of energy as the random walk on
{ } with transition probabilities
{
{ }
In other words the stochastic sequence is a Markov chain with
transition probabilities . A state diagram for this Markov chain is shown on Figure
1, using a directed graph to picture the state transitions.
Figure 1. A state diagram for Markov chain. States represent energy of an agent
The random walk of energy is useful approach to analysis of properties of the
model.
3
Model results
Now let us consider the statistical distribution of likes and reposts for messages
in the information flow. Note that we can find the probability to get n likes for one
agent according to the above theoretical approach.
Suppose an agent gets like at time t; then { }, otherwise { }.
{ }, if t and
any vector such that
Denote by
{ } otherwise for . It is easily proved that
∑
{ } ∑ ∑ ∏
Data generated by the model is illustrated in Figure 2.
Figure 2. Distribution of likes generated by model
The frequency distribution of likes (blue line with dots) increases at first, and
then decreases. It looks like a density function of the Weibull distribution [4]
{
)
(
(
)
4
In Figure 2 a density function of the Weibull distribution with the shape
parameter and the scale parameter is shown (red line). We get this
density function as an approximation for the frequency distribution of likes using the
method of least squares.
The frequency distribution of reposts and its approximation are shown in
Figure 3. Here a density function of the Weibull distribution has the shape parameter
and the scale parameter .
Figure 3. Distribution of reposts generated by model
Information flows in social networks
We study life cycles of news publications in Twitter and compare results with
output produced by the model. Data about increase of likes and retweets for special
information messages were collected [3]. We found that distributions of likes and
retweets from a real social network fit Weibull distribution similarly to the model
(Figure 5 and Figure 6). The shape parameter coincides with good accuracy in both
situations.
5
Figure 5. Distribution of likes from Twitter
Figure 6. Distribution of retweets from Twitter
We developed a computer program using R programming language for
analyzing statistical data. Processing was carried out in three following steps.
At first step the program detected increases in number of retweets for one user
in online mode. For example, messages of New York Times newspaper were scanned
every 15 minutes.
6
At second step the program treated data accumulated at the first step. We
applied Weibull distribution for data approximation, so the scale parameter and the
shape parameter were calculated. In addition, we estimated the rate of increase for
number of retweets.
At third step all gathered data were stored in the external data base for future
analysis.
To summarize, we collected texts of each message, timestamps for messages,
scale and shape parameters, and numerous graphs. These graphs represent number of
likes and retweets, the rate of growth for number of likes and retweets, and
approximation for number of likes and retweets with Weibull distribution.
Conclusion
We constructed agent-based model of message life cycle in social networks.
The statistical pattern for number of likes and reposts for information messages
was found. Distribution of likes and reposts satisfy Weibull distribution according to
modeling results. Model output is quite similar to the results from the real social
network. It follows that the statistical pattern exists in real social networks and the
model captures this pattern.
Findings described in this article can be useful for future studying of
information spread in social networks. Also the presented results can be applied to
detecting anomalies in a life cycle of information messages.
1. Dodonov A.G., Lande D.V., Prischepa V.V., Putiatin V.G. Competitive intelligence in
computer networks . – K .: IPRI NAS of Ukraine, 2013. – 248 p.
2. Hraivoronska A.M., Lande D.V. Agent-based approach to investigating dynamics of the
information flows // System analysis and information technologies: Materials of the 17th
International scientific conference SAIT 2015, Kiev, 22-25 June 2015 / UNK IASA NTUU
"KPI". – K .: ESC IASA NTUU "KPI‖, 2015. – C. 62-63.
3. Li R., Lei K.H., Khadiwala R., Chang K.C. TEDAS: A Twitter-based Event Detection and
Analysis System // Data Engineering (ICDE), 2012 IEEE 28th International Conference,
2012. - P. 1273-1276.
4. Neshitoy V.V. Mathematical and statistical analysis techniques in library and
informationtional activities. – Minsk: Belarus. State. Univ. of Culture and Arts, 2009. –
203 p.
7
|
1506.01730 | 1 | 1506 | 2015-06-04T21:07:39 | Coauthorship and Thematic Networks in AAEP Annual Meetings | [
"cs.SI",
"cs.DL"
] | We analyze the coauthorship production of the AAEP Annual Meeting since 1964. We use social network analysis for creating coauthorship networks and given that any paper must be tagged with two JEL codes, we use this information for also structuring a thematic network. Then we calculate network metrics and find main actors and clusters for coauthors and topics. We distinguish a gender gap in the sample. Thematic networks show a cluster of codes and the analysis of the cluster shows the preeminence of the tags related to trade, econometric, distribution/poverty and health and education topics. | cs.SI | cs | Coauthorship and Thematic Networks in AAEP Annual
Meetings
Juan M.C. Larrosa
[email protected]
Departamento de Economía, Universidad Nacional del Sur (UNS)
Instituto de Investigaciones Económicas y Sociales del Sur (IIESS)
======== First Draft ===========
Abstract
We analyze the coauthorship production of the AAEP Annual Meeting since 1964. We use
social network analysis for creating coauthorship networks and given that any paper must be
tagged with two JEL codes, we use this information for also structuring a thematic network.
Then we calculate network metrics and find main actors and clusters for coauthors and topics.
We distinguish a gender gap in the sample. Thematic networks show a cluster of codes and the
analysis of the cluster shows the preeminence of the tags related to trade, econometric,
distribution/poverty and health and education topics.
1. Introduction
Networks of collaboration among researchers have been presented since early times of science.
To co-author a paper means collaboration between at least two authors and is a way of learning,
sharing knowledge, and labor division. We construct networks of scientists in which a link
between two scientists is established by their coauthorship of one or more scientific papers.
These networks are affiliation networks in which actors are linked by their common
membership of groups consisting of authors of a paper. They are social networks with more
interaction than many affiliation networks (networks where people are connected to an event,
for instance); it is probably fair to say that most people who have written a paper together are
genuinely acquainted with one another. We study many statistical properties of our networks,
including numbers of papers written by coauthors, the timeline of papers presented, the topics
that identify each contribution, the typical distance through the network from one scientist to
another, and a variety of measures of connectedness within a network. Specifically, we estimate
centralities such as closeness, eigenvector and betweennes.
1
These specific networks became popular when mathematicians calculate their own Erdös
number by counting how many coauthors they share with any other coauthor of the prolific Paul
Erdös. Those who had published a paper with him were given a Erdös number of 1, those who
had published with one of those people but not with Erdös, a number of 2, and so on (Newmn).
So far, studies of current literature about coauthorship networks mostly give emphasis to
understand patterns of scientific collaborations, to capture collaborative statistics, and to
propose valid and reliable measures for identifying prominent author(s).
Coauthorship network, as an important kind of social network, has been intensively studied
(Newman (2001a, 2001b, 2003, 2005); Barabási et al. (2002); Nascimento et al. (2003);
Kretschmer (2004); Liu et al. (2005); Yin et al. (2006); Vidgen et al. (2007); Rodriguez and
Pepe (2008), Uddin et al. (2012), Rumsey (2006), Paredes (2011), Erfanmanesh et al. (2012),
Kurosawa and Takama (2012), Brandao and Moro (2012), Murray et al. (2006), Jahn (2008),
Maia et al. (2013), Murray et al. (2006), Day and Shih (2011)). A complex approach to diverse
and enormous datasets of different branches of the science is presented in Cotta and Merelo
(2005).
2. Coauthor networks
What is a co-authorship network? When two authors write a paper, they establish a link between
them. As long as other authors collaborate in producing one paper more links are included
relating each new co-author with all other previous authors. We study the way coauthorship
between economists who present contributions in a periodical professional meeting in Argentina
has been evolved in the past decades. The common place for exposing new contributions in the
Economics profession in Argentina has been the traditional Annual Meeting of the Asociación
Argentina de Economía Política (AAEP) where newly from recently graduated to old school
researchers and professors converges yearly for presenting a highly diverse supply of
contributions1.
Figure 1 shows four examples or real coauthorship networks constructed with data of AAEP
annual meetings. The central node of each (star-like) network is the named author. For instance,
the coauthorship network of Leonardo Gasparini shows several lines connecting only two nodes
(a paper of him and only one coauthor), triangles (a paper with two coauthors), and more
complicated forms. In the case of Walter Sosa Escudero’s coauthorship network shows also
lineas, triangles, and even a heptagon. This is the case of the largest coauthored paper presented
in the AAEP meetings with seven coauthors.
1 Chinchilla-Rodríguez et al. (2012) study a more broad approach to Argentinian scientific authors but
focusing on publications in indexed journals. Aguado-López et al. (2009) also find pattern of
collaboration among coauthors in Argentina.
2
Figure 1. Examples of AAEP coauthorship networks
Coauthorship network of Leonardo Gasparini
Coauthorship network of Walter Sosa Escudero
Note: Center of the star network is the named author. Source: The Author
Other contributions have added information on network of collaboration between economists.
Fafchamps et al. (2006) and Goyal et al (2006) present evidence of small world properties in an
enormous database of economist contributions. Bukowska et al. (2014) also present a specific
study of coauthorship between Polish economists2. These three previous papers focus in
structural properties of the network and focus on journal references. The first two conclude, as
well as in our case, that the collaboration community of economists represents a small world
framework, where most contributors belong to a huge connected component and they coexist
with several isolated participants.
As shown in Figure 2, the quantity in coauthored contributions in the AAEP Annual Meeting
has increased remarkably since the 1990s. Each of the networks depicted in the position upper
to the bars represents a ten year window for coauthorship papers. The earliest (network above
bars to the extreme left) is for the 60’s, the second for the 70’s, and so on. The last network
represent the 5 year- period of 2010-2014. It is clear that networks become larger and more
populated. The 90s marks a notorious increment and the last network also shows that the last
five years presents a level of activity similar to previous decade in terms of coauthorship.
2 Medical sciences have been prone to use this methodology. Valderrama-Zurián et al. (2007) uses
coauthorship network analysis but for a Spanish cardiologist journal and Ramírez Ruiz (2009) for Spanish
psychiatrist researchers. González-Alcaide and Navarro-Molina (2008) makes the same approach for
reproductive biology's literature. Olmeda‐Gómez et al. (2009) also study Spanish intra and interuniversity
and communities coauthorship. Medicis Morel et al. (2009) uses coauthorship for planning purposes in
disease prevention.
3
Figure 2. Evolution in the number of coauthorship papers and network of coauthors
We want to explore the pattern of co-authorship networks and to describe the collaboration
structure between authors, institutions and topics covered by the contributions. We will make
use of metrics of social network analysis, from to a network level (structural) and to actor level.
We use clustering (indirect approach), graph metrics (such as density, diameter, etc.), centrality
indices; cohesion measures (component, cliques)3. A first glance at the data can be observed in
Figure 3. The links of three big actors are enlarged in black.
3 Choobdar et al. (2012) use a motif approach for detecting groups in coauthorship networks.
4
Figure 3. Coauthorship network of AAEP Annual Meeting with its three main coauthors remarked
(1964-2014)
Note: Six main actors labeled and their links are enlarged. Network layout is Harel-Koreln Fast Multiscale
(HKFM)
2.1 Methods
To undertake this study we identified conference papers published in the AAEP site during
1964-2014. For each paper selected we identified the name and surnames of the authors, as well
as their institutional affiliation (institution) and one or two JEL codes of the paper. The network
consists in 890 nodes and 1644 edges.
We obtained a series of measures to allow for the analysis of structure or social networks. If we
take agents (authors or institutions) individually, we present 3 measures of centrality or
cohesion that facilitate detailed analysis of the social network studied: degree, and indices of
betweenness and closeness.
Several social network metrics are employed that enable to measure the characteristics of a
network, including components analysis and centrality analysis. Explanations for component
analysis and the metrics used are as follows.
5
2.1.1 Component Analysis
A component of a network is a substructure in which there is at least a path connecting a node
and any other node. A network may include some components which are isolated from each
other without any connections. The size of a component indicates the number of nodes it
contains. Component analysis is used to study the network structure. The component analysis is
employed to study academic circles of the AAEP proceedings in this paper.
2.1.2 Centrality Analysis
The earliest pursued category of methodology in the social network analysis is the
centrality of individuals and organizations in their social networks. Different kinds of
centralities including degree, betweenness and closeness, give rough indications of the social
power from several different perspectives of a node based on how well they “connect” the
network4.
Degree centrality denotes the number of links connected to a node in the network. Important
nodes usually have high degree.
is the degree of node
and is calculated by the
equation as follows.
where
equals 0 or 1, 0 means actor i has no tie with actor j, while 1 means they do have a
link.
The normalized value of degree centrality of actors in the network can be calculated by the
formula as follows.
The g represents the total number of the actors in the network. Degree indicates in our case the
number of different economists, a specific author or several other authors, that are directly
connected with, and is obtained by identifying and subsequently quantifying relationships of
coauthorship. It's a measure that reflects the greater or lesser extent of collaboration maintained
by authors.
Betweenness indicates the extent to which a particular node lies between the various
other nodes in the network. For instance, among 3 nodes, A, B and C, A is connected with C
and B is connected with C, but no connection exists between A and B. Therefore, C is the key
node between A and B when A and B want to connect to each other. The role of broker or
gatekeeper is played by the actor with high betweenness who at same time is endowed a
potential for control over others.
The betweenness centrality of a node in a network is calculated by the following formula.
4 Abbasi et al. (2011) uses these metrics for correlating with coauthor personal academic performance.
6
DiCninDiijijCnXijX1ijDiijXCngThe normalized value of the betweenness centrality of a node in a network is calculated by the
following formula.
Betweenness determines the extent to which an agent is situated in the middle of or between
other agents in the network, permitting us to make interconnections. Betweenness measures the
prestige of authors and institutions and their capacity to access and control information flow. It
is calculated as the sum of the shortest paths between the 2 agents that include between them the
agent in question.
Eigenvector centrality is calculated by assessing how well connected an individual is to the parts
of the network with the greatest connectivity. This information is derived by the eigenvalues of
the eigenvector of the adjacency matrix of the network (matrix representation of the graph).
Individuals with high eigenvector scores have many connections, and their connections, have
many connections as well. The mathematical notion behind eigenvectors is that we can express
the matrix of nodes’ connections (adjacency) with a set of characteristic values that are assigned
to each individual. Eigenvector centrality scores correspond to the score you get for individuals
if you start by constructing the connections node-to-node between all individuals in a network,
and then assign a single number to each individual while attempting to keep the distances
between these new values equal to the observed distances. Of course this can’t be done with a
single numeric value per individual, but in fact you can always represent a set of social
connections or distances by assigning as many vectors (strings of numbers for each individual)
as there are individuals in the network.
High eigenvector centrality individuals are leaders of the network. They are often public figures
with many connections to other high-profile individuals. Thus, they often play roles of key
opinion leaders and shape public perception. However, these persons are not necessarily
associated to another centrality measures (like betweenness and degree).
PageRank centrality outputs a probability distribution used to represent the likelihood that by
randomly exploring on the links of a network one will arrive to any particular other author.
PageRank works by counting the number and quality of links to an author (in our case) to
determine a rough estimate of how important the author is. The underlying assumption is that
more important authors are likely to receive more links from other coauthors.
7
2BijkijkjkCngng212jkijkjkBigngCnggFigure 4. Total papers presented at the AAEP Annual Meeting (single and coauthored)
2.2 Descriptive Data of the Proceedings
As mentioned earlier, the AAEP is the Asociación Argentina de Economía Política (Argentinian
Political Economics Association) and congregates most of the professional and academic
economists in the country. It has been realized one annual meeting since 1964 in different
universities and cities across the country. In 1966 and 1973 the meeting was suspended. As a
byproduct of each meeting the association prints the proceedings of each meeting that are
actually online.
Papers have been primarily single-authored with a decreasing trend. As Figure 4 depicts, most
papers were single-authored initially up to mid-seventies but it with the beginning of the
nineties where Single authored papers have preeminent in the proceedings of the congress up to
1999 when coauthored contributions surpassed them in quantity. As the ratio
Single/Coauthored (S/C) shows in the dashed line coauthorship have been steadily increasing
(S/C ratio decreasing) since the 1970s.
2.3 Small world
In graph theory, a connected component of an undirected graph (such as our case) is a subgraph
(a network inside the network) in which any two vertices are connected to each other by paths
(steps of links connecting nodes), and which is connected to no additional vertices in the
supergraph (the rest of the network). The whole network has up to 17 connected components but
the main component add up the 96% of nodes and 98% of links (see Table 1). This is a case of
the small world phenomenon (SWP) with a big connected component that connects most of the
nodes. A very simple measure of SWP is that the natural logarithm of the total of nodes
(ln(890)=6.74) roughly approximates to the average distance among peers (8.45). The diameter
of the larger connected component is high requiring as much as 20 steps for beginning with one
8
node to reach its farthest node. The SWP is the observation that one can find a short chain of
colleagues, often of no more than a handful of individuals, connecting almost any two authors
on the network. It is equivalent to the statement that most pairs of individuals are connected by a
short path through the coauthorship network.
Table 1. Graph Metrics of Connected Components
Group
G1
G2
G3
G4
G5
G6
G7
G8
G9
G10
G11
G12
G13
G14
G15
G16
N
850
5
3
3
3
3
3
2
2
2
2
2
2
2
2
2
UE
1442
10
3
3
3
3
3
1
1
1
1
1
1
1
1
1
EwD
167
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
TE
1609
10
3
3
3
3
3
1
1
1
1
1
1
1
1
1
MGD
AGD
20
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
8,45
0,8
0,667
0,667
0,667
0,667
0,667
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
D
0,004
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
2
1
0
1
G17
Codification: N = Nodes; UE = Unique edges; EwD = Edges with duplicates; TE = Total edges; MGD = Maximum geodesic
distance (diameter); AGD = Average geodesic distance; D = Graph density (Source: The Author)
0,5
1
1
Another descriptive metric that is interesting to remark is presented in the composite Figure 5.
The main figure shows the distribution frequency of the degree among coauthors and the
inserted figure represents the same information but in log-log scale. As it’s observed, it is a long
tail distribution of degrees (fat-tail distribution). This is an indication for the presence of a
structure of diffusion of information congregated in hubs, or persons with many connections
that reach farther nodes. A network with fat-tail distribution of degree of nodes has good
properties for dissemination of information.
9
Figure 5. Frequency of Degrees and Log-log Representation
2.4 Affiliations
Members of the economic community in Argentina work in diverse public and private
institutions. These were classified into 19 national universities (Universidad Nacional de
Córdoba-UNC-, Universidad Nacional de La Plata –UNLP-, Universidad Nacional del Sur –
UNS-, Universidad de Buenos Aires –UBA-, Universidad Nacional de Cuyo –UNCu-,
Universidad Nacional de Salta –UNSa-, Universidad Nacional de Rosario –UNR-, Universidad
Nacional de Mar del Plata –UNMdP-, Universidad Nacional General Sarmiento –UNGS-,
Universidad Nacional del Litoral –UNL-, Universidad Nacional de Río Cuarto –UNRC-,
Universidad Nacional de Chilecito -UN Chilecito-, Universidad Nacional de la Patagonia San
Juan Bosco –UNPSJB-, Universidad Nacional de San Luis –UNSL-, Universidad nacional de
Morón –UNaM-, Universidad Nacional del Centro de la Provincia de Buenos Aires –UNCPBA-
, Universidad Nacional de Quilmes –UNQ-, Universidad Nacional de Tucumán –UNSTA-,
Universidad Nacional de San Martín –UNSAM-), 9 private universities (Universidad del CEMA
–UCEMA-, Universidad de San Andrés –UDESA-, Universidad Torcuato Di Tella –UTDT-,
Universidad Argentina de la Empresa –UADE-, Universidad Católica Argentina –UCA-,
Universidad Austral –Uaustral-, Universidad de Belgrano –UB-, Universidad Empresarial Siglo
21 -UES21-, Universidad Católica de Santa Fé –UCSF-), several Private/Public Research
Center, Foreign Universities, State Entities (ministries and the like), Private/Public Bank,
International Entities (UN, CEPAL, among others). Figure 6 shows up the clusters detected by
affiliation. Clusters are presented in circular network layout and the thinner links represent intra-
group coauthorship and broader links represent extra-group coauthorship. The size of each
circle network makes it easy to grasp what affiliations are more prominent than other.
10
Figure 6. Cluster by affiliation
2.4.1 Structural metrics
As Table 2 shows up the larger affiliation that engenders coauthorship to the meetings is UNC
with 130 coauthors followed in sharp difference by the UNL and UNS, 42 and 44 coauthors
below respectively.
Table 2. Cluster metrics of groups with more than 20 nodes
Label
N
UE
EwD
TE
CC
SVCC MVCC MECC MGD AGD D
UNC
130
226
UNLP
UNS
88
86
116
155
46
17
6
272
133
161
4
12
3
11
2
9
2
125
269
10
4,23
0,030
73
84
126
161
8
8
3,54
0,032
3,85
0,043
Foreign
University
Public/Pri
vate
Research
Central/Pr
ivate Bank
UCEMA
UDESA
UNT
State
Entity
UBA
UNCu
UTDT
UNSa
63
33
57
31
0
0
33
39
28
31
31
20
41
50
18
68
11
38
34
34
29
29
27
24
22
38
17
40
20
17
30
13
28
2
0
2
2
0
0
4
4
40
17
42
22
17
30
17
32
12
20
8
16
15
6
12
2
7
9
14
5
10
10
4
9
1
7
7
9
7
27
64
21
8
25
5
7
21
11
21
31
10
40
7
9
29
15
32
3
4
5
7
4
8
2
2
8
5
5
1,08
0,017
1,22
0,019
2,23
0,071
2,88
0,055
1,60
0,030
3,37
0,073
0,81
0,052
1,21
0,042
3,29
0,085
2,14
0,054
2,57
0,130
Codification: N = Nodes; UE = Unique edges; EwD = Edges with duplicates; TE = Total edges; CC = Connected components;
SVCC = Single-Vertex connected components; MVCC = Maximum vertices in a connected component; MECC = Maximum
edges in a connected component; MGD = Maximum geodesic distance (diameter); AGD = Average geodesic distance; D = Graph
density (Source: The Author)
After metrics have been estimated we obtain the correlations between them. Table 3 shows the
correlation matrix. The size of the cluster (N) is highly correlated with the presence of unique
edges (UE) and total edges (TE) for one side, and maximum vertices (MVCC) and edges
(MECC) in a connected component, for the other side. The five metrics are logically correlated
with the size of the cluster given that larger number of coauthors requires more links and
vertices. Density (D) is slightly negative correlated with almost all metrics except with those
related to diameter (MGD, AGD). Edges with duplicates (EwD), that represent repeated
coauthorships, are also related with the size (N, TE, UE, MVCC, MECC) of the cluster,
Table 3. Correlations among cluster metrics
N
UE
EwD
TE
CC
SVCC MVCC MECC MGD AGD
D
N
UE
TE
CC
1
0,935
1
EwD
0,780
0,838
1
1
0,930
0,996
0,885
-0,062
-0,402
-0,373
-0,406
1
1
1
1
1
SVCC
-0,062
-0,402
-0,383
-0,408
0,995
MVCC
0,890
0,988
0,842
0,986
-0,508
-0,502
MECC
0,893
0,990
0,883
0,995
-0,490
-0,489
0,993
MGD
0,567
0,714
0,572
0,707
-0,618
-0,597
0,777
0,742
12
AGD
D
0,538
0,732
0,569
0,721
-0,736
-0,710
0,808
0,769
0,974
1
-0,525
-0,267
-0,147
-0,252
-0,632
-0,633
-0,168
-0,179
0,124
0,224
1
Source: The Author
3. Network of Coauthors
When analyzing important actors in the coauthorship sample we estimated actor’s centralities.
Gender differences emerge. Figure 7 shows the difference in size in male vs. female
coauthorship network.
Figure 7. Male and Female Coauthorship Sub-Networks
a) Male coauthorship network
b) Female coauthorship network
Source: The Author
A way to notice another gender differences we can anticipate that most centrality calculations
sensitively differ when considering male or female coauthorship subnetwork5. For instance,
Table 4 shows the deviations from the mean in centralities between genders. Male coauthors
surpass female colleagues in all centrality measures. Female, on the other hand, shows a slightly
upper estimation for clustering coefficient. That would mean women tend to join papers with
more coauthors.
5 Yan et al. (2009) use centrality measures for estimating the impact of their publication.
13
Table 4. Mean Deviations of each Metric by Gender
Betweenness
Degree
Centrality
Closeness
Centrality
Eigenvector
Centrality
PageRank
Clustering
Coefficient
Male
Female
3,1%
-6,4%
18,2%
-37,0%
5,0%
-10,9%
18,9%
-38,6%
4,4%
-8,9%
-6,0%
12,3%
Sample: Female: 279 individuals, Male: 566 individuals. Source: The Author
Before getting into individual actor analysis, we can observe in Figure 8 a matrix of scatterplots
between estimated full sample centralities. At first glance, PageRank and degree show a
remarkably correlation with a less clear image in the case of betweenness and PageRank and
degree. That is to say, actors with high degree tend to have high PageRank and in some cases
high betweenness.
Figure 8. Matrix of Scatterplots of Coauthor Centralities
14
DegreeBetweennessClosenessEigenvectorPageRank010203001020300500001000000500001000000.510.510.02.040.02.0402460246Having shown this difference among economists by gender, it is plausible to see more male
economists in the top of centrality measures. The following tables will remark this fact. In the
top ten considering the entire sample, given the gender gap presented in Table 4, we will observe
mostly male economist. So Table 6 to Table 8 show maxima from sample and for male
economists at the same time (with some exceptions visible in the table). Table 5 shows up actors
with the larger betweenness centrality. Fernando Navajas and Santiago Urbiztondo (both from
UCEMA). This centrality remarks economists that tend to connect groups otherwise
disconnected.
Table 5. Top Ten Betweenness Centrality Authors
Author
Degree
Betweenness
Affiliation
Navajas, Fernando H.
Urbiztondo, Santiago
Abdala, Manuel Angel
Spiller, Pablo T.
Heymann, Daniel
Sosa Escudero, Walter
Arrufat, José Luis
Porto, Alberto
Tohmé, Fernando
Canavese, Alfredo Juan
13
114033,23
FIEL
6
5
2
19
23
19
19
15
12
88394,89
UCEMA
87869,3
86203,3
85440,2
69798,03
69434,26
68620,18
48178,99
46950,28
UNC
UDESA
UBA
UDESA
UNC
UNLP
UNS
UTDT
In the cases of degree and eigenvector centralities, Table 6 shows that Leonardo Gasparini
(UNLP) has the maximum degree and has the second maximum Walter Sosa Escudero (UNLP
and UDESA). This order is reversed when considering eigenvector centrality, where Sosa
Escudero has the maximum followed by Gasparini. Higher degree points to coauthor having
worked with more other coauthors and eigenvector points out to coauthor having worked with
more important (in terms of degree) other coauthors.
Table 6. Top Ten Eigenvector Centrality Authors
Author
Degree
Eigenvector
Affiliation
23
28
15
19
11
11
9
6
6
6
Sosa Escudero, Walter
Gasparini, Leonardo
Marchionni, Mariana
Porto, Alberto
Streb, Jorge
Druck, Pablo
Rodriguez, Carlos A.
Bolzico, Javier
Henke, Alejandro
Rutman, José
UDESA
UNLP
UNLP
UNLP
UCEMA
Fundación del Tucumán
UCEMA
UCEMA
UCEMA
BCRA
0,041
0,04
0,027
0,019
0,019
0,019
0,018
0,017
0,017
0,017
15
PageRank centrality metric highlights authors that are more solicited by other coauthors for
producing contributions. Popular authors emerge clearly with this metric, and again, Gasparini
(UNLP) and Sosa Escudero (UDESA) jointly with Carrera (UNLP-BCRA) seem to be the most
popular coauthors in the event.
Table 7. Top Ten PageRank Centrality Authors
Author
Degree
PageRank
Affiliation
Gasparini, Leonardo
Carrera, Jorge
Sosa Escudero, Walter
Porto, Alberto
Heymann, Daniel
Gertel, Héctor
Galperín, Carlos
D´Amato, Laura
Arrufat, José Luis
Dabús, Carlos
28
20
23
19
19
22
15
20
19
16
6,289
5,227
5,221
4,783
4,766
4,689
4,372
4,269
4,089
4,004
UNLP
UNLP
UDESA
UNLP
UBA
UNC
UBA
BCRA
UNC
UNS
It is fair to remark that Sosa Escudero is the coauthor that emerges as the only economist in the
Top 10 of all centralities as observed in all the aforementioned tables.
Now let’s focus on the gender gap. Tables 9 to 12 show the centrality metrics for female
coauthor subnetwork. Specifically, Table 8 shows the top ten female economists sorted by
degree. Heading the list are two BCRA economists: Laura D’Amato and Tamara Burdisso.
Table 8. Top Ten Degree Centrality Female Coauthors
Author
Degree Affiliation
D´Amato, Laura
Burdisso, Tamara
Marchionni, Mariana
Moscoso, Nebel
London, Silvia
20 BCRA
17 BCRA
15 UNLP
15 UNS
12 UNS
Picardi de Sastre, Marta Susana
12 UNS
Cerro, Ana María
Paz Terán, Corina
Conte Grand, Mariana
Recalde, Maria Luisa
12 UNT
11 UNT
9 UCEMA
9 UNC
16
Table 9 shows a different picture in the top ten of the women economist having the highest
betweenness centrality metrics. Corina Paz Terán from UNT and Iris Perlbach de Maradona
(UNCu) are first and second, respectively. It is interesting to note that more than half of the
main female brokers in the network are from universities of the interior of the country. That
would mean that women tend to connect groups geographically disconnected.
Table 9. Top Ten Betweenness Centrality Female Coauthors
Vertex
Degree
Centrality Affiliation
Betweenness
Paz Terán, Corina
Perlbach de Maradona, Iris
Sarquis, Liliana
Juárez de Perona, Hada
London, Silvia
Navarro, Ana Inés
D' Elia, Vanesa
Conte Grand, Mariana
Burdisso, Tamara
Cerro, Ana María
11
7
7
5
12
5
6
9
17
12
41.468
32.301
31.609
31.321
23.854
23.124
UNT
UNCu
UNC
UNC
UNS
UNR
21.328
ANSES
19.200
UCEMA
17.797
16.327
BCRA
UNT
In Table 10 we present results from eigenvector centrality estimation. This time, emerge
Mariana Marchionni (UNLP) and Hildegart Ahumada (UTDT) as the two more important
nodes. It is worthy to note that Ahumada has less than half that Marchionni’s eigenvector
centrality and, as noted earlier, Marchionni has only the 65% of the same metric compared to
maximum male economist. All of the female economists in the top 10 are affiliated to institution
from the Buenos Aires Province.
Table 10. Top Ten Eigenvector Centrality Female Coauthors
Author
Marchionni, Mariana
Ahumada, Hildegart
D´Amato, Laura
Alzúa, María Laura
Gabrielli, María Florencia
Burdisso, Tamara
Serio, Monserrat
Edo, María
Viollaz, Mariana
Conconi, Adriana
Degree
Eigenvector
Centrality Affiliation
15
9
20
7
8
17
4
3
4
3
0,027
0,012
0,009
0,009
0,009
0,008
0,008
0,007
0,006
0,006
UNLP
UTDT
BCRA
UNLP
BCRA
BCRA
UNLP
UCEMA
UNLP
CEDLAS
17
Finally, Table 11 displays the top ten female economists according to PageRank centrality. This
metric is also highly correlated with degree in the female subnetwork, so it is unsurprisingly
similar to Table 8. D’Amato and Burdisso are the most central economist given by this metric
but it is interesting to note that more than half of the top ten are economist from the interior of
the country.
Table 11. Top Ten PageRank Centrality Female Coauthors
Author
Degree PageRank Affiliation
D´Amato, Laura
Burdisso, Tamara
Cerro, Ana María
Marchionni, Mariana
Moscoso, Nebel
London, Silvia
Conte Grand, Mariana
Paz Terán, Corina
Bergés, Miriam
20
17
12
15
15
12
9
11
9
4,269
BCRA
3,46
3,441
3,293
3,19
2,921
BCRA
UNT
UNLP
UNS
UNS
2,707
UCEMA
2,626
UNT
2,45
UNMdP
Picardi de Sastre, Marta Susana
12
2,352
UNS
4. Network of JEL categories
Each co-authored contribution is classified according to, at least, one or two JEL codes. This
facilitates analyzing what topics is co-present in the economic community that co-authored
papers in the AAEP event. We link each paper by the coincidence of its two JEL codes this way
providing a picture of the topics that are shared by the contributions.
The thematic network has 109 nodes and 451 unique links and 34 self-loop links. The density of
the graph is 0.071 and exhibit one connected component. The diameter of the network is 6 with
an average geodesic distance of 2.6.
We calculate the random walk closeness and betweenness centralities because of the presence of
self-loop in the data (Newman (2005)). Actually both centralities are highly correlated
(correlation of .98). Figure 9 show the JEL code network. Clusters were made by grouping
contributions within each general category (only first letter). Clusters are displayed in circular
network. Slimmer links represent intra-cluster links and broader links represent extra-cluster
links.
18
Figure 9. Clustering by JEL category
Again as in the previous section a descriptive metric about the diffusion property of the network
is presented in the composite Figure 10. The main figure shows the distribution frequency of the
degree among coauthors and the inserted figure represents the same information but in log-log
scale. As observed, it appears to have a long tailed distribution of degrees as in Figure 5. This is
too an indication for the presence of a structure of diffusion of information congregated in hubs,
or persons with many connections that reach farther nodes. A network with fat-tail distribution
of degree of nodes has good properties for dissemination of information.
19
Figure 10. Frequency of Degrees and Log-log Representation
Network metrics of the cluster by one-letter JEL code network are presented in Table 12. The
three larger clusters (higher N) correspond to C (Mathematical and Quantitative Methods), D
(Microeconomics) and L (Industrial Organization). The higher density (D) in E
(Macroeconomics and Monetary Economics) implies that macroeconomists tend to repeat the
code. The highest diameter (MGD) in C (Mathematical and Quantitative Methods) and O
(Economic Development, Technological Change, and Growth) implies that both JEL codes are
related to other far diverse JEL codes across contributions. A (General Economics, Handbooks
and Teaching), M (Business Administration and Business Economics; Marketing; Accounting),
P (Economic Systems), and Z (Other Special Topics) are isolated codes barely used by authors.
Table 12. Network metrics for JEL codes network
N
TE
SL
CC
SVCC
MVCC
MECC
MGD
AGD
D
2
3
10
10
0
2
13
8
7
14
0
1
3
4
3
2
2
2
6
1
2
1
1
4
0
1
2
9
4
7
20
0
1
13
5
14
0
1
4
3
2
-
-
0,40
0,33
1,93
0,22
1,00
0,09
1,27
0,52
JEL
Code
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
Z
6
4
9
4
8
4
10
2
7
6
4
6
6
1
10
5
11
6
15
2
7
0
3
6
0
7
2
0
4
3
3
3
4
1
0
0
2
1
0
1
1
0
2
2
3
1
2
3
3
2
6
1
4
1
5
1
1
1
2
0
1
2
1
2
5
0
4
0
4
1
5
3
7
4
7
2
5
1
2
6
1
6
2
1
10
5
11
6
15
2
4
0
1
6
0
7
2
0
2
2
3
2
2
1
3
0
1
4
0
3
1
0
1,12
0,40
0,89
0,33
1,63
0,22
1,13
0,50
1,27
0,39
0,50
0,17
1,37
0,16
-
-
0,33
0,05
1,72
0,33
-
-
1,44
0,40
0,50
0,07
-
-
Labels: A – General Economics, Handbooks and Teaching; B – History of Economic Thought, Methodology, and Heterodox
Approaches; C – Mathematical and Quantitative Methods; D – Microeconomics; E – Macroeconomics and Monetary
Economics; F – International Economics; G – Financial Economics; H – Public Economics; I – Health, Education, and
Welfare; J – Labor and Demographic Economics; K – Law and Economics; L – Industrial Organization; M – Business
Administration and Business Economics; Marketing; Accounting; N – Economic History; O – Economic Development,
Technological Change, and Growth; P – Economic Systems; Q – Agricultural and Natural Resource Economics;
Environmental and Ecological Economics; R – Urban, Rural, and Regional Economics; Z – Other Special Topics.
Codification: N = Nodes; SL = Self-Loops; TE = Total edges; CC = Connected components; SVCC = Single-Vertex
connected components; MVCC = Maximum vertices in a connected component; MECC = Maximum edges in a connected
component; MGD = Maximum geodesic distance (diameter); AGD = Average geodesic distance; D = Graph density (Source:
The Author)
The correlation table of these variables is showed in Table 13. It shows that the size of the
cluster (N) is not only highly correlated with the number of edges (TE), maximum number of
vertices (MVCC) and diameter (MGD). This means that clusters with high number of JEL code
links end up connecting more other JEL code contributions. The high correlation between self-
loops (SL) and total edges (TE) take into account the repetitiveness of collaborations between
same authors. Density (D), on the other hand, is negatively correlated with single vertex
components (SVCC) and positively correlated with maximum edges in component, in both
cases in an obvious manner.
21
Table 13. Correlation table for JEL codes network metrics
N
TE
SL
CC
SVCC
MVCC
MECC
MGD
AGD
D
N
1,00
TE
0,75
1,00
SL
0,55
0,78
1,00
CC
0,37
-0,19
0,08
1,00
SVCC
0,10
-0,40
-0,10
0,94
1,00
MVCC
0,75
0,93
0,61
-0,29
-0,49
1,00
MECC
0,64
0,98
0,76
-0,31
-0,47
0,93
1,00
MGD
0,78
0,73
0,51
-0,12
-0,39
0,87
0,67
1,00
AGD
0,75
0,84
0,57
-0,26
-0,51
0,95
0,82
0,96
1,00
D
0,22
0,67
0,58
-0,56
-0,73
0,64
0,70
0,53
0,66
1,00
Codification: N = Nodes; SL = Self-Loops; TE = Total edges; CC = Connected components; SVCC = Single-Vertex
connected components; MVCC = Maximum vertices in a connected component; MECC = Maximum edges in a connected
component; MGD = Maximum geodesic distance (diameter); AGD = Average geodesic distance; D = Graph density (Source:
The Author)
Trade (F1) and Welfare and Poverty (I3) are jointly the most chosen JEL codes (higher degree).
However, Economic Development (O1) is the pivotal topic of the contributions having both
maximum centrality in random walk closeness and betweenness followed by Trade. The code
associated to most referenced codes is Econometric Methods (C2) with the higher value in
eigenvector centrality.
Table 14. Centralities the JEL Codes of Coauthored Papers (sorted by degree)
Code-Area
F1 – Trade
I3 – Welfare and Poverty
C2 – Econometric methods: Single equation models; Single
variables
Q1 – Agriculture
E3 – Prices, Business Fluctuations, and Cycles
C1 – Econometric and Statistical Methods: General
I1 – Health
C4 – Econometric and Statistical Methods: Special Topics
C6 – Mathematical Methods; Programming Models;
Mathematical and Simulation Modeling
E2 – Macroeconomics: Consumption, Saving, Production,
Employment, and Investment
RW-
Closeness
Centrality
Eigenvector
Centrality
4,01
1,3
1,27
0,97
1,87
2,31
1,63
2,21
2,01
1,83
3,0
3,0
3,4
2,4
3,1
2,5
2,0
2,3
2,2
2,6
PageR
ank
2,895
2,889
2,608
2,749
2,37
2,226
2,421
2,23
2,164
2,013
RW-
Degree
Betweenness
Centrality
24,701
9,814
8,87
7,362
12,068
14,708
9,999
15,084
12,829
12,072
26
26
25
24
23
21
21
20
20
20
22
O4 – Economic Growth and Aggregate Productivity
C3 – Econometric Methods: Multiple or Simultaneous
Equation Models
G2 – Financial institutions and Services
H7 – State and Local Government; Intergovernmental
Relations
O1 – Economic development
F4 – Macroeconomic Aspects of International Trade and
Finance
E5 – Monetary Policy, Central Banking, and the Supply of
Money and Credit
I2 – Education
18
17
17
17
17
16
15
15
8,114
23,75
6,797
0,956
26,196
3,778
0,391
14,515
1,3
2,84
1,12
0,16
2,87
0,58
0,07
2,05
2,1
2,3
2,2
1,6
2,0
2,2
2,1
1,8
2,113
1,81
1,747
2,019
1,782
1,634
1,485
1,563
Bold figures represent maximum values in each variable. RW-Betweenness Centrality means random walk betweenness and
RW-Closeness means random walk closeness. Eigenvector centrality is the original metric multiplied by 100.
The analysis of the interaction between the centralities published in Table 14 was made by
observing scatter plots viz a viz each pair of centralities. A general positive relation among all
centralities is observed, in some cases clearer than in other, as seen in Figure 11.
Figure 11. Matrix of Scatter Plots of JEL Codes Centralities
23
DegreeRW-BetweennessEigenvectorCentralityPageRankRW-Closeness01020300102030010203001020300.02.040.02.04012301230.02.040.02.04All this information is summarizes in the correlation matrix of Table 15. Random walk
betweenness and closeness show high correlation meaning that codes more regularly used are
close one to the other and they are also the codes that unifies otherwise separate clusters of
topics. On the other hand, degree and PageRank and eigenvector also show high correlation,
meaning that highly used topics are also more popular directly and indirectly.
Table 15. Correlation matrix of centralities
Degree
RW-Betweenness Eigenvector
PageRank
RW-closeness
Degree
RW-Betweenness
Eigenvector
PageRank
RW-closeness
1
0,655
0,966
0,991
0,683
1
0,657
0,641
0,982
1
0,938
0,685
1
0,671
1
4.1 K-cores
A k-core in an undirected network is a connected maximal induced subgraph which has
minimum degree greater than or equal to k. Moreover in our case, a k-core is a maximal group
of JEL codes, all of whom are connected to some number (k) of other codes of the group. The
coreness score is the maximum value of k for which it is in a k-core. In our case, the 7-core is
the maximum value for k. It means that it takes to sever 7 links for any of the members of the
core for disconnecting it off the group. Figure 12 shows the subgraph representing the 7-core.
The red links are for the four JEL codes with the highest eigenvector centrality: C2
(Econometric methods: Single equation models; Single variables), E3 (Prices, Business
Fluctuations, and Cycles), I3 (Welfare and Poverty), and F1 (Trade).
24
Figure 12. 7-core of the network of JEL Codes
In Table 16 we publish the description of the codes for a better intuition about the relatedness of
the connections. If we focus on Figure 12 we defined that broader links represent repeated
interactions. In this case, at a glance, it seems that C2 and C4 interacts repeatedly with I2. So
studies on Education have been supported by empirical evidence analyzed by econometric
methods. It also can be noticed that Q1 and C6 are tagged jointly several times, grouping
Agriculture studies with mathematical methods. C3 and O4 (with I3) are also jointly marked,
given the idea that econometric methods also support evidence on growth poverty studies. A
more powerful relation is show between more obviously I3 and D3 where poverty and
distributional studies come together. F1 are often related to C2, C6 and Q1, meaning that trade
studies have been supported by econometrics and many times focused on agricultural markets.
Summarizing, this 7-core indicates a group of highly interconnected topics that are frequently
and jointly tagged among the contributions presented in the meeting.
25
Table 16. 7-core of JEL codes description
Code
C1 – Econometric and Statistical Methods: General
C2 – Econometric methods: Single equation models; Single variables
C3 – Econometric Methods: Multiple or Simultaneous Equation Models
C4 – Econometric and Statistical Methods: Special Topics
C6 – Mathematical Methods; Programming Models; Mathematical and Simulation Modeling
D3 – Distribution
E2 – Macroeconomics: Consumption, Saving, Production, Employment, and Investment
E3 – Prices, Business Fluctuations, and Cycles
E4 – Money and Interest Rates
E5 – Monetary Policy, Central Banking, and the Supply of Money and Credit
F1 – Trade
F3 - International Finance
F4 – Macroeconomic Aspects of International Trade and Finance
G1 – General Financial Markets
G2 – Financial institutions and Services
H5 – National Government Expenditures and Related Policies
H7 – State and Local Government; Intergovernmental Relations
I1 – Health
I2 – Education
I3 – Welfare and Poverty
J0 – Labor and demographic economics - General
J1 – Demographic Economics
J2 – Time Allocation, Work Behavior, and Employment Determination and Creation; Human capital
J6 – Mobility, Unemployment, and Vacancies
L6 – Industry Studies: Manufacturing
O1 – Economic development
O3 – Technological Change; Research and Development
O4 – Economic Growth and Aggregate Productivity
Q1 – Agriculture
R1 – General Regional economics
Source: The Author
5. Conclusions
We have presented data and analysis of coauthorship related to the state of the Economics
profession in Argentina. We focused our effort in an annual congress where the majority of the
community of economists in the country sends its production regularly. In this paper, we pave
the way to study the impact of certain measures, such as centralities, densities, degree
distributions, gender, location and affiliation in the production of economic contributions. The
general features of the networks suggest promotes diffusion and several actors emerge as hubs
of prestige. A thematic network is constructed by using the JEL codes (at most two for paper).
We find a cluster of repeatedly tagged codes of 30 JEL Codes up to the first digit. It shows the
importance of econometrics and mathematic models a supportive discipline of other more
26
theoretical areas such agricultural economics, distributive and educational studies, trade and
economic growth and development.
This is a first approach to the data and we think it opens a gate for study how the discipline has
been evolved in Argentina at the main national event.
References
Abbasi, A., J. Altmann, and L. Hossain (2011), “Identifying the Effects of Co-Authorship
Networks on the Performance of Scholars: A correlation and Regression Analysis of
Performance Measures and Social Network Analysis Measures”, TEMEP Discussion
Paper No. 2011:76.
Aguado-López, E., R. Rogel-Salazar, G. Garduño-Oropeza, A. Becerril-García, M. F. Zúñiga-
Roca, and A. Velázquez-Álvarez (2009), “Patrones de colaboración científica a partir de
redes de coautoría”. Convergencia Número Especial IA: 225-258.
Amblard, F., A. Casteigts, P. Flocchini, W. Quattrociocchi, and N. Santoro (2011), “On the
Temporal Analysis of Scientific Network Evolution”, International Conference on
Computational Aspects of Social Networks (CASoN): 169 – 174 [DOI:
10.1109/CASON.2011.6085938]
Barabási, A. L., Jeong, H., Neda, Z., Ravasz, E., Schubert, A., and Vicsek, T. (2002).
“Evolution of the social network of scientific collaborations”. Physica A, 311(3-4), 590-
614.
Belik, I. and K. Jornsten (2014), “The Coauthorship Network Analysis of the Norwegian School
of Economics”, Discussion Paper 20, Norwegian School of Economics (NHH).
Borracci, R.A., H.C. Doval, D. Manente, and C.D. Tajer (2009). “Redes de colaboración
científica en las publicaciones cardiológicas argentinas” Revista Argentina de
Cardiología, 77 (6): 487-492.
Brandao, M.A. and M.M. Moro (2012) “Affiliation Influence on Recommendation in Academic
Social Networks” Proceedings of the AMW.
Bukowska, G., J. Falkowski, and B. Lopaciuk-Gonczaryk (2014) “Teaming up or writing alone
- authorship strategies in leading Polish economic journals” Working Papers 2014-29,
Faculty of Economic Sciences, University of Warsaw.
Chinchilla-Rodríguez, Z., A. Ferligoj, S. Miguel, L. Kronegger, and F. de Moya-Anegón
(2012), “Blockmodeling of co-authorship networks in library and information science in
Argentina: A case study”, Scientometrics 93(3): 699-717.
Choobdar, S., P. Ribeiro, S. Bugla, and F. Silva (2012), “Comparison of co-authorship networks
across scientific fields using motifs” IEEE/ACM International Conference on Advances
in Social Networks Analysis and Mining.
27
Cotta, C. and J-J. Merelo (2005), “The Complex Network of Evolutionary Computation
Authors: an Initial Study”, arXiv:physics/0507196v2 [physics.soc-ph]
Day, M.-Y. and S.-P. Shih (2011) "Understanding scientific collaboration with social network
analysis," The 17th Cross-Strait Conference on Information and Management (CSCIM
2011), 20, Jul 2011, Beijing, China.
Ding, Y. (2011). “Scientific collaboration and endorsement: Network analysis of coauthorship
and citation networks”, Journal of Informetrics 5(1): 187–203.
[DOI:10.1016/j.joi.2010.10.008]
Erfanmanesh, M., V.A. Rohani, and A. Abrizah (2012), “Co-authorship network of
scientometrics research collaboration”, Malaysian Journal of Library & Information
Science 17(3): 73-93.
Erman, N. and L. Todorovski (2009), “Mapping the E-Government Research with Social
Network Analysis”, Lecture Notes in Computer Science 5693: 13-25
Fafchamps, M., M. van der Leij, and S. Goyal (2006), “Scientific Networks and Co-authorship”,
Working Paper No. 256, Department of Economics, University of Oxdord.
González-Alcaide, G. and C. Navarro-Molina (2008), “Coauthorship networks and institutional
collaboration patterns in reproductive biology” Fertility and Sterility 90 (4): 941-956.
Goyal, S., M.J. van der Leij, and J.L. Moraga-González (2006) “Economics: An Emerging
Small World”, Journal of Political Economy 114 (2): 403-412.
Jahn, N. (2008), “The methodological status of co-authorship networks”, Fourth International
Conference on Webometrics, Informetrics and Scientometrics & Ninth COLLNET
Meeting, Berlin, 28 July - 1 August 2008.
Kurosawa T. and Y. Takama (2012), “Co-Authorship Networks Visualization System for
Supporting Survey of Researchers’ Future Activities”, Journal of Emerging
Technologies in Web Intelligence 4 (1): 3-14 [doi:10.4304/jetwi.4.1.3-14]
Liu, X., J. Bollen, and M. L. Nelson (2005), “Co-authorship networks in the digital library
research community”, Information Processing and Management 41: 1462–1480.
Maia, G., P. O.S. Vaz de Melo, D.L. Guidoni, F. S.H. Souza, T.H. Silva, J.M. Almeida and
A.A.F. Loureiro (2013), “On the Analysis of the Collaboration Network of the Brazilian
Symposium on Computer Networks and Distributed Systems”, Journal of the Brazilian
Computer Society 19 (3): 361-382
Medicis Morel, C., S. Jacob Serruya, G. Oliveira Penna and R. Guimaraes (2009), “Co-
authorship Network Analysis: A Powerful Tool for Strategic Planning of Research,
Development and Capacity Building Programs on Neglected Diseases”, PLOS
Neglected Tropical Diseases 3(8): e501. [DOI:10.1371/journal.pntd.0000501]
Murray, C., W. Ke and K. Borner (2006), “Mapping Scientific Disciplines and Author Expertise
Based on Personal Bibliography Files”, Tenth International Conference Information
Visualization: 258-263 [DOI: 10.1109/IV.2006.73]
28
Nascimento, M. A., Sander, J., and Pound, J. (2003). “Analysis of SIGMOD’s coauthorship
graph”. SIGMOD Record, 32(3), 8-10.
Newman, M. E. J. (2001a). “Scientific collaboration networks: I. Network construction and
fundamental results”. Physical Review E, 64, 016131.
Newman, M. E. J. (2001b). “The structure of scientific collaboration networks”. Proceedings of
the National Academy of Science of the United States of America, 98(2), 404-409.
Newman, M. E. J. (2003). “The structure and function of complex networks”. SIAM Review,
45(2), 167-256.
Newman, M. E. J. (2005). “A measure of betweenness centrality based on random walks”.
Social Networks, 27, 39-54.
Olmeda‐Gómez, C., A. Perianes‐Rodriguez, M. A. Ovalle‐Perandones, V.P. Guerrero‐Bote, and
F. de Moya Anegón (2009), “Visualization of scientific co‐authorship in Spanish
universities: From regionalization to internationalization” Aslib Proceedings 61 (1): 83-
100.
Paredes, A. (2011). “Publicaciones y militancia político-religiosa latinoamericana. Las redes de
coautoría de Mauricio Ignacio Ellacuría en las publicaciones de la editorial Tierra
Nueva (década de 1970)”. Cuadernos del CILHA 12 (14): 173-192.
Ramírez Ruiz, L. (2009). “Campo científico y redes de coautoría en la psiquiatría. La
producción científica psiquiátrica mexicana sobre el trastorno de la personalidad”,
REDES- Revista hispana para elanálisis de redes sociales 19 (2) [DOI:
http://dx.doi.org/10.5565/rev/redes.255]
Rodriguez, M.A. and A. Pepe (2008), “On the relationship between the structural and
socioacademic communities of a coauthorship network”, Journal of Informetrics 2 (3):
195-201, [DOI:10.1016/j.joi.2008.04.002]
Rumsey, A.R. (2006), “The Association Between Co-authorship Network Structures and
Successful Academic Publishing Among Higher Education Scholars” All Theses and
Dissertations. Paper 790.
Uddin, S., L. Hossain, A. Abbasi and K. Rasmussen (2012), “Trend and efficiency analysis of
co-authorship network”, Scientometrics 90 (2): 687-699
Valderrama-Zurián, J.C., G. González-Alcaide, F.J. Valderrama-Zurián, R. Aleixandre-
Benaventa, and A. Miguel-Dasitc (2007). “Redes de coautorías y colaboración
institucional en Revista Española de Cardiología”, Revista Española de Cardiología 60
(2):117-30 [DOI: 10.1157/13099458]
Vargas- Quesada, B., D. Minguillo, Z. Chinchilla-Rodríguez and F. de Moya-Anegón (2010),
“Estructura de la colaboración científica española en Biblioteconomía y Documentación
(Scopus 1999-2007)”, Revista Interamericana de Bibliotecología 33 (1): 105-123.
29
Yin, L., Kretschmer, H., Hanneman, R. A., and Liu, Z. (2006). “Connection and stratification in
research collaboration: An analysis of the COLLNET network”. Information Processing
and Management, 42, 1599-1613.
Yan, E. and Y. Ding (2009), “Applying centrality measures to impact analysis: A coauthorship
network analysis”. Journal of the American Society for Information Science and
Technology 60 (10): 2107–2118. [DOI: 10.1002/asi.21128]
30
|
1111.2018 | 1 | 1111 | 2011-11-08T19:12:43 | Intrinsically Dynamic Network Communities | [
"cs.SI",
"physics.soc-ph"
] | Community finding algorithms for networks have recently been extended to dynamic data. Most of these recent methods aim at exhibiting community partitions from successive graph snapshots and thereafter connecting or smoothing these partitions using clever time-dependent features and sampling techniques. These approaches are nonetheless achieving longitudinal rather than dynamic community detection. We assume that communities are fundamentally defined by the repetition of interactions among a set of nodes over time. According to this definition, analyzing the data by considering successive snapshots induces a significant loss of information: we suggest that it blurs essentially dynamic phenomena - such as communities based on repeated inter-temporal interactions, nodes switching from a community to another across time, or the possibility that a community survives while its members are being integrally replaced over a longer time period. We propose a formalism which aims at tackling this issue in the context of time-directed datasets (such as citation networks), and present several illustrations on both empirical and synthetic dynamic networks. We eventually introduce intrinsically dynamic metrics to qualify temporal community structure and emphasize their possible role as an estimator of the quality of the community detection - taking into account the fact that various empirical contexts may call for distinct `community' definitions and detection criteria. | cs.SI | cs |
Intrinsically Dynamic Network Communities
Bivas Mitraa,d, Lionel Tabourierb,d, Camille Rotha,c,d
aInstitut des Syst`emes Complexes-Paris-Ile-de-France, 57 rue Lhomond, F-75005 Paris
bLIP6, Universit´e Pierre et Marie Curie, 4 place Jussieu, F-75005 Paris
cCAMS, CNRS/EHESS, 190 avenue de France, F-75013 Paris
dCREA, CNRS/Ecole Polytechnique, 42 bd Victor, F-75015 Paris
Abstract
Community finding algorithms for networks have recently been extended to
dynamic data. Most of these recent methods aim at exhibiting commu-
nity partitions from successive graph snapshots and thereafter connecting or
smoothing these partitions using clever time-dependent features and sam-
pling techniques. These approaches are nonetheless achieving longitudinal
rather than dynamic community detection. We assume that communities
are fundamentally defined by the repetition of interactions among a set of
nodes over time. According to this definition, analyzing the data by con-
sidering successive snapshots induces a significant loss of information: we
suggest that it blurs essentially dynamic phenomena -- such as communities
based on repeated inter-temporal interactions, nodes switching from a com-
munity to another across time, or the possibility that a community survives
while its members are being integrally replaced over a longer time period.
We propose a formalism which aims at tackling this issue in the context of
time-directed datasets (such as citation networks), and present several illus-
trations on both empirical and synthetic dynamic networks. We eventually
introduce intrinsically dynamic metrics to qualify temporal community struc-
ture and emphasize their possible role as an estimator of the quality of the
community detection -- taking into account the fact that various empirical
contexts may call for distinct 'community' definitions and detection criteria.
Keywords:
community quality metrics
community detection, dynamic networks, citation networks,
✩ All authors contributed equally to the manuscript.
Preprint submitted to Computer Networks
October 5, 2018
1. Introduction
The detection of groups from structural interaction datasets has generated
a tremendous amount of literature over the past decade [for a recent and
comprehensive review, see 1]. These methods essentially aim at partitioning
nodes into "communities" in such a way that the density of links within
communities is higher than the density of links between them -- thereby
adopting one possible structural definition of social communities, that "its
members should have many relations with each other and few with non-
members" [2, p. 121]. Most corresponding studies are primarily featuring
static community finding algorithms, i.e. relying on networks as static graphs,
either derived from aggregation of data over the whole crawling period or
from a snapshot at a particular point in time -- which is essentially the
same.
Emphasizing the fact that real-world communities are also time-evolving,
a more recent stream of research endeavored at describing the dynamics of
such communities [3 -- 19]. In this portion of the literature, communities and
their evolution are however being studied in a somewhat independent man-
ner: communities are separately extracted from several snapshots and then
time-dependent characteristics are introduced to smooth potential differences
between the various partitions over time, or to connect various partitions in
order to have inter-temporally linked communities.
In other words, these
approaches are rather proposing a longitudinal community detection.
Such methodology may however become inappropriate if some intricate
temporal relationships occur, in particular if some nodes which were part of
a community at some point are not anymore at a later point in time, while
the "underlying group" remains -- e.g. an association, a lab, a company
which survives through time without depending on a specific set of perma-
nent members.1 More broadly, our first assumption is that communities are
fundamentally defined by a certain amount of interaction recurrence among
a possibly disparate set of nodes over time. This type of phenomenon is cer-
1This problem was originally framed by G. Simmel in the following qualitative terms:
"The most general case in which the persistence of the group presents itself as a problem
occurs in the fact that, in spite of the departure and the change of members, the group
remains identical. We say that it is the same state, the same association, the same army,
which now exists that existed so and so many decades or centuries ago. This, although no
single member of the original organization remains." [20, p. 667]
2
tainly roughly detectable through the trace of interactions, as recorded in a
static graph, or a series of (snapshot-based) static graphs. We suggest how-
ever that the aggregation operation may induce a strong information loss
and often requires additional thresholding hypotheses (on link weight and
timewindow width, inter alia). Our approach aims at remaining as much as
possible faithful to the original empirical data.
We therefore propose a simple formalism to detect essentially dynamic
communities from a diachronic dataset, and understand their evolution within
a unified, single-pass procedure. By "diachronic dataset" we mean that the
data we consider features links whose extremities are associated with possi-
bly distinct timestamps, like in a citation network or an email network (an
item of B made at t′ is cited/answered by A at t > t′).
After a presentation of the relevant literature in Sec. 2, we explain (Sec. 3)
the principles of this method which consists in a new ontological viewpoint
built upon usual concepts of community detection methods.
In Sec. 4 we
introduce various datasets, both synthetic and empirical (citation) networks,
in blog- and science-related contexts. We then discuss results in Sec. 5 and,
in particular, we propose a variety of metrics aimed at providing information
about the type and quality of detected temporal communities. This leads to
a macro-level characterization of empirical datasets through their dynamic
community profile. Focusing on the behavior of the individual nodes within
communities -- for instance how many times nodes appear or change their
community membership -- we later present in Sec. 6 several features of tem-
poral communities which are typical of our approach. We discuss eventually
(Sec. 7) how this approach exhibits novel stylized facts that are not directly
obtainable from existing methods, and how our methodology could be ap-
plied, with some tweaking, to other kind of network data where edges are
associated with discrete timesteps. In particular, we also suggest a possible
improvement of our methodology by introducing an additional "temporal-
oriented" step which can suitably complement the 'structure-oriented' ap-
proach of our algorithm.
2. Related work
The analysis of community evolution in dynamic networks is a recent and
increasingly active field. To our knowledge, the first study was carried out
by Hopcroft et al. [3] who analyzed several snapshots of a scientific citation
3
database. Using a hierarchical clustering algorithm -- based on the similar-
ity of articles -- they defined "natural communities" particularly robust to
minor perturbations of the graph. Then they proposed rules based on set
theory tools to decide how communities evolve from a snapshot to another.
Many variations of this set of rules have been proposed afterwards [4 -- 6], one
of the most comprehensive being monic [7]. Since then, such approaches
have been widely used and developed. Asur et al. [8] introduced a family of
events (merging, splitting etc.) on both communities and individuals to char-
acterize the evolution. Falkowski et al. [9] computed groups with a classical
divisive algorithm at each timestep, links were created between community
instances at different timesteps with a weight depending on monic matching
rules. Toyoda and Kitsuregawa [10] studied the evolution of Web communi-
ties from a sequence of snapshots. Palla et al. [11] used the clique percolation
method to extract communities at each moment and then matched them at
consecutive time steps to make statistics on their evolution: sizes, ages, over-
laps between two different time steps etc. In [12] three classical algorithms
are used to detect communities at every snapshots, and since these methods
are unstable, a stabilization of the Louvain algorithm is proposed, achieving
simultaneously high modularity and good stability.
The above-described approaches are basically two-stage methods: (i) de-
tect clusters independently at some period in the graph evolution, then (ii)
infer relationships between partitions at different periods. However, this kind
of approach is susceptible to edge effects, due to the longitudinal analysis:
discrete time periods have to be defined and they sometimes split impor-
tant signals into two distinct periods. Significant variations even between
partitions close in time may appear, which results in artifactual community
structure evolution. It is desirable, instead, to have a unified framework, in
which cluster evolution can be deduced both from the current graph struc-
ture and from the knowledge of the community structure at previous time
steps. More recently, a new kind of clustering concept called "evolutionary
clustering" has been proposed to capture the evolutionary process of clusters
in temporal data. This framework was introduced by Chakrabarti et al. [13]
who assume that short-term community structure alterations are not desir-
able and therefore smooth communities over time. The smoothing process
consists of a trade-off between the quality of the detection on a snapshot
and its consistency with the previous community detection. Chi et al. [14]
extended similar ideas and proposed the first evolutionary spectral clustering
algorithm. Based on evolutionary clustering, Lin et al. [15] introduced the
4
framework FacetNet, which allows vertices to belong to several communi-
ties simultaneously. FacetNet can be extended to handle vertex addition
and removal as well as variations of the number of clusters in consecutive
timesteps. However, it is not able to account for the creation and disin-
tegration of communities, and it is not scalable to large systems because
of computational limits. These issues have been addressed in a recent ap-
proach by Kim and Han [16]. A uniform community detection methodology
called OSLOM (Order Statistics Local Optimization Method) has been re-
cently proposed in [21]. It detects clusters in networks accounting for edge
directions, edge weights, overlapping communities, hierarchies and commu-
nity dynamics. The algorithm is based on the local optimization of a fitness
function expressing the statistical significance of clusters with respect to ran-
dom fluctuations, which is estimated with tools of Extreme and Order Statis-
tics [22, 23]. Instead of separately analyzing the snapshots, this methodology
aims at combining information from different time slices, thereby taking ad-
vantage of the information from different snapshots to uncover correlations
between structures of the system at various time stamps.
The temporal information can also be integrated in the graph itself. One
attempt in this direction is [17] which uses the community detection algo-
rithm Walktrap [18] but changes the input graph to integrate dynamics:
they create a temporal graph by duplicating nodes appearing at different
timesteps, and by artificially linking a node to itself at the following times-
tamp. Communities are then detected on this temporal graph which contains
a mix of temporal and classical links. This idea of connecting several snap-
shots is extended in [19]: the authors propose a more general way to build
the temporal graph and suggest an appropriate modification of the modular-
ity. Yet these approaches rely on the arbitrary hypothesis that a connection
between two nodes can be compared to the connection of a node with itself
across time.
The formalism we propose shares some features with these temporal
graphs, but avoids ad hoc alterations of the underlying empirical data, to
the cost of being restricted -- at least in this paper -- to a certain kind of
data where link extremities are explicitly attributed possibly different times-
tamps, as is the case e.g. in citation networks.
5
3. Methodology
Our methodology explicitly relies on a diachronic dataset, i.e. a set of
links connecting a timestamped source to a timestamped destination, where
source and destination timestamps may be distinct. This is typically the case
in citation networks.2 We define basic notations to represent such citation
datasets and describe a graph suited to this kind of data.
3.1. Physical graph vs. temporal graph
We call physical nodes the source or destination of the links -- without
consideration for timestamps -- let V = {vi}i∈{1,..,n} be the associated set.
The timescale is supposed to be discretized so that any timestamp is an
element of set T = {ti}i∈I.
The empirical data consists of directed links whose extremeties relate to
possibly distinct timesteps:
Ψ = n(cid:16)(vi, ti), (vj, tj)(cid:17) vi, vj ∈ V , ti, tj ∈ To
(1)
Typical approaches aim at aggregating this original data over the whole
timescale, thereby obtaining a usual directed graph G(V, E) whose edge set
is E = {(vi, vj)}, where node vi cites node vj. We will refer to such links as
physical links and to G as the physical graph.
To our knowledge, most dynamic community detection methods are re-
lying on this type of graphs: they ultimately rely on physical graphs based
on a particular slicing of the dataset into time periods (usually, a partition
of time periods). Our point is to diverge from this significant information
reduction by relying directly on the original empirical data.
We therefore define a key concept for the following analysis: the temporal
graph G = (V, E), defined upon a set of time-labeled vertices, or tempo-
ral nodes, V = {(vi, ti)}, and a set of time-labeled links, or temporal links,
E = n(cid:16)(vi, ti), (vj, tj)(cid:17)o, such that ∀i, (vi, ti) ∈ V. Practically, the ti and tj
associated to vi and vj will be elements of T corresponding to the timestamp
when vi cites vj, as defined in Ψ. See an illustration on Fig. 1.
2See Sec. 7 for a discussion on possible extensions of this method.
6
Figure 1: Example of a temporal graph based on four physical nodes A, B, C and D.
3.2. Temporal community detection
Contrary to the physical graph G(V, E), the temporal graph G(V, E) built
from Ψ provides us with information regarding the appearance as well as
disappearance of citation links between specific physical nodes over a period
of time. We may now apply a classical community detection algorithm on G
to obtain a cover C = {C1, C2, ...., Cm} of the temporal node set V.
Each of these Ci is a set of temporal nodes from the temporal graph. Com-
bined with G, and more precisely E, each Ci straightforwardly and uniquely
defines a subgraph induced by the corresponding subset of V. It will be called
a temporal community.
In the following practical explorations, we rely on the so-called Louvain
algorithm [24] -- essentially for its ability to quickly cluster temporal nodes
into cohesive subgraphs. C will be a partition because this very algorithm
does output partitions of the underlying graph nodes, as do most network
algorithms for community detection. Here we would like to emphasize the
fact that our methodology is usable with other typical static community
finding algorithms, including overlapping community detection techniques
[e.g., 25]. As an evidence, in the next section we illustrate our methodology
with two other algorithms such as Girvan-Newman [26] and Walktrap [18] in
addition to Louvain algorithm for the synthetic dataset (Fig. 3).
7
4. Data sources
4.1. Synthetic data
We implement in this section our methodology on a synthetically gen-
erated citation data set, built using an a priori community structure. This
synthetic data will be useful as a toy example to demonstrate the effect of the
method on a controlled environment, where the level and extent of recurrent,
dynamic interaction is a priori known.
Synthetic data generation. To produce the synthetic dataset, we first consider
nc a priori "communities". We create a set of n = m · nc physical nodes
V = {v1, ..., vn} each assigned a community number in such a way that each
community has a constant number of m members. We also define a set
of timestamps T = {ti}i∈{1,...,tmax}. We thus have a 2D-grid of size n · tmax
whose elements are temporal nodes of V. We eventually fix a temporal graph
density by tuning the average out-degree of the temporal nodes d.
We then synthesize a dynamic citation network Gp by randomly generat-
ing a number of temporal links respecting the following constraints:
• A link from (v, t) to (v′, t′) must be such that t′ ≤ t.
• The total number of outgoing temporal links emanating from all tem-
poral nodes at a specific timestamp t is given as d · n. Outgoing links
are spread randomly on the n nodes at each timestep t.
• An outgoing temporal link has a probability p to reach a temporal node
of the same community as the source and probability 1 − p to reach a
temporal node assigned to any other a priori community.
• We additionally introduce a sliding window of size w so that t − w ≤ t′,
ensuring that most sources refer to recent destinations rather than to
arbitrarily old ones.
Decreasing values of p and d lead to a temporal graph with decaying tem-
poral community structure and recurrent interactions being more and more
fortuitous. A totally random inter-community linking pattern thus corre-
sponds to prandom = 1
. To concretely illustrate this phenomenon and the
nc
functioning of our approach, we generate a synthetic citation data set Ψ fol-
lowing the above-described procedure, with parameters: nc = 4 and m = 5,
tmax = 20, w = 10 and d = 3. Applying the Louvain community detection
8
(a) p = 1
(b) p = 0.85
(c) p = 0.5
Figure 2: Temporal graph G constructed from the synthetic data, with nc = 4, m = 5,
w = 10, and d = 3 for various probabilities of intra-community linking p. Left to right:
p = 1, p = 0.85 and p = 0.5, with respectively 5, 9 and 16 detected temporal communities,
each labeled using distinct colors; time goes from left to right, while physical nodes are
spread on the y-axis (#0 to #19).
algorithm on the corresponding temporal graph yields temporal communities
exhibiting a decaying temporal cohesiveness as much as p decreases. Figure 2
provides a simple illustration of how accurately the algorithm describes the
temporal community structure, and especially matches the a priori tempo-
ral communities when p is high, i.e. when the data effectively obeys such
a community structure. In order to show the robustness of our methodol-
ogy with respect to the chosen community detection algorithms, we present
results with three distinct algorithms namely Louvain, Girvan-Newman and
Walktrap, for the synthetic dataset, see Fig. 3. For the empirical dataset and
for the remainder of this paper, we carry on with Louvain for its efficiency.
(a) Girvan-Newman
(b) Louvain (same as above)
(c) Walktrap
Figure 3: Temporal communities detected for a unique synthetic dataset (p = 0.85) using
Louvain, Girvan-Newman and Walktrap algorithms.
9
4.2. Empirical data
We now describe the two datasets we used to build empirical temporal
graphs, namely scientific and blog citation data, respectively called ACL
and Blogs.
• ACL.
This dataset comes from the Association of Computational Linguistics
(ACL). It features the ACL Anthology Network -- a scientific biblio-
graphical repository focused on computational linguistics3. The dataset
is current as of Nov 2008. It is paper-centered: it describes 13, 706 dif-
ferent papers, back to year 1965, such that we know that a paper pub-
lished at some date cites some other papers published at some possibly
earlier date.
We transform this data into a dynamic author-focused dataset featuring
which author cites whom at which date, i.e. author A cited at tA a
production of author B (possibly A himself) at tB ≤ tA. The database
contains a total of 247, 059 dynamic links among the 11, 163 authors of
this 43-year collection.
• Blogs.
This dataset comes from a collection from February 1st to July 1st,
2010, of blog posts of a significant part of the active French-speaking
blogosphere, dynamically monitored by Linkfluence, a company spe-
cialized in digital community surveys.
It features post contents, most importantly who publishes a post, when,
which other post this post does cite, and when that other post was pub-
lished. In other words, it features links of the form blog A cites at tA
a post published by blog B (possibly the same as A) at time tB ≤ tA.
We get 49,232 dynamic links among 10,436 blogs during the 151-days
crawling period.
5. Results
5.1. Qualitative insights
Topical clustering. As expected, communities found on both datasets exhibit
a certain consistency regarding their topic: for instance, one large commu-
3It may be browsed from http://aclweb.org/anthology-new -- see also [27].
10
nity in ACL principally includes authors of papers dealing with "statistical
machine translation". As such, it would surely be comforting that temporal
communities are consistent with the type of results that static algorithms
would usually yield: let us therefore focus on situations specific to temporal
communities which are likely to be less accessible through classical static
community detection approaches.
Events. Communities related to specific events, and therefore characterized
by a relative burst of interactions, are also exhibited. For instance, the Blogs
dataset features 16 temporal communities which all involve the same core of
3 specific nodes, and sometimes an extra other node. The associated times-
tamps for these communities are quite regular: each community is separated
of the next one by around one week. A closer examination of the database in-
forms us that these communities correspond to the weekly "best of" made by
blog filmgeek.fr -- specialized in movie reviews -- which often involves the
same group of blogs: blogywoodland.blogspot.com, cinefeed.com and,
more rarely, toujoursraison.com. Such quasi-periodic phenomenon is a
clear evidence of a specific, recurrent event.
Strong recurrent interactions. The temporal approach makes it possible to
easily detect interacting "cores" without introducing extra hypotheses on link
weights -- "cores" made of, for instance, a small group of strongly interacting
nodes, with or without a "periphery" of other weakly interacting nodes.
For example, ACL features some small temporal communities consisting of
several authors sharing a particularly strong bond, such as a group of 3
Japanese authors (namely S. Yoshida, T. Hitaka and H. Tsurumaru) who
published several times together, also citing their previous papers. With a
static, unweighted approach, these cores may be overlooked as usual elements
of a possibly larger community.
5.2. Temporal metrics and dynamic community profiles
We now introduce various temporal metrics in order, and thereby dis-
tinguish temporal communities. We show how these metrics can be used to
focus on specific types of temporal communities and, at a higher level, how
they can be used to discriminate empirical contexts through distinct dynamic
community profiles.
We essentially suggest that the following dimensions are key in appraising
temporal community types: (1) Community size (i.e. extent of the community
11
within the system); (2) Recurrence of interactions; (3) Interactivity (and self-
citation); and (4) Balance (i.e. connectedness heterogeneity).
Community size (z). Temporal community extent may be measured through
the community size, which we define in terms of physical nodes. More for-
mally, z(C) denotes the number of unique nodes participating in the temporal
community:
∀C ∈ C,
(2)
z(C) = (cid:12)(cid:12)(cid:12)
{vi ∃(vi, ti) ∈ C}(cid:12)(cid:12)(cid:12)
On Fig. 4, communities ACL #1 and #26 are respectively of size 3 and 9.
Recurrence of interactions: node activity NA. We characterize the recur-
rence of node participation in a temporal community in terms of node activ-
ity NA. It is a normalized index simply based on the ratio of temporal nodes
with respect to physical nodes in the community. Formally, we define:
∀C ∈ C, NA(C) = 1 −
z(C)
C
(3)
Hence, a highly active community is more likely to feature a small number
of physical nodes (low z(C)) appearing repeatedly over several timestamps
(high C), resulting in a NA close to 1. For instance, on Fig. 4 we see that
temporal community ACL #1 has a high NA, with only three nodes quite
recurrently interacting with each other.4 Note also that the Louvain algo-
rithm captures cohesive temporal subgraphs, i.e. dense patterns of either
recurrent or multiple interactions. As we see in Fig. 4, low NA communities
exhibit an increased branching structure and correspond more to star-like
multiple interactions than recurrent ones. In this respect, NA filters tem-
porally recurrent patterns among those detected by the Louvain algorithm.
4We may also represent node recurrence within a given temporal community by (i) using
the average degree in the corresponding temporal subgraph, i.e. using the ratio between
C and the number of temporal links, or (ii) by using repeated appearances of physical
links, i.e. the ratio between (the number of temporal links of the temporal subgraph) and
(the number of links in the projection of corresponding temporal subgraph projection onto
a static, unweighted network). However, we find that the former is empirically correlated
to community size z(C) while the latter is fairly correlated to NA(C).
12
NA
high
low
Figure 4: ACL data with two typical communities having respectively a high (left ) and
low (right ) node activity NA.
Interactivity: self-citation ratio. A temporal community may contain a large
number of temporal nodes and links while essentially consisting of a node
citing repeatedly itself (a relatively frequent pattern on the blogosphere and,
to a lesser extent, in science). The self-citation ratio SC(C) is defined as the
ratio between the number of self-citations and the total number of temporal
links present in the community. Formally,
∀C ∈ C,
SC(C) =
{((vi, ti), (vi, tj)) ∈ C 2}
{((vi, ti), (vj, tj)) ∈ C 2}
(4)
This measure primarily targets temporal communities where a pivotal node
intensely cites itself over a large number of timestamps, possibly being sparsely
cited by other surrounding nodes -- compare high-SC communities "Blogs #1"
with "Blogs #69" on Figure 5.
Balance: heterogeneity of interactions. Temporal communities, as can be
seen on Fig. 5, may possess balanced or unbalanced activity, depending on
whether one physical node much more heavily and repeatedly cites other,
or all physically nodes eventually cite each other in an even manner. We
13
h(C) =
p2
i
(5)
1
z(C)Pz(C)
i
propose to measure this structural heterogeneity using an index based on
Herfindahl's index h:
where pi(C) is the normalized number of temporal links stemming from a
given physical node i within C (it is normalized such that Pz(C)
pi(C) =
i
SC
high
low
high
HI
low
Figure 5: Typical temporal community patterns with respect to SC and HI for "Blogs".
When SC is high, temporal communities could look like a long self-citation line (high HI,
#1) or a backbone (low HI #69); when SC is low, they could appear as incoming stars
(high HI, #428) or outgoing stars (low HI, #325).
14
1, z(C) being the size of community C). Because h(C) ∈ [1/z(C), 1], we
eventually rescale it into [0, 1]:
HI(C) =
z(C)h(C) − 1
z(C) − 1
(6)
Put shortly, HI is closer to 1 when temporal communities have an homoge-
neous out-going connectivity (e.g. "Blogs #1", as opposed to "Blogs #325").
5.3. Dynamic profiles
First glimpse: synthetic toy model. Fig. 6(a) shows the behavior of the afore-
said metrics in synthetic data for various values of the inter-community link-
ing probability p. As can be observed, these metrics are unaffected for most
values of p, except for the highest values where all metrics NA, HI and SC
increase relatively sharply. Inset of Fig. 6(a) shows that in the weakly co-
hesive network, temporal communities have an average size which is close to
the number of nodes, i.e. they all tend to be spread over a large portion of
the physical node set. By contrast, temporal communities for larger values of
p are much smaller, and indeed closer to the a priori community attribution,
i.e. they are much more focused on a small subset of nodes.
(a) Temporal metrics NA, SC, and HI
for synthetic data, with respect to intra-
community probability p. (Inset: aver-
age size of communities in terms of phys-
ical nodes.)
(b) Dissimilarity5 between a priori com-
munity assignment and ex post detected
communities.
Figure 6: Behavior of metrics on the synthetic toy model with respect to intracommunity
probability p.
15
This behavior echoes the match between a priori community assignations
and actual node interaction profiles for a given p. Obviously, the original com-
munity assignation is likely to vanish as p diverges from 1. Yet, it actually
vanishes at around a range of values of p which is similar to the region where
the behavior of the above metrics change, as shown on Fig. 6(a). Indeed, if
we define a dissimilarity quantity expressing how much the ex post commu-
nity detection diverges from the original a priori community assignation5, we
indeed notice that there is a sharp change in dissimilarity as p reaches the
region around [0.8, 0.9]. See Fig. 6(b) for an illustration.
Global temporal landscape. We may now combine some of these temporal
metrics to depict general dynamic profiles for each dataset. Fig. 7 represents
the positions of all temporal communities in a SC vs. NA plane, together
with their size. (Other dimensions could be selected, depending on the fo-
cus.) Strong discrepancies appear for each datasets. The synthetic dataset,
for instance, exhibits a progression from low- to high- NA temporal com-
munity population as p goes to 1, confirming the a priori knowledge that
datasets built with higher p values are indeed yielding more cohesive tem-
poral communities. Self-citation is relatively rare however in that context,
compared with the empirical dataset profiles, especially blogs.
In this respect, ACL is principally made of larger temporal communities
with globally medium NA indices and non-negligible SC indices (indicating
that most of these scientific citation temporal communities are made of a bit
of self-citation embedded into a wider web of recurrent non-selfcitations), and
a small number of either zero-NA communities (which are basically negligible
communities corresponding to one instance of a citation of B by A) or higher
SC and NA communities (which are instances of self-citation of a group of
authors across a small number of timesteps). On the other hand, Blogs
display a much more contrasted profile: there is a large number of highly
self-citing communities, with moderate to high NA, and a large number of
non-self-interacting communities, with low to medium-high NA.
5More precisely: given (C −)i=1,..,mnctmax a vector such that C −
i represents the a priori
community of temporal node i, and C + a same-length vector of detected communities, we
consider d = Pi,j (cid:0)δ(C −
j )(cid:1), where δ(x, y) is the Kronecker function.
Put simply, if a pair of temporal nodes is classified differently by the a priori assignment
and the ex post detection result, d will be increased by 1. We eventually consider a dis-
similarity quantity D which is d normalized with respect to all possible node combinations
in the network.
i , C −
j ) XOR δ(C +
i , C +
16
SC
1.0
0.8
0.6
0.4
0.2
SC
1.0
0.8
0.6
0.4
0.2
26
p!0.5
Synthetic
SC
p!1.
1.0
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
1.0
0.2
0.4
0.6
0.8
1.0
NA
NA
ACL
Empirical
SC
Blogs
1.0
0.8
0.6
0.4
0.2
1
69
1
0.2
0.4
0.6
0.8
1.0
325
NA
428
0.2
0.4
0.6
0.8
1.0
NA
Figure 7: Position of temporal communities for, on top, synthetic data (p = 0.5 and
p = 1) and, at bottom, ACL and Blogs. Global profiles are plotted according to NA and
SC values (resp. x-axis and y-axis) and their size (represented by a gray disk whose area is
logarithmically proportional to z(C)). Framed labels correspond to temporal communities
represented in the previous figures.
Put differently, Fig. 7 provides a global overview of the temporal inter-
action profile of each dataset, plausibly typical of the underlying referencing
behavior. It also emphasizes that a single all-purpose temporal community
definition is likely to overlook the diversity of recurrent interaction contexts,
as datasets are structurally significantly different from one another and rely
upon distinct inter-temporal interaction behaviors.
5.4. Impact of graph density / sparsity
The level of interaction intensity is likely to affect temporal community
structure: admittedly, a sparse graph will exhibit smaller communities, in a
more fragmented way. For instance, coming back to the toy synthetic data,
17
(a) d = 2
(b) d = 4
Figure 8: Visual representation of the dynamic community structure of synthetic datasets
created using various average degrees d, and a maximal intracommunity probability p = 1.
a decrease in the average degree/density leads to a less coherent temporal
community landscape: for example, in Fig. 8, we illustrate that in a synthetic
dataset with identical parameters as before, except for an average degree of
2, leads to as many as 17 communities even for p = 1 (Fig. 8-left), while
an average degree of 4 leads assuredly to the 4 a priori communities (Fig. 8-
right).
This issue essentially boils down to the fact that sparse graphs may lead
to sets of small meaningless communities. It is an issue which is certainly
common to community detection methods, and it is typically addressed by
an increase in the granularity of the input data, for instance by aggregating
data on longer time periods or considering a lower time sampling rate; or by
eventually merging communities based on various criteria. Solving this issue
in general is beyond the scope of this paper; yet, we may discuss several ways
of addressing it in our specific context. In particular:
• The temporal grain may be increased in order to take into account
a slower pace of linking. This would not be equivalent to longitudinal
approaches, as we would still rely on the inter-temporal intertwinement
of links across various periods to build communities. For instance, our
results on ACL and blogs are robust when time sampling is halved,
i.e. when considering that year 1980 and 1981 correspond to a single
timestamp, as do 1982 and 1983, but not 1981 and 1982.
• Another way of proceeding would be to merge some communities based
on the temporal information, using temporal nodes of a single physical
node which are present at close timesteps, in a fashion not unfamiliar
18
(a) Node lifetime distri-
bution for Blogs (scale
in days), inset: for ACL
(scale in years).
(b) Community mem-
bership distribution for
(scale in days),
Blogs
inset:
for ACL (scale in
years).
(c) Correlation between node
lifetime and community mem-
bership for Blogs;
for
ACL.
inset:
Figure 9: Distributions of node lifetimes (number of distinct timesteps of activity in the
dataset), community memberships (number of temporal communities a given node belongs
to, over the whole dataset), and related correlations.
to what has been done in [17, 19] by adding inter-temporal links across
temporal nodes. Similarly, temporal metrics of Sec. 5.2 may be used as
guidelines to filter out irrelevant temporal communities. We will sketch
a few preliminary details of this latter approach in Sec. 7.2.
6. Behavior of nodes inside and across temporal communities
The description of temporal communities provides a landscape of the
various foci of activity of physical nodes across time: some nodes may be
devoted to a given subgroup of nodes, while others may frequently jump from
a community to another. We now propose a few simple metrics to measure
community membership parameters of individual nodes, and use them on the
"Blogs" and "ACL" datasets to characterize different bloggers and authors,
as well as the temporal cohesiveness of the respective underlying systems as
a whole.
6.1. Physical node lifetime and community membership
We define the lifetime of a physical node as the total number of distinct
timestamps where it appears in the temporal graph -- it is fundamentally a
node property. Fig. 9(a) represents the distribution of node lifetimes, which
is similar for ACL and Blogs (it is also similar whether node lifetime is based
19
on link targets only, or on link targets and origins): almost 40% of nodes just
appear for a single timestamp; the distribution is heterogeneous with many
nodes exhibiting a very weak activity.
Physical nodes may belong to different number of communities in their
lifetime. Fig. 9(b) shows the fraction of physical nodes belonging to a given
number of temporal communities, or community membership. While most
nodes belong to a single community throughout their lifetime, a significant
number of nodes are members of various communities as well; following,
again, a pattern typical of an heterogeneous probability law. There is admit-
tedly a relationship between node lifetime and community membership, as a
short-lived physical node is likely to belong to few communities. Fig. 9(b)
certainly shows that in ACL, around two-thirds of authors belong to one com-
munity throughout their lifetime. It is unclear, however, whether all nodes
belonging to few communities are short-lived: they may also constantly be-
long to a single community. To address this issue, we plot the correlation
between node lifetime and community membership on Fig. 9(c). There are
indeed few committed nodes belonging to a single temporal community for
a very long time (Blogs: maximum 151 timestamps, ACL: 23 years); but
the landscape is globally mixed: while nodes appearing only once (trivially)
belong to a single community, and few other nodes are members of multiple
communities in their lifetime.
6.2. Multiplicity and change in community membership
More precisely, we examine the distribution of the multiplicity of com-
munity membership CM defined as the ratio of the node membership over
its lifetime -- see Fig. 10(a). This value equals 1 when a node belongs to as
many different communities as the number of timesteps where it is active,
and is closer to zero when it is involved in a smaller number of communities.
About 60% of nodes have a CM of 1, while around 10-20% of nodes have a
CM ∈ ]0.45; 0.55].
Where nodes with smaller CM certainly migrate seldom from a temporal
community to another, nodes with higher CM values might as well be heavily
migrating or just short-lived nodes. To concretely appraise these migration
or toggling effects, we finally define the "community toggle" CT of a node as
the ratio between the number of times it jumps from a temporal community
to another in the next active timestep, over the maximum number of toggles
it can do, which is its lifetime minus one (when lifetime is 1 there is no
possible toggle so CT = 0 by definition). We plot the distribution of CT on
20
(a) Community multiplicity CM distri-
bution
(b) Community toggle CT distribution
Figure 10: Binned distributions of community multiplicity or toggle indices for all nodes.
Main figures correspond to "Blogs" data, insets to "ACL".
Fig. 10(b). We can observe that it is generally bimodal: there are therefore
two types of nodes. Nodes constantly belonging to a community (be it with
a short or long lifetime), or nodes belonging to a variety of communities. We
can observe that 30% of bloggers exhibit a very low toggle rate (between 0.0-
0.1, mostly 0), whereas a similar proportion of nodes has heavily changing
temporal community memberships -- perhaps a typical feature of blogspace.
In ACL however, authors exhibit mostly stable behavior with a very low
toggle rate for 70%.
This last argument underlines a possible issue in usual partitioning algo-
rithms, with respect to detecting whether a node is constantly central in a
given community, or whether it is sporadically marginal, peripheral or even
a bumblebee for a series of communities. Node toggling statistics, possibly
coupled with other dimensions such as degree, could be fruitfully used to dis-
criminate such kinds of nodes. "Backbone nodes", for instance, are active,
often self-citing and have a very low toggling rate, as is the case for exam-
ple of developpez.net (rate = 0.024): a forum-like blog which is one of
the most important French-speaking website in programming. On the other
hand, ump-senat.fr has a high toggling rate (rate = 0.955): this is the blog
of the right-wing group at the French Senate, very active yet on a variety
topics and, more importantly, never really central on any of them.
21
7. Extension of the methodology
In this section, we suggest several different extensions of our methodol-
ogy. First we show that our algorithm is also applicable beyond the citation
dataset. Next, we propose a possible improvement of our algorithm through
a complementary community repairing process.
7.1. Scope: other types of datasets and networks
We admittedly focused on citation datasets, where link extremities gen-
erally correspond to distinct times (at t, B cites an instance of A at t′ < t).
We now suggest that other types of non-strictly citation datasets can be
appraised.
First, we may use all co-appearance dynamic networks, which are usually
well represented by bipartite graphs. In effect, whenever some nodes of one
side of the bipartite graph are linked to one node of the other side, at pos-
sibly different timesteps, it is possible to link the first-side nodes together.
Many monopartite networks are actually projections of bipartite networks
[28], where A and B get connected because they were jointly connected to a
common r; yet, traditional projections overlook the fact that A and B may
have been linked to r at different times. An example would be peer-to-peer
exchange networks:
if A makes a request for resource r at tA and then B
makes a similar request at tB > tA, we can create a timestamped link from
(A, tA) to (B, tB). The corresponding temporal graph captures the shared
interest/involvement of some nodes across various timesteps.
More generally, the analysis we made on diachronic datasets draws bene-
fits from the fact that interacting agents are associated with a specific times-
tamp. Our approach could nonetheless be used on a dataset which can
be expressed as a sequence of interactions such as: ((vi, αi), (vj, αj)) where
αi ∈ {αk}k∈K refers to a property of node vi rather than a timestamp. A
node may for instance be characterized by its location in space, thus enabling
geographically-based communities: this in turn could be useful in order to
describe communities embedded in their geographical environment. Commu-
nication networks (phone calls, instant messaging, emails) could provide us
with such data.
7.2. Reconstruction: using the physical node information
Our methodology primarily aims at identifying cohesive cross-temporal
interaction patterns in the underlying diachronic data set. This approach
22
Original
Step 1
Step 2
Step 3
Step 4
Step 5
Figure 11: Example of a portion of merging process based on N A optimization, leading
to physically more cohesive communities, from "primary" temporal communities.
focuses on structural properties, and cluster detection does not use contex-
tual data yet, such as physical node information, or semantic data. It can
thus be further improved by introducing an additional "context-oriented"
step which can suitably complement the "structure-oriented" logic of our al-
gorithm. This step would consist in reshaping the detected communities to
optimize their contextual relevance. A straightforward example of context-
aware community repairing process can be described as the merging of differ-
ent temporally-cohesive communities into a single physically-cohesive clus-
ter. More precisely, temporal nodes duplicated from the same physical node
supposedly share common features or interests [17], and this information can
suitably be used in a second step to restore or strengthen physical consistency
in temporal communities detected by the proposed algorithm. For instance,
the synthetic datasets defined in Section 4.1 rely on the assumption that
physical nodes remain in a same a priori community throughout their life-
time. We may thus reasonably expect that merging temporal communities
consisting of similar physical nodes would generate communities closer to
the a priori assignment. An illustrative toy example is presented on Fig. 11,
where such merging process is being essentially guided by an incremental
optimization of physical cohesiveness through node activity NA (it is how-
ever outside of the scope of this paper to dig further into such approach). In
this framework, dynamic communities as we detect them with our method,
could be combined and merged in order to build larger yet physically consis-
tent dynamic communities, i.e. where dynamic communities based on similar
physical nodes are eventually grouped. This notion of context may also be
extended to more context-dependent features, such as semantic properties.
8. Conclusion
Many existing dynamic community detection methods are based on suc-
cessive snapshots and are therefore essentially longitudinal rather than dy-
23
namic. By contrast, assuming that network communities fundamentally cor-
respond to recurrent interaction over time, we proposed a methodology which
does not alter the original temporal information of dynamic network data. In
other words, it avoids a step where the original interaction data is aggregated
into various network snapshots, or where connections are modified to accom-
modate relationships between nodes at various timesteps. This requirement
primarily led us to focus on a specific type of network data where link ex-
tremities naturally correspond to distinct moments, as is typically the case
in citation networks. We suggest however that the approach could be applied
on several other widespread types of networks -- such as bipartite graphs,
or more precisely co-use/co-citation/co-mention/co-appearance networks.
We introduced intrinsically dynamic metrics to qualify temporal commu-
nity structure: we could therefore single out communities based on specific
patterns of repeated inter-temporal interactions, internal hierarchization, and
discuss in particular how and to what extent nodes switch from a community
to another across time. More broadly, using macro-level visualizations of the
whole temporal community structure, we could demonstrate that various
empirical contexts exhibit distinct temporal community profiles, addition-
ally emphasizing the fact that those various contexts may call for distinct
'community' definitions and detection criteria.
Acknowledgements. We would like to thank Thomas Aynaud for his useful com-
ments on the state-of-the-art. This work has been partially supported by the
French National Agency of Research (ANR) through grant "Webfluence" #ANR-
08-SYSC-009 and by the Future and Emerging Technologies programme FP7-
COSI-ICT of the European Commission through project QLectives (grant no.:
231200).
References
[1] S. Fortunato. Community detection in graphs. Physics Reports, 486:75 --
174, 2010.
[2] R. D. Alba. A graph-theoretic definition of a sociometric clique. Journal
of Mathematical Sociology, 3:113 -- 126, 1973.
[3] J. Hopcroft, O. Khan, B. Kulis, and B. Selman. Tracking evolving
communities in large linked networks. PNAS, 6(188701), 2004.
24
[4] M. Oliveira and J. Gama. Bipartite graphs for monitoring clusters tran-
sitions. Advances in Intelligent Data Analysis IX M, 876, (2010).
[5] M. Oliveira and J. Gama. Understanding clusters evolution. Workshop
on Ubiquitous Data Mining, volume D, (2010).
[6] D. Greene and D. Doyle. Tracking the evolution of communities in
dynamic social networks. Advances in Social Networks Analysis and
Mining (ASONAM), volume D, (2010).
[7] M. Spiliopoulou, I. Ntoutsi, Y. Theodoridis, and R. Schult. Monic:
modeling and monitoring cluster transitions. In Proceedings of the 12th
ACM SIGKDD international conference on Knowledge discovery and
data mining, pages 706 -- 711. ACM, 2006.
[8] S. Asur, S. Parthasarathy, and D. Ucar. An event-based framework for
characterizing the evolutionary behavior of interaction graphs. Proceed-
ings of the 13th ACM SIGKDD international conference on Knowledge
discovery and data mining (ACM), 2007.
[9] T. Falkowski and M. Spiliopoulou. Users in volatile communities:
Studying active participation and community evolution.
In Cristina
Conati, Kathleen McCoy, and Georgios Paliouras, editors, User Mod-
eling 2007, volume 4511 of Lecture Notes in Computer Science, pages
47 -- 56. Springer Berlin / Heidelberg, 2007.
[10] M. Toyoda and M. Kitsuregawa. Extracting evolution of web commu-
nities from a series of web archives. In HyperText '03 Proc. 14th. ACM
Conf. Hypertext & hypermedia, volume 5408. ACM, 2003.
[11] J. Hopcroft, O. Khan, B. Kulis, and B. Selman. Quantifying social group
evolution. Nature, 446(188701), (2007).
[12] T. Aynaud and J.-L. Guillaume. Static community detection algorithms
for evolving networks. Wireless Networks, (2010).
[13] D. Chakrabarti, R. Kumar, and A. Tomkins. An event-based framework
for characterizing the evolutionary behavior of interaction graphs. Pro-
ceedings of the 13th ACM SIGKDD international conference on Knowl-
edge discovery and data mining (ACM), (2007).
25
[14] Y. Chi, S. Zhu, X. Song, J. Tatemura, and B. L. Tseng. Structural
and temporal analysis of the blogosphere through community factoriza-
tion. Proceedings of the 13th ACM SIGKDD international conference
on Knowledge discovery and data mining - KDD '07, 163, (2007).
[15] Y.-R. Lin, Y. Chi, S. Zhu, H. Sundaram, and B. L. Tseng. Facetnet: A
framework for analyzing communities and their evolutions in dynamic
networks. Proc. 17th Intl. Conf. on the World Wide Web (WWW), 163,
(2008).
[16] M. Kim and J. Han. A particle and density based evolutionary clustering
method for dynamic networks. In Proceedings of 2009 Int. Conf. on Very
Large Data Bases, August 2009.
[17] M. B. Jdidia, C. Robardet, and E. Fleury. Communities detection and
analysis of their dynamics in collaborative networks. IEEE ICDIM, 163,
(2007).
[18] P. Pons and M. Latapy. Computing communities in large networks
using random walks. Journal of Graph Algorithms and Applications,
163, (2006).
[19] P. Mucha, T. Richardson, K. Macon, and M. Porter. Community struc-
ture in time-dependent, multiscale, and multiplex networks. Science,
876, (2010).
[20] G. Simmel. The persistence of social groups. American Journal of
Sociology, 3(5):662, 1898.
[21] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and S. Fortunato. Find-
ing statistically significant communities in networks. PLoS ONE,
6(4):e18961, 04 2011.
[22] A. Lancichinetti, F. Radicchi, and J. J. Ramasco. Statistical significance
of communities in networks. Physical Review E, 81:046110, 2010.
[23] F. Radicchi, A. Lancichinetti, and J. J. Ramasco. Combinatorial ap-
proach to modularity. Physical Review E, 82:026102, 2010.
[24] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast
unfolding of communites in large networks. Journal of Statistical Me-
chanics: Theory and Experiment, page P10008, 2008.
26
[25] T. S. Evans. Clique graphs and overlapping communities. Journal of
Statistical Mechanics: Theory and Experiment, page P12037, 2010.
[26] M. Girvan and M. E. J. Newman. Community structure in social and
biological networks. PNAS, 99:7821 -- 7826, June 2002.
[27] D. R. Radev, P. Muthukrishnan, and V. Qazvinian. The ACL Anthol-
ogy Network corpus. In Proceedings of the 2009 Workshop on Text and
Citation Analysis for Scholarly Digital Libraries, NLPIR4DL '09, pages
54 -- 61, Stroudsburg, PA, USA, 2009. Association for Computational Lin-
guistics.
[28] J.-L. Guillaume and M. Latapy. Bipartite structure of all complex net-
works. Information Processing Letters, 90(5):215 -- 221, 2004.
27
|
1706.05295 | 2 | 1706 | 2017-06-29T05:48:49 | Nonbacktracking Bounds on the Influence in Independent Cascade Models | [
"cs.SI",
"cs.CC",
"cs.IT",
"cs.IT",
"math.PR",
"stat.ML"
] | This paper develops upper and lower bounds on the influence measure in a network, more precisely, the expected number of nodes that a seed set can influence in the independent cascade model. In particular, our bounds exploit nonbacktracking walks, Fortuin-Kasteleyn-Ginibre (FKG) type inequalities, and are computed by message passing implementation. Nonbacktracking walks have recently allowed for headways in community detection, and this paper shows that their use can also impact the influence computation. Further, we provide a knob to control the trade-off between the efficiency and the accuracy of the bounds. Finally, the tightness of the bounds is illustrated with simulations on various network models. | cs.SI | cs | Nonbacktracking Bounds on the Influence in Independent
Emmanuel Abbe∗
Cascade Models
Sanjeev Kulkarni†
June 30, 2017
Abstract
Eun Jee Lee‡
This paper develops upper and lower bounds on the influence measure in a network,
more precisely, the expected number of nodes that a seed set can influence in the
independent cascade model. In particular, our bounds exploit nonbacktracking walks,
Fortuin–Kasteleyn–Ginibre (FKG) type inequalities, and are computed by message
passing implementation. Nonbacktracking walks have recently allowed for headways in
community detection, and this paper shows that their use can also impact the influence
computation. Further, we provide a knob to control the trade-off between the efficiency
and the accuracy of the bounds. Finally, the tightness of the bounds is illustrated with
simulations on various network models.
1
Introduction
Influence propagation is concerned with the diffusion of information (or viruses) from initially
influenced (or infected) nodes, called seeds, in a network. Understanding how information
propagates in networks has become a central problem in a broad range of fields, such as
viral marketing [17], sociology [8, 19, 22], communication [12], epidemiology [20], and social
network analysis [23].
One of the most fundamental questions on influence propagation is to estimate the
influence, i.e. the expected number of influenced nodes at the end of the propagation given
some seeds. Estimating the influence is central to various research problems related to
influence propagation, such as the widely-known influence maximization problem - finding
a set of k nodes that maximizes the expected number of influenced nodes.
Recent studies in the influence propagation have proposed heuristic algorithms [11, 18, 3,
7, 21] for the influence maximization problem while using Monte Carlo (MC) simulations
to approximate the influence. Despite its simplicity, approximating the influence via MC
simulations is far from ideal for large networks; in particular, MC may require a large amount
of computations in order to stabilize the approximation.
7
1
0
2
n
u
J
9
2
]
I
S
.
s
c
[
2
v
5
9
2
5
0
.
6
0
7
1
:
v
i
X
r
a
∗Program in Applied and Computational Mathematics, and the Department of Electrical Engineering,
Princeton University, Princeton, USA, [email protected].
†The Department
of Electrical Engineering,
Princeton University,
Princeton,
USA,
[email protected].
‡Program in Applied and Computational Mathematics, Princeton University, Princeton, USA,
[email protected].
1
To overcome the limitations of Monte Carlo simulations, many researchers have been
taking theoretical approaches to approximate the influence of given seeds in a network. Draief
et al., [5] introduced an upper bound for the influence by using the spectral radius of the
adjacency matrix. Tighter upper bounds were later suggested in [16] which relate the ratio of
influenced nodes in a network to the spectral radius of the so-called Hazard matrix. Further,
improved upper bounds which account for sensitive edges were introduced in [15].
In contrast, there has been little work on finding a tight lower bound for the influence. A
few exceptions include the work by Khim et al. [13], where the lower bound is obtained by
only considering the infections through the maximal-weighted paths.
In this paper, we propose both upper and lower bounds on the influence using nonback-
tracking walks and Fortuin–Kasteleyn–Ginibre (FKG) type inequalities. The bounds can be
efficiently obtained by message passing implementation. This shows that nonbacktracking
walks can also impact influence propagation, making another case for the use of nonback-
tracking walks in graphical model problems as in [14, 9, 2, 1], discussed later in the paper.
Further, we provide a parametrized version of the bounds that can adjust the trade-off
between the efficiency and the accuracy of the bounds.
2 Background
We introduce here the independent cascade model and provide background for the main
results.
Definition 1 (Independent Cascade Model). Consider a directed graph G = (V, (cid:126)E) with
V = n, a transmission probability matrix P ∈ [0, 1]n×n, and a seed set S0 ⊆ V . For
all u ∈ V , let N (u) be the set of neighbors of node u. The independent cascade model
IC(G,P, S0) sequentially generates the infected set St ⊆ V for each discrete time t ≥ 1 as
follows. At time t, St is initialized to be an empty set. Then, each node u ∈ St−1 attempts to
infect v ∈ N (u)∩ (V \∪t−1
i=0Si) with probability Puv, i.e. node u infects its uninfected neighbor
v with probability Puv. If v is infected at time t, add v to St. The process stops at T if
ST = ∅ at the end of the step t = T . The set of the infected nodes at the end of propagation
is defined as S = ∪T−1
i=0 St.
We often refer as an edge (u, v) being open if node u infects node v. The IC model can
also be defined on an undirected graph by replacing each edge e = (u, v) which has the
−−−→
transmission probability pe with two directed edges
(v, u) and assigning transmission
probabilities Puv = Pvu = pe.
−−−→
(u, v),
The IC model is equivalent to the live-arc graph model, where the infection happens at
once, rather than sequentially. The live-arc graph model first decides the state of every edge
with a Bernoulli trial, i.e. edge (u, v) is open independently with probability Puv and closed,
otherwise. Then, the set of infected nodes is defined as the nodes that are connected to at
least one of the seeds by the open edges.
Definition 2 (Influence). The expected number of nodes that are infected at the end of the
propagation process is called the influence (rather than the expected influence, with a slight
abuse of terminology) of IC(G,P, S0), and is defined as
2
(cid:88)
v∈V
σ(S0) =
P(v is infected).
(1)
It is shown in [4] that computing the influence σ(S0) in the independent cascade model
IC(G,P, S0) is #P-hard, even with a single seed, i.e. S0 = 1.
Next, we define nonbacktracking (NB) walks on a directed graph. Nonbacktracking walks
have already been used for studying the characteristics of networks. To the best of our
knowledge, the use of NB walks in the context of epidemics was first introduced in the
paper of Karrer et al. [10] and later applied to percolation in [9]. In particular, Karrer et
al. reformulate the spread of infections as a message passing process and demonstrate how
the resulting equations can be used to calculate the upper bound on the number of nodes
that are susceptible at a given time. As we shall see, we take a different approach to the use
of the NB walks, which focuses on the effective contribution of a node in infecting another
node and accumulates such contributions to obtain upper and lower bounds. More recently,
nonbacktracking walks are used for community detection [14, 2, 1].
Definition 3 (Nonbacktracking Walk). Let G = (V, E) be a directed graph. A nonbacktrack-
ing walk of length k is defined as w(k) = (v0, v1, . . . , vk), where vi ∈ V and (vi−1, vi) ∈ E for
all i ∈ [k], and vi−1 (cid:54)= vi+1 for i ∈ [k − 1].
We next recall a key inequality introduced by Fortuin et. al [6].
Theorem 1 (FKG Inequality). Let Γ be a finite partially ordered set, ordered by ≺ with
(Γ,≺) a distributive lattice and µ be a positive measure on Γ satisfying the following condition:
for all x, y ∈ Γ,
µ(x ∧ y)µ(x ∨ y) ≥ µ(x)µ(y),
where x ∧ y = max{z ∈ Γ : z (cid:22) x, z (cid:22) y} and x ∨ y = min{z ∈ Γ : y (cid:22) z, y (cid:22) z}. Let f and
g be both increasing (or both decreasing) functions on Γ. Then,
(
µ(x))(
f (x)g(x)µ(x)) ≥ (
f (x)µ(x))(
g(x)µ(x)).
(2)
(cid:88)
x∈Γ
(cid:88)
x∈Γ
(cid:88)
x∈Γ
(cid:88)
x∈Γ
FKG inequality is instrumental in studying the influence propagation since the probability
that a node is influenced is nondecreasing with respect to the partial order of random variables
describing the states, open or closed, of the edges.
3 Nonbacktracking bounds on the influence
In this section, we presents upper and lower bounds on the influence in the independent
cascade model and explain the motivations and intuitions of the bounds. The bounds are
computed efficiently by algorithms which utilize nonbacktracking walks and FKG inequalities.
In particular, the upper bound on a network based on a graph G(V, E) runs in O(V 2+V E)
and the lower bound runs in O(V + E), whereas Monte Carlo simulation would require
O(V 3 + V 2E) computations without knowing the variance of the influence, which is
harder to estimate than the influence. The reason for the large computational complexity of
MC is that in order to ensure that the standard error of the estimation does not grow with
3
respect to V , MC requires O(V 2) computations. Hence, for large networks, where MC
may not be feasible, our algorithms can still provide bounds on the influence.
Furthermore, from our computable upper σ+ and lower bounds σ−, we can compute an
upper bound on the variance given by (σ+ − σ−)2/4. This could be used to estimate the
number of computations needed by MC. Computing the upper bound on the variance with
the proposed bounds can be done in O(V 2 + V E), whereas computing the variance with
MC simulation requires O(V 5 + V 4E).
3.1 Nonbacktracking upper bounds (NB-UB)
We start by defining the following for the independent cascade model IC(G,P, S0), where
G = (V, E) and V = n.
Definition 4. For any v ∈ V , we define the set of in-neighbors N−(v) = {u ∈ V : (u, v) ∈ E}
and the set of out-neighbors N +(v) = {u ∈ V : (v, u) ∈ E}.
Definition 5. For any v ∈ V and l ∈ {0, . . . , n − 1}, the set Pl(S0→ v) is defined as the set
of all paths with length l from any seed s ∈ S0 to v. We call a path P is open if every edge
in P is open.
Definition 6. For any u, v ∈ V , l ∈ {0, . . . , n−1}, and S ⊆ V , we define the events
A(v) = {v is infected}
Al(v) = ∪P∈Pl(S0→v){P is open}
Al(u→ v) = ∪P∈Pl(S0→u),P(cid:54)∈v{P is open and edge (u, v) is open}
Al,S(v) = ∪P∈{P (cid:48)∈Pl(S0→v):P (cid:48)(cid:54)∈w,∀w∈S}{P is open},
(3)
(4)
(5)
(6)
and the probabilities
pl(u→ v) = P(Al(u→ v)).
p(v) = P(A(v))
pl(v) = P(Al(v))
(7)
(8)
(9)
In other words, Al(v) is the event that node v is infected by open paths of length l, Al(u→ v)
is the event that v is infected by node u with open paths of length l + 1, i.e. there exists
an open path of length l + 1 from a seed to v that ends with edge (u, v), and Al,S(v) is the
event that node v is infected by length l open paths which do not include any node in S.
Lemma 1. For any v ∈ V ,
For any v ∈ V and l ∈ {0, . . . , n − 1},
p(v) ≤ 1 − n−1(cid:89)
pl(v) ≤ 1 − (cid:89)
l=0
u∈N−(v)
4
(1 − pl(v)).
(1 − pl(u→ v)).
(10)
(11)
Proof. Recall that p(v) = P(A(v)), pl(v) = P(Al(v)), and pl(u→ v) = P(Al(u→ v)).
p(v) = P(∪n−1
l=0 Al(v))
= 1 − P(∩n−1
l=0 Al(v)C)
≤ 1 − n−1(cid:89)
= 1 − n−1(cid:89)
l=0
P(Al(v)C)
(1 − pl(v)).
Equation (14) follows from positive correlation among the events Al(v)C for all v ∈ V , which
can be proved by FKG inequality. Similarly,
l=0
pl(v) = P(∪u∈N−(v)Al(u→ v))
= 1 − P(∩u∈N−(v)Al(u→ v)C)
P(Al(u→ v)C)
≤ 1 − (cid:89)
= 1 − (cid:89)
u∈N−(v)
(1 − pl(u→ v)).
u∈N−(v)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
Lemma 1 suggests that given pl(u→ v), we may compute an upper bound on the influence.
Ideally, pl(u→ v) can be computed by considering all paths with length l. However, this
results in exponential complexity O(nl), as l gets up to n − 1. Thus, we present an efficient
way to compute an upper bound UBl(u→ v) on pl(u→ v), which in turns gives an upper
bound UBl(v) on pl(v), with the following recursion formula.
Definition 7. For all l ∈ {0, . . . , n − 1} and u, v ∈ V such that (u, v) ∈ E, UBl(u) ∈ [0, 1]
and UBl(u→ v) ∈ [0, 1] are defined recursively as follows.
Initial condition: For every s∈ S0, s+∈ N +(s), u∈ V \S0, and v∈ N +(u),
UB0(s) = 1, UB0(s→ s+) = Pss+
UB0(u) = 0, UB0(u→ v) = 0.
(20)
(21)
Recursion: For every l > 0, s∈ S0, s+∈ N +(s), s−∈ N−(s), u∈ V \S0, and v∈ N +(u)\S0,
(22)
(23)
UBl(s) = 0, UBl(s→ s+) = 0, UBl(s−→ s) = 0
UBl(u) = 1 − (cid:89)
w∈N−(u)
(1 − UBl−1(w→ u))
(cid:40)Puv(1 − 1−UBl(u)
1−UBl−1(v→u) ),
PuvUBl(u),
UBl(u→ v) =
if v∈ N−(u)
otherwise.
(24)
Equation (22) follows from that for any seed node s ∈ S0 and for all l > 0, pl(s) = 0,
pl(s → s+) = 0, pl(s− → s) = 0. A naive way to compute UBl(u → v) is UBl(u → v) =
5
PuvUBl−1(u), but this results in an extremely loose bound due to the backtracking. For a
tighter bound, we use nonbacktracking in Equation (24), i.e. when computing UBl(u→ v),
we ignore the contribution of UBl−1(v→ u).
Theorem 2. For any independent cascade model IC(G,P, S0),
σ(S0) ≤ (cid:88)
(1 − n−1(cid:89)
v∈V
l=0
(1 − UBl(v))) =: σ+(S0),
(25)
where UBl(v) is obtained recursively as in Definition 7.
Proof. We provide a proof by induction. The initial condition, for l = 0, can be easily
checked. For every s∈ S0, s+∈ N +(s), u∈ V \S0, and v∈ N +(u),
p0(s) = 1 ≤ UB0(s) = 1
p0(s→ s+) = Pss+ ≤ UB0(s→ s+) = Pss+
p0(u) = 0 ≤ UB0(u) = 0
p0(u→ v) = 0 ≤ UB0(u→ v) = 0.
(26)
(27)
(28)
(29)
For each l ≤ L, assume that pl(v) ≤ UBl(v) and pl(u→ v) ≤ UBl(u→ v) for all u, v ∈ V .
Since pl(s) = pl(s → s+) = pl(s− → s) = 0 for every l ≥ 1, s ∈ S0, s+∈ N +(s), and
s−∈ N−(s), it is sufficient to show pL+1(v) ≤ UBL+1(v) and pL+1(u→ v) ≤ UBL+1(u→ v)
for all u∈ V \S0, and v∈ N +(u).
For simplicity, for any pair of events (A, B), use the notation AB for A ∩ B.
For any v ∈ V \ S0,
pL+1(v) = P(∪u∈N−(v)EuvAL,{v}(u)),
where Euv denotes the event that edge (u, v) is open, i.e. P(Euv) = Puv. Thus,
pL+1(v) = 1 − P(∩u∈N−(v)(EuvAL,{v}(u))C)
(1 − P(EuvAL,{v}(u)))
≤ 1 − (cid:89)
= 1 − (cid:89)
≤ 1 − (cid:89)
u∈N−(v)
u∈N−(v)
u∈N−(v)
(1 − pL(u→ v))
(1 − UBL(u→ v)) = UBL+1(v),
(30)
(31)
(32)
(33)
(34)
where Equation (32) is obtained by the positive correlation among the events EuvAL,{v}(u),
and Equation (34) comes from the assumption.
For any v ∈ V \ S0 and w ∈ N +(v),
pL+1(v→ w) = P(EvwAL+1,{w}(v)).
= PvwP(AL+1,{w}(v))
(35)
(36)
6
Equation (36) follows from the independence between the events Evw and AL+1,{w}(v).
If w ∈ N−(v),
pL+1(v→ w) = PvwP(∪u∈N−(v)\{w}EuvAL,{v,w}(u))
1 − (cid:89)
1 − (cid:89)
1 − (cid:89)
≤ Pvw
≤ Pvw
≤ Pvw
(1 − P(EuvAL,{v,w}(u)))
u∈N−(v)\{w}
,
(1 − pL(u→ v))
u∈N−(v)\{w}
(1 − UBL(u→ v))
u∈N−(v)\{w}
(37)
(38)
(39)
(40)
(41)
(42)
(43)
(44)
(46)
(47)
Equation (40) holds, since the two events satisfy EuvAL,{v,w}(u) ⊆ EuvAL,{v}(u).
Recall that, if w ∈ N−(v),
UBL+1(v→ w) = Pvw(1 − 1 − UBL+1(v)
1 − UBL(w→ v)
= Pvw(1 − (cid:89)
)
(1 − UBL(u→ v))).
u∈N−(v)\{w}
Thus, pL+1(v→ w) ≤ UBL+1(v→ w), for all w ∈ N +(v) ∩ N−(v).
If w /∈ N−(v),
(45)
Hence, pL+1(v→ w) ≤ UBL+1(v→ w), for all w ∈ N +(v), concluding the induction proof.
Finally, by Lemma 1,
1 −(cid:89)
pL+1(v→ w) = PvwP(∪u∈N−(v)EuvAL,{v,w}(u))
≤ Pvw
(1 − UBL(u→ v))
= PvwUBL+1(v) = UBL+1(v→ w),
u∈N−(v)
σ(S0) ≤ (cid:88)
≤ (cid:88)
v∈V
(1 − n−1(cid:89)
(1 − n−1(cid:89)
l=0
v∈V
l=0
(1 − pl(v)))
(1 − UBl(v))) = σ+(S0).
3.2 Algorithm for NB-UB
Next, we present Nonbacktracking Upper Bound (NB-UB) algorithm which efficiently com-
putes UBl(v) and UBl(u→ v) by message passing. At l-th iteration, the variables in NB-UB
represent as follows.
7
· Sl : set of nodes that are processed at l-th iteration.
· Mcurr(v) = {(u, UBl−1(u→ v)) : u is an in-neighbor of v, and u ∈ Sl−1},
set of pairs (previously processed in-neighbor u of v, incoming message from u to v).
· MSrc(v) = {u : u is a in-neighbor of v, and u ∈ Sl−1},
set of in-neighbor nodes of v that were processed at the previous step.
· Mcurr(v)[u] = UBl−1(u→ v), the incoming message from u to v.
· Mnext(v) = {(u, UBl(u→ v)) : u is an in-neighbor of v, and u ∈ Sl},
set of pairs (currently processed in-neighbor u, next iteration's incoming message from u
to v).
Algorithm 1 Nonbacktracking Upper Bound (NB-UB)
Initialize: UBl(v) = 0 for all 0 ≤ l ≤ n − 1 and v ∈ V
Initialize: Insert (v, 1) to Mnext(v) for all v ∈ S0
for l = 0 to n − 1 do
for u ∈ Sl do
Mcurr(u) = Mnext(u)
Clear Mnext(u)
UBl(u) = ProcessIncomingMsgUB(Mcurr(u))
for v ∈ N +(u) \ S0 do
Sl+1.insert(v)
if v ∈ MSrc(u) then
else
UBl(u→ v) = GenerateOutgoingMsgUB(Mcurr(u)[v], UBl(u),Puv)
Mnext(v).insert((u, UBl(u→ v))).
UBl(u→ v) = GenerateOutgoingMsgUB(0, UBl(u),Puv)
Mnext(v).insert((u, UBl(u→ v))).
Output: UBl(u) for all l, u
At the beginning, every seed node v ∈ S0 is initialized such that Mcurr(v) = {(v, 1)}. For each
l-th iteration, every node u in Sl is processed as follows. First, ProcessIncomingMsgUB(Mcurr(u))
computes UBl(u) as in Equation (23). Second, u passes a message to its neighbor v ∈
N +(u) \ S0 along the edge (u, v), and v stores (inserts) the message in Mnext(v) for the
next iteration. The message contains 1) the source of the message, u, and 2) UBl(u→ v),
which is computed as in Equation (24), by the function GenerateOutgoingMsgUB. Finally,
the algorithm outputs UBl(u) for all u ∈ V and l ∈ {0, . . . , n−1}, and the upper bound
σ+(S0) is computed by Equation (25).
Next, we illustrate how the algorithm runs on a small network in Figure 1. The inde-
pendent cascade model IC(G,P, S0) is defined on an undirected graph G = (V, E), where
V = {a, b, c, d}, S0 = {b}, and every edge has the same transmission probability p. For each
l, Table 1 shows the values of the key variables, Sl, Mcurr, and UBl, in the algorithm and
UBl(u→ v) for every pair u, v such that u ∈ Sl and v ∈ N +(u) \ S0.
For example, at l = 2, since S2 = {d}, node d is processed. Recall that, at l = 1, node
a sent the message (a, UB1(a→ d)) to d, and node c sent the message (c, UB1(c→ d)) to d.
8
Figure 1: The step-wise illustration of NB-UB algorithm on the example network.
l = 0
{b}
l = 1
{a, c}
l = 2
{d}
l = 3
{a, c, e}
Sl
a
b
c
d
e
Mcurr
{(b, 1)}
∅
∅
∅
∅
UB0
0
1
0
0
0
Mcurr
{(b, p)}
{(b, p)}
∅
∅
∅
UB1
p
0
p
0
0
Mcurr
∅
∅
∅
{(a, p2),
(c, p2)}
Out
-Prob
UB0(b→ a) = p
UB0(b→ c) = p
UB1(a→ d) = p2
UB1(c→ d) = p2
UB2
0
0
0
Mcurr
{(d, p3)}
∅
{(d, p3)}
2p2 − p4
∅
UB3
p3
0
p3
0
0
∅
UB2(d→ a) = p3
UB2(d→ c) = p3
UB2(d→ e) = 2p3 − p5
{(d, 2p3 − p5)}
2p3 − p5
UB3(a→ d) = 0
UB3(c→ d) = 0
UB3(e→ d) = 0
Table 1: The values of the key variables in NB-UB algorithm on the example network in Figure 1.
Thus,
Mcurr(d) = {(a, UB1(a→ d)), (c, UB1(c→ d))} = {(a, p2), (c, p2)}
MSrc(d) = {a, c},
(48)
(49)
and node d is processed as follows.
First, compute UB2(d) as
UB2(d) = ProcessIncomingMsgUB(Mcurr(d))
(50)
(51)
Next, set S3 = N +(d)\S0 = {a, c, e}, and compute UB2(d→ a), UB2(d→ c), and UB2(d→ e)
as
= 1 − (1 − UB1(a→ d))(1 − UB1(c→ d)) = 2p2 − p4.
UB2(d→ a) = GenerateOutgoingMsgUB(UB1(a→ d), UB2(d),Pda)
UB2(d→ c) = GenerateOutgoingMsgUB(UB1(c→ d), UB2(d),Pdc)
= Pda(1 − 1 − UB2(d)
1 − UB1(a→ d)
= Pdc(1 − 1 − UB2(d)
1 − UB1(c→ d)
) = p3
) = p3
UB2(d→ e) = GenerateOutgoingMsgUB(0, UB2(d),Pde)
= Pde(1 − 1 − UB2(d)
1 − 0
) = PdeUB2(d) = 2p3 − p5.
(52)
(53)
(54)
(55)
(56)
(57)
9
𝒑𝒑𝟐𝒂𝒍=𝟎𝒃𝒄𝒅𝒆𝒍=𝟏𝒍=𝟐𝒍=𝟑𝒑𝒑𝟐𝒑𝟑𝒑𝟑𝟐𝒑𝟑−𝒑𝟓Then, node d send messages (d, UB2(d→ a)) to a, (d, UB2(d→ c)) to c, and (d, UB2(d→ e))
to e, concluding the process of the l = 2 step.
Computational complexity: Notice that for each iteration l∈{0, . . . , n−1}, the algorithm
accesses at most n nodes, and for each node, the functions ProcessIncomingMsgUB and
GenerateOutgoingMsgUB are computed in O(deg(v)). Therefore, the worst case computa-
tional complexity is O(V 2 + V E).
3.3 Nonbacktracking lower bounds (NB-LB)
A naive way to compute a lower bound on the influence in a network IC(G,P, S0) is to
reduce the network to a (spanning) tree network, by removing edges. Then, since there is a
unique path from a node to another, we can compute the influence of the tree network, which
is a lower bound on the influence in the original network, in O(V ). We take this approach of
generating a subnetwork from the original network, yet we avoid the significant gap between
the bound and the influence by considering the following directed acyclic subnetworks, in
which there is no backtracking walk.
Definition 8 (Min-distance Directed Acyclic Subnetwork). Consider an independent cascade
model IC(G,P, S0) with G = (V, E) and V = n. Let d(S0, v) be the minimum distance from
a seed in S0 to v. A minimum-distance directed acyclic subnetwork (MDAS), IC(G(cid:48),P(cid:48), S0),
where G(cid:48) = (V (cid:48), E(cid:48)), is obtained as follows.
· V (cid:48) = {v1, ..., vn} is an ordered set of nodes such that d(S0, vi) ≤ d(S0, vj), for every i < j.
· E(cid:48) = {(vi, vj) ∈ E : i < j}, i.e. remove edges from E whose source node comes later in
the order than its destination node to obtain E(cid:48).
vivj = Pvivj, if (vi, vj) ∈ E(cid:48), and P(cid:48)
· P(cid:48)
If there are multiple ordered sets of vertices that satisfying the condition, we may choose an
order arbitrarily.
For any k ∈ [n], let p(vk) be the probability that vk ∈ V (cid:48) is infected in the MDAS,
IC(G(cid:48),P(cid:48), S0). Since p(vk) is equivalent to the probability of the union of the events that an
in-neighbor ui ∈ N−(vk) infects vk, p(vk) can be computed by the principle of inclusion and
exclusion. Thus, we may compute a lower bound on p(vk), using Bonferroni inequalities, if we
know the probabilities that in-neighbors u and v both infects vk, for every pair u, v ∈ N−(vk).
However, computing such probabilities can take O(kk). Hence, we present LBl(vk) which
efficiently computes a lower bound on p(vk) by the following recursion.
Definition 9. For all vk ∈ V (cid:48), LB(vk) ∈ [0, 1] is defined by the recursion on k as follows.
Initial condition: for every vs ∈ S0,
vivj = 0, otherwise.
Recursion: for every vk ∈ V (cid:48) \ S0,
LB(vk) =
m∗(cid:88)
i=1
LB(vs) = 1.
P(cid:48)
uivk
LB(ui)(1 − i−1(cid:88)
j=1
P(cid:48)
uj vk
,
)
10
(58)
(59)
where N−(vk) ={u1, . . . , um} is the ordered set of in-neighbors of vk in IC(G(cid:48),P(cid:48), S0) and
m∗ = max{m(cid:48) ≤ m :(cid:80)m(cid:48)−1
Remark. Since the i-th summand in Equation (59) can utilize(cid:80)i−2
computed in (i−1)-th summand, to compute (cid:80)i−1
j=1 P(cid:48)
≤ 1}.
uj vk
j=1 P(cid:48)
uj vk
j=1 P(cid:48)
, which is already
, the summation takes at most
uj vk
O(deg(vk)).
Theorem 3. For any independent cascade model IC(G,P, S0) and its MDAS IC(G(cid:48),P(cid:48), S0),
(60)
σ(S0) ≥ (cid:88)
LB(vk) =: σ−(S0),
vk∈V (cid:48)
where LB(vk) is obtained recursively as in Definition 9.
Proof. We provide a proof by induction. For any vk ∈ V (cid:48), let A(vk) be the event that node
vk is infected in MDAS IC(G(cid:48),P(cid:48), S0), and for every edge (vj, vk), let Evj ,vk be the event
that edge (vj, vk) is open, i.e. P(Evj ,vk ) = P(cid:48)
The initial condition k = 1 holds, since p(v1) = 1 ≥ LB(v1) = 1 (v1 is a seed).
For every k ≤ K, assume p(vk) ≥ LB(vk).
For the node vK+1,
. Recall that p(vk) = P(A(vk)).
vj vk
p(vK+1) = P(∪vj∈N−(vK+1)Evj vK+1A(vj)).
(61)
We re-label vertices in N−(vK+1) = {u1, . . . , um(K+1)} where m(K + 1) = in-deg(vK+1),
and let QiK+1 = P(cid:48)
. Then, for any integer m ≤ m(K + 1),
uivK+1
p(vK+1) = P(∪m(K+1)
≥ P(∪m
i=1
≥ m(cid:88)
m(cid:88)
≥ m(cid:88)
i=1
=
EuivK+1A(ui))
i=1
i=1EuivK+1A(ui))
P(EuivK+1A(ui)) − m(cid:88)
i−1(cid:88)
i−1(cid:88)
QiK+1P(A(ui)) − m(cid:88)
QiK+1P(A(ui))(1 − i−1(cid:88)
j=1
j=1
i=1
i=1
i=1
j=1
QjK+1).
P(EuivK+1A(ui)Euj vK+1A(uj))
QiK+1QjK+1P(A(ui)A(uj))
(62)
(63)
(64)
(65)
(66)
(67)
(68)
(69)
Equation (64) follows from the principle of inclusion and exclusion. Equation (65) results from
the Independence between the event that an edge ending with vK+1 is open and the event that
a node vi is infected where i < K + 1. Equation (66) holds since P(A(ui)) ≥ P(A(ui)A(uj)).
Now, define m∗ = max{m(cid:48) ≤ m(K + 1) :(cid:80)m(cid:48)−1
j=1 QjK+1 ≤ 1}. Then,
p(vK+1) ≥ m∗(cid:88)
≥ m∗(cid:88)
i=1
QiK+1P(A(ui))(1 − i−1(cid:88)
QiK+1LB(ui)(1 − i−1(cid:88)
j=1
QjK+1)
QjK+1)
i=1
= LB(vK+1).
j=1
11
Equation (68) follows since 1−(cid:80)i−1
p(vi) ≥ LB(vi) for all vi ∈ V (cid:48), concluding the induction proof.
Finally,
j=1 QjK+1 ≥ 0 for all i ≤ m∗ by the definition of m∗. Thus,
σ(S0) ≥ n(cid:88)
≥ n(cid:88)
i=1
p(vi)
LB(vi) = σ−(S0).
(70)
(71)
Equation (70) holds since its right hand side equals to the influence of the MDAS, IC(G(cid:48),P(cid:48), S0).
i=1
3.4 Algorithm for NB-LB
Next, we present Nonbacktracking Lower Bound (NB-LB) algorithm which efficiently com-
putes LB(vk). At k-th iteration, the variables in NB-LB represent as follow.
) : vt is an in-neighbor of vk}, set of pairs (incoming message
· M(vk) = {(LB(vt),P(cid:48)
from an in-neighbor vt to vk, the transmission probability of edge (vt, vk)).
· M(vk)i = (M(vk)i,1, M(vk)i,2), the i-th pair in M(vk), for i ≥ 1.
Algorithm 2 Nonbacktracking Lower Bound (NB-LB)
vtvk
Input: directed acyclic network IC(G(cid:48),P(cid:48), S0)
Initialize: σ− = 0
Initialize: Insert (1, 1) to M(vi) for all vi ∈ S0
for k = 1 to n do
LB(vk) = ProcessIncomingMsgLB(M(vk))
σ− += LB(vk)
for vt ∈ N +(vk) \ S0 do
M(vt).insert((LB(vk),P(cid:48)
vkvt))
Output: σ−
At the beginning, every seed node v ∈ S0 is initialized such that M(v) = {(1, 1)}, and
σ− = 0. For each k-th iteration, node vk is processed as follows. First, LB(vk) is computed
as in the Equation (59), by the function ProcessIncomingMsgLB, and added to σ−. Second,
vk passes the message (LB(vk),P(cid:48)
vkvt) to its neighbor vt ∈ N +(vk)\S0, and vt stores (inserts)
it in M(vt). Finally, the algorithm outputs σ−, the lower bound on the influence.
Figure 2: The step-wise illustration of NB-LB on the example network.
In Figure 2, we show an example for the lower bound computation by NB-LB on a small
network IC(G,P, S0) defined on an undirected graph G = (V, E), where V = {a, b, c, d},
12
𝐌𝐃𝐀𝐒𝒌=𝟏𝒌=𝟐𝒌=𝟑𝒂𝒃𝒄𝒅𝒑𝒑𝒑𝟐𝒑𝟐+𝒑𝟑−𝒑𝟒S0 = {a}, and every edge has the same transmission probability p. For each k, Table 2 shows
the values of the key variables, M(vk), LB(vk), and (LB(vk),P(cid:48)
vkvt) for the out-neighbors
vt ∈ N +(vk) \ S0, and shows the change in σ−.
vk
M(vk)
LB(vk)
N +(vk) \ S0
(LB(vk),P(cid:48)
vkvt ) to vt
σ−
k = 1
a
{(1, 1)}
1
{b, c}
k = 2
b
{(1, p)}
p
{c}
(1, p) to b and c
(p, p) to c
1
1 + p
k = 3
k = 4
c
{(1, p), (p, p)}
p + p2 − p3
{d}
(p + p2 − p3, p) to d
1 + 2p + p2 − p3
d
∅
∅
p2 + p3 − p4
1 + 2p + 2p2 − p4
Table 2: The values of the key variables in NB-LB on the example network in Figure 2.
From the undirected network, we obtain MDAS in Figure 2 as follows. Since d(a, S0) = 0,
d(b, S0) = d(c, S0) = 1 and d(d, S0) = 2, we order the vertices as {v1 = a, v2 = b, v3 = c, v4 = d}
to satisfy that d(vi, S0) ≤ d(vj, S0), for every i < j. Then, NB-LB algorithm process the
nodes {v1 = a, v2 = b, v3 = c, v4 = d} sequentially.
(LB(a),P(cid:48)
For example, at k = 3, node c is processed. Recall that at k = 1, node a sent the message
ac) to node c; at k = 2, node b sent the message (LB(b),P(cid:48)
bc) to node c. Thus,
M(c) = {(LB(a),P(cid:48)
ac), (LB(b),P(cid:48)
bc)} = {(1, p), (p, p)}.
Then, it computes LB(c) by the function ProcessIncomingMsgLB.
LB(c) = ProcessIncomingMsgLB(M(c))
bcLB(b)(1 − P(cid:48)
Recall that σ− = 1 + p, at the end of iteration k = 2, so
acLB(a) + P(cid:48)
= P(cid:48)
ac) = p + p2 − p3.
(72)
(73)
(74)
σ− = 1 + p + LB(c) = 1 + 2p + p2 − p3.
(75)
Next, since N +(c) \ S0 = {d}, node c sends the message (LB(c),Pcd) = (p + p2 − p3, p) to
node d, concluding the process of the k = 3 step.
Computational complexity: Obtaining an arbitrary directed acyclic subnetwork from
the original network takes O(V + E). Next, the algorithm iterates through the nodes
V (cid:48) ={v1, . . . , vn}. For each node vk, ProcessIncomingMsgLB takes O(deg(vk)) and vk sends
messages to its out-neighbors in O(deg(vk)). Hence, the worst case computational complexity
is O(V + E).
3.5 Tunable nonbacktracking bounds
In this section, we introduce the parametrized version of NB-UB and NB-LB which provide
control to adjust the trade-off between the efficiency and the accuracy of the bounds.
Tunable nonbacktracking upper bounds (tNB-UB): The algorithm inputs the param-
eter t, which indicates the maximum length of the paths that the algorithm considers to
13
compute the exact, rather than the upper bound on, probability of infection. For every node
u ∈ V , the algorithm computes p≤t(u) that node u is infected by open paths whose length is
less than or equal to t.
p≤t(u) = P(∪P∈{∪t
i=0Pi(S0→u)}{P is open}).
(76)
Then, we start (non-parameterized) NB-UB algorithm from l = t + 1 with the new initial
conditions: for all u ∈ V and v ∈ N +(u),
Finally, the upper bound by tNB-UB is computed as(cid:80)
UBt(u) = p≤t(u)
UBt(u→ v) = pt(u→ v)
v∈V (1 −(cid:81)n−1
l=t (1 − UBl(v))).
(77)
(78)
For higher values of t, the algorithm results in tighter upper bounds, while the computa-
tional complexity may increase exponentially for dense networks. Thus, this method is most
applicable in sparse networks, where the degree of each node is bounded.
We present here the parametrized algorithms for NB-UB.
Algorithm 3 Tunable NB-UB (tNB-UB)
parameter: non-negative integer t ≤ n − 1
Initialize: UBt(v) = 0 for all t ≤ l ≤ n − 1 and v ∈ V
for u ∈ V do
UBt(u) = p≤t(u)
for v ∈ N +(u) \ S0 do
if pt(u→ v) > 0 then
St+1.insert(v)
Mnext(v).insert(u, pt(u→ v))
for l = t + 1 to n − 1 do
for u ∈ Sl do
Mcurr(u) = Mnext(u)
Clear Mnext(u)
UBl(u) = ProcessIncomingMsgUB(Mcurr(u))
for v ∈ N +(u) \ S0 do
Sl+1.insert(v)
if v ∈ Mcurr(u) then
else
UBl(u→ v) = GenerateOutgoingMsgUB(Mcurr(u)[v], UBl(u),Puv)
Mnext(v).insert((u, UBl(u→ v))).
UBl(u→ v) = GenerateOutgoingMsgUB(0, UBl(u),Puv)
Mnext(v).insert((u, UBl(u→ v))).
Output: UBl(u) for all l = {t, t + 1, . . . , n − 1}, u ∈ V
Tunable nonbacktracking lower bounds (tNB-LB): We first order the vertex set as
V (cid:48) = {v1, . . . , vn}, which satisfies d(S0, vi) ≤ d(S0, vj), for every i < j. Given a non-negative
integer parameter t ≤ n, we obtain a t-size subnetwork IC(G[Vt],P[Vt], S0 ∩ Vt), where G[Vt]
is the vertex-induced subgraph which is induced by the set of nodes Vt = {v1, . . . , vt}, and
14
P[Vt] is the corresponding transmission probability matrix. For each vi ∈ Vt, we compute the
exact probability pt(vi) that node vi is infected in the subnetwork IC(G[Vt],P[Vt], S0 ∩ Vt).
Then, we start (non-parameterized) NB-LB algorithm from k = t + 1 with the new initial
condition: for all k ≤ t,
Finally, tNB-LB computes the lower bound as(cid:80)
LB(vk) = pt(vk).
vk∈V (cid:48) LB(vk).
(79)
Algorithm 4 Tunable NB-LB (tNB-LB)
parameter: non-negative integer t ≤ n
Initialize: σ− = 0
for k = 1 to t do
LB(vk) = pt(vk)
σ− += LB(vk)
for vi ∈ {N +(vk) ∩ {vj : j > t}} do
M(vi).insert((LB(vk),P(cid:48)
vkvi))
for k = t + 1 to n do
LB(vk) = ProcessIncomingMsgLB(M(vk))
σ− += LB(vk)
for vi ∈ N +(vk) \ S0 do
M(vi).insert((LB(vk),P(cid:48)
vkvi))
Output: σ−
For a larger t, the algorithm results in tighter lower bounds. However, the computational
complexity may increase exponentially with respect to t, the size of the subnetwork. This
algorithm can adopt Monte Carlo simulations on the subnetwork to avoid the large computa-
tional complexity. However, this modification results in probabilistic lower bounds, rather
than theoretically guaranteed lower bounds. Nonetheless, this can still give a significant
improvement, because the Monte Carlo simulations on a smaller size of network require less
computations to stabilize the estimation.
4 Experimental results
In this section, we evaluate the NB-UB and NB-LB in independent cascade models on a
variety of classical synthetic networks.
Network generation : We consider 4 classical random graph models with the parameters
shown as follows: Erdos Renyi random graphs with ER(n = 1000, p = 3/1000), scale-free
networks SF (n = 1000, α = 2.5), random regular graphs Reg(n = 1000, d = 3), and random
tree graphs with power-law degree distributions T (n = 1000, α = 3). For each graph model,
we generate 100 networks IC(G, pA,{s}) as follows. The graph G is the largest connected
component of a graph drawn from the graph model, the seed node s is selected randomly
from the vertex set of G, and A is the adjacency matrix of G. Then, the corresponding IC
model has the same transmission probability p for every edge.
15
Evaluation of bounds : For each network generated, we compute the following quanti-
ties for each p ∈ {0.1, 0.2, . . . , 0.9}.
· σmc: the estimation of the influence with 1000000 Monte Carlo simulations.
· σ+: the upper bound obtained by NB-UB.
· σ+
· σ−: the lower bound obtained by NB-LB.
· σ−
prob: the probabilistic lower bound obtained by 10 Monte Carlo simulations.
spec: the spectral upper bound by [16].
Figure 3: This figure compares the average relative gap of the bounds: NB-UB, the spectral upper
bound in [16], NB-LB, and the probabilistic lower bound computed by MC simulations, for various
types of networks.
The probabilistic lower bound is chosen for the experiments, since there has not been any
tight lower bound. The sample size of 10 is determined to overly match the computational
complexity of NB-LB algorithm. In Figure 3, we compare the average relative gap of the
bounds for every network model and for each transmission probability, where the true value is
assumed to be σmc. For example, the average relative gap of NB-UB for 100 Erdos Renyi net-
σ+[Ni]−σmc[Ni]
works {Ni}100
,
where σ+[Ni] and σmc[Ni] denote the NB-UB and the MC estimation, respectively, for the
network Ni.
i=1 with the transmission probability p is computed by 1
Results : Figure 3 shows that NB-UB outperforms the upper bound in [16] for the Erdos-
Renyi and random 3-regular networks, and performs comparably for the scale-free networks.
Also, NB-LB gives tighter bounds than the MC bounds on the Erdos-Renyi, scale-free, and
random regular networks when the transmission probability is small, p < 0.4. The NB-UB
and NB-LB compute the exact influence for the tree networks since both algorithms avoid
backtracking walks.
(cid:80)
σmc[Ni]
100
i∈[100]
Next, we show the bounds on exemplary networks.
4.1 Upper bounds
Selection of networks : In order to illustrate a typical behavior of the bounds, we have
chosen the network in Figure 4a as follows. First, we generate 100 random 3-regular graphs
16
(a)
(b)
Figure 4: (a) The figure compares various upper bounds on the influence in the 3-regular network
in section 4.1. The MC upper bounds are computed with various simulation sizes and shown with
the data points indicated with MC(N ), where N is the number of simulations. The spectral upper
bound in [16] is shown in red line, and NB-UB is shown in green line.
(b) The figure shows lower bounds on the influence of a scale-free network in section 4.2. The
probabilistic lower bounds shown with points are obtained from Monte Carlo simulations with various
simulation sizes, and the data points indicated with MC(N ) are obtained by N number of simulations.
NB-LB is shown in green line.
G with 1000 nodes and assign a random seed s. Then, the corresponding IC model is
defined as IC(G,P = pA, S0 = {s}), where A is the adjacency matrix, resulting in the same
transmission probability p for every edge. For each network, we compute NB-UB and MC
estimation of 1000 simulations. We note that with 1000 simulations, the estimation given by
MC cannot guarantee stability. Yet, given limited time and resources, it is acceptable for
the selection process. Then, we compute the score for each network. The score is defined as
the sum of the square differences between the upper bounds and MC estimations over the
transmission probability p ∈ {0.1, 0.2, . . . , 0.9}. Finally, a graph whose score is the median
from all 100 scores is chosen for Figure 4a.
Results : In figure 4a, we compare 1) the upper bounds introduced [16] and 2) the
probabilistic upper bounds obtained by Monte Carlo simulations with 99% confidence level,
to NB-UB. The upper bounds from MC simulations are computed with the various sample
sizes N ∈ {5, 10, 30, 300, 3000}.
It is evident from the figure that a larger sample size
provides a tighter probabilistic upper bound. NB-UB outperforms the bound by [16] and the
probabilistic MC bound when the transmission probability is relatively small. Further, it
shows a similar trend as the MC simulations with a large sample size.
4.2 Lower bounds
Selection of networks : We adopt a similar selection process as in the selection for upper
bounds, but with the scale free networks, with 3000 nodes and α = 2.5.
Results : We compare probabilistic lower bounds obtained by MC with 99% confidence
level to NB-LB. The lower bounds from Monte Carlo simulations are computed with various
sample sizes N ∈ {5, 12, 30, 300, 3000}, which accounts for a constant, log(n), 0.01n, 0.1n,
and n = V . NB-LB outperforms the probabilistic bounds by MC with small sample sizes.
17
0010203040506070809010000.050.10.150.20.250.30.350.40.450.5InfluenceTransmission ProbabilityUpper bounds of the influenceMC (5)MC (10)MC (30)MC (300)MC (3000)NB-UBSpectral010203040506070809010000.10.20.30.40.5010020030040050060070080090010000.50.60.70.80.91180.92605.80500100015002000250000.10.20.30.40.50.60.70.80.91InfluenceTransmission ProbabilityLower bounds of the influenceMC (5)MC (12)MC (30)MC (300)MC (3000)NB-LBRecall that the computational complexity of the lower bound in algorithm 2 is O(V + E),
which is the computational complexity of a constant number of Monte Carlo simulations. In
figure 4b, it shows that NB-LB is tighter than the probabilistic lower bounds with the same
computational complexity, and it also agrees with the behavior of the MC simulations.
4.3 Tunable bounds
In this section, we present tunable upper and lower bounds on example networks.
(a)
(b)
Figure 5: (a) NB-UB, tNB-UB with t = 3, and MC estimation with 10000 simulations on a 3-regular
network with 100 nodes.
(b) NB-LB, tNB-LB with various t ∈ {12, 100, 300}, and MC estimation with 3000000 simulations on
a scale-free network with 3000 nodes.
In Figure 5a, we show tNB-UB on a sample network. We consider a 3-regular network
with 100 nodes and a single seed. Since the NB-UB gives a tight bound on p < 0.4, we plot
tNB-UB on p ∈ (0.4, 0.5) where it shows some improvements with small t.
In Figure 5b, we present tNB-LB on a scale-free network with 3000 nodes, α = 2.5, and
a single seed. We compare tNB-LB with various choices of t ∈ {1, 12, 100, 300}, and tNB-LB
approaches the MC estimation as t grows.
5 Conclusion
In this paper, we propose both upper and lower bounds on the influence in the independent
cascade models, and provide algorithms to efficiently compute the bounds. We extend the
results by proposing tunable bounds which can adjust the trade off between the efficiency
and the accuracy. Finally, the tightness and the performance of bounds are shown with
experimental results. One can further improve the bounds considering r-nonbacktracking
walks, i.e. avoiding cycles of length r rather than just backtracks, and we leave this for future
study.
6 Acknowledgements
We would like to thank Colin Sandon for helpful discussions. This research was partly
supported by the NSF CAREER Award CCF-1552131 and the ARO grant W911NF-16-1-
0051.
18
0510152025300.40.410.420.430.440.450.460.470.48InfluenceTransmission ProbabilityTunable NB-UBNB-UBtNB-UB(t=3)MCSeries1Series2Series3Series4Series5050010001500200025001234567891011121314151617181920Chart TitleSeries1Series2Series3Series4Series50500100015002000250000.10.20.30.40.50.60.70.80.91InfluenceTransmission Probability Tunable NB-LBNB-LBtNB-LB(t=12)tNB-LB(t=100)tNB-LB(t=300)MCReferences
[1] E. Abbe and C. Sandon. Detection in the stochastic block model with multiple clusters:
proof of the achievability conjectures, acyclic bp, and the information-computation gap.
arXiv preprint arXiv:1512.09080, 2015.
[2] C. Bordenave, M. Lelarge, and L. Massoulié. Non-backtracking spectrum of random
graphs: community detection and non-regular ramanujan graphs. In Foundations of
Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on, pages 1347–1357.
IEEE, 2015.
[3] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery
and data mining, pages 199–208. ACM, 2009.
[4] W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks
under the linear threshold model. In Data Mining (ICDM), 2010 IEEE 10th International
Conference on, pages 88–97. IEEE, 2010.
[5] M. Draief, A. Ganesh, and L. Massoulié. Thresholds for virus spread on networks. In
Proceedings of the 1st international conference on Performance evaluation methodolgies
and tools, page 51. ACM, 2006.
[6] C. M. Fortuin, P. W. Kasteleyn, and J. Ginibre. Correlation inequalities on some
partially ordered sets. Communications in Mathematical Physics, 22(2):89–103, 1971.
[7] A. Goyal, W. Lu, and L. V. Lakshmanan. Celf++: optimizing the greedy algorithm
for influence maximization in social networks. In Proceedings of the 20th international
conference companion on World wide web, pages 47–48. ACM, 2011.
[8] M. Granovetter. Threshold models of collective behavior. American journal of sociology,
pages 1420–1443, 1978.
[9] B. Karrer, M. Newman, and L. Zdeborová. Percolation on sparse networks. Physical
review letters, 113(20):208702, 2014.
[10] B. Karrer and M. E. Newman. Message passing approach for general epidemic models.
Physical Review E, 82(1):016101, 2010.
[11] D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a
social network. In Proceedings of the ninth ACM SIGKDD international conference on
Knowledge discovery and data mining, pages 137–146. ACM, 2003.
[12] A. Khelil, C. Becker, J. Tian, and K. Rothermel. An epidemic model for information
diffusion in manets. In Proceedings of the 5th ACM international workshop on Modeling
analysis and simulation of wireless and mobile systems, pages 54–60. ACM, 2002.
[13] J. T. Khim, V. Jog, and P.-L. Loh. Computing and maximizing influence in linear
threshold and triggering models. In Advances in Neural Information Processing Systems,
pages 4538–4546, 2016.
19
[14] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly, L. Zdeborová, and P. Zhang.
Spectral redemption in clustering sparse networks. Proceedings of the National Academy
of Sciences, 110(52):20935–20940, 2013.
[15] E. J. Lee, S. Kamath, E. Abbe, and S. R. Kulkarni. Spectral bounds for independent
cascade model with sensitive edges. In 2016 Annual Conference on Information Science
and Systems (CISS), pages 649–653, March 2016.
[16] R. Lemonnier, K. Scaman, and N. Vayatis. Tight bounds for influence in diffusion
networks and application to bond percolation and epidemiology. In Advances in Neural
Information Processing Systems, pages 846–854, 2014.
[17] J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing.
ACM Transactions on the Web (TWEB), 1(1):5, 2007.
[18] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-
effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD
international conference on Knowledge discovery and data mining, pages 420–429. ACM,
2007.
[19] D. Lopez-Pintado and D. J. Watts. Social influence, binary decisions and collective
dynamics. Rationality and Society, 20(4):399–443, 2008.
[20] B. Shulgin, L. Stone, and Z. Agur. Pulse vaccination strategy in the sir epidemic model.
Bulletin of Mathematical Biology, 60(6):1123–1148, 1998.
[21] C. Wang, W. Chen, and Y. Wang. Scalable influence maximization for independent
cascade model in large-scale social networks. Data Mining and Knowledge Discovery,
25(3):545–576, 2012.
[22] D. J. Watts. A simple model of global cascades on random networks. Proceedings of the
National Academy of Sciences, 99(9):5766–5771, 2002.
[23] J. Yang and S. Counts. Predicting the speed, scale, and range of information diffusion
in twitter. 2010.
20
|
1206.3933 | 3 | 1206 | 2013-04-04T17:21:58 | Prediction of Emerging Technologies Based on Analysis of the U.S. Patent Citation Network | [
"cs.SI",
"physics.soc-ph"
] | The network of patents connected by citations is an evolving graph, which provides a representation of the innovation process. A patent citing another implies that the cited patent reflects a piece of previously existing knowledge that the citing patent builds upon. A methodology presented here (i) identifies actual clusters of patents: i.e. technological branches, and (ii) gives predictions about the temporal changes of the structure of the clusters. A predictor, called the {citation vector}, is defined for characterizing technological development to show how a patent cited by other patents belongs to various industrial fields. The clustering technique adopted is able to detect the new emerging recombinations, and predicts emerging new technology clusters. The predictive ability of our new method is illustrated on the example of USPTO subcategory 11, Agriculture, Food, Textiles. A cluster of patents is determined based on citation data up to 1991, which shows significant overlap of the class 442 formed at the beginning of 1997. These new tools of predictive analytics could support policy decision making processes in science and technology, and help formulate recommendations for action. | cs.SI | cs | Scientometrics manuscript No.
(will be inserted by the editor)
Prediction of Emerging Technologies Based on
Analysis of the U.S. Patent Citation Network
P´eter ´Erdi · Kinga Makovi · Zolt´an
Somogyv´ari · Katherine Strandburg · Jan
Tobochnik · P´eter Volf · L´aszl´o Zal´anyi
3
1
0
2
r
p
A
4
]
I
S
.
s
c
[
3
v
3
3
9
3
.
6
0
2
1
:
v
i
X
r
a
Received: date / Accepted: date
Correspondence to P´eter ´Erdi, address: Kalamazoo College, 1200 Academy Street,
Kalamazoo, MI 49006, USA; phone: +(269) 337-5720; fax: +(269) 337-7101; e-mail:
[email protected]
Abstract The network of patents connected by citations is an evolving graph,
which provides a representation of the innovation process. A patent citing another
implies that the cited patent reflects a piece of previously existing knowledge
that the citing patent builds upon. A methodology presented here (i) identifies
actual clusters of patents: i.e. technological branches, and (ii) gives predictions
about the temporal changes of the structure of the clusters. A predictor, called the
citation vector, is defined for characterizing technological development to show how
a patent cited by other patents belongs to various industrial fields. The clustering
technique adopted is able to detect the new emerging recombinations, and predicts
emerging new technology clusters. The predictive ability of our new method is
illustrated on the example of USPTO subcategory 11, Agriculture, Food, Textiles.
PE thanks the Henry Luce Foundation and the Toyota Research Institue for their support.
KJS acknowledges the generous support of The Filomen D’Agostino and Max E. Greenberg
Research Fund.
P. ´Erdi · K. Makovi · J. Tobochnik · L. Zal´anyi
Center for Complex Systems Studies, Kalamazoo College, Kalamazoo, MI 49006, USA
Tel.: +(269) 337-5720
Fax: +(269) 337-7101
E-mail: [email protected]
P. ´Erdi · K. Makovi · Z. Somogyv´ari · P. Volf · L. Zal´anyi
Complex Systems and Computational Neuroscience Group, Wigner Research Centre for
Physics, Hungarian Academy of Sciences, Budapest, Hungary
P. Volf
Department of Measurement and Information Systems, Budapest University of Technology
and Economics, Budapest, Hungary
Network and Subscriber Data Management, Nokia Siemens Networks, Budapest, Hungary
K. Makovi
Department of Sociology, Columbia University, New York, NY, USA
K. Strandburg
New York University School of Law, New York, NY, USA
2
P´eter ´Erdi et al.
A cluster of patents is determined based on citation data up to 1991, which shows
significant overlap of the class 442 formed at the beginning of 1997. These new
tools of predictive analytics could support policy decision making processes in
science and technology, and help formulate recommendations for action.
Keywords patent citation · network · co-citation clustering · technological
evolution
1 Introduction
In this paper we present a conceptual framework and a computational algorithm
for studying the process of technological evolution and making predictions about
it by mining the patent citation network. Patent data long has been recognized as
a rich and potentially fruitful source of information about innovation and techno-
logical change. Besides describing and claiming inventions, patents cite previous
patents (and other references) that are relevant to determining whether the inven-
tion is sufficiently novel and nonobvious to be patented. Citations are contributed
by patentees, patent attorneys, and patent office examiners. Patents, as nodes, and
citations between them, as edges, form a growing directed network, which aggre-
gates information about technological relationships and progress provided by those
players. Our methodology seeks to detect incipient technological trends reflected
in the citation network and thus to predict their emergence. The proposed method
should also be useful for analyzing the historical evolution of patented technology.
Innovation is frequently deemed key to economic growth and sustainability
(Saviotti et al, 2003, 2005; Saviotti, 2005). Often, economically significant tech-
nologies are the result of considerable investment in basic research and technology
development. Basic research is funded by the government and, to a lesser extent,
by large firms such as those found in the medical and pharmaceutical industries.
Development is carried out by a range of players, including start-up companies
spending large fractions of their revenues on innovation. Not surprisingly research
and development (R&D) costs have risen rapidly in the past few decades. For
example, “worldwide R&D expenditures in 2007 totaled an estimated $1,107 bil-
lion.”1
Because innovation is unpredictable, R&D investment is often risky. The prac-
tical implications for particular firms are evident: “The continuous emergence of
new technologies and the steady growth of most technologies suggest that rely-
ing on the status quo is deadly for any firm...” (Sood and Tellis, 2005). As Day
and Schoemaker argue (Day and Schoemaker, 2005): “...The biggest dangers to
a company are the ones you don’t see coming. Understanding these threats –
and anticipating opportunities – requires strong peripheral vision.” In the long
term, understanding the emergence of new technological fields could help to orient
public policy, direct investment, and reduce risk, resulting in improved economic
efficiency. Detecting the emergence of new technological branches is an intrinsically
difficult problem, however.
Recent improvements in computing power and in the digitization of patent
data make possible the type of large-scale data mining methodology we develop
in this paper. Our approach belongs to the field of predictive analytics, which
1 http://www.nsf.gov/statistics/seind10/c4/c4s5.htm
Prediction of Emerging Technologies
3
is a branch of data mining concerned with the prediction of future trends. The
central element of predictive analytics is the predictor, a mathematical object
that can be defined for an individual, organization or other entity and employed
to predict its future behavior. Here we define a ‘citation vector’ for each patent to
play the role of a predictor. Each coordinate of the citation vector is proportional
to the relative frequency that the patent has been cited by other patents in a
particular technological category at a specific time. Changes in this citation vector
over time reflect the changing role that a particular patented technology is playing
as a contributor to later technological development. We hypothesize that patents
with similar citation vectors will belong to the same technological field. To track
the development and emergence of technological clusters, we employ clustering
algorithms based on a measure of similarity defined using the citation vectors. We
identify the community structure of non-assortative patents – those which receive
citations from outside their own technological areas. The formation of new clusters
should correspond to the emergence of new technological directions.
A predictive methodology should be able to “predict” evolution from the “more
distant” past to the “more recent” past. A process, called backtesting checks if this
criteria is met, which if true, holds the promise of predictions from the present to
the near future. To illustrate the potential of our approach and demonstrate that
the emergence of new technological fields can be predicted from patent citation
data, we backtested by using our method to “predict” an emerging technological
area that was later recognized as a new technological class by the US Patent and
Trademark Office (USPTO).
Because the patent citation network reflects social activity, the potential scope
and limitations of prediction are different from those in the natural sciences. Un-
expected scientific discoveries, patent laws, habits of patent examiners, the pace of
economic growth and many other factors influence the development of technology
and of the patent network that we do not intend to explicitly model. Correspond-
ingly, patent grants change the innovative environment, which we also don’t in-
corporate in our modeling strategy. Any predictive method can peer only into the
relatively short term future, ours is not an exception. The methodology developed
here harnesses assessments of technological relationships made by a very large
number of participants in the system and attempts to capture the larger picture
emerging from those grass root assessments. We hope to show what is possible
based on a purely structural analysis of the patent citation data in spite of the
above mentioned difficulties.
2 The Patent Citation Network
The United States patent system is a very large compendium of information about
technology, and its evolution goes back more than two hundred years. It con-
tains more than 8 million patents. The system reflects technological developments
worldwide. Currently about half of US patents are granted to foreign inventors. Of
course, the US patent system is not a complete record of technological evolution:
not all technological developments are eligible for patenting and not all eligible
advances are patented in the United States or anywhere else, for that matter.
Nonetheless, the United States patent system is a well-studied and documented
source of data about the evolution of technology. Thus, we have chosen it as the
4
P´eter ´Erdi et al.
primary basis of our investigation, keeping in mind that our method potentially
could be applied to other patent databases as well.
Complex networks have garnered much attention in the last decade. The appli-
cation of complex network analysis to innovation networks has provided a new per-
spective from which to understand the innovation landscape (Pyka and Scharnhost,
2009). In our study, the patent citation network is comprised of patents (nodes)
and the citations between them (links). A patent citation reflects a technological
relationship between the inventions claimed in the citing and cited patents. Cita-
tions are contributed by patentees and their attorneys and by patent examiners.
They reflect references to be considered in determining whether the claimed in-
vention meets the patentability requirements of novelty and nonobviousness. Both
patentees and patent examiners have incentives to cite materially related prior
patents. Patent applicants are legally required to list related patents of which
they are aware. Patent examiners seek out the most closely related prior patents
so that they can evaluate whether a patent should be granted. Consequently, ci-
tation of one patent by another represents a technological connection between
them, and the patent citation network reflects information about technological
connections known to patentees and patent examiners. Patents sometimes cite
scientific journals and other non-patent sources. We ignore those citations here.
Taking them into account is not necessary to our goal of identifying emerging
technology clusters and is not possible using our current methodology, though it
may be possible in the future to improve the method by devising a means to take
them into account. In the literature review section we will give a more detailed
analysis of what one can infer from the patent network, here we cite only (Duguet
and MacGarvie, 2005):”...patent citations are indeed related to firms’ statements
about their acquisition and dispersion of new technology...”.
As described below, our methodology utilizes a classification system based on
the one that USPTO uses in defining our citation vector. However, our method-
ology has the promise to predict the emergence of new technological fields not
yet captured by the USPTO classification system. The USPTO system has about
450 classes, and over 120,000 subclasses. All patents and published patent appli-
cations are manually assigned to primary and secondary classes and subclasses
by patent examiners. The classification system is used by patent examiners and
by applicants and their attorneys and agents as a primary resource for assisting
them in searching for relevant prior art. Classes and sub-classes are subject to
ongoing modification, reflecting the USPTO’s assessment of technological change.
Not only are new classes added to the system, but patents can be reclassified when
a new class is defined. As we discuss later, that reclassification provides us with a
natural experiment, which offers an opportunity to test our methodology for de-
tecting emerging new fields (Jaffe and Trajtenberg, 2005). Within the framework
of a project sponsored by the National Bureau of Economic Research (NBER),
a higher-level classification system was developed, in which the 400+ USPTO
classes were aggregated into 36 subcategories2, which were further lumped into
2 11 – Agriculture, Food, Textiles; 12 – Coating; 13 – Gas; 14 – Organic Compounds;
15 – Resins; 19 – Miscellaneous-Chemical; 21 – Communications; 22 – Computer Hard-
ware&Software; 23 – Computer Peripherials; 24 – Information Storage; 31 – Drugs; 32 –
Surgery&Med Inst; 33 – Biotechnology; 39 – Miscellaneous-Drgs&Med; 41 – Electrical De-
vices; 42 – Electrical Lighting; 43 – Measuring&Testing; 44 – Nuclear&X-rays; 45 – Power
Systems; 46 –Semiconductor Devices; 49 – Miscellaneous-Electric; 51 – Mat.Proc&Handling;
Prediction of Emerging Technologies
5
six categories (Computers and Communications, Drugs and Medical, Electrical
and Electronics, Chemical, Mechanical and Others). As any classification system,
this system reflects ad hoc decisions as to what constitutes a category or a sub-
category. However this classification system appears to show sufficient robustness
to be of use in our methodology (Jaffe and Trajtenberg, 2005).
3 Literature Review
Two strands of literature form the context for our research. First, there is a large
literature in which patent citations (and, relatedly, academic journal citations)
are used to explore various aspects of technological and scientific development.
Second, there is a literature involving attempts to produce predictive roadmaps
of the direction of science and technology. Our project, along with a few others,
stands at the intersection of these two literatures, using patent citations as a
predictive tool.
3.1 Patent citation analysis
Patent citation analysis has been used for a variety of different objectives. For
example, citation counts have long been used to evaluate research performance
(Garfield, 1983; Moed, 2005). Economic studies suggest that patent citation counts
are correlated with economic value (Harhoff et al, 1999; Sampat and Ziedonis,
2002; Hagedoorn and Cloodt, 2003; Lanjouw and Schankerman, 2004; Jaffe and
Trajtenberg, 2005). More generally, patent citation data has been used in conjunc-
tion with other empirical information, such as information about the companies
who own patents, interviews with scientists in the field, and analysis of the citation
structure of scientific papers, to explore the relationship between innovation and
the patent system (Narin, 1994; Milman, 1994; Meyer, 2001; Kostoff and Schaller,
2001; Debackere et al, 2002; Murray, 2002; Verbeek et al, 2002). Patent citations
have also been used to investigate knowledge flows and spillovers (Duguet and
MacGarvie, 2005; Strumsky et al, 2005; Fleming et al, 2006; Sorenson et al, 2006),
though the validity of these studies is called into question by the fact that patent
citations are very frequently inserted as a result of a search for relevant prior art by
a patentee’s attorney or agent or a patent examiner (Sampat, 2004; Criscuolo and
B.Verspagen, 2008; Alcacer and Gittelman, 2006). From previous work the basic
idea is that new knowledge comes from combinations of old knowledge. Local com-
binations are more effective than distant combinations, which though rare, when
they occur provide major new knowledge (Sternitzke, 2009). We ourselves have
used the methodologies of modern network science to study the dynamic growth
of the patent citation network in an attempt to better understand the patent sys-
tem itself and the possible effects of changes in legal doctrine (Strandburg et al,
2007, 2009).
52 – Metal Working; 53 – Motors&Engines+Parts; 54 – Optics; 55 – Transportation; 59 –
Miscellaneous-Mechanical; 61 – Agriculture, Husbandry, Food; 62 – Amusement Devices; 63 –
Apparel&Textile; 64 – Earth Working&Wells; 65 – Furniture, House, Fixtures; 66 – Heating;
67 – Pipes&Joints, 68 – Receptacles, 69 – Miscellaneous-Others.
6
P´eter ´Erdi et al.
Other scholars have used patents as proxies for invention in attempts to de-
velop and test theoretical models for the process of technological evolution. For
example, Fleming and Sorenson (Fleming, 2001; Fleming and Sorenson, 2001) de-
velop a model of technological evolution in which technology evolves primarily
by a process of searching for new combinations of existing technologies. In anal-
ogy to biological evolution, they imagine a “fitness landscape” and a process of
“recombinant search” by which technological evolution occurs. They use citations
as a measure of fitness, and conclude that a successful innovation balances be-
tween re-using familiar components – an approach which is likely to succeed –
and combining elements that have rarely been used together – an approach that
often fails, but produces more radical improvements. In a later paper Fleming
(Fleming, 2004) uses patent citation data to explore the value of using science
to guide technological innovation by tracking the number of patent citations to
non-patent sources, and measures the difficulty of an invention by looking at how
subclasses related to the patent were previously combined. His main conclusion is
that science provides the greatest advantage to those inventions with the great-
est coupling between the components (non-modularity). Podolny and Stuart also
use patent citations to study the innovative process (Podolny and Stuart, 1995).
They define local measures of competitive intensity and competitive crowding in
a technological niche based on indirect patent citation ties and use these measures
to study the ways in which a technological niche can become crowded and then
exhausted as innovative activity proceeds.
Most relevant to our work here is that patent citations, as well as academic
journal citations, have been used to study the “structure” of knowledge as reflected
in different fields and sub-fields. All of these methods rely on some way to measure
the similarity or relatedness of patents or journal articles. Co-citation analysis,
one approach to this problem, goes back to the now classic works of Small (Small,
1973; Garfield, 1993): “...A new form of document coupling called co-citation is
defined as the frequency with which two documents are cited together. The co-
citation frequency of two scientific papers can be determined by comparing lists
of citing documents in the Science Citation Index and counting identical entries.
Networks of co-cited papers can be generated for specific scientific specialties [...]
Clusters of co-cited papers provide a new way to study the specialty structure
of science...” The assumption of co-citation analysis is that documents that are
frequently cited together cover closely related subject matter. Co-citation analysis
has been used recently (Chen et al, 2010), as well as more than a decade ago (Mogee
and Kolar, 1998b,a, 1999) to study the structure of knowledge in various specific
fields, such as nanotechnology (Huang et al, 2003, 2004; Meyer, 2001; Kostoff et al,
2006), semiconductors (Almeida and Kogut, 1997), biotechnology (McMillanm
et al, 2000), and tissue engineering (Murray, 2002) providing valuable insight into
the development of these technological fields. The main goal of this line of research
is to understand in detail the development of a specific industrial sector. Wallace et
al. (Wallace et al, 2009) recently adopted a method (Blondel et al, 2008) for using
co-citation networks to detect clusters that relies on the topology of the citation-
weighted network. Lai and Wu (Lai and Wu, 2005) have argued that co-citation
might be used to develop a patent classification system to assist patent managers
in understanding the basic patents for a specific industry, the relationships among
categories of technologies, and the evolution of a technology category – arguing
very much along the lines that we do here.
Prediction of Emerging Technologies
7
Researchers are also exploring the use of concepts taken from modern network
science and social network studies to illuminate the structure of technology using
the patent citation network. For example, Weng et al. (Weng et al, 2010), em-
ploy the concept of structural equivalence, a fundamental notion in the classical
theory of social networks. They define two patents as “structurally equivalent” in
the technological network when they cite the same preceding patents. They use
structural equivalence to map out the relationships between 48 insurance business
method patents and classify patents as belonging to the technological core or pe-
riphery. They compare their results to a classification made by expert inspection of
the patents. Our predictor, the ‘citation vector’ described in the following section
can be conceived as a tool to get at a weighted version of structural equivalence.
Other researchers have measured the distance between patents as defined by the
shortest path along the patent citation network. For example, Lee at al. (Lee et al,
2010) recently analyzed a small subset of the patent citation network to study the
case of electrical conducting polymer nanocomposites. Chang et al. (Chang et al,
2009) use a measure of “strength” based on the frequency of both direct and indi-
rect citation links to define a small set of “basic” patents in the business method
arena and then use clustering methods to determine the structure of relationships
among those basic patents. For the most part, these studies have been limited to
small numbers of patents and many have focused primarily on visualization.
Researchers have also used citations between patents and the scientific lit-
erature to investigate the relationship between scientific research and patented
technology. For example, a comparative study (Shibata et al, 2010) of the struc-
tures of the scientific publication and patent citation networks in the field of solar
cell technology found a time lag between scientific discovery and its technological
application. Other researchers have also considered the role of science in tech-
nological innovation by investigating citations between patents and articles in the
scientific literature (Mogee and Kolar, 1998b; McMillanm et al, 2000; Meyer, 2001;
Tijssen, 2001; Fleming, 2004). One main difference between scientific and patent
citations is that they are less likely to have identical references. To account for
this difference, it was suggested that the patentee and the patent examiner refer-
ence more objectively prior art that is relevant, whereas authors of journal articles
have motivation to reference papers that are irrelevant to the subject of the study
(Meyer, 2000).
Finally, there are various non-citation-based methods of determining the simi-
larity between patents (or between academic articles). Researchers have used text
mining (Huang et al, 2003; Kostoff et al, 2006), keyword analysis (Huang et al,
2004), and co-classification analysis based on USPTO classifications (Leydesdorff,
2008) in this way. These approaches are usually more time consuming, their im-
plementation may be specific to a technological field and involve ad hoc decisions
in the classification process and thus they are less systematic than ours. Gener-
ally, while we don’t believe that patent citation is the magic bullet to identify the
most promising emerging technologies, we see that the more traditional methods
of patent trajectory analysis and the new methods are converging (Fontana et al,
2009).
8
P´eter ´Erdi et al.
3.2 Predicting the Direction of Science and Technology
There is a large literature concerning various approaches to producing “roadmaps”
of science and technology as tools for policy and management based on numerous
approaches ranging from citation analysis to expert opinion (see, e.g., Kostoff and
Geisler (2007); Kajikawa et al (2008), and references therein). Some of this work
seeks to provide direction to specific industrial research and development processes.
Recently, for example, OuYang and Weng (OuYang and Weng, 2011) suggested
the use of patent citation information, in addition to other information such as
expert analysis, during the process of new product design. Citation-based meth-
ods, specifically co-citation clustering techniques, have been employed for tracking
and predicting growth areas in science using the scientific literature (Small, 2006).
Because the patent system is such a rich source of information about the evolution
of technology, it has long been hoped that insights into the mechanisms of techno-
logical changes can be used to make predictions on emerging fields of technologies
(Breitzman, 2007).
The extensive work of Kajikawa and his coworkers, which focuses on mining
larger scale trends from citation data, is most closely related to the work we
report here. These studies use citations to cluster scientific articles in order to
detect emerging research areas. These researchers have deployed various clustering
techniques based on co-citation and on direct citation networks (Shibata et al,
2008), to explore research evolution in the sustainable energy industry (fuel cell,
solar cell) (Kajikawa et al, 2008), the area of biomass and bio-fuels (Kajikawa and
Takeda, 2008), and, most recently, in the field of regenerative medicine (Shibata
et al, 2011).
4 Research methodology
4.1 Evolving clusters
The basic orientation of our research is similar to that of Kaijikawa and co-
coworkers. We search for emerging and evolving technology clusters based on a cita-
tion network. Our method differs from previous work in several respects, however.
All citation-based clustering methods leverage the grass roots, field-specific exper-
tise embedded in the citation network. Here, because we are clustering patents we
are able to make use of the additional embedded expertise reflected in the assign-
ment of patents to USPTO classifications by patent examiners. In our clustering
approach, we use evolving patterns of citations to a particular patent by other
patents in various technology categories to measure patent similarity. Our method
can be used to analyze large subsets of the patent citation network in a systematic
fashion and to observe the dynamics of cluster formation and disappearance over
time. In the long run we hope to be able to describe these dynamics systematically
in terms of birth, death, growth, shrinking, splitting and merging of clusters, anal-
ogous to the cluster dynamical elementary events described by Palla et al. (Palla
et al, 2007). Figure 1 illustrates these events.
Although our method is based on USPTO’s and NBER’s classification of
patents, we believe, that any classification system, which covers the whole tech-
Prediction of Emerging Technologies
9
Fig. 1 Possible elementary events of cluster evolution. Based on Palla et al. (Palla
et al, 2007).
nological space and describes it in sufficient detail could serve as the basis for our
investigation.
4.2 Construction of a predictor for technological development
To capture the time evolution of technological fields, we have constructed a quan-
tity, the ‘citation vector’, which we use to define measures of similarity between
patents.
Specifically, we define the citation vector for a given patent at any given time
in the following way:
1. For each patent, we calculate the sum of the citations received by that patent
from patents in each of the 36 technological subcategories defined by Hall et
al. (Hall et al, 2001); as noted above, these subcategories are aggregations of
USPTO patent classifications. This gives us 36 sums for each patent, which
we treat as entries in a 36-component vector. In the process of calculating
the sums we weight incoming citations with respect to the overall number of
citations made by the sender patent, thus, we give more weight to senders which
referred to fewer others. The coordinate corresponding to each patent’s own
subcategory is set to zero so that the citation vectors focus on the combination
of different technological fields.
2. We then normalize the 36-component vector obtained for each patent in the
previous step using an Euclidean norm to obtain our citation vector. Patents
that have not received any citations are assigned a vector with all zero entries.
The citation vector’s components may be interpreted as describing the relative
influence that a patent has had on different technological areas at a specific
time. The impact of a patent on future technologies changes over time, and
thus the citation vector evolves to reflect the changing ways in which a patented
invention is reflected in different technological fields.
We next seek to group patents into clusters based on their roles in the space of
technologies. To do this, we define the similarity between two patents as the Eu-
10
P´eter ´Erdi et al.
Table 1 Number of patents in the examined networks and subnetworks in different moments.
Patents in the whole database
Patents in the subcategory 11
Patents belong to class 442 from 1997
Patents with non-zero citation vector in 11
citations connected to patents in SC 11
01.01.91
01.01.94
01.01.97
12.31.99
4980927
5274846
5590420
6009554
18833
2815
7671
70920
21052
3245
9382
92177
23191
3752
11245
120380
25624
4370
13217
161711
clidean distance of their citation vectors and apply clustering algorithms based on
this similarity measure. We thus hypothesize that patents cited in the same propor-
tion by patents in other technological areas have similar technological roles. This
hypothesis resonates with the hypothesis formulated by the pioneer of co-citation
analysis, Henry Small (Small, 1973), that co-cited patents are technologically sim-
ilar.
Our focus is on those inventions that were influential in technologies other
than their own. In other words, we are concentrating on patents that received
non-assortative citations (Newman, 2002). Because the high number of patents
receiving only intra-subcategory citations tends to mask the recombinant process,
citations within the same subcategory are eliminated from the citation vector.
Our algorithm for predicting technological development consists of the follow-
ing steps:
1. Select a time point t1 between 1975 and 2007 and drop all patents that were
issued after t1.
2. Keep some subset of subcategories: c1, c2, . . . , cn – to work with a reasonably
sized problem.
3. Compute the citation vector. Drop patents with assortative citation only.
4. Compute the similarity matrix of patents by using the Euclidean distance
product between the corresponding citation vectors.
5. Apply a hierarchical clustering algorithm to reveal the functional clusters of
patents.
6. Repeat the above steps for several time points t1 < t2 < . . . < tn.
7. Compare the dendrogram obtained by the clustering algorithm for different
time points to identify structural changes (such as emergence and/or disap-
pearance of groups).
The discussion thus far leaves us with two key questions: (i) What algorithms
should be chosen to cluster the patents? (ii) How should we link the clustering
results from consecutive time steps? The following subsections address these ques-
tions.
4.3 Identification of patent clusters
Several clustering and graph partitioning algorithms are reasonable candidates for
our project. An important pragmatic constraint in choosing clustering algorithms
is their computation-time complexity. Given the fact that we are working on a
huge database, we face an unavoidable trade-off between accuracy and computa-
tion time. Because we do not know a priori the appropriate number of clusters,
Prediction of Emerging Technologies
11
hierarchical methods are preferred, as they do not require that the number of
clusters be specified in advance. Available clustering methods include the k-means
and Ward methods, which are point clustering algorithms (Ward, 1963). Graph
clustering algorithms, such as those that use edge-betweenness (Girvan and New-
man, 2002; Newman and Girvan, 2004) random walks (Pons and Latapy, 2006)
and the MCL method (van Dongen, 2000) are also possible choices. The otherwise
celebrated clique-percolation method (Palla et al, 2007) employs a very restrictive
concept of a k-clique, making it difficult to mine clusters from the patent citation
network. Spectral methods (Newman, 2006) are not satisfactory because they are
extremely computation-time intensive in cases like this one, in which one would
have to calculate the eigenvalues of a relatively dense matrix. In the application
presented here we adopted the Ward method.
4.4 Detecting structural changes in the patent cluster system
The structure of dendrograms resulting from hierarchical clustering methods, such
as the Ward method, reflects structural relationships between patent clusters. In
this hierarchy, each branching point is binary and defined only by its height on
the dendrogram, corresponding to the distance between the two branches. Thus,
all types of temporal changes in the cluster structure can be divided into four
elementary events: 1) increase or 2) decrease in the height of an existing branching
point, and 3) insertion of a new or 4) fusion of two existing branching points. To
find these substantial, structural changes, we identify the corresponding branching
points in the dendrograms representing consecutive time samples of the network
and follow their evolution through the time period documented in the database.
To test whether our clusters are meaningful, we can compare the emergence
of new clusters to the introduction of new classes by the USPTO. Potential new
classes can be identified in the clustering results by comparing the dendrogram
structure with the USPTO classification. While some of the branching points of
the dendrogram are reflected in the current classification structure, we may find
significant branches which are not identified by the classification system used at
that time point and test our approach by seeing whether clusters that emerge at
a particular time are later identified as new classes by the USPTO.
5 Results and model validation
We have chosen the NBER subcategory 11, Agriculture, Food, Textiles as an
example, to demonstrate our method. The rationals of our choice are:
1. Subcategory 11 (SC 11) has moderate size (compared to other subcategories),
which was appropriate to the first test of our algorithm.
2. SC 11 is heterogeneous enough to show non-trivial structure.
3. A new USPTO class, the class 442 was established recently within the subcat-
egory 11, which we can use to test our approach.
Note, that restriction of the field of investigation does not restrict the possi-
bility of cross-technological interactions, because the citation vector remains 36
dimensional, including all the possible interactions between the actually investi-
gated and all the other technological fields.
12
P´eter ´Erdi et al.
Fig. 2 Cluster structure of patents in the citation space. Two-dimensional represen-
tation of patent similarity structure in the subcategory 11 by using the Fruchterman-Reingold
algorithm. Local densities corresponding to technological areas can be recognized by the naked
eye or identified by clustering methods. The colors encode the US patent classes: red corre-
sponds to class 8; green: 19; blue: 71; magenta: 127; yellow: 442; cyan: 504.
5.1 Patent clusters: existence and detectability
We begin by demonstrating the existence of local patent clusters based on the
citation vector. Such clusters can be seen even with the naked eye by perusing
a visualization of the 36 dimensional citation vector space projected onto two
dimensions, or can be extracted by a clustering algorithm. See Figure 2.
5.2 Changes in the structure of clusters reflects technological evolution
Temporal changes in the cluster structure of the patent system can be detected in
the changes of dendrograms. We present the dendrogram structure of the subcate-
gory 11 at two different times (Figure 3). Comparing the hierarchical structure in
1994 and 2000, we can observe both quantitative changes, when only the height of
the branching point (branch separation distance) changed, and qualitative changes,
when a new branching point has appeared.
In general, the hierarchical clustering is very sensitive and even the structure
of large branches could be changed by changing only a few elements in the basic
set. In spite of this general sensitivity, the main branches in the presented den-
drograms were remarkably stable through the significant temporal changes during
the development - they were easily identifiable from 1991 to 2000, during which
time a significant increase took place in the underlying set, as can be seen from
Table 1. The main branches and their large scale structure were also stable against
minor modifications of the algorithm, such as the weighting method of the given
citations during the citation vector calculation. These observations show, that the
large branches are well identified real structures. However, this reliability does not
Prediction of Emerging Technologies
13
Fig. 3 Temporal changes in the cluster structure of the patent system. Dendrograms
representing the results of the hierarchical Ward clustering of patents in subcategory 11, based
on their citation vector similarity on Jan. 1, 1994 (18833 patents in graph A) and Dec. 31,
1999 (25624 in graph B). The x axis denotes a list of patents in subcategory 11, while the
distances between them, as defined by the citation vector similarity, are drawn on the y axis.
(Patents separated by 0 distance form thin lines on the x axis.) The 7 colors of the dendrogram
correspond to the 7 most widely separated clusters. While the overall structure is similar in
1994 and 1999, interesting structural changes emerged in this period. The cluster marked with
the red color and asterix approximately corresponds to the new class 442, which was established
in 1997, but was clearly identifiable by our clustering algorithm as early as 1991.
necessarily hold for smaller cluster patterns, which are often the focus of interest.
Thus, if a small cluster is identified as a candidate for becoming a new field by
our algorithm, it should be considered as a suggestion and should be evaluated by
experts to verify the result.
really existing structures. Although, this does not necessarily hold for smaller
cluster patterns, often in the focus of interest. Thus if a small cluster identified as
a candidate becoming a new field by our algorithm, it should be considered as a
suggestion and should be revised by experts to verify the result.
5.3 The emergence of new classes: an illustration
The most important preliminary validation of our methodology is our ability to
“predict” the emergence of a new technology class that was eventually identified by
the USPTO. As we mentioned earlier, the USPTO classification scheme not only
provides the basis for the NBER subcategories that define our citation vector, it
also provides a number of natural experiments to test the predictive power of our
clustering method. When the USPTO identifies a new technological category it
defines a new class and then may reclassify earlier patents that are now recog-
nized to have been part of that incipient new technological category. (Recall that
there are many more USPTO classes than NBER subcategories – within a given
subcategory there are patents from a number of USPTO classes.) If our clustering
method is sensitive to the emergence of new technological fields, we might hope
that it will identify new technological branches before the USPTO recognizes their
existence and defines new classes.
Figures 4 and 5 illustrate the emergence of class 442, which was not defined
by the USPTO until 1997. Figure 4 shows how patents that will eventually be
reclassified into class 442 can be seen to be splitting off from other patents in
14
P´eter ´Erdi et al.
Fig. 4 An example of the splitting process in the citation space, underlying the
formation of a new class. In the 2D projection of the 36 dimensional citation space, position
of the circles denote the position of the patents in subcategory 11 in the citation space in three
different stages of the separation process (Jan. 1,1994, Jan. 1,1997, Dec. 31,1999). Red circles
show those patents which were reclassified into the newly formed class 442, during the year
1997. The rest of the patents which preserved their classification after 1997 are denoted by
blue circles. Precursors of the separation appear well before the official establishment of the
new class.
subcategory 11 as early as 1991. The visually recognizable cluster of patents in
Figure 4 that will later be reclassified into class 442 can be identified by the
Ward method with cutoff at 7 clusters in 1991, as is shown in Figure 5. The
histogram in Figure 5 shows the frequency of patents with a given cluster number
and USPTO class. Patents that will eventually be reclassified into class 442 are
already concentrated in cluster 7. The Pearson-correlation between the class 442
and the correspondig clusters in our analysis resulted in high values: 0.9106 in 1991;
0.9005 in 1994; 0.8546 in 1997 and 0.9177 in the end of 1999. This example thus
demonstrates that the citation vector can play the role of a predictor: emerging
patent classes can be identified.
6 Discussion
Patent citation data seems to be a goldmine of new insights into the develop-
ment of technologies, since it represents, even with noise, the innovation process.
Scholars have long sought to understand technological change using evolutionary
analogies, describing it as a process of recombination of already existing tech-
nologies (Schumpeter, 1939; Usher, 1954; Henderson and Clark, 1990; Weitzman,
1996; Hargadon and Sutton, 1997). Inventions are often described as combina-
tions of prior technologies. “...For example, one might think of the automobile as
a combination of the bicycle, the horse carriage, and the internal combustion en-
gine” (Podolny and Stuart, 1995; Podolny et al, 1996; Fleming, 2001; Fleming and
Sorenson, 2001). This feature of technological advance is well-recognized in patent
law and has been the subject of recent Supreme Court attention, see KSR Int’l
Co. v. Teleflex, Inc., 550 U.S. 398 (2007). Our methodology exploits and tests this
perspective by using the role a particular patented technology plays in combining
existing technological fields to detect the emergence of new technology areas. In
this respect our method improves upon clustering methods based entirely on the
existence of a citation between two articles or patents by incorporating locally-
generated information (the patent category) relevant to the meaning of a given
Prediction of Emerging Technologies
15
Fig. 5 Separation of the patents by clustering in the citation space, based on the
Jan. 1,1991 data. A: Distribution of the patents issued before 1991 in the subcategory 11,
within the 6 official classes in 1997 on the class axis (also marked with different colors) and
within the 7 clusters in the citation space. The clustering algorithm collected the majority of
those patents which were later reclassified into the newly formed class 442 (orange line) into
the cluster 7 (marked with an asterisk). Vice-verse, the cluster 7 contains almost exclusively
those patents which were later reclassified. Thus, we were able to identify the precursors of the
emerging new class by clustering in the citation space. B: The dendrogram belonging to the
hierarchical clustering of the patents in the subcategory 11 in year 1991 shows that the branch
which belongs to the cluster 7 is the most widely separated branch of the tree. The coloring
here refers to the result of the clustering, unlike graph A where coloring marks the USPTO
classes.
citation. Here we present a proof of concept for the method. In future work we
will scan the patent citation network more broadly to identify clusters that may
reflect the incipient development of new technological “hot spots.”
We recognize that our method has a number of limitations. An important
limitation is the time lag between the birth of a new technology and its appearance
in the patent databases as reflected in the accumulation of citations. Cs´ardi et al.
(Cs´ardi et al, 2009) showed that the probability that an existing patent will be cited
by a new patent peaks about 15 months after issuance. This time lag seems to show
little variance across different fields. We may therefore expect that a fair amount of
information about the use of a patented technology may have accumulated during
that time. It is also the case, however, that the citation probability exhibits a
long tail, so that patents may continue to receive additional citations (potentially
from different technological areas) over very long times. Clearly the usefulness of
the methodology as a predictor will depend on its ability to identify emerging
technology areas before they are otherwise recognized. In the specific example we
explored here we were able to identify a new class well before its official recognition
by the USPTO. In future work, we will seek to determine the time difference
between the detection of the first signs that a new cluster is emerging and the
official formation of the new class for other cases to determine whether there is a
characteristic time lag and, if so, whether it varies among technological categories.
The new method combines objective and subjective features. The citations
themselves (the links between citing and cited documents) are based on simi-
lar technology/application concepts, and can be viewed as more or less objective
quantities. The citation vector bases are the manually assigned categories, and can
be viewed as more subjective quantities. Thus, in some sense, the approach is a
marriage of two types of taxonomies, each having many possible variations. We
16
P´eter ´Erdi et al.
suppose that USPTO classification catches sufficient details to reflect in advance
some change in its structure. If the resolution is low, i.e. only the larger categories
are used we can identify only rare and really deep/fundamental changes.
Our methodology also oversimplifies the patent citation network in many ways.
For example, technological fields are not homogeneous with respect to number of
patents, average number of citations per patent, and so forth. Future work should
explore the implications of these differences, especially the consequences of them
to the weighting we applied when calculating the citation vector.
Finally, because there is no way to determine a priori the appropriate number of
clusters for a given subset of the citation network, the method described provides
only candidates for the identification of a new technological branch. To put it
another way, we offer a decision support system: we are able to identify candidates
for hot spots of technological development that are worthy of attention.
In future work, we also hope to use the method to examine, from a more
theoretical perspective, the specific mechanisms of technological branching. New
technological branches can be generated either by a single (cluster dynamical)
elementary event or by combinations of such events. For example, a new cluster
might arise from a combination of merging and splitting. By examining historical
examples, we hope to observe how the elementary events interact to build the
recombination process and identify the typical “microscopic mechanisms” under-
lying new class formation. This more ambitious research direction is grounded in a
hypothesis that social systems are causal systems – complex systems with circular
causality and feedback loops (´Erdi, 2007, 2010) – whose statistical properties may
allow us to uncover rules that govern their development (for similar attempts see
Leskovec and coworkers (2005), and Berlingerio et al (2009)). “...Analogously to
what happened in physics, we are finally in the position to move from the anal-
ysis of the “social atoms” or “social molecules” (i.e., small social groups) to the
quantitative analysis of social aggregate states...” (Vespignani, 2009). Our study
of the specific example of the patent citation network may thus help in the long
run to advance our understanding of how complex social systems evolve.
Acknowledgments
PE thanks the Henry Luce Foundation and the Toyota Research Institue for
their support. KJS acknowledges the generous support of The Filomen D’Agostino
and Max E. Greenberg Research Fund. Thanks for Fulop Bazs´o, Mih´aly B´anyai,
Judit Szente, Bal´azs Ujfalussy for discussions.
The final publication is available at www.springerlink.com.
http://www.springerlink.com/openurl.asp?genre=article&id=doi:
10.1007/s11192-012-0796-4
References
Alcacer J, Gittelman M (2006) How do i know what you know? patent examin-
ers and the generation of patent citations. Review of Economics and Statistics
88(4):774–779
Almeida P, Kogut B (1997) The exploration of technological diversity and the
geographic localization of innovation. Small Business Economics 9:21–31
Berlingerio M, Bonchi F, Bringmann B, Gionis A (2009) Mining graph evolution
rules. In: Buntine W, Grobelnik M, Mladenic D, Shawe-Taylor J (eds) Machine
Prediction of Emerging Technologies
17
Learning and Knowledge Discovery in Databases, Springer, European Confer-
ence on Machine Learning and Knowledge Discovery in Databases, pp 115–130
Blondel V, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of com-
munities in large networks. Journal of Statistical Mechanics: Theory and Ex-
periment p P10008
Breitzman A (2007) The emerging clusters project. Final Report, 1790 Analytics,
www.ntis.gov/pdf/Report-EmergingClusters.pdf
Chang S, Lai K, Chang S (2009) Exploring technology diffusion and classification of
business methods: using the patent citation network. Technological Forecasting
and Social Change 76(1):107–117
Chen C, Ibekwe-SanJuan F, Hou J (2010) The structure and dynamics of co-
citation clusters: A multiple-perspective co-citation analysis. Journal of the
American Society for Information Science and Technology 61:1386–1409
Criscuolo P, BVerspagen (2008) Does it matter where patent citations come
from? inventor versus examiner citations in european patents. Research Policy
37:1892–1908
Cs´ardi G, Strandburg K, Tobochnik J, ´Erdi P (2009) Chapter 10. the inverse
problem of evolving networks – with application to social nets. In: Bollob´as B,
Kozma R, Mikl´os D (eds) Handbook of Large-Scale Random Networks, Springer-
Verlag, Berlin, Heidelberg, New York, pp 409–443
Day G, Schoemaker P (2005) Scanning the periphery. Harvard Business Review
pp 1–12
Debackere K, Verbeek A, Luwel M, Zimmermann E (2002) The multiple uses of
technometric indicators. International Journal of Management Reviews 4:213–
231
van Dongen S (2000) A cluster algorithm for graphs. Technical Report INS-
R0010, National Research Institute for Mathematics and Computer Science in
the Netherlands, Amsterdam
Duguet E, MacGarvie M (2005) How well do patent citations measure flows of
technology? Evidence from French innovation surveys. Economics of Innovation
and New Technology 14(5):375–393
´Erdi P (2007) Complexity Explained. Springer-Verlag, Berlin, Heidelberg
´Erdi P (2010) Scope and limits of predictions by social dynamic models: Crisis,
innovation, decision making. Evolutionary and Institutional Economic Review
7:21–42
Fleming L (2001) Recombinant uncertainty in technological search. Management
Science 47(1):117–132
Fleming L (2004) Science as a map in technological search. Strategic Management
Journal 25:909–928
Fleming L, Sorenson O (2001) Technology as a complex adaptive system: evidence
from patent data. Research Policy 30:1019–1039
Fleming L, Juda A, III CK (2006) Small worlds and regional
innovation.
Harvard Business School Working Paper Series, No. 04–008, available at
http://ssrn.com/abstract=892871
Fontana R, Nuvolari A, Verspagen M (2009) Mapping technological trajectories
as patent citation networks. an application to data communication standards.
Economics of Innovation and New Technology 18:311–336
Garfield E (1983) Citation Indexing – Its Theory and Application in Science,
Technology and Humanities. ISI Press, Philadelphia
18
P´eter ´Erdi et al.
Garfield E (1993) Co-citation analysis of the scientific literature: Henry small on
mapping the collective mind of science. Current Contents 19:3–13
Girvan M, Newman M (2002) Community structure in social and biological net-
works. PNAS 99(12):7821–7826
Hagedoorn J, Cloodt M (2003) Measuring innovative performance: Is there an
advantage in using multiple indicators? Research Policy 32:1365–1379
Hall B, Jaffe A, Trajtenberg M (2001) The NBER patent citation data file: Lessons,
insights and methodological tools. Working Paper 8498, National Bureau of
Economic Research
Hargadon A, Sutton R (1997) Technology brokering and innovation in a product
development firm. Administrative Science Quarterly 42:716–749
Harhoff D, Narin F, Scherer F, Vopel K (1999) Citation frequency and the value
of patented inventions. The Review of Economics and Statistics 81:511–515
Henderson R, Clark K (1990) Architectural innovation: The reconfiguration of
existing product technologies and the failure of established firms. Administrative
Science Quarterly 35(1):9–30
Huang Z, Chen H, Yip A, Ng G, Guo F, Chen ZK, Roco M (2003) Longitudinal
patent analysis for nanoscale science and engineering: Country, institution and
technology field. Journal of Nanoparticle Research 5:333–363
Huang Z, Chen H, Chen ZK, Roco M (2004) International nanotechnology de-
velopment in 2003: Country, institution, and technology field analysis based on
uspto patent database. Journal of Nanoparticle Research 6:325–354
Jaffe A, Trajtenberg M (2005) Patents, Citations & Innovations – a Window on
the Knowledge Economy. MIT Press, Cambridge
Kajikawa Y, Takeda Y (2008) Structure of research on biomass and bio-fuels: A
citation-based approach. Technological Forecasting and Social Change 75:1349–
1359
Kajikawa Y, Usui O, Hakata K, Yasunaga Y, Matsushima K (2008) Sructure of
knowledge in the science and technology roadmaps. Technological Forecasting
and Social Change 75:1–11
Kostoff R, Geisler E (2007) The unintended consequences of metrics in technology
evaluation. Journal of Infometrics 1:103–114
Kostoff R, Schaller R (2001) Science and technology roadmaps. IEEE Transactions
on Engineering Management 48:132–143
Kostoff R, Stump J, Johnson D, Murday J, Lau C, Tolles W (2006) The structure
and infrastructure of the global nanotechnology literature. Journal of Nanopar-
ticle Research 8:301–321
Lai K, Wu SJ (2005) Using the patent co-citation approach to establish a new
patent classification system. Information Processing and Management 41:313–
330
Lanjouw J, Schankerman M (2004) Patent quality and research productivity: Mea-
suring innovation with multiple indicators. The Economic Journal 114(495):441–
465
Lee PC, Su HN, Wu FS (2010) Quantitative mapping of patented technology – the
case of electrical conducting polymer nanocomposite. Technological Forecasting
and Social Change 77(3):466–478
Leskovec J, Kleinberg J, Faloutsos C (2005) Graphs over time: densification laws,
shrinking diameters and possible explanations. In: KDD 2005: Proceedings of
the eleventh ACM SIGKDD international conference on Knowledge discovery
Prediction of Emerging Technologies
19
in data mining, ACM, New York, NY, pp 177–187
Leydesdorff L (2008) Patent classifications as indicators of intellectual organiza-
tion. Journal of the American Society for Information Science and Technology
59(10):1582–1597
McMillanm G, Narin F, Deeds D (2000) An analysis of the critical role of public
science in innovation: the case of biotechnology. Research Policy 29:1–8
Meyer M (2000) What is special about patent citations? differences between sci-
entific and patent citations. Scientometrics 49:93–123
Meyer M (2001) Patent citation analysis in a novel field of technology: An explo-
ration of nano-science and nano-technology. Scientometrics 51:163–183
Milman B (1994) Individual cocitation clusters as nuclei of complete and dynamic
infrometric models of scientific and technological areas. Scientometrics 31:45–57
Moed H (2005) Citation Analysis in Research Evaluation. Springer, Dordrecht,
Netherlands
Mogee M, Kolar R (1998a) Patent citation analysis of allergan pharmaceutical
patents. Expert Opinion on Therapeutic Patents 8(10):1323–1346
Mogee M, Kolar R (1998b) Patent citation analysis of new chemical entities
claimed as pharmaceuticals. Expert Opinion on Therapeutic Patents 8(3):213–
222
Mogee M, Kolar R (1999) Patent co-citation analysis of eli lilly & co. patents.
Expert Opinion on Therapeutic Patents 9(3):291–305
Murray F (2002) Innovation as co-evolution of scientific and technological net-
works: exploring tissue engineering. Research Policy 31:1389–1403
Narin F (1994) Patent bibliometrics. Scientometrics 30:147–155
Newman M (2002) Assortative mixing in networks. Physical Review Letters
89(20):208,701
Newman M (2006) Finding community structure in networks using the eigenvec-
tors of matrices. Physical Review E 74:036,104
Newman M, Girvan M (2004) Finding and evaluating community structure in
networks. Physical Review E 69(026113)
OuYang K, Weng C (2011) A new comprehensive patent analysis approach for
new product design in mechanical engineering. Technological Forecasting and
Social Change 78(7):1183–1199
Palla G, Barab´asi AL, Vicsek T (2007) Quantifying social group evolution. Nature
446:664–667
Podolny J, Stuart T (1995) A role-based ecology of technological change. The
American Journal of Sociology 100(5):1224–1260
Podolny J, Stuart T, Hannan M (1996) Networks, knowledge, and niches: Com-
petition in the worldwide semiconductor industry, 1984-1991. The American
Journal of Sociology 102(3):659–689
Pons P, Latapy M (2006) Computing communities in large networks using random
walks. Journal of Graph Algorithms and Applications 10:191–218
Pyka A, Scharnhost A (2009) Innovation Networks. New Approaches in Modelling
and Analyzing. Springer-Verlag, Berlin, Heidelberg
Sampat B (2004) Examining patent examination: An analysis of examiner and
application generated prior art. Working Paper, Prepared for NBER Summer
Institute
Sampat B, Ziedonis A (2002) Cite seeing: Patent citations and the economic value
of patents. Unpublished manuscript, from the author
20
P´eter ´Erdi et al.
Saviotti P (2005) On the co-evolution of technologies and institutions. In: We-
ber M, Hemmelskamp J (eds) Towards Environmental Innovations Systems,
Springer, Berlin, Hidelberg
Saviotti P, de Looze M, Maopertuis M (2003) Knowledge dynamics and the merg-
ers of firms in the biotechnology based sectors. International Journal of Biotech-
nology 5(3–4):371–401
Saviotti P, de Looze M, Maopertuis M (2005) Knowledge dynamics, firm strat-
egy, mergers and acquisitions in the biotechnology based sectors. Economics of
Innovation and New Technology 14(1–2):103–124
Schumpeter J (1939) Business Cycles. McGraw-Hill, New York
Shibata N, Kajikawa Y, Takeda Y, Matsushima K (2008) Detecting emerging
research fronts based on topological measures in citation networks of scientific
publications. Technovation 28:758–775
Shibata N, Kajikawa Y, Sakata I (2010) Extracting the commercialization gap
between science and technology – case study of a solar cell. Technological Fore-
casting and Social Change 77:1147–1155
Shibata N, Kajikawa Y, Takeda Y, Sakata I, Matsushima K (2011) Detecting
emerging research fronts in regenerative medicine by the citation network anal-
ysis of scientific publications. Technological Forecasting and Social Change
78:274–282
Small H (1973) Cocitation in scientific literature: New measure of relationship be-
tween two documents. Journal of The American Society For Information Science
24:265–269
Small H (2006) Tracking and predicting growth areas in science. Scientometrics
68:595–610
Sood A, Tellis G (2005) Technological evolution and radical innovation. Journal
of Marketing 69:152–168
Sorenson O, Rivkin J, Fleming L (2006) Complexity, networks and knowledge flow.
Research Policy 35(7):994–1017
Sternitzke C (2009) Patents and publications as sources of novel and inventive
knowledge. Scientometrics 79:551–561
Strandburg K, Cs´ardi G, Tobochnik J, ´Erdi P, Zal´anyi L (2007) Law and the
science of networks: An overview and an application to the “patent explosion”.
Berkeley Technology Law Journal 21:1293
Strandburg K, Cs´ardi G, Tobochnik J, ´Erdi P, Zal´anyi L (2009) Patent citation
networks revisited: signs of a twenty-first century change? North Carolina Law
Review 87:1657–1698
Strumsky D, Lobo J, Fleming L (2005) Metropolitan patenting, inventor agglom-
eration and social networks: A tale of two effects. SFI Working Paper No. 05-02-
004, available at http://www.santafe.edu/media/workingpapers/05-02-004.pdf
Tijssen R (2001) Global and domestic utilization of industrial relevant science:
patent citation analysis of science-technology interactions and knowledge flows.
Research Policy 30:35–54
Usher A (1954) A History of Mechanical Invention. Dover, Cambridge
Verbeek A, Debackere K, Luwel M, Zimmermann E (2002) Measuring progress
and evolution in science and technology – I: The multiple uses of bibliometric
indicators. International Journal of Management Reviews 4(2):179–211
Vespignani A (2009) Predicting the behavior of techno-social systems. Science
325(5939):425–428
Prediction of Emerging Technologies
21
Wallace M, Gingras Y, Duhon R (2009) A new approach for detecting scientific
specialties from raw cocitation networks. Journal of the American Society for
Information Science and Technology 60(2):240–246
Ward J (1963) Hierarchical grouping to optimize an objective function. Journal of
the American Statistical Association 58(301):236–244
Weitzman M (1996) Hybridizing growth theory. American Economic Review
86(2):207–12
Weng C, Chen WY, Hsu HY, Chien SH (2010) To study the technological network
by structural equivalence. Journal of High Technology Management Research
21:52–63
7 Biographies
P´eter ´Erdi is the is the Henry R. Luce Professor of Complex Systems studies in
Kalamazoo College, and also a research professor at the Wigner Research Centre
for Physics, Hungarian Academy of Sciences He has been working on the fields of
computational neuroscience and computational social sciences.
Kinga Makovi is a PhD student in the Department of Sociology at Columbia
University, and holds an MS in mathematical economics from Corvinus University
in Budapest (2010). Her interests include social networks, quantitative methods
and simulation techniques in social sciences.
Zolt´an Somogyv´ari is a senior research fellow at the Wigner Research Centre
for Physics, Hungarian Academy of Sciences. He is an expert in developing new
methods of analysing large data sets.
Katherine Strandburg is a Professor of Law at New York University School of
Law. Her teaching and research activities are in the areas of intellectual property
law, cyberlaw, and information privacy law. Prior to her legal caireer, she was a
research physicist at Argonne National Laboratory, having received her Ph.D. in
Physics from Cornell University.
Jan Tobochnik is the Dow Distinguished Professor of Natural Science in Kala-
mazoo College. He also served as the Editor of the American Journal of Physics.
His research involves using computer simulations to understand a wide variety of
systems. In the last decade he has been involved in investigating the structural
properties of social networks.
P´eter Volf got his master degree in the Department of Measurement and In-
formation Systems of the Budapest University of Technology and Economics. His
main interest is now developing efficient clustering algorithms. He is now with
Nokia Siemens Networks, Budapest.
L´aszl´o Zal´anyi is a senior research fellow at the Wigner Research Centre for
Physics, Hungarian Academy of Sciences. He is an expert in developing new meth-
ods of analysing large data sets. His research areas are the application of stochastic
methods to neural and social systems, and network theory.
|
1802.04472 | 3 | 1802 | 2019-02-22T11:47:03 | Community Detection through Likelihood Optimization: In Search of a Sound Model | [
"cs.SI",
"math.ST",
"math.ST"
] | Community detection is one of the most important problems in network analysis. Among many algorithms proposed for this task, methods based on statistical inference are of particular interest: they are mathematically sound and were shown to provide partitions of good quality. Statistical inference methods are based on fitting some random graph model (a.k.a. null model) to the observed network by maximizing the likelihood. The choice of this model is extremely important and is the main focus of the current study. We provide an extensive theoretical and empirical analysis to compare several models: the widely used planted partition model, recently proposed degree-corrected modification of this model, and a new null model having some desirable statistical properties. We also develop and compare two likelihood optimization algorithms suitable for the models under consideration. An extensive empirical analysis on a variety of datasets shows, in particular, that the new model is the best one for describing most of the considered real-world complex networks according to the likelihood of observed graph structures. | cs.SI | cs | Community Detection through Likelihood Optimization:
In Search of a Sound Model∗
Liudmila Prokhorenkova
Moscow Institute of Physics and Technology
Yandex
Moscow, Russia
[email protected]
Alexey Tikhonov
Yandex
Berlin, Germany
[email protected]
9
1
0
2
b
e
F
2
2
]
I
S
.
s
c
[
3
v
2
7
4
4
0
.
2
0
8
1
:
v
i
X
r
a
ABSTRACT
Community detection is one of the most important problems in
network analysis. Among many algorithms proposed for this task,
methods based on statistical inference are of particular interest: they
are mathematically sound and were shown to provide partitions of
good quality. Statistical inference methods are based on fitting some
random graph model (a.k.a. null model) to the observed network by
maximizing the likelihood. The choice of this model is extremely
important and is the main focus of the current study. We provide
an extensive theoretical and empirical analysis to compare several
models: the widely used planted partition model, recently proposed
degree-corrected modification of this model, and a new null model
having some desirable statistical properties. We also develop and
compare two likelihood optimization algorithms suitable for the
models under consideration. An extensive empirical analysis on a
variety of datasets shows, in particular, that the new model is the
best one for describing most of the considered real-world complex
networks according to the likelihood of observed graph structures.
KEYWORDS
Community detection; likelihood optimization; statistical inference;
planted partition model; LFR benchmark
1 INTRODUCTION
Among various properties shared by many real-world complex
networks, community structure is extremely important. It is charac-
terized by the presence of highly interconnected groups of vertices
(communities or clusters) relatively well separated from the rest of
the network. In social networks communities are formed by users
with similar interests, in citation networks they represent papers
on related topics, etc. The presence of communities highly affects,
e.g., the promotion of products via viral marketing, the spreading
of infectious diseases, computer viruses and information, and so on.
Being able to identify communities in a network could help us to
exploit this network more effectively: find similar scientific papers,
discover users with similar interests for targeted advertisement,
compress or visualize the network, etc.
Among other algorithms proposed for community detection,
the notable ones are methods based on statistical inference. In
such methods, some underlying random graph model is assumed,
the evidence is represented by the observed graph, and hidden
variables to be inferred are the parameters of the model together
with community assignments. Such methods are appealing since
∗This is a preprint for the paper published in Proceedings of the 2019 World Wide Web
Conference (WWW'19) under the Creative Commons Attribution 4.0 International
(CC-BY 4.0) license. This version contains a few additional technical details.
they are theoretically sound and consistent: e.g., it has been proved
that when the maximum-likelihood method is applied to networks
generated from the same stochastic block model, it returns correct
cluster assignments in the limit of large degrees [7]. Also, likelihood
can be used to formalize the notion of a community [15].
The choice of the proper null model is essential for statistical in-
ference algorithms as it highly affects their performance. There are
two types of models: with fixed or non-fixed number of parameters.
Direct likelihood optimization for models with non-fixed number
of parameters leads to trivial partitions, as discussed in Section 4.1,
and additional heuristics are needed to define the number of clus-
ters. Hence, in this paper we focus on models with fixed number
of parameters. We analyze strengths and weaknesses of two most
popular models -- planted partition model and its degree-corrected
variant (they are discussed in Section 3). We also propose a new
model, which has only one parameter, satisfies a desired statistical
property of preserving the expected degree sequence, and shows
the best fit for a variety of real-worlds networks according to the
likelihood of observed structures.
Our research is similar in spirit to the recent paper by Yang and
Leskovec [58], where the authors provided an extensive comparison
of various community scoring functions. In contrast, we focus solely
on the likelihood optimization methods and, particularly, on the
comparison of the null models. Note that such models allow to score
partitions on the global level instead of individual communities. To
the best of our knowledge, we are the first to perform such thorough
evaluation of the null models used for community detection.
best fit to a variety of real-world complex networks.
To sum up, the contributions of this paper are the following:
• We theoretically analyze two well-known null models used
for community detection. Based on this analysis, we propose
a new one-parameter model which has a desirable statistical
property of preserving the expected degree sequence.
• We empirically demonstrate that the new model gives the
• We show that the likelihood based on the proposed model
can be used as a new, more reliable, alternative to the well-
known modularity measure.
• We develop several likelihood optimization algorithms suit-
able for all discussed models. We perform an extensive em-
pirical comparison of all the algorithms on various synthetic
and real-world datasets.
• The implementation of the proposed algorithms is available
as an open-source library.1
The rest of the paper is organized as follows. In the next section
we overview related papers and introduce the required background.
1https://github.com/altsoph/community_loglike
Then, in Section 3, we formally define and analyze all null models
used in the current research. In Section 4, we discuss the method
of statistical inference and present the likelihoods for all models.
The proposed likelihood optimization algorithms are discussed in
Section 5. Section 6 provides an extensive empirical analysis of all
models and algorithms and Section 7 concludes the paper.
2 BACKGROUND AND RELATED WORK
2.1 Community Detection Methods
In this section, we briefly overview algorithms used for community
detection. However, most of the related work will be discussed in
the corresponding background sections: Section 2.2 discusses mod-
ularity measure; Section 2.3 defines the LFR bechmark; Sections 3.1
and 3.2 describe standard null models; Section 4.2 discusses papers
on statistical inference; Section 5.1 deals with some optimization
techniques. For a deeper overview of community detection area,
we refer the reader to several survey papers, e.g., [10, 16, 19, 21, 33].
The problem of community detection has recently attracted a
lot of attention and many algorithms were proposed to solve this
problem. The proposed methods include: spectral algorithms [55];
methods based on statistical inference (see Section 4); methods
based on optimization (see Section 5); methods based on dynamical
processes on networks, like diffusion, spin dynamics, synchroniza-
tion, and so on. Also, existing approaches differ by a particular
task at hand: detecting overlapping communities [57], clustering in
dynamic [51], directed [48], or weighted [3] networks, community
detection in annotated [39] or layered [44] networks, and so on.
In this paper, we focus on the basic problem of detecting non-
overlapping communities in undirected and unweighted graphs.
However, ideas discussed in this paper can be applied to more
general cases, since there exist the corresponding generalizations
of the null models. We leave this analysis for the future research,
since there is a lot to be understood even for the basic case.
2.2 Modularity
Throughout this paper we assume that we are given a simple undi-
rected graph G = (V(G), E(G)) and the task is to find a partition
C = {C1, . . . , Ck} of its vertex set V(G) such that Ci = V(G) and
Ci Cj = ∅ for i (cid:44) j. The notation used in the paper is summarized
in Table 1.
For various problems related to community detection it is ex-
tremely important to have a quality function ¯Q(C, G) which mea-
sures a goodness of a partition C for a graph G. Having such a
function, one can:
• Optimize ¯Q(C, G) to detect good communities according to
• Use ¯Q(C, G) as a stopping criteria for a community detection
algorithm (e.g., to choose the partition level in hierarchical
algorithms);
• Tune parameters of a parametric community detection algo-
• Compare several community detection algorithms when no
• Compare several candidate partitions of G.
The most well-known such measure is modularity which was
first introduced by Newman and Girvan [40]. The basic idea is to
ground truth partition is available;
this measure;
rithm;
Variable
G
V (G)
E(G)
n = V(G)
m = E(G)
k = C
Q0(C, G, γ)
Q1(C, G, γ)
c(i)
C = {C1, . . . , Ck }
Pout = P − Pin
min = min(C, G)
mout = mout(C, G)
P =(cid:0)n
2(cid:1)
C∈C(cid:0)C
2(cid:1)
Pin =
D(C) =
Din(C) =
dout(i) = d − din(i)
i∈C d(i)
i∈C din(i)
d(i)
din(i)
m(Cq, Cr)
e(i, j)
Table 1: Notation
Description
observed graph, simple and undirected
set of vertices
set of edges
number of vertices in G
number of edges in G
partition of V (G)
number of communities
simple modularity defined in (1)
standard modularity defined in (2)
cluster assignment of vertex i
number of intra-community edges
number of inter-community edges
number of pairs of vertices
number of intra-community pairs of vertices
number of inter-community pairs of vertices
degree of vertex i in G
number edges going from i to vertices in Cc(i)
number of edges going from i to outside Cc(i)
degree of cluster C
twice the number of edges induced by C
number of edges between Cq and Cr or twice
the number of intra-cluster edges if q = r
number of edges between i and j
consider the fraction of intra-community edges among all edges of
G and penalize it in order to avoid trivial partitions like C = {V(G)}.
In its general form, modularity is
(cid:0)min − γ E(m
in)(cid:1) ,
′
Q(C, G, γ) =
1
m
in
= m′
where m = m(G) = E(G) is the number of edges in G; min =
min(C, G) is the number of intra-community edges; m′
in(C)
is a (random) number of intra-community edges in a graph con-
structed according to some underlying random graph model; γ is
the resolution parameter [47], which is usually added to get the
possibility of varying the number of communities obtained after
maximizing Q(C, G, γ).
The simplest underlying model is the Erdős -- Rényi random graph,
i.e., we assume that G is sampled uniformly at random from the set
of all graphs with n vertices and m edges. For this model, E(m′
in) =
Pin · m
P
, where P = (cid:0)n2(cid:1) is the number of pairs of vertices and
C∈C(cid:0)C
2(cid:1) is the number of intra-community pairs. So, the
Pin =
formula for simple modularity is
1
m
Q0(C, G, γ) =
(cid:18)
(cid:19)
min − γ
Pinm
P
.
(1)
However, the Erdős -- Rényi random graph model is known to
be not a good descriptor of real-world networks since its Poisson
degree distribution significantly differs from heavy-tailed degree
distributions observed in real-world networks. A standard solution
is to consider a random graph with a given expected degree se-
quence [12] as a null model, and to take the degree sequence from
the observed graph.2 For this model, the probability that vertices
2At large scale, this model is essentially equivalent to the configuration model [35]: a
random graph sampled uniformly from the set of graphs with a given degree sequence.
C∈C
, where d(i) is the degree of a
i and j are connected equals d(i)d(j)
2m
vertex i.3 In this case we have
Em
′
in =
where D(C) =
1
2
d(i)d(j) =
1
2m
C∈C
i∈C d(i) is the degree of cluster C. So, the standard
D(C)2
1
4m
C∈C
i∈C
j∈C
,
expression for modularity is
Q1(C, G, γ) = min
m
− γ
4m
2
D(C)2
.
(2)
Originally, modularity was introduced with γ = 1, but is was proven
to have a resolution limit [20], i.e., it fails to detect communities
smaller than a certain size; varying the resolution parameter helps
to overcome this problem, but tuning γ is challenging.
Despite some known shortcomings [19], modularity remains the
most popular way to measure the quality of a partition and many al-
gorithms are based on direct modularity optimization (see Section 5).
Also, as we discuss in Section 4, under certain assumptions, modu-
larity maximization is equivalent to likelihood optimization [36].
In this paper we also propose a new quality function based on a
more consistent one-parametric null model.
2.3 LFR Model
Let us now describe the LFR (Lancichinetti-Fortunato-Radicchi)
model [29], which is the most widely used synthetic benchmark
for comparison of community detection algorithms.
LFR generates a graph G on n vertices. The main parameters of
the model are: the exponent of the power-law degree distribution γ,
the exponent of the power-law community size distribution β, the
average degree ¯d, and mixing parameter µ. First, we generate the
degrees of vertices by sampling them independently from the power-
law distribution with exponent γ and mean ¯d. Each vertex shares a
fraction 1 − µ of its edges with the vertices of its community and a
fraction µ with the other vertices of the network. The sizes of the
communities are sampled from the power-law distribution with
exponent β, such that the sum of all sizes equals n. Then, vertices are
assigned to communities such that the internal degree of any vertex
is less than the size of its community. Finally, the configuration
model [35] with rewiring steps is used to construct a graph with the
given degree sequence and with the required fraction of internal
edges. See [29] for the detailed description of this procedure.
3 NULL MODELS
In this section, we analyze several random graph models having
community structure and suitable for using as null models for
likelihood optimization.
3.1 Stochastic Block Model
The most well-known random graph model with community struc-
ture is the stochastic block model (SBM) [26]. In this model, the
vertices are divided in k clusters and for each pair of vertices i, j
3For technical purposes, it is more convenient (and conventional) to allow the under-
lying model to have loops and multiple edges and to assume that the number of edges
between vertices i and j follows a Poisson distribution with the mean d(i)d(j)
if i (cid:44) i
2m
and the expected number of loops for a vertex i is d(i)2
. In particular, in this case
4m
we avoid problems when d(i)d(j) > 2m which can possibly occur. Note that usually
d(i)d(j) ≪ 2m, so multiple edges rarely appear.
we draw an edge between them with probability pc(i),c(j) indepen-
dently of all other edges; here c(i) is a community assignment for
a vertex i. In other words, the probability of an edge between two
vertices depends only on their community assignments. The values
pq,r , 1 ≤ q, r ≤ k are parameters of the model, 0 ≤ pq,r ≤ 1 and
pq,r = pr,q. The matrix of the probabilities pq,r is called the sto-
chastic block matrix. If the diagonal elements are larger than the
other ones, then generated graphs have community structure.
In many community detection algorithms a simplified version
of SBM called planted partition model (PPM) is used [14]. PPM
is a special case of SBM, where pq,q = pin for 1 ≤ q ≤ k and
pq,r = pout for 1 ≤ q, r ≤ k, q (cid:44) r, pin and pout are parameters of
PPM.
3.2 Degree-Corrected Stochastic Block Model
Similarly to the Erdős -- Rényi random graph, SBM is unable to model
heavy-tailed degree distributions, so community detection algo-
rithms based on this model may have a poor quality. To overcome
this issue, Karrer and Newman proposed the degree-corrected sto-
chastic block model (DCSBM) [28]. In this model the vertices are
again assigned to k clusters and edges are placed independently at
random. The number of edges between vertices i and j follows a
Poisson distribution with the mean d(i)d(j)
2m pc(i),c(j) or a half that
number for self-loops. Let us show that DCSBM is able to generate
graphs with desired expected degrees.
Proposition 1. There exist such pq,r that in DCPPM we have
E(d′(i)) = d(i) for all i.
Proof. Let us set
pq,r =
2 m m(Cq , Cr)
D(Cq) D(Cr) ,
where m(Cq , Cr) is the number of edges between clusters Cq and
Cr or twice the number of intra-cluster edges if q = r. Note that
these parameters maximize the likelihood for DCSBM [28]. For
such parameters we get the desired condition:
d(i)d(j)
2m
pc(i),c(j)
d(i)
D(cid:0)Cc(i)(cid:1)
C∈C
m(cid:0)C, Cc(i)(cid:1)
D(C)
j∈C
d(j) = d(i) .
=
So, we proved that in its general form DCSBM is able to preserve
the desired degree sequence.
□
The degree-corrected planted partition model (DCPPM) [36] is a
simplified version of DCSBM, where pq,q = pin for 1 ≤ q ≤ k and
pq,r = pout for 1 ≤ q, r ≤ k, q (cid:44) r. Let us prove the following
"negative" proposition.
Proposition 2. If pin (cid:44) pout and for some q, r we have D(Cq) (cid:44)
D(Cr), then E(d′(i)) (cid:44) d(i) for some i.
Proof. Let us compute the expected degree of i:
n
j=1
E(d
′(i)) =
E(d
′(i)) = d(i)
2m
pin
j∈Cc(i)
= d(i)
2m
pout
d(j) + d(i)
(cid:16)
D(cid:0)Cc(i)(cid:1)(pin − pout) + 2m pout
2m
C(cid:44)Cc(i)
d(j)
j∈C
(cid:17)
.
To get E(d′(i)) = d(i) for all i, we need to have, for any cluster C,
D(C)(pin − pout) + 2m pout = 2m .
As we have at least two clusters with different values D(C), we
have to take pin = pout = 1 , which leads to the standard config-
uration model without any community structure and contradicts
the statement of the proposition.
□
As a result, we obtain that the standard method of limiting the
number of parameters in DCSBM leads to inability of the obtained
model to preserve the expected degree sequence.
3.3 Independent LFR Model
Motivated by Proposition 2, we developed a one-parameter model
which preserves the expected degree sequence. It is a special case
of DCSBM and we call it independent LFR model (ILFR) due to its
analogy to the LFR benchmark.
The core problem of DCPPM is the assumption that the probabil-
ity of an internal edge is independent of the size of its community,
so the fraction of internal edges for a vertex depends on the commu-
nity size. On the contrary, we propose using the mixing parameter
µ to control this fraction. Namely, we consider DCSBM with the
following expected number of edges between two vertices i and j:
µd(i)d(j)
if c(i) (cid:44) c(j) ,
2m
(1 − µ)d(i)d(j)
D(Cc(i))
µd(i)d(j)
2m
+
if c(i) = c(j)
(or half this number for the self loops). Note that making the proba-
bility of an internal edge dependent on the size of the community is
very natural: e.g., if a community of people is very small, one would
expect that its members are much closer related to each other than
members of large communities. The following proposition holds
for the proposed model.
Proposition 3. In ILFR we have E(d′(i)) = d(i) for all i.
Proof. Indeed, let us compute the expected degree of i:
′(i)) = d(i)(cid:169)(cid:173)(cid:171)(1 − µ)
j∈Cc(i)
E(d
d(j)
D(Cc(i)) + µ
j∈V (G)
(cid:170)(cid:174)(cid:172) = d(i) .
d(j)
2m
□
So, this model solves the problem with expected degrees. Another
advantage of ILFR is that it has only one parameter µ instead of pin
and pout in planted partition models.
4 STATISTICAL INFERENCE
4.1 Method
Having discussed possible options for the null models, we are ready
to describe the statistical inference method. For community detec-
tion problem, this method consists of two ingredients: the evidence,
expressed by a graph G, and a random graph null model with pa-
rameters θ (θ include community assignments and µ or pin and
pout for the models under consideration). The goal is to find such
parameters θ that maximize the posterior distribution
P(θG) =
P(Gθ)P(θ)
P(G)
,
∫ P(G¯θ)P(¯θ) d
θ
¯θ is independent of θ, therefore arg max
where P(θ) is the prior distribution of parameters and P(G) =
P(θG) =
P(Gθ)P(θ) . The choice of the prior distribution P(θ) is
arg max
θ
usually not obvious. Therefore, in the community detection liter-
ature, the likelihood P(Gθ) that the model is consistent with the
observed graph structure is often maximized.
Let us also stress that in Section 3 we discussed two types of
models: SBM/DCSBM having non-fixed number of parameters and
PPM/DCPPM/ILFR with a fixed number of parameters. If the num-
ber of parameters is fixed, then the likelihood optimization can
be applied directly. Otherwise, one needs another tool to find the
optimal number of clusters, since direct likelihood maximization
would lead to a trivial partition with all vertices forming their own
clusters and the probability of an edge between two vertices equals
1 if they are connected and 0 otherwise. To avoid this problem, we
further focus only on the models with fixed number of parameters.
4.2 Related Work on Statistical Inference
Let us briefly describe previous literature on statistical inference in
community detection. Hastings [24] considers PPM, as defined in
Section 3.1. He shows a connection between the obtained likelihood
and the Hamiltonian of a Potts model with short- and long-range
interactions. For pin > pout , the model is a spin glass with ferro-
magnetic nearest-neighbor interactions and antiferromagnetic long-
range interactions. Belief propagation is used to find the ground
state of the spin model. Another method based on the directed SBM
is presented by Newman and Leicht [41], they use the expectation-
maximization technique to optimize the parameters. These ideas
are close to the a posteriori blockmodel proposed in [42]. A varia-
tional approach to parameter estimation is adopted in [17]. Some
improvements and modifications of these approaches are intro-
duced in, e.g., [11, 25, 45, 60]. A generalization to the overlapping
SBM is proposed by McDaid and Hurley [34]. As we discussed,
DCSBM is defined in [28] and communities are detected based on
the likelihood in this model. Copic et al. [15] define an axioma-
tization for the problem of community detection based on PPM.
Likelihood is used as a quality function to define rankings between
graph partitions and it is shown that such rankings satisfy a number
of desired properties. The authors also propose an algorithm to find
(approximately) the maximum likelihood partition.
Finally, if the number of parameters in the model is not fixed,
some additional tools are required to figure out the optimal number
of clusters. Here the average entropy of the classification [45] or
the Integrated Classification Likelihood [17, 60] can be used.
4.3 Likelihood for PPM and Simple Modularity
The log-likelihood for PPM can be easily written:
log L
′
P P M(C, G, pin, pout) = min log pin + mout log pout +
(Pin − min) log(1 − pin) + (Pout − mout) log(1 − pout) .
Although it can be optimized directly using the algorithms discussed
further in the paper, in order to demonstrate a connection of the log-
likelihood to simple modularity defined in (1) and to deal with all
models in a unified way, we use the conventional trick and say that
the number of edges between i and j follows a Poisson distribution
with parameter pin or pout . Then we get:
−pin p
LP P M(C, G, pin, pout) =
·
−Pout pout p
min
in p
mout
out
,
e(i, j)
out = e
i, j:i <j,
c(i)=c(j)
−Pinpin e
−pout p
e(i, j)
in
e
e
i, j:i <j,
c(i)(cid:44)c(j)
where e(i, j) is the number of edges between i and j, so
log LP P M(C, G, pin, pout) =
min log pin + mout log pout − Pinpin − Pout pout .
Note that the values pin and pout maximizing (3) are
pin = min
Pin
, pout = mout
Pout
.
In a resent paper by Newman [36] it was shown that if we as-
sume pin and pout to be fixed, then maximizing (3) is equivalent to
maximizing simple modularity (1). Indeed,
log LP P M(C, G, pin, pout) = min(log pin−log pout)+m log pout
− Pin(pin − pout) − P pout = m log pout − P pout
pin − pout
+ (log pin − log pout)
So, we get the equivalence with
min − Pin
log pin − log pout
(cid:18)
(cid:19)
γ =
P(pin − pout)
m(log pin − log pout) .
4.4 Likelihood for DCPPM and Modularity
Let us compute the log-likelihood for the DCPPM [36]:
d(i)d(j)pout
2m
= −1
2
i, j: c(i)=c(j)
d(i)d(j)pin
log LDCP P M(C, G, pin, pout)
2m
log d(i)d(j)pin
−
+
+
(i, j)∈E(G),
(i, j)∈E(G),
i <j,c(i)=c(j)
i <j,c(i)(cid:44)c(j)
= min(log pin − log pout) − pin − pout
+
i, j: i <j,
c(i)(cid:44)c(j)
4m
2m
D(C)2
d(i) log d(i) + m log pout − mpout − m log(2m) .
C∈C
log d(i)d(j)pout
2m
i
(3)
(4)
.
(5)
(6)
The values of parameters maximizing this likelihood are:
pin =
4 m min
C D(C)2 , pout =
(7)
As shown in [36], if pin and pout are fixed, then maximizing
log LDCP P M(C, G, pin, pout) is exactly equivalent to maximizing
modularity (2) with
C D(C)2 .
4 m mout
4m
2 −
γ =
pin − pout
log pin − log pout
.
(8)
4.5 Likelihood for ILFR
Let us compute the likelihood for the proposed ILFR model:
(cid:18)
µd(i)d(j)
log LI LF R(C, G, µ) = −1
+
2
=
2m
log µd(i)d(j)
(i, j)∈E(G),
i <j,c(i)=c(j)
i, j:c(i)=c(j)
log
d(i)d(j)
d(i)d(j)
Din(C)
2
log
C∈C
2m
+ mout log µ +
D(Cc(i)) +
(cid:18) (1 − µ)
(cid:18) (1 − µ)
(cid:18)(1 − µ)
D(Cc(i)) +
D(C) +
(cid:19)
(cid:19)(cid:19)
(cid:19)
µ
2m
µ
2m
µ
2m
i, j:i <j,
c(i)(cid:44)c(j)
(i, j)∈E(G),
i <j,c(i)(cid:44)c(j)
−
+
where Din(C) =
(cid:18)(1 − µ)
since(cid:12)(cid:12)(cid:12)log 1−µ
D(C)
i
log
d(i) log d(i) − mout log 2m − m ,
(9)
i∈C din(i) is twice the number of edges induced
by C. Note that the optimal value of µ is hard to find analytically,
but it can be approximated numerically by optimizing (9).
D(C) +
algorithms and to make formulas more concise:
The following approximation helps to speed up the optimization
(cid:19)
µ D(C)
(1 − µ) 2 m
≈ log (1 − µ)
D(C) ,
(cid:19)
= log (1 − µ)
D(C) + log
≈ log (1 − µ)
(cid:12)(cid:12)(cid:12) ≫ µD(C)
D(C) +
(1−µ) 2 m . This leads to another quality function,
−
log D(C) +
log LI LF RS(C, G, µ) = min log(1− µ) +mout log µ−mout log 2m
(10)
1 +
µD(C)
(1 − µ) 2 m
which we further refer to as ILFRS (S stands for "simplified"):
d(i) log d(i) − m .
Din(C)
µ
2m
(cid:18)
2
C
i
The optimal µ according to (10) can now be computed analytically:
(11)
Note that now we can substitute µ in (10) by the optimal value (11)
µ = mout
m
.
and obtain a non-parametric quality function:
log LI LF RS(C, G) = min log min
m
− mout log 2m −
Din(C)
log D(C) +
+ mout log mout
m
− m
d(i) log d(i) .
(12)
2
C
i
The obtained function is fairly simple and, as we show by further
experiments, it can successfully replace the standard modularity
function in many applications.
Let us also note that in contrast to ILFR, the likelihood for the
standard LFR model cannot be computed. First, LFR is based on
the configuration model, which introduces complex dependences
between all edges, making the likelihood intractable. Second, and
most importantly, the number of iter-community edges for each
vertex is deterministic (the fraction of such edges is µ); as a result,
for most of graphs and partitions the likelihood is equal to zero.
5 OPTIMIZATION
5.1 Related Work on Modularity Optimization
First, let us discuss some optimization approaches used in commu-
nity detection. The most widely used measure to be optimized is
modularity (2). The following types of approaches are known.
Greedy optimization. Newman and Girvan [40] proposed a greedy
algorithm for modularity optimization, where the clusters are it-
eratively merged by choosing the pair which leads to a greater
modularity increase (while it is positive). A speedup of the greedy
algorithm was proposed by Clauset et al. [13]. Some other modi-
fications were also suggested in, e.g., [49, 56]. Probably the most
well-known and widely used greedy algorithm is called Louvain [8].
At the beginning each vertex forms its own cluster. Then we cre-
ate the first level of the partition by iterating through all vertices:
for each vertex i we compute the gain in modularity coming from
putting i to the community of its neighbor and pick the community
with the largest gain, as long as it is positive. After that the first
level is formed and we replace the obtained communities by super-
vertices, and two supervertices are connected by a (weighted) edge
if there is at least one edge between vertices of the corresponding
communities. Then the process is repeated with the supervertices,
and so on, as long as modularity increases. This algorithm was
shown to be fast and provide partitions of good quality. We choose
Louvain algorithm as the basis for our experiments, the detailed
description of its application to our problem is given in Section 5.2.
Simulated annealing. Simulated annealing was first applied to
modularity optimization in [23]. This method combines two types
of moves: local moves, where a single vertex is shifted from one
cluster to another; global moves, consisting of merges and splits of
communities. Methods based on simulated annealing are relatively
slow and cannot be applied to large datasets.
Spectral optimization. Spectral methods are quite popular in mod-
ularity optimization. Such methods use the eigenvalues and eigen-
vectors of a so-called modularity matrix. Some examples can be
found in [37, 53].
Many other algorithms exist, among them are methods based on
extremal optimization [18], mathematical programming [2], mean
field annealing [30], genetic algorithms [54], etc.
5.2 Proposed Likelihood Optimization Methods
In Section 4, we presented four quality functions based on the likeli-
hood: PPM (3), DCPPM (6), ILFR (9), and ILFRS (10). All functions are
parametric: PPM and DCPPM have parameters pin and pout , ILFR
and ILFRS have one parameter µ. In this section, we discuss the pos-
sible ways to maximize these likelihoods. Below we assume that we
are given an arbitrary algorithm FindPartition( ¯Q, G) which is able
to find a partition by maximizing some quality function ¯Q(C, G).
Although the optimization strategies proposed below are able
to work with any algorithm FindPartition, let us first discuss our
particular choice. As we already mentioned, we choose Louvain
algorithm [8], which is arguably the most widely used method for
community detection. Louvain is fast and allows to process large
datasets. Importantly, it can be adapted to all quality functions
discussed in this paper. Initially the method is designed to optimize
modularity, so it can be directly applied to the likelihood of DCPPM
due to their equivalence. To adapt Louvain to other likelihoods, we
have to change one part of the original algorithm: when we try to
remove a vertex (or supervertex) from one community an add to
another, we need to efficiently compute the difference in likelihood.
This can be done for any of the considered quality functions: for
ILFR and ILFRS the differences can be computed using (9) and (10);
for PPM we have to additionally store the sizes of supervertices
in order to compute the difference for Pin in (1). The rest of the
Louvain algorithm remains the same.4 Therefore, the asymptotic
time complexity of our Louvain-based FindPartition and of the
original Louvain are the same, up to a constant multiplier (the
complexity of Louvain is empirically evaluated to be O(n log n)).
Note that both the original Louvain and our modifications can
be applied to the likelihoods with fixed values of parameters pin,
pout or µ. Therefore, the key question is how to find the optimal
values of these parameters.
Iterative strategy. The simplified version of this strategy was
initially proposed in [36] for PPM and DCPPM models. Detailed de-
scription of our method is presented in Algorithm 1. Initially, we fix
γ = 1 or µ = 0.5 depending on the null model. Then, we apply Find-
Partition to the corresponding log-likelihood function. Using the
obtained partition we can re-estimate the parameters and continue
this procedure until convergence or until some maximum allowed
number of steps is reached. In our experiments we noticed that for
any null model the parameters may end up cyclically varying near
some value. Therefore, at each iteration we additionally check if
we obtain an already seen parameter and stop in this case. This
additional trick allows to significantly reduce the overall number
of iterations. In our experiments we observed that we never need
more than 50 iterations and the mean value is much smaller, see
Section 6 for more details.
Maximization strategy. An alternative strategy is to directly
search for parameters which maximize likelihood of the obtained
partition. Here we can use any black-box optimization method. At
each iteration of optimization, for some value of γ or µ, we run
FindPartition to obtain a partition C, then, using C, we find the
optimal parameters according to (4), (7), (11) or by optimizing (9).
Finally, we compute the likelihood to be maximized using (3), (6),
(9), or (10). In our experiments, for simplicity and reproducibility,
we use grid search in this strategy. However, any other method of
black-box parameter optimization can be used instead, e.g., random
search [5], Bayesian optimization [50], Gaussian processes [22],
sequential model-based optimization [6, 27], and so on.
4To make our results reproducible, we made the source code publicly available at
https://github.com/altsoph/community_loglike.
Algorithm 1: Iterative strategy
input : graph G, Model, algorithm FindPartition, N , ε
Initialize param = 1 (γ for PPM, DCPPM) or param = 0.5 (µ
for ILFR, ILFRS), Params = ∅;
for i ← 1 to N do
Define ¯Q according to (1) for PPM, (2) for DCPPM, (9) for
ILFR, (10) for ILFRS with parameter param;
C = FindPartition( ¯Q, G);
if Model is PPM or DCPPM then
Compute pin and pout according to (4) or (7);
Compute paramnew according to (5) or (8);
if Model is ILFRS then
Compute paramnew according to (11);
if Model is ILFR then
Compute paramnew by optimizing (9);
if param − paramnew < ε or paramnew ∈ Params then
break;
Add paramnew to Params;
param ← paramnew ;
return C
To summarize, the maximization strategy directly maximizes
the obtained likelihood, while the iterative one searches for a "sta-
ble" parameter, i.e., the one which does not change after applying
FindPartition. Note that the convergence of the iterative strategy
is not guaranteed for real-world networks. Therefore, initially we
expected the maximization strategy to be more stable. However,
our experiments show that these two strategies demonstrate similar
performance, but the iterative one is faster.
Let us mention another possible optimization strategy, which
we do not use in our experiments. Given a partition C, for each
likelihood function except ILFR, we can compute the optimal values
of parameters according to (4), (7), and (11). Therefore, for the cor-
responding models we can substitute these parameters and obtain
non-parametric likelihoods, as we did in (12) for ILFRS. Namely, for
PPM we can replace pin and pout in (3) by (4) and obtain
−
log LP P M(C, G) = min log min
Pin
+ mout log mout
Pout
− m .
C D(C)2
d(i) log d(i)
For DCPPM, we replace pin and pout in (6) by (7) and get
(cid:18)
min − mout
2 −
4m
2 −
4 m mout
C D(C)2 −
log LDCP P M(C, G) = min log min
C D(C)2
C D(C)2
4 m
(cid:0)4m
C D(C)2(cid:1)
2 −
mout
(cid:19)
+
2 −
C D(C)2 − m log(2m).
All obtained non-parametric quality functions can potentially be
optimized directly since they do not have free parameters. However,
we do not consider such strategy since: 1) it cannot be applied to
ILFR as there is no analytical formula for optimal µ, 2) this strategy
cannot be easily combined with the Louvain algorithm. The reason
is that Louvain has several partition levels and partitions obtained
+ m log
4m
i
2
mout
4m
on earlier levels cannot be changed later. At the beginning of the
algorithm our estimates of µ, pin, and pout are far from optimal:
all vertices form their own communities, so µ = 1, pout = 1, and
pin = 0. As a result, the first level of the partition, which has a big
impact on the final quality, is constructed based on non-optimal
parameters. In fact, in most cases the algorithm does not even start
optimization due to the huge overestimate of µ or pout .
6 EXPERIMENTS
In this section, we conduct an extensive experimental study to com-
pare the discussed models. We start with some preliminaries and
discuss evaluation metrics and datasets. In Section 6.3, we measure
how well the models describe various real-world networks. Next,
we compare all proposed community detection algorithms. Finally,
Section 6.5 presents some negative results on the limits of statistical
inference algorithms when applied to real-world networks.
6.1 Evaluation Metrics
In order to evaluate the performance of any algorithm, we have to
compare the partition C obtained by this algorithm with the ground
truth partition CGT . The problem of choosing a good similarity
measure for this comparison does not have any standard solution
in community detection literature. Different similarity measures
can possibly give preferences to different algorithms. Usually, a
suitable measure is chosen according to a practical problem at hand.
That is why in this work we compute and compare several standard
similarity measures.
In particular, we use Normalized Mutual Information (NMI) of
two partitions C and CGT , which is often used for the comparison
of community detection algorithms [4, 19]. The idea behind NMI is
that if two partitions are similar, one needs very little information
to infer CGT given C. Assume that cluster labels for CGT and C
are values of two random variables ξGT and ξ. Then,
NMI(CGT , C) =
2 I(ξGT , ξ)
H(ξGT ) + H(ξ) ,
where I(ξGT , ξ) = H(ξ) − H(ξGT ξ) is the mutual information
of ξGT and ξ, H(ξ) is the Shannon entropy of ξ, H(ξGT ξ) is the
conditional entropy of ξGT given ξ .
We also use two well-known similarity measures based on count-
ing correctly and incorrectly classified pairs of vertices. Let n11
denote the number of pairs of vertices which are in the same com-
munity in both partitions C and CGT , n01 (n10) the number of pairs
which are in the same community in C (CGT ) and in different
communities in CGT (C), and n00 the number of pairs that are in
different communities in both partitions. By combining the intro-
duced values one can obtain several similarity measures. We use
two most popular ones, the first is Rand index [46]:
,
n11+n10+n01+n00
i.e., the fraction of the number of correctly classified pairs of ver-
tices to the total number of pairs. One problem of the Rand index is
that its value is usually close to 1, since n00 is typically very high.
The well-known Jaccard index does not suffer from this problem, it
is defined as
, i.e., the fraction of the number of vertex
pairs classified in the same cluster in both partitions to the number
of pairs classified in the same cluster in at least one partition.
n11+n10+n01
n11+n00
n11
Table 2: Real-world datasets; µ, γ0, and γ1 are computed for
ground truth partitions according to (11), (4, 5) and (7, 8)
Table 4: Log-likelihoods: datasets without ground truth
Dataset
Karate club [59]
Dolphins [32]
Football [40]
Political books [38]
Political blogs [1]
email-Eu-core [31]
Cora citation [52]
AS [9]
n
34
62
115
105
1224
986
24166
23752
m
78
159
613
441
16715
16064
89157
58416
k
2
2
11
3
2
42
70
176
µ
0.128
0.038
0.325
0.159
0.094
0.664
0.458
0.561
γ1
0.78
0.54
2.39
0.86
0.72
2.74
5.46
1.15
γ0
0.78
0.55
2.57
0.89
0.72
2.80
6.21
1.40
Table 3: Log-likelihoods: datasets with ground truth
Dataset
Karate
Dolphins
Football
Political books
Political blogs
Eu-core
Cora
AS
log LP P M log LDC P P M log LI LF R
-206.12
-168.63
-483.50
-428.64
-1428.4
-1384.1
-1243.3
-1363.8
-73912
-50750
-65559
-48483
-678306
-584730
-542952
-329784
-168.65
-439.52
-1426.7
-1235.0
-50756
-48783
-593358
-351537
6.2 Datasets
Synthetic networks. We use the LFR model described in Sec-
6.2.1
tion 2.3 to generate synthetic networks. The parameters of the
generated graphs are the following: the number of vertices n = 104;
the parameter of the power-law degree distribution γ = 2.5; the
average degree ¯d = 30; the parameter of the community size distri-
bution β = 1.5, with the minimum cluster size 50 and the maximum
600; the mixing parameter µ is varied in range [0, 1].
We additionally experimented with synthetic graphs of different
edge densities obtained by varying the average degree. The results
are omitted since the only difference observed is that the qualities
of all algorithms are usually larger for denser graphs. Finally, note
that there are other benchmark models proposed in the literature.
However, community detection in synthetic networks is not the
main focus in this paper, therefore we do not consider such models.
6.2.2 Real-world networks. We collected several networks with dif-
ferent structural properties (see Table 2). In addition to widely used
networks, such as Zachary's karate club, dolphin social network,
and American college football, we also used annotated books about
politics5 and political blogs [1]. The dataset email-Eu-core is ob-
tained from SNAP,6 here the ground truth communities correspond
to the departments of a research institute. In Cora citation dataset
communities correspond to subjects of research papers, while in
AS [9] the vertices are annotated with their countries. These are all
publicly available datasets we found for non-overlapping commu-
nity detection.7
5V. Krebs, unpublished, http://www.orgnet.com/
6http://snap.stanford.edu/data/email-Eu-core.html
7It is easier to find datasets with ground truth overlapping communities, see, e.g.,
http://snap.stanford.edu/data/index.html#communities
Dataset
Karate
Dolphins
Football
Political books
Political blogs
Eu-core
Cora
AS
Ca-GrQc
Ego-Facebook
p2p-Gnutella09
Wiki-vote
Email-Enron
Soc-Epinions1
Soc-Slashdot0811
ego-Twitter
n
34
62
115
105
1224
986
24K
24K
5242
4039
8114
7115
37K
76K
77K
81K
log LP P M log LDC P P M log LI LF R
-191.182
-160.154
-417.240
-394.538
-1406.79
-1364.38
-1182.90
-1088.77
-60653.8
-49702.3
-57421.1
-45469.2
-512556
-425463
-449088
-227917
-50258.2
-42259.3
-241708
-207910
-167995
-144711
-504395
-388380
-1192893
-803161
-2825138
-2000906
-4011399
-2949833
-6979664
-5314782
-163.990
-398.718
-1407.43
-1135.57
-49912.3
-46020.9
-450154
-244745
-53393.9
-234311
-148594
-388044
-862315
-2087117
-3120963
-5781209
6.3 Comparison of Likelihoods
Since the main aim of this paper is to analyze and compare sev-
eral null models having community structure, we start with the
following research question: Which model gives the best fit for real-
world complex networks? To answer this question, we compare the
probabilities that real-world networks were generated by each of
the null models. Namely, we compared the log-likelihoods (3) for
PPM, (6) for DCPPM and (9) for ILFR.8 Note that (10) is a simplified
expression for (9), so we consider it only as a quality function but
not as log-likelihood.
In the first experiment, we took the datasets described in Sec-
tion 6.2.2 and assumed that the partitions are defined by the ground
truth cluster assignments provided for these datasets. Then, we
computed the optimal parameters pin, pout or µ and used them to
compute the corresponding log-likelihood (see Table 3). One can see
that PPM is the best model describing the Football dataset, DCPPM
is the best for Pol-books, while for all other datasets ILFR has the
largest likelihood. Note that ILFR has only one parameter to be
tuned while DCPPM has two. Therefore, we initially expected that
for many datasets DCPPM may have a larger likelihood. In this case,
to decide which model better describes the data, we would have to
adapt some information criterion (e.g., the Bayesian information
criterion) to our problem, which is a nontrivial task for the models
under consideration. Surprisingly, for most of the datasets ILFR has
a larger likelihood, which clearly indicates that this model is more
suitable for describing real-world networks.9
However, even though for each dataset under consideration we
have a ground truth partition (a.k.a. attributes or metadata), this
partition can be not an ideal division of vertices into communities
and also can be not the only ground truth partition possible. For
example, many complex networks have hierarchical community
8We intentionally do not consider synthetic networks in this experiment: likelihoods
are expected to be heavily affected by the particular synthetic model used. For example,
LFR benchmark could give a preference to ILFR null model.
9Note that using these results we cannot compare ILFR and DCPPM with PPM since
ILFR and DCPPM are based on the observed degree sequences, while PPM only uses
the cluster assignments.
structure: e.g., for Cora dataset we can use original attributes (/Ar-
tificial_Intelligence/Machine_Learning/Probabilistic_Methods/), or
second-level ones (/Artificial_Intelligence/Machine_Learning/), or
just first-level (Artificial_Intelligence).10 We further discuss this
problem in Section 6.4.2.
Fortunately, likelihoods can be compared even for datasets with-
out any knowledge about community structure, which allows to
compare null models on a much larger variety of datasets. In or-
der to measure the likelihood for any graph, we first have to find
a partition that maximizes this value (among all possible parti-
tions), which is feasible only for very small datasets. However, the
optimal partition (and the corresponding likelihood) can be ap-
proximately found by applying the corresponding maximization
algorithm: PPM-max, DCPPM-max or ILFR-max. We performed
such comparison on the datasets introduced in Section 6.2.2 as
well as on 8 new datasets of various nature downloaded from
http://snap.stanford.edu/data/index.html (see Table 4). According
to this experiment, for almost all datasets the largest likelihood is
again obtained for ILFR model, despite it has fewer free parameters,
which means that this model is the best one for describing real-
world datasets, which is the main empirical result supporting the
introduction of ILFR and the corresponding log-likelihood quality
function.
Let us note that the log-likelihoods presented in Table 4 can be
underestimated, since we cannot guarantee that our optimization
algorithms find exactly the maximum likelihood partition. However,
we believe that this does not introduce any bias into this experiment
(i.e., does not change the conclusions) since the same optimization
procedure is applied for all models. Also, note that in all cases the
log-likelihoods in Table 3 are smaller than the corresponding ones
in Table 4, which means that our optimization algorithms found
partitions providing better likelihoods for the corresponding models
than the ground truth ones, which is expected (since partitions were
tuned).
6.4 Community Detection Algorithms
In this section, we compare all algorithms proposed in Section 5.2.
Note that we intentionally use only methods based on the like-
lihood optimization since this paper focuses on the analysis and
comparison of null models.
Synthetic networks. First, we compared all algorithms on syn-
6.4.1
thetic networks described in Section 6.2.1. For each µ we generated
5 random samples of LFR and averaged the results. Figure 1 shows
the results obtained for all similarity measures under consideration
(Rand, Jaccard and NMI). Note that in most cases these similarity
measures are consistent, i.e., for a given mixing parameter they rank
the algorithms similarly. However, Jaccard index is less descriptive
for large mixing parameters.
Based on the obtained results, several important observations
can be made. For all values of µ, the best (or very close to the best)
quality is obtained by ILFRS-max and ILFR-max strategies. For
both ILFR and ILFRS it turns out that maximizing the likelihood is
better than iteratively estimating the parameters, which supports
10By measuring the likelihood for all such partitions of Cora, we notices that original
attributes provide the highest likelihood for all null models, therefore we further
analyze only this partition.
Figure 1: Comparison on synthetic networks
our intuition that better partitions are expected to have higher
likelihoods. For small values of µ the worst results are obtained by
PPM (both strategies), while for large values Louvain algorithm is
the worst.
We also measured statistical significance of the obtained im-
provements: for each µ, we applied the algorithms to 5 random
samples of LFR and used the paired t-test. For instance, it turns
out that according to NMI ILFRS-max never looses significantly
and it is significantly better (p-value < 0.05) than: DCPPM-max for
µ ∈ {0.7, 0.9, 1}; DCPPM-iterate for µ ∈ {0.7, 0.8}; PPM-max and
PPM-iterate for all µ ∈ [0.2, 1]; ILFR-iterate and ILFRS-iterate for
0.82 0.84 0.86 0.88 0.9 0.92 0.94 0.96 0.98 1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1Rand indexmixing parameterLouvainPPM-maxPPM-iterateDCPPM-maxDCPPM-iterateILFRS-maxILFRS-iterateILFR-maxILFR-iterate 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1Jaccard indexmixing parameterLouvainPPM-maxPPM-iterateDCPPM-maxDCPPM-iterateILFRS-maxILFRS-iterateILFR-maxILFR-iterate 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1NMImixing parameterLouvainPPM-maxPPM-iterateDCPPM-maxDCPPM-iterateILFRS-maxILFRS-iterateILFR-maxILFR-iterateTable 5: Maximization strategies (Rand index / Jaccard index / NMI)
Louvain
PPM
DCPPM
ILFR
ILFRS
0.732 / 0.470 / 0.586
0.634 / 0.351 / 0.499
0.970 / 0.720 / 0.922
0.831 / 0.616 / 0.545
0.886 / 0.788 / 0.641
0.869 / 0.218 / 0.584
0.943 / 0.127 / 0.460
0.821 / 0.198 / 0.489
0.707 / 0.397 / 0.585
0.529 / 0.153 / 0.386
0.993 / 0.916 / 0.972
0.722 / 0.331 / 0.449
0.574 / 0.153 / 0.234
0.942 / 0.207 / 0.661
0.978 / 0.044 / 0.547
0.826 / 0.009 / 0.422
0.766 / 0.523 / 0.667
0.600 / 0.286 / 0.483
0.993 / 0.916 / 0.972
0.817 / 0.583 / 0.536
0.904 / 0.823 / 0.705
0.964 / 0.434 / 0.740
0.978 / 0.050 / 0.533
0.826 / 0.026 / 0.461
0.774 / 0.535 / 0.687
0.594 / 0.274 / 0.472
0.993 / 0.916 / 0.972
0.719 / 0.347 / 0.437
0.860 / 0.738 / 0.570
0.953 / 0.371 / 0.727
0.978 / 0.063 / 0.551
0.826 / 0.018 / 0.438
0.774 / 0.535 / 0.687
0.584 / 0.256 / 0.454
0.993 / 0.916 / 0.972
0.772 / 0.477 / 0.490
0.879 / 0.778 / 0.625
0.960 / 0.410 / 0.739
0.978 / 0.060 / 0.551
0.826 / 0.018 / 0.438
Table 6: Iterative strategies (Rand index / Jaccard index / NMI)
Louvain
PPM
DCPPM
ILFR
ILFRS
0.732 / 0.470 / 0.586
0.634 / 0.351 / 0.499
0.970 / 0.720 / 0.922
0.831 / 0.616 / 0.545
0.886 / 0.788 / 0.641
0.869 / 0.218 / 0.584
0.943 / 0.127 / 0.460
0.821 / 0.198 / 0.489
0.743 / 0.480 / 0.612
0.548 / 0.190 / 0.403
0.993 / 0.916 / 0.972
0.740 / 0.377 / 0.464
0.582 / 0.171 / 0.240
0.939 / 0.205 / 0.656
0.978 / 0.049 / 0.547
0.826 / 0.011 / 0.426
0.750 / 0.502 / 0.612
0.600 / 0.286 / 0.481
0.993 / 0.916 / 0.972
0.843 / 0.651 / 0.554
0.902 / 0.820 / 0.694
0.965 / 0.439 / 0.742
0.978 / 0.052 / 0.534
0.826 / 0.025 / 0.460
0.766 / 0.523 / 0.667
0.576 / 0.238 / 0.449
0.993 / 0.916 / 0.972
0.760 / 0.445 / 0.481
0.862 / 0.743 / 0.576
0.948 / 0.351 / 0.713
0.978 / 0.058 / 0.549
0.826 / 0.017 / 0.436
0.760 / 0.519 / 0.633
0.575 / 0.238 / 0.448
0.993 / 0.916 / 0.972
0.770 / 0.475 / 0.489
0.877 / 0.773 / 0.618
0.955 / 0.387 / 0.725
0.978 / 0.061 / 0.550
0.826 / 0.017 / 0.435
Dataset
Karate
Dolphins
Football
Pol-books
Pol-blogs
Eu-core
Cora
AS
Dataset
Karate
Dolphins
Football
Pol-books
Pol-blogs
Eu-core
Cora
AS
Table 7: Quality functions: ground truth vs optimization
log LP P M
PPM-max
log LDCP P M
DCPPM-max
log LI LF RS
ILFRS-max
log LI LF R
ILFR-max
Dataset
Karate
Dolphins
Football
Pol-books
Pol-blogs
Eu-core
Cora
AS
Modularity
GT
0.3715
0.3735
0.5877
0.4149
0.4053
0.3138
0.5165
0.1708
Louvain
0.4188
0.5233
0.6043
0.5205
0.4267
0.4211
0.7875
0.6307
GT
-206
-483
-1384
-1364
-73913
-65559
-678306
-542952
GT
-169
-439
-1427
-1235
-50756
-48783
-593358
-351537
-191
-417
-1364
-1183
-60654
-57421
-512556
-449088
-164
-399
-1407
-1136
-49912
-46021
-450154
-244745
GT
-176
-434
-1447
-1285
-51843
-49073
-585837
-338397
-168
-405
-1425
-1125
-50614
-46202
-425657
-227192
GT
-169
-429
-1428
-1243
-50750
-48483
-584730
-329784
-160
-395
-1407
-1089
-49702
-45469
-425463
-227917
µ = 0.7; and Louvain for µ ∈ [0.4, 1]. These results additionally sup-
port the choice of the quality function LI LF RS (12) for community
detection instead of the standard modularity function.
6.4.2 Real-world complex networks. It is argued in several papers
that ground truth community labels (a.k.a. metadata) available for
some real-world networks should not be used to analyze and com-
pare community detection algorithms [43]. Indeed, such labels are
usually obtained using some discrete-valued vertex attributes which
are not guaranteed to be reasonable community assignments. For
example, users in a social network can be split by gender, city, or
interests, and each of these partitions could be treated as ground
truth cluster assignments. An algorithm performing better for "city"
labels can be worse for "interests" ones. As a result, no meaningful
conclusion can be made based on such comparison. However, for
the sake of completeness, we compare all algorithms on real-world
networks, since it is still a standard practice in community detection
literature.
Tables 5 and 6 present the results for the iterative and maxi-
mization strategies, respectively (in both cases we add Louvain for
comparison).11 Note that we cannot properly measure statistical
significance since we cannot sample several copies for each dataset.
However, we can account for the randomness included in the al-
gorithms: they all order vertices at each iteration randomly. To do
this, for each dataset we run all algorithms 5 times and then apply
the unpaired t-test to compare them. We put numbers in bold in
Tables 5 or 6 if there is a group of algorithms without significant
differences (p-value > 0.05) inside the group and with significant
differences with the rest of the algorithms.
11Recall that Louvain optimizes modularity, so it is similar to DCPPM but with fixed
values of pin and pout .
The results in general are not consistent: although DCPPM is
often the best, the winning model may depend on a graph under
consideration and on a target metric. For example, Louvain wins on
Cora and AS according to Jaccard index, but it is the worst on the
same datasets according to Rand index. This supports the claim that
ground truth community assignments can be noisy or irrelevant.
We also noticed that iterative and maximization strategies usu-
ally have similar performance and the choice between them is not
straightforward. For example, for ILFRS it is often better to ap-
ply maximization strategy, while for PPM iterative one should be
preferred. Based on this observation, we propose using the itera-
tive strategy, which is faster (it converges after a small number of
iteration, as discussed below).
The performance of ILFRS is in general slightly better than of
ILFR. Taking into account our results on synthetic networks, we
propose using the faster ILFRS instead of ILFR in all practical appli-
cations.
Finally, we analyzed the speed of convergence for iterative strate-
gies on real-world datasets. Namely, we measured the number of
iterations made by Algorithm 1 before some stopping criteria is
reached. Note that the algorithm never stopped because of reaching
the maximum allowed number of iterations N = 50, so we either
observed a convergence or applied the cycling criteria (i.e., encoun-
tered an already seed parameter). The average number of iterations
obtained for PPM is 12.6 (in all cases the algorithm converged). For
DCPPM we got 6.2 (converged in all cases except AS, where we
applied cycling stopping criteria after 18 iterations). For ILFRS we
have 5.4 iterations (cycling criteria is applied to 3 datasets). For
ILFR we got 4.4 (again, with 3 applications of cycling criteria).
6.5 Statistical Inference, Negative Result
Having noticed unstable results for real-world datasets, we tried to
answer the following research question: Is any of the null models
suitable for community detection in real-world graphs?
In order to answer this question, for each quality function we
compare its value for the ground truth partition with its value for
the partition obtained by the corresponding maximization algo-
rithm (see Table 7). For all quality functions, including the widely
used modularity, and for all datasets the ground truth partition
has a lower value of the quality function. This means that further
optimization of any quality function would not lead us towards
the ground truth partition, which is a negative observation. In par-
ticular, there is no hope in improving the results obtained by our
algorithms by replacing Louvain-based FindPartition with some
more effective maximization algorithm.
Note that in the literature it is often assumed that a partition
with larger modularity is better and, as a result, an algorithm which
leads to a partition with larger modularity is better. However, our
observation above demonstrates that on the considered real-world
datasets it is not the case. We also performed additional experiments
and noticed that in almost all cases the value of a quality function for
the ground truth partition is lower than for the partition obtained
by any discussed optimization algorithm (not necessary optimizing
the same quality function), which is an even stronger negative
observation.
The following conclusion can be made: either the ground truth
metadata contained in the considered real-world networks is not a
good descriptor for a community structure or statistical inference
algorithms based on all null models discussed in this paper are
unable to detect real-world communities.
7 CONCLUSION
In this paper, we focused on the comparison of null models which
can be used by likelihood optimization algorithms for community
detection. We compared two well-known models, PPM and DCPPM,
and a new model, ILFR, which has only one parameter and is proved
to preserve the desired expected degree sequence. For the new
model we have written the log-likelihood, both in parametric and
self-contained forms. To maximize the parametric log-likelihood
functions, we proposed and compared two optimization strategies:
maximization and iterative.
The most important conclusion is that the proposed model, ILFR,
is the best one for describing most of the considered real-world
complex networks according to the likelihood of the observed graph
structures, despite the fact that it has only one free parameter. We
argue that the likelihood can be considered as the main argument
in evaluating the null models instead of the direct comparison of
community detection algorithms. The reason is that one cannot fully
rely on ground truth cluster labels available for real-world networks.
Also, we demonstrated that ILFR-based algorithms have the best
performance on synthetic networks. Based on the obtained results,
we believe that the proposed ILFR-based quality function (12) can
be successfully used as a target for optimization algorithms, instead
of the widely adopted modularity.
A natural direction for the future research is to analyze null
models for overlapping community detection. This would be use-
ful since many observed networks have overlapping communities.
However, fundamental analysis of this problem is complicated by
the fact that null models with overlapping communities are less
developed and more complex for mathematical analysis.
ACKNOWLEDGMENTS
This study was funded by RFBR according to the research project
18-31-00207.
REFERENCES
[1] Lada A Adamic and Natalie Glance. 2005. The political blogosphere and the 2004
US election: divided they blog. In Proceedings of the 3rd international workshop
on Link discovery. ACM, 36 -- 43.
[2] Gaurav Agarwal and David Kempe. 2008. Modularity-maximizing graph com-
munities via mathematical programming. The European Physical Journal B 66, 3
(2008), 409 -- 418.
[3] Christopher Aicher, Abigail Z Jacobs, and Aaron Clauset. 2014. Learning latent
block structure in weighted networks. Journal of Complex Networks 3, 2 (2014),
221 -- 248.
[4] James P Bagrow. 2008. Evaluating local community methods in networks. Journal
[5] James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter
of Statistical Mechanics: Theory and Experiment 2008, 05 (2008), P05001.
optimization. Journal of Machine Learning Research 13, Feb (2012), 281 -- 305.
[6] James S Bergstra, Rémi Bardenet, Yoshua Bengio, and Balázs Kégl. 2011. Al-
gorithms for hyper-parameter optimization. In Advances in neural information
processing systems. 2546 -- 2554.
[7] Peter J Bickel and Aiyou Chen. 2009. A nonparametric view of network mod-
els and Newman -- Girvan and other modularities. Proceedings of the National
Academy of Sciences 106, 50 (2009), 21068 -- 21073.
[8] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb-
vre. 2008. Fast unfolding of communities in large networks. Journal of statistical
[9] Marián Boguná, Fragkiskos Papadopoulos, and Dmitri Krioukov. 2010. Sustaining
[18] Jordi Duch and Alex Arenas. 2005. Community detection in complex networks
mechanics: theory and experiment 2008, 10 (2008), P10008.
the internet with hyperbolic mapping. Nature communications 1 (2010), 62.
[10] Tanmoy Chakraborty, Ayushi Dalmia, Animesh Mukherjee, and Niloy Ganguly.
2017. Metrics for community analysis: A survey. ACM Computing Surveys (CSUR)
50, 4 (2017), 54.
[11] Yi Chen, XL Wang, Xin Xiang, BZ Tang, and JZ Bu. 2015. Network structure
exploration via Bayesian nonparametric models. Journal of Statistical Mechanics:
Theory and Experiment 2015, 10 (2015), P10004.
[12] Fan Chung and Linyuan Lu. 2002. Connected components in random graphs with
given expected degree sequences. Annals of combinatorics 6, 2 (2002), 125 -- 145.
[13] Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding commu-
nity structure in very large networks. Physical review E 70, 6 (2004), 066111.
[14] Anne Condon and Richard M Karp. 2001. Algorithms for graph partitioning
on the planted partition model. Random Structures and Algorithms 18, 2 (2001),
116 -- 140.
[15] Jernej Copic, Matthew O Jackson, and Alan Kirman. 2009. Identifying community
structures from network data via maximum likelihood methods. The BE Journal
of Theoretical Economics 9, 1 (2009).
[16] Michele Coscia, Fosca Giannotti, and Dino Pedreschi. 2011. A classification for
community discovery methods in complex networks. Statistical Analysis and
Data Mining: The ASA Data Science Journal 4, 5 (2011), 512 -- 546.
[17] J-J Daudin, Franck Picard, and Stéphane Robin. 2008. A mixture model for random
graphs. Statistics and computing 18, 2 (2008), 173 -- 183.
using extremal optimization. Physical review E 72, 2 (2005), 027104.
(2010), 75 -- 174.
[19] Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3
[20] Santo Fortunato and Marc Barthélemy. 2007. Resolution limit in community
detection. Proceedings of the National Academy of Sciences 104, 1 (2007), 36 -- 41.
[21] Santo Fortunato and Darko Hric. 2016. Community detection in networks: A
user guide. Physics Reports 659 (2016), 1 -- 44.
[22] D. Golovin, B. Solnik, S. Moitra, G. Kochanski, J. Karro, and D. Sculley. 2017.
Google vizier: A service for black-box optimization. In International Conference
on Knowledge Discovery and Data Mining. ACM, 1487 -- 1495.
[23] Roger Guimera and Luis A Nunes Amaral. 2005. Functional cartography of
complex metabolic networks. nature 433(7028), 7028 (2005), 895 -- 900.
Physical Review E 74, 3 (2006), 035102.
modularity. Physical review letters 100, 25 (2008), 258701.
chastic blockmodels: First steps. Social networks 5, 2 (1983), 109 -- 137.
[27] Frank Hutter, Holger H Hoos, and Kevin Leyton-Brown. 2011. Sequential model-
based optimization for general algorithm configuration. In International Confer-
ence on Learning and Intelligent Optimization. Springer, 507 -- 523.
[28] Brian Karrer and Mark EJ Newman. 2011. Stochastic blockmodels and community
structure in networks. Physical Review E 83, 1 (2011), 016107.
[29] Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark
graphs for testing community detection algorithms. Physical review E 78, 4 (2008),
046110.
[30] Sune Lehmann and Lars Kai Hansen. 2007. Deterministic modularity optimization.
The European Physical Journal B-Condensed Matter and Complex Systems 60, 1
(2007), 83 -- 88.
[31] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2007. Graph evolution:
Densification and shrinking diameters. ACM Transactions on Knowledge Discovery
from Data (TKDD) 1, 1 (2007), 2.
[32] David Lusseau, Karsten Schneider, Oliver J Boisseau, Patti Haase, Elisabeth
Slooten, and Steve M Dawson. 2003. The bottlenose dolphin community of
Doubtful Sound features a large proportion of long-lasting associations. Behav-
ioral Ecology and Sociobiology 54, 4 (2003), 396 -- 405.
[33] Fragkiskos D Malliaros and Michalis Vazirgiannis. 2013. Clustering and com-
munity detection in directed networks: A survey. Physics Reports 533, 4 (2013),
95 -- 142.
[34] Aaron McDaid and Neil Hurley. 2010. Detecting highly overlapping communities
with model-based overlapping seed expansion. In Advances in Social Networks
[26] Paul W Holland, Kathryn Blackmond Laskey, and Samuel Leinhardt. 1983. Sto-
[24] Matthew B Hastings. 2006. Community detection as an inference problem.
[25] Jake M Hofman and Chris H Wiggins. 2008. Bayesian approach to network
[38] Mark EJ Newman. 2006. Modularity and community structure in networks.
Analysis and Mining (ASONAM), 2010 International Conference on. IEEE, 112 -- 119.
[35] Michael Molloy and Bruce Reed. 1995. A critical point for random graphs with a
given degree sequence. Random structures & algorithms 6, 2-3 (1995), 161 -- 180.
[36] MEJ Newman. 2016. Community detection in networks: Modularity optimization
and maximum likelihood are equivalent. arXiv preprint arXiv:1606.02319 (2016).
[37] Mark EJ Newman. 2006. Finding community structure in networks using the
eigenvectors of matrices. Physical review E 74, 3 (2006), 036104.
Proceedings of the national academy of sciences 103, 23 (2006), 8577 -- 8582.
networks. Nature communications 7 (2016).
structure in networks. Physical review E 69, 2 (2004), 026113.
[41] Mark EJ Newman and Elizabeth A Leicht. 2007. Mixture models and exploratory
analysis in networks. Proceedings of the National Academy of Sciences 104, 23
(2007), 9564 -- 9569.
[42] Krzysztof Nowicki and Tom A B Snijders. 2001. Estimation and prediction for
[40] Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating community
[39] Mark EJ Newman and Aaron Clauset. 2016. Structure and inference in annotated
small groups. Journal of anthropological research 33, 4 (1977), 452 -- 473.
[60] Hugo Zanghi, Christophe Ambroise, and Vincent Miele. 2008. Fast online graph
clustering via Erdős -- Rényi mixture. Pattern recognition 41, 12 (2008), 3592 -- 3599.
stochastic blockstructures. J. Amer. Statist. Assoc. 96, 455 (2001), 1077 -- 1087.
[43] Leto Peel, Daniel B Larremore, and Aaron Clauset. 2017. The ground truth about
metadata and community detection in networks. Science advances 3, 5 (2017),
e1602548.
[44] Tiago P Peixoto. 2015. Inferring the mesoscale structure of layered, edge-valued,
[51] Myra Spiliopoulou. 2011. Evolution in social networks: A survey.
[45] José J Ramasco and Muhittin Mungan. 2008. Inversion method for content-based
[47] Jörg Reichardt and Stefan Bornholdt. 2006. Statistical mechanics of community
[46] William M Rand. 1971. Objective criteria for the evaluation of clustering methods.
and time-varying networks. Physical Review E 92, 4 (2015), 042807.
networks. Physical Review E 77, 3 (2008), 036122.
Journal of the American Statistical association 66, 336 (1971), 846 -- 850.
detection. Physical Review E 74, 1 (2006), 016110.
[48] Martin Rosvall and Carl T Bergstrom. 2008. Maps of random walks on complex
networks reveal community structure. Proceedings of the National Academy of
Sciences 105, 4 (2008), 1118 -- 1123.
[49] Philipp Schuetz and Amedeo Caflisch. 2008. Efficient modularity optimization
by multistep greedy algorithm and vertex mover refinement. Physical Review E
77, 4 (2008), 046112.
[50] Jasper Snoek, Oren Rippel, Kevin Swersky, Ryan Kiros, Nadathur Satish,
Narayanan Sundaram, Mostofa Patwary, Mr Prabhat, and Ryan Adams. 2015.
Scalable bayesian optimization using deep neural networks. In International
Conference on Machine Learning. 2171 -- 2180.
In Social
network data analytics. Springer, 149 -- 175.
[52] Lovro Šubelj and Marko Bajec. 2013. Model of complex networks based on
citation dynamics. In Proceedings of the 22nd international conference on World
Wide Web. ACM, 527 -- 530.
[53] Yudong Sun, Bogdan Danila, K Josić, and Kevin E Bassler. 2009. Improved commu-
nity structure detection using a modified fine-tuning strategy. EPL (Europhysics
Letters) 86, 2 (2009), 28004.
[54] Mursel Tasgin, Amac Herdagdelen, and Haluk Bingol. 2007. Community detection
in complex networks using genetic algorithms. arXiv preprint arXiv:0711.0491
(2007).
[55] Ulrike Von Luxburg. 2007. A tutorial on spectral clustering. Statistics and
computing 17, 4 (2007), 395 -- 416.
[56] Ken Wakita and Toshiyuki Tsurumi. 2007. Finding community structure in mega-
scale social networks. In Proceedings of the 16th international conference on World
Wide Web. ACM, 1275 -- 1276.
[57] Jaewon Yang and Jure Leskovec. 2014. Structure and overlaps of ground-truth
communities in networks. ACM Transactions on Intelligent Systems and Technology
(TIST) 5, 2 (2014), 26.
[58] Jaewon Yang and Jure Leskovec. 2015. Defining and evaluating network commu-
nities based on ground-truth. Knowledge and Information Systems 42, 1 (2015),
181 -- 213.
[59] Wayne W Zachary. 1977. An information flow model for conflict and fission in
|
1808.02784 | 1 | 1808 | 2018-08-08T14:00:16 | Schools are segregated by educational outcomes in the digital space | [
"cs.SI"
] | The Internet provides students with a unique opportunity to connect and maintain social ties with peers from other schools, irrespective of how far they are from each other. However, little is known about the real structure of such online relationships. In this paper, we investigate the structure of interschool friendship on a popular social networking site. We use data from 36,951 students from 590 schools of a large European city. We find that the probability of a friendship tie between students from neighboring schools is high and that it decreases with the distance between schools following the power law. We also find that students are more likely to be connected if the educational outcomes of their schools are similar. We show that this fact is not a consequence of residential segregation. While high- and low-performing schools are evenly distributed across the city, this is not the case for the digital space, where schools turn out to be segregated by educational outcomes. There is no significant correlation between the educational outcomes of a school and its geographical neighbors; however, there is a strong correlation between the educational outcomes of a school and its digital neighbors. These results challenge the common assumption that the Internet is a borderless space, and may have important implications for the understanding of educational inequality in the digital age. | cs.SI | cs | Schools are segregated by educational outcomes in the digital space
Ivan Smirnov1∗
1 Institute of Education; National Research University Higher
School of Economics, Myasnitskaya ul., 20, Moscow 101000, Russia
The Internet provides students with a unique opportunity to connect and maintain social ties
with peers from other schools, irrespective of how far they are from each other. However, little
is known about the real structure of such online relationships. In this paper, we investigate the
structure of interschool friendship on a popular social networking site. We use data from 36, 951
students from 590 schools of a large European city. We find that the probability of a friendship tie
between students from neighboring schools is high and that it decreases with the distance between
schools following the power law. We also find that students are more likely to be connected if the
educational outcomes of their schools are similar. We show that this fact is not a consequence of
residential segregation. While high- and low-performing schools are evenly distributed across the
city, this is not the case for the digital space, where schools turn out to be segregated by educational
outcomes. There is no significant correlation between the educational outcomes of a school and its
geographical neighbors; however, there is a strong correlation between the educational outcomes of
a school and its digital neighbors. These results challenge the common assumption that the Internet
is a borderless space, and may have important implications for the understanding of educational
inequality in the digital age.
Keywords: schools, social networks, educational outcomes, digital inequality
Even Pope said so [1]. The Internet creates unique op-
portunities for people to connect with each other.
It
may, therefore, be significantly beneficial for its users
because social ties are known to play a significant role
in human well-being including life-satisfaction [2], health
[3, 4], and professional development [5, 6]. There is grow-
ing evidence that these findings apply not only to offline
social ties but to online friendship as well [7, 8]. This
role of the internet may be particularly important for
underprivileged groups of people such as students from
low-performing schools who lack resources in their im-
mediate environment. Connections with students from
high-performing schools might potentially influence their
university aspirations [9], improve educational outcomes
[10], and promote positive behavioral change [11].
People from underprivileged backgrounds tend not to
benefit as much as their peers from the Internet (a phe-
nomenon usually referred to as digital inequality [12]).
While well-educated people often use the Internet for
medical or juridical advice, job seeking or education,
their less educated peers use it predominantly for enter-
tainment [13 -- 15]. The use of social media by students is
known to be differentiated in a similar way depending on
their academic performance. High-performing students
use it for information seeking while low-performing stu-
dents for chatting and entertainment [16, 17].
It may
be expected that online social ties would also depend on
academic achievements and that students might be seg-
regated by the educational outcomes in the digital space.
At a general level, segregation is the degree to which
several groups of people are separated from each other
[18]. In this paper, we investigate whether students from
∗[email protected]
high- and low-performing schools are separated (i.e. not
connected via online friendship) in the digital space.
Figure 1: The school network. Circles represent schools.
Different colors correspond to administrative districts of Saint
Petersburg. Two schools are connected if there is a friendship
tie between their students. For visual clarity, only strong
connections (at least three friendship ties) are shown.
8
1
0
2
g
u
A
8
]
I
S
.
s
c
[
1
v
4
8
7
2
0
.
8
0
8
1
:
v
i
X
r
a
We use data from 36, 951 15-year-old students from 590
schools of Saint Petersburg, Russia, registered on a pop-
ular social networking site VK1 (see Methods for details
about the sample). VK is the Russian analog of Face-
book and the largest European social networking site. It
is ubiquitous among young Russians: more than 90% of
18-24-year-olds use it regularly [19]. The information in
users' public profiles includes their age and the schools
they are studying in. This information is available via
the open application programming interface (API) of VK.
We use the VK API to download information about all
students who indicate that they study in one of Saint Pe-
tersburg's schools and who were born in 2001 (i.e. that
students were 15 years old at the time of data collection).
Similar to other social networking sites, users might be-
come "friends" on VK if they mutually confirm this sta-
tus. We use information about such online friendships to
construct a weighted network of schools (Fig. 1), where
two schools are connected if there is at least one friend-
ship tie between their students (see Methods for details),
and the weight corresponds to the number of such ties.
For each school, the information about its geographical
coordinates along with the performance of its graduates
on the unified state examination (USE) is available (see
Methods). The USE scores serve as a proxy for schools'
educational outcomes.
Residential segregation by income is believed to be an
important source of variation in schools' educational out-
comes in some countries [20 -- 22].
It means that low-
performing schools are concentrated in less affluent neigh-
borhoods and the educational outcomes of a school could
be effectively predicted from the socioeconomic status of
its district [23]. The situation might be different in Saint
Petersburg thanks to the egalitarian nature of the Rus-
sian educational system inherited from the Soviet period.
To account for potential effects of residential segregation,
we collect data from 11, 034 apartments from the largest
Russian real estate site CIAN2 and use average apart-
ment price as a proxy of neighborhood affluence. We then
check whether schools' educational outcomes are corre-
lated with the affluence of their neighborhood.
We measure geographical segregation of schools as a cor-
relation between the educational outcomes of a school
and those of its closest geographical neighbors. We then
compare this segregation with that in the digital space.
In this case, instead of the closest geographical neighbors,
we examine the educational outcomes of schools' closest
digital neighbors. We assume that the distance between
two schools in the digital space is inversely proportional
to the number of online friendship ties between them.
The probability of an online friendship between two peo-
ple is known to be strongly dependent on the geograph-
ical distance between them [24 -- 27]. It is, therefore, im-
1 http://vk.com
2 http://cian.ru
2
Figure 2: Probability of a friendship tie between
two schools as a function of distance between these
schools. For close schools, the probability is 0.75 and it then
declines with distance following the power law (inset).
portant to ensure that any observed effect for the digital
network of schools is not solely driven by the geographi-
cal constraints. To achieve this, we use a random graph
model that preserves geographical constraints -- namely,
the probability of a friendship tie between two schools
given the geographical distance between them. We then
compare the results obtained for such random networks
with the observed results for the real network.
Results
Distance and online relationships
We find that geographical distance plays an important
role in the formation of an interschool friendship. The
probability of a friendship tie between two close schools
is high (0.75) but it declines rapidly with distance
following the power law (Fig. 2). The best fit is provided
by the exponent −0.62 (Fig. 2 inset), which is similar to
the previously observed results [27].
Geographical segregation
We find that the educational outcomes of schools do not
depend on their distance from the city center (Pearson
correlation coefficient between USE scores of schools and
their distance from the center is 0.018, P = 0.65). The
distance from the center may be, however, a poor proxy
for neighborhood affluence. Hence, we additionally col-
lect information about average apartment prices across
the city (see Fig. S1 for the corresponding heat map).
010203040Distance between schools (d), km0.00.20.40.60.8Probability of frienship tie1251020400.10.20.40.6d0.623
Figure 3: Correlation between educational outcomes of schools and their 20 closest geographical (a) and digital
neighbors (b). While there is no correlation for physical neighbors, there is a relatively strong correlation for digital neighbors.
These results hold true regardless of the number of neighbors used in the analysis.
We then compute the correlation between schools' USE
scores and neighborhood affluence, Sn(R) (see Methods).
The exact value depends on R (see Fig. S2), and the max-
imum value is Sn = 0.12 (P = 0.007), indicating a weak
correlation between educational outcomes and neighbor-
hood affluence. Finally, we compute a correlation be-
tween USE scores of schools and average USE score of
their N closest geographical neighbors, Sg(N ) (see Meth-
ods). We find no correlation Sg(N ) = 0.01 (P = 0.73)
for N = 20 (Fig. 3a); this result holds true for all values
of N (Fig. S3).
We therefore find that there is only a weak if any
relationship between educational outcomes of a school
and its location in physical space. However, as we show
in the next section, this result does not apply for the
school location in the digital space.
Digital segregation
We find that there is a relatively strong correlation be-
tween the educational outcomes of schools and their N
closest digital neighbors (see Methods). Sd(N ) = 0.47
(P < 10−33) for N = 20 (Fig 3b). The correlation is
significant for all N (Fig. S3).
To rule out the role of geographical constraints in the
observed digital segregation, we use a random graph
model that preserves relationships between distance and
probability of a friendship tie from the observed net-
work (i.e. we create a tie between two schools with
a probability from distribution represented in Figure 2
that depends on distance between schools). We com-
pute Srand
(1) for generated random networks and com-
pare it with Sd(1). After 10, 000 simulations we obtain
(cid:104)Srand
(1)) = 0.04. The
(1)) = 0.14 < Sd(1). This
maximum value max(Srand
(1)(cid:105) = −0.0005 and SD(Srand
d
d
d
d
result makes the observed digital segregation significant
with P < 10−4.
We also find that high-performing schools not only tend
to be connected with each other but also have more con-
nections on average than low-performing schools. The
correlation between the degree centrality of schools in
the network and their educational outcomes is 0.49. Note
that this simple network property explains as much vari-
ation in the educational outcomes as the socioeconomic
status of students [28], which is one of the key context
variables used in educational studies [29].
We show, therefore, that the educational outcomes of a
school are closely related to its location in the digital
space. More central schools tend to be high performing.
We also show that schools with similar academic perfor-
mance tend to be connected in the digital space. We
demonstrate that these results cannot be explained by
schools' locations in the physical space.
Discussion
Both for research and policy-making purposes, it is cru-
cial to understand the context in which schools operate.
This requirement traditionally means collecting informa-
tion about school resources and the socioeconomic status
of its students. Today, students spend much of their time
online [30], and it may be warranted to consider students'
online environment on a par with their home environ-
ment. In this paper, we focus only on one dimension of
such an online environment, namely interschool friend-
ship on a social networking site. We find that school
position in an online friendship network could explain as
much variation in the educational outcomes of its stu-
406080Educational outcomes556065Educational outcomes(physical neigbours)r = 0.01a)406080Educational outcomes556065Educational outcomes(digital neigbours)r = 0.47b)4
this way for research purposes.
We also use data from the largest Russian real estate
site CIAN to collect information about the prices of all
2-room apartments in Saint Petersburg listed on the
site. For each apartment, its price per square meter was
calculated. CIAN team approved the use of this data for
research purposes.
Network of schools
We define a 36, 951×36, 951 adjacency matrix F that rep-
resents the friendship network of students (i.e. Fi,j = 1
if students i and j are friends on VK and Fi,j = 0 oth-
erwise). We assume that student i studies in school s(i),
and construct a weighted network of schools by counting
the number of all friendship ties between two schools.
This network is represented by 590× 590 matrix A where
(cid:88)
Ak,l =
Fi,j.
{i,js(i)=k,s(j)=l}
dents as their socioeconomic status, indicating the im-
portance of the digital context. Online inequalities might
merely reflect existing socioeconomic inequality or rather
complement it. Future research is required to clarify this
relationship.
Social media have become the main source of information
for young people.
In Russia, VK is referred to as the
main source of information about the country and the
world by 70.3% of respondents (cid:22) more than any other
information source [31]. It is also considered more trust-
worthy than traditional media [31]. The news feed of the
social network mainly comprises posts shared by online
friends. The friends from different schools may, therefore,
be an important source of diversity in the information
environment of students. In particular, the connections
with students from high-performing schools could have a
positive impact on students from low-performing schools.
However, our results suggest that interschool friendship
ties mainly exist between schools with similar educational
outcomes. Intriguingly, this digital separation cannot be
explained by the geographical location of schools. This
result means that the digital environment not only fails
to remove segregation, but rather might amplify it.
Methods
Data collection
According to the open data government portal3, there are
638 high schools in Saint Petersburg. This number ex-
cludes specific types of schools such as boarding schools,
cadet schools, and educational centers. We use open VK
API to find these schools in the VK database. We find
VK IDs for 628 of the schools. We exclude school №1
from the sample because it has an unreasonable number
of users (more than 1000 per cohort). We also exclude
two pairs of schools with identical names. We then use
data from the web portal "Schools of Saint Petersburg"4
to obtain the average performance of schools' graduates
at the Unified State Examination. This is a mandatory
state examination that all school graduates should pass
in Russia. This information was available for 590 schools
from our sample.
We then perform requests to VK API to obtain the lists
of all users who were born in 2001 and indicate that they
are studying in one of the schools from our sample. To
exclude users who provided false information about their
school, we remove profiles with no friends from the same
school, as previously recommended [32]. We also exclude
students who indicate several schools in their profiles.
Finally, we download the lists of all VK friends for users
from our sample. All collected data is publicly available.
The VK team confirmed to us that we can use its API in
One potential disadvantage of this definition is that two
schools could be considered as closely connected when
only one student from the first school has a lot of friends
from the other. We therefore also use an alternative way
to define the weight of the school tie. In this case, instead
of friendship ties, we count the number of students from
one school that have friends from another (i.e. we define
Ak,l = {is(i) = k and ∃j : Fi,j = 1, s(j) = l}).
We
symmetric matrix
Ak,l = min( Ak,l, Al,k). This alternative metric leads to
the same results, and therefore we opted for the first
more straightforward approach.
construct
a
could
then
Segregation measures
If Ui is the average performance on the Unified State
Examination of graduates from school i, we could then
define segregation based on the affluence of school neigh-
borhoods in the following way:
Sn(R) = corr(Ui,
Pj/{jd(i, j) < R}),
(cid:88)
{jd(i,j)<R}
where Pj is the price of apartment j in rubles per square
meter and d(i, j) is the distance between school i and
apartment j.
We denote geographical neighbors of school i by Ng(i).
Ng(i) = (si,1, ..., si,590) is an ordered list of all schools
such as d(i, si,k) <= d(i, si,k+1), where d is the geo-
graphical distance between schools. We then denote
the list of k-closest geographical neighbors by N k
g (i) =
(si,1, ..., si,k). We define the k-closest digital neighbors
d (i) by replacing geographical distance with the digital
N k
distance that is equal to 1/Ai,j.
We then define geographical and digital segregations by
academic performance in the following manner:
(cid:88)
3 http://data.gov.spb.ru
4 http://www.shkola-spb.ru
Sg(k) = corr(Ui,
Uj/k)
{jj∈N k
g (i)}
Sd(k) = corr(Ui,
(cid:88)
{jj∈N k
d (i)}
Uj/k)
Note that in the case of digital segregation, there could
be several schools with exactly the same distance from a
certain school. In this case, N k
d (i) is not uniquely defined.
In our computations, we randomly select with equal prob-
abilities one of the possible N k
d (i).
5
for
6
[17] Ivan Smirnov. Predicting PISA scores from students'
In International Conference on Web on
digital traces.
Social Media, pages 360 -- 364, 2018.
[18] Rebecca Allen and Anna Vignoles. What should an in-
dex of school segregation measure? Oxford Review of
Education, 33(5):643 -- 668, 2007.
[19] Public Opinion Foundation. Online practices of Russians:
http://fom.ru/SMI-i-internet/
social networks.
12495, 2016. [Accessed 01.08.2018].
[20] Carolina Andrea Flores. Residential segregation and the
geography of opportunites: a spatial analysis of hetero-
geneity and spillovers in education. PhD thesis, The Uni-
versity of Texas at Austin, 2008.
[21] Ian Gordon and Vassilis Monastriotis. Urban size, spatial
segregation and educational outcomes. London: London
School of Economics, 2003.
[22] Ann Owens. Income segregation between school districts
and inequality in students' achievement. Sociology of Ed-
ucation, 91(1):1 -- 27, 2018.
[23] Sean F Reardon, Demetra Kalogrides, and Ken Shores.
The geography of racial/ethnic test score gaps. CEPA
Working Paper No. 16-10., 2017.
[24] Yuri Takhteyev, Anatoliy Gruzd, and Barry Well-
man. Geography of twitter networks. Social networks,
34(1):73 -- 81, 2012.
[25] Won-Yong Shin, Bikash C Singh, Jaehee Cho, and
Andr´e M Everett. A new understanding of friendships
in space: Complex networks meet twitter. Journal of
Information Science, 41(6):751 -- 764, 2015.
[26] Bal´azs Lengyel, Attila Varga, Bence S´agv´ari, ´Akos
Jakobi, and J´anos Kert´esz. Geographies of an online so-
cial network. PloS one, 10(9):e0137248, 2015.
[27] Przemyslaw A Grabowicz, Jose J Ramasco, Bruno
Gon¸calves, and V´ıctor M Egu´ıluz. Entangling mobility
and interactions in social media. PloS one, 9(3):e92196,
2014.
[28] Gordey Yasterbov, Alexey Bessudnov, Marina Pinskaya,
and Sergey Kosaretsky. Contextualizing academic perfor-
mance in russian schools: School characteristics, the com-
position of student body and local deprivation. Higher
School of Economics Research Paper, 2014.
[29] Selcuk R Sirin.
Socioeconomic status and academic
achievement: A meta-analytic review of research. Re-
view of educational research, 75(3):417 -- 453, 2005.
[30] Diana Koroleva. Always online: Using mobile technol-
ogy and social media at home and at school by modern
teenagers. Educational Studies, 1:205 -- 224, 2016.
[31] Kasamara, Valeria and Sorokina, Anna. Russian stu-
http://tass.ru/obschestvo/4255020,
dents' values.
2017. [Accessed 02.08.2018].
[32] Ivan Smirnov, Elizaveta Sivak, and Yana Kozmina.
In
search of lost profiles: The reliability of vkontakte data
and its importance in educational research. Educational
Studies, 4:106 -- 122, 2016.
the
Message
day.
Francis.
communications
[1] Pope
world
vatican.va/content/francesco/en/messages/
communications/documents/papa-francesco_
20140124_messaggio-comunicazioni-sociali.html,
2014. [Accessed 02.08.2018].
48th
https://w2.
[2] Ed Diener, Eunkook M Suh, Richard E Lucas, and
Heidi L Smith. Subjective well-being: Three decades of
progress. Psychological bulletin, 125(2):276, 1999.
[3] Julianne Holt-Lunstad, Timothy B Smith, and J Bradley
Layton. Social relationships and mortality risk: a meta-
analytic review. PLoS medicine, 7(7):e1000316, 2010.
[4] Ichiro Kawachi and Lisa F Berkman. Social ties and
mental health. Journal of Urban health, 78(3):458 -- 467,
2001.
[5] Joel M Podolny and James N Baron. Resources and rela-
tionships: Social networks and mobility in the workplace.
American sociological review, 62(5):673 -- 693, 1997.
[6] Thomas WH Ng, Lillian T Eby, Kelly L Sorensen, and
Daniel C Feldman. Predictors of objective and subjective
career success: A meta-analysis. Personnel psychology,
58(2):367 -- 408, 2005.
[7] William R Hobbs, Moira Burke, Nicholas A Christakis,
and James H Fowler. Online social integration is associ-
ated with reduced mortality risk. Proceedings of the Na-
tional Academy of Sciences, 113(46):12980 -- 12984, 2016.
[8] Adriana M Manago, Tamara Taylor, and Patricia M
Greenfield. Me and my 400 friends: The anatomy of
college students' Facebook networks, their communica-
tion patterns, and well-being. Developmental psychology,
48(2):369, 2012.
[9] Jere Cohen. Peer influence on college aspirations with
initial aspirations controlled. American Sociological Re-
view, 48(5):728 -- 734, 1983.
[10] Alessandro Lomi, Tom AB Snijders, Christian EG
Steglich, and Vanina Jasmine Torl´o. Why are some more
peer than others? evidence from a longitudinal study
of social networks and individual academic performance.
Social Science Research, 40(6):1506 -- 1520, 2011.
[11] Kimberly A Maxwell. Friends: The role of peer influence
across adolescent risk behaviors. Journal of Youth and
adolescence, 31(4):267 -- 277, 2002.
[12] Paul DiMaggio, Eszter Hargittai, Coral Celeste, and
Steven Shafer. From unequal access to differentiated use:
A literature review and agenda for research on digital in-
equality. Social inequality, pages 355 -- 400, 2004.
[13] Katy E Pearce and Ronald E Rice. Somewhat sepa-
rate and unequal: digital divides, social networking sites,
and capital-enhancing activities. Social Media+ Society,
3(2):2056305117716272, 2017.
[14] Moritz Buchi, Natascha Just, and Michael Latzer. Mod-
eling the second-level digital divide: A five-country study
of social differences in internet use. New Media & Society,
18(11):2703 -- 2722, 2016.
[15] Alexander JAM Van Deursen and Jan AGM Van Dijk.
The digital divide shifts to differences in usage. New
media & society, 16(3):507 -- 526, 2014.
[16] Reynol Junco. Too much face and not enough books:
The relationship between multiple indices of Facebook
use and academic performance. Computers in human
behavior, 28(1):187 -- 198, 2012.
7
Figure S3: Digital Sd(N ) and geographical Sg(N ) segre-
gations as functions of the number of the neighbors
N used in the analysis.
Figure S1: The heat map of average apartment price
in Saint Petersburg. The price is the highest in the city
center, near Krestovsky Island, and along the Moscow avenue.
Figure S2: Segregation Sn(R) as a function of the radius
R that defines school neighborhood.
05101520Radius, km0.000.040.080.12Segregation5100200Number of neigbours0.00.20.4Segregationdigitalgeographical |
1905.02762 | 1 | 1905 | 2019-05-07T18:33:24 | Displaying Things in Common to Encourage Friendship Formation: A Large Randomized Field Experiment | [
"cs.SI"
] | Friendship formation is important to online social network sites and to society, but can suffer from informational friction. In this study, we demonstrate that social networks may effectively use an IT-facilitated intervention -- displaying things in common (TIC) between users (mutual hometown, interest, education, work, city) -- to encourage friendship formation. Displaying TIC updates an individual's belief about the shared similarity with another and reduces information friction that may be hard to overcome in offline communication. In collaboration with an online social network, we conduct a randomized field experiment that randomly varies the prominence of different things in common when a user is browsing a non-friend's profile. The dyad-level exogenous variation, orthogonal to any (un)observed structural factors in viewer-profile's network, allows us to cleanly isolate the role of preferences for TIC in driving network formation and homophily. We find that displaying TICs to viewers can significantly increase their probability of sending a friend requests and forming friendships, and is especially effective for pairs of people who have little in common. We also find that displaying TIC can improve friendship formation for a wide range of viewers with different demographics and is more effective when the TICs are more surprising to the viewer. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Displaying Things in Common to Encourage Friendship Formation:
A Large Randomized Field Experiment
Tianshu Sun · Sean J. Taylor
9
1
0
2
y
a
M
7
]
I
S
.
s
c
[
1
v
2
6
7
2
0
.
5
0
9
1
:
v
i
X
r
a
Abstract Friendship formation is of central importance to online social network sites and to society, but can
suffer from significant and unequal frictions. In this study, we demonstrate that social networks and policy
makers may use an IT-facilitated intervention -- displaying things in common (TIC) between users (mutual
hometown, interest, education, work, city) -- to encourage friendship formation, especially among people
who are different from each other. Displaying TIC may update an individual's belief about the shared similar-
ity with another and reduce information friction that may be hard to overcome in offline communication. In
collaboration with an online social network, we design and implement a randomized field experiment, which
randomly varies the prominence of different types of things in common information when a user (viewer) is
browsing a non-friend's profile. The dyad-level exogenous variation, orthogonal to any (un)observed struc-
tural factors in viewer-profile's network, allows us to cleanly isolate the role of individuals' preference for
TIC in driving network formation and homophily. We find that displaying TIC to viewers may significantly
increase their probability of sending a friend request and forming a friendship, and is especially effective
for pairs of people who have little in common. Such findings suggest that information intervention is a very
effective and zero-cost approach to encourage the formation of weak ties, and also provide the first experi-
mental evidence on the crucial role of individuals' preference (versus structural embeddedness) in network
formation. We further demonstrate that displaying TIC could improve friendship formation for a wide range
of viewers with different demographics and friendship status, and is more effective when the TIC information
is more surprising to the viewer. Our study offers actionable insights to social networks and policy makers
on the design of information intervention to encourage friendship formation and improve the diversity of the
friendship, at both an aggregate and an individual level.
Keywords Network Formation · Social Interactions · Field Experiment · Things in Common · Homophily ·
Information Theory · Diversity
Tianshu Sun
Marshall School of Business, University of Southern California
E-mail: [email protected]
Sean Taylor
Facebook
E-mail: [email protected]
2
1. Introduction and Motivation
Tianshu Sun, Sean J. Taylor
Friendship formation is of central importance to online social network sites (SN) and to society. For social
networks such as Facebook, Instagram, and Linkedin, encouraging friendship formation among users is vi-
tally important: first, articulated friendships provide infrastructure for the spread of information (Granovetter
1977, Yoganarasimhan 2012, Peng et al. 2018), influence (Aral and Walker 2011, Bapna and Umyarov 2015,
Ugander et al. 2012, Eckles et al. 2016), and support (Burke and Kraut 2016) on the network. In addition,
user engagement and retention on SN sites exhibits a strong local network effect (Sundararajan 2007, Hart-
mann 2010, Tucker 2008) and friendship formation is primarily what enables this effect: with more friends,
a user may use the SN more frequently, share more and create more content (Shriver et al. 2013, Goes et al.
2014, Toubia and Stephen 2013). Recognizing the significant benefits users gain from having more friends,
most major SN sites invest significantly in encouraging friendship formation among their users1. The same
considerations and emphasis on friendship formation have also been prevalent among public and private or-
ganizations in the society: policy makers in schools and corporations recognize the importance of friendship
for the stability and performance of the students and employees (Marmaros and Sacerdote 2006, Carrell
et al. 2013, Mayer and Puller 2008, Mollica et al. 2003, Ibarra 1992), and strive to facilitate tie formation
within their organizations.
Besides the absolute volume of friendship formation among individuals, there is also a surging interest
and an increasing emphasis by both SN sites and policy makers on the diversity of friendships (Fischer
2008, Eagle et al. 2010). A diverse friendship, formed by weak ties (i.e. people who share little in common
in terms of mutual friends, origin, past experience, as defined in Easley and Kleinberg (2010), Aral and
Walker (2014)) may increase information novelty (Bakshy et al. 2012b), facilitate the spread of valuable
information (Gee et al. 2017, Shi et al. 2014), and promote mutual understanding among different parties
(Bakshy et al. 2015).
Despite the importance of the volume and diversity of friendships, there are significant frictions in the
friendship formation process (e.g. information friction) and these frictions are unequally distributed -- they
are often higher among people who are different from each other. Previous research in Marketing, Informa-
tion Systems, Economics and Sociology have been focused on understanding the preference and mechanisms
underlying network formation (Katona and Sarvary 2008, Jackson 2008, Mayzlin and Yoganarasimhan 2012,
Ameri et al. 2017, Phan and Airoldi 2015, McPherson et al. 2001, Altenburger and Ugander 2018), but no
systematic research has been done on how policy makers can actively encourage friendship formation, es-
pecially for people who are very different (with little in common). In this study, we propose to address the
challenge using a novel IT-facilitated information intervention: displaying 'things in common' computed
from big data of users' digital profile on social networks (origin, past experience, likes, check-ins).
The IT-facilitated TIC intervention is motivated by theories on friendship formation and enabled by
recent advances in big data and computing technology. When making a friending decision, individuals search
for shared attributes or experiences with the other party (Fisman et al. 2008, Currarini et al. 2009), such
as common origin (hometown), experiences (work, education), contexts (current city), or interests (likes).
Information about TIC can help reduce cognitive cost (Mollica et al. 2003, Forman et al. 2008), increase trust
(Lin and Viswanathan 2015), and allow individuals to derive more utility from the friendship in the long run
(Felmlee et al. 1990). However, discovering similarity is often costly and suffer from informational friction
in offline communication: it may take multiple conversations and a non-trivial amount of time before two
people realize they share something in common. In contrast, with recent development in data infrastructure
and technology, online social networks can now compute, synthesize and display things in common between
1 Several major SNs have made increasing the number of friends a key goal in their operations (Price 2012): e.g. Linkedin aims to
get a user to reach X friends in Y days, and Facebook and Twitter use similar goal metrics.
Displaying Things in Common to Encourage Friendship Formation
3
any pair of users in real time (when a viewer is browsing a non-friend profile). Displaying TIC updates the
viewer's belief about shared similarities with another2 and can significantly reduce information friction in
the friending process, generating substantial value in network formation.
Interestingly, such information intervention we suggest can be applicable in any IT-mediated friendship
formation process in both online social platforms and offline organizations (e.g. through enterprise social
network like Slack, Workplace, Jive and Yammer). And the potential of TIC intervention is only increasing
because of the accumulation of rich data and the advances of computing technology (Yadav and Pavlou
2014). To the best of our knowledge, our study is the first to identify the unique opportunity and propose
the information intervention in both industry practice and academic research. The promise of displaying
TIC is huge: as envisioned by Zuckerberg in Facebook's new mission statement "If we connect with people
about what we have in common, it is easier to have dialogue about what we disagree on. When we do this
well, we give billions of people the ability to share new perspectives...and bring the world closer together"
(Zuckerberg 2017)
Despite the practical importance and technical feasibility, no study has systematically examined the
effectiveness of displaying things in common on friendship formation. Very little is known about its causal
effect on users' friending behaviors, friendship formation, and friendship diversity. Specifically, we want to
understand:
(Q1, effectiveness) Can displaying 'things in common' encourage a viewer's friend request and increase
the probability of friendship formation?
(Q2, heterogeneity) Is displaying TIC effective in encouraging the friendship formation of weak ties, i.e.
pairs of individuals who are different (with no mutual friends and who share few TICs)? Is displaying TIC
effective for viewers with different demographics and friendship status?
(Q3, mechanism) What is the potential mechanism underlying the effect of displaying TIC on view-
ers' friending decision? When will the display of a TIC be more effective? Will there be substitution or
complementarity when showing multiple TICs and why?
The answers to these questions provide immediate managerial implications on how to facilitate users'
friending decision and cultivate tie formation in social networks -- a policy question that is important not just
for large SN and organizations but for any site or firm building social features.
To address the questions, we carefully design and conduct a randomized experiment at the level viewer-
profile pairs, and find that displaying TIC may significantly increase friendship formation, especially for
weak ties (by 7.1-10.3%). We demonstrate that TIC intervention works for a wide range of users and is
more effective when TIC creates more 'surprisal' to the viewers. As a result, the proposed TIC intervention
is implemented at full scale. In this way, our experiment contributes to the practice and the Marketing,
Information Systems and Economics literature, in few ways.
First, a large stream of literature on social influence (or peer effect) have intensively studied IT-mediated
social influence on existing friendship ties (Iyengar et al. 2011, Tucker 2008, Aral and Walker 2012, Susarla
et al. 2012, Wang et al. 2018). However, little is known about how IT can help facilitate and shape friendship
formation. Understanding IT-enabled tie formation is crucial as friendship ties serve as the infrastructure
underlying influence processes and have a significant impact on information diffusion (Shi et al. 2014, Peng
et al. 2018). Our study is among the first to address this gap and suggests that SN sites may creatively
leverage IT-facilitated information intervention to overcome challenges in friendship formation, especially
2 The viewer may either have little information about the profile's interest, or have an biased perceptionGoel et al. (2010). In both
scenarios, the displayed TIC information would help update the viewer's belief.
4
Tianshu Sun, Sean J. Taylor
among weak ties3. In this way, information and influence can better spread on the network infrastructure
(Phan and Godes 2018, Gee et al. 2017).
Second, recent efforts by researchers, policy makers and SN sites to improve friendship formation have
focused on 'recommending the right people' for interaction (e.g. 'People You May Know' feature, (Linkedin
2016, Su et al. 2016, Brzozowski and Romero 2011). In this study, we argue that it is equally important to
'show the right information' upon interaction. Regardless of the friend recommendation algorithm, a user
will spend a limited amount of time browsing another user's profile on Facebook and Twitter (Lerman
et al. (2013), few seconds). Providing better information to viewers allows them to understand what they
share in common with other users and make more informed friending decisions. In addition, unlike friend
recommendation/link prediction algorithms which generally rely on the existence of mutual ties (Moricz
et al. 2010, Dhar et al. 2014), information provision can operate independently of social network structure
thus can help connect people who share no mutual ties (i.e. weak ties formation).4
Third, despite a recent surge of interest in diversity at schools and workplaces and an increasing empha-
sis on friendship diversity (Fischer 2008), little is understood about how platforms and policy makers can
foster such diversity on platforms or within organizations. Our study proposes and demonstrates that dis-
playing TIC information, distilled from existing data accumulated on the platform (or in the organization),
could reduce information friction in social interaction process and increase friendship diversity. We envision
that TIC information may also reduce bias in other forms of social interaction such as hiring and increase
diversity within an organization.
Besides managerial relevance and immediate applicability, our study also makes several contributions to
social network literature and improve our theoretical understanding of the origin of network formation and
homophily. First, our experiment cleanly isolates the causal effect of users' preferences for different types
of TIC on tie formation. This is the first experimental evidence in the network literature. Second, the origin
of homophily is notoriously hard to identify (Currarini et al. 2010), as the preference factor (over TIC)
and structural factor (e.g. network embeddedness or mutual friends) always entangles with each other in
observational data. By randomizing the display of TIC (which is orthogonal to any structural factor), we are
now able to measure the relative importance of individuals' preferences versus structural factors in network
formation process. We further detail the contributions to network theory in 'Results and Discussion' and in
Appendix D.
2. Identification Challenges and Strategy
While important to both practice and theory, identifying the causal effect of displaying things in common
on friendship formation is empirically challenging (Figures 1 and 2). First, one cannot identify the treatment
effect by simply comparing friending decisions across ego-alter pairs with different numbers of TIC: it is
possible that the ego may be more likely to friend an alter that shares more similar traits due to unobserved
confounding (Ui j in Figure 1, e.g. existence of mutual friend), regardless of whether the 'things in common'
3 Despite lively discussions on the importance of friendship diversity (Kossinets and Watts 2009, Eagle et al. 2010, Granovetter 1977)
in facilitating interactions among different groups (Bakshy et al. 2015), very little is understood about how online social networks can
actively help 'build' the weak ties among people with different background.
4 Finally, our study also extends a large stream of literature in Marketing and IS on the reduction of information friction in online
platforms and marketplaces. Previous literature has focused on how IT artifacts (online reviews, product recommendations) can be used
to reduce friction in user-product interactions (Fradkin 2017, Forman et al. 2008, Oestreicher-Singer and Sundararajan 2012, Fleder
and Hosanagar 2009). Our study suggests a new route in which IT could reduce the friction in user-user interaction, and open up a new
area of research on the role of IT in moderating the structure, evolution and value of user-user network (Oestreicher-Singer et al. 2013,
Hosanagar et al. 2013).
Displaying Things in Common to Encourage Friendship Formation
5
are actually shown on the alter profile or not. In other words, when observing a correlation between the
presence of TIC (i.e. Xi j) and an increase in friendship formation (i.e. Yi j), one can not differentiate structural
factors versus treatment effect (of displaying TIC)5. This identification problem is fundamentally rooted
in unobserved confounding present in observational data (Hartmann et al. 2008, Phan and Airoldi 2015,
Kossinets and Watts 2009, Aral et al. 2009, Shalizi and Thomas 2011, Kwon et al. 2017)6. Second, structural
factor may complement or substitute the effect of preferences over TIC in the network formation process.
It would be interesting to understand the importance of displaying TIC with or without the presence of
mutual friends. Finally, the baseline probability of friendship formation in online social interaction process
is generally very low. Less than 0.1% of the viewer-profile pairs form a friendship in the social interactions
(viewer browsing the profile). Thus, a very large sample of pairs is needed to detect statistical significance
of a reasonable treatment effect (Lewis and Rao 2015).
Fig. 1: Identification Challenge. In observational data, it is extremely hard to identify the effect of displaying
TIC in driving friendship formation (Yi j), as the actual TIC (Xi j) for viewer-profile pair is endogenously
correlated (dashed line) with confounding factors (Ui j) such as the existence of mutual friend, thus the
estimated effect of Xi j on Yi j is biased. (formally, in econometric equation Yi j = γ ∗ Xi j +Ui j,γ is biased)
In order to address these challenges, we leverage a large-scale randomized experiment on a large SN
site involving over 50 million viewer-profile pairs. This product test was designed to help choose the best
combination of TIC for the SN site to display, randomly varying the prominence of 'things in common'
information when a viewer is browsing another's profile card. The treatment (to display certain TIC infor-
mation or not) is randomly assigned only thus are independent to both observed and unobserved structural
5 For instance, those viewer-profile pairs with 2 TIC may have a higher friendship formation rate than those with only 1 TIC, not
because of the additional TIC at display, but because pairs with 2 TIC are likely to have more mutual friends and more interaction
opportunities (i.e. structural factors) than pairs with 1 TIC. In Online Appendix C, we confirm the above insight and empirically
demonstrate that the correlation between number of things in common in a pair and the corresponding friendship formation rate is not
only biased, but even opposite to the true causal effect in sign (Figure C.1)
6 Observational data often lacks of detailed information on the structural factor such as interaction history and friendship structure
(McPherson et al. 2001), which is needed to control for meeting bias and triadic closure. Even more fundamentally, the endogenous
correlation between things in common, meeting bias, and network structure makes it almost impossible to isolate the role of preference
in friendship formation from observational studies (Currarini et al. 2010).
6
Tianshu Sun, Sean J. Taylor
Fig. 2: Identification Strategy. Randomization process in the experiment creates exogenous variation in the
displayed things in common (Di j), therefore allows us to identify the causal effect of showing TIC and
isolate the effect of displaying TIC in driving friendship formation. The display of a certain type of things
in common 'a' (i.e. Di ja) is independent of Ui j, thus the estimated coefficient for Di ja is unbiased. The
exogenous assignment of Di ja allows us to identify effect of each type of things in common. (formally,
Yi j = σa ∗ Di ja + γ ∗ Xi j +Ui j, where σa is the causal effect of displaying a type of TIC 'a'. σa is identified
and unbiased because corr(Di ja,Ui j) = 0).
factor between the viewer-profile dyad (e.g. mutual friend(s), interaction opportunity). The exogenous vari-
ation created in the displayed TIC (Di j) boosted the salience of TIC to the viewer and allows us to identify
the role of preference in driving friendship formation (Figure 2), and understand its effect with or without
the presence of structural factors (i.e. the existence of mutual friend) in a real network environment. The
scale of our experiment ensures that we have sufficient statistical power to detect the treatment effect, and to
explore heterogeneity in effects for different categories of TIC and for different subgroups of viewer-profile
pairs. We present the experiment and data in detail as below.
3. Experiment Design and Data
We collaborated with a large global SN site which features a user profile page where registered users can
report a wide range of information that they want to share with others, including current city, current work,
hometown, past education, past experience and so on. Users on the SN site can also participate in several
kinds of activities, including browsing and interacting with friends' updates and public pages, and posting
updates and content on their own profile.
The SN site, like most other SN sites, has a function on its mobile platform in which users can discover
new friends. Specifically, a user (who we will refer to as the 'viewer') may view the profile cards of other
users -- one at a time on the mobile screen (Figure 4). The profile card includes a subset of information
that the alter has shared on her or his public profile on the social network site, including current work,
education, current city, hometown, as well as recent photos and updates s/he has shared publicly (Figure 4
for a wireframe of the design). The viewer may swipe right or left to see the next or previous profile card
in the sequence, and can tap on "Add Friend" to send a friend request to the alter. If the alter approves
Displaying Things in Common to Encourage Friendship Formation
7
Fig. 3: Process. Step-by-step illustration of friendship formation process.
the request in the notification, then an articulated friendship between the pair is formed (Figure 3)7. When
browsing the profile card for a specific alter, the viewer may also see whether s/he share any mutual friends
with the profile, and if so, how many. Finally, the site may also display things in common for the viewer-
profile pair (Figure 4 right pane) based on their public profile information (city, work, hometown, education)
and page like behavior in the past8. There are five types of things in common: mutual city, mutual work,
mutual hometown, mutual education, and mutual interest (page likes). Depending on the characteristics and
past behaviors of both the viewer and profile, each viewer-profile pair may have zero, one, or up to five
things in common. Thus, the eligible things in common that the SN site can display for each viewer-profile
pair may vary across pairs.
We randomly sampled a portion of viewer-profile pairs with at least one TIC (and at most five TIC) and
conduct a randomized field experiment over the representative sample. Over a period of few weeks, over
50 million viewer-profile pairs were randomly assigned into different test conditions. Specifically, for each
viewer-profile pair, we randomly and independently vary whether to display each type of things in common
that the pair may share, with a 50% chance of showing or not (Step 1 in Figure 3). For instance, for all pairs
with two TIC (e.g. mutual city and mutual like), in expectation 25% of pairs would see two TIC, 50% would
see one (with 25% see mutual like and 25% see mutual city), and 25% would see none. In expectation,
the number of TIC shown should follow a binomial distribution determined by number of actual things in
common shared by the viewer-profile pairs. Figure 5 confirms the empirical distribution perfectly matches
our randomization strategy, providing the randomization check9. Finally, the randomization is performed
at viewer-profile pair level, i.e. the same viewer may be assigned to different condition when browsing
7 We use 'articulated friendship' to denote that the friendship on SN sites is a unique type of social network connection, which is
valuable by itself (in the creation and spread of information) and may differ from the offline friendship. For instance, the interaction
frequency and tie strength of articulated friendship on average may be lower (weaker) as compared to the offline friendship.
8 Specifically, the viewer and profile can be represented as two high-dimensional n× 1 vectors: each row representing the value of a
profile field entry or a page like decision. Their TIC are calculated from the intersect of the two vectors.
9 We also check the balance of a series of user covariates (e.g. viewer/profile gender, friend count) across the control and treatment
groups and do not find any significant differences. All tables are available upon request.
8
Tianshu Sun, Sean J. Taylor
Fig. 4: Control and Treatment Group. A wireframe of the user interface for the experiment. Control group
is on the left and treatment group on the right. In this example, the two types of TIC between the profile and
the viewer -- mutual city and mutual like -- are both displayed
different profiles. We choose to randomize at viewer-profile level because the primary outcomes of interest,
friend request and friendship formation, are measured at that level.
Besides the randomized display of TIC, we also controlled the information environment of viewer-profile
interaction in our experiment in two ways: first, upon the viewer sending out a friend request, the alter in both
control and treatment group will see exactly the same notification (Step 3 in Figure 3), and no information
about TIC is displayed to the alter in the notification. In this way, we isolate the treatment to viewers and
all effects of displaying TIC on friendship formation should be driven by changes in viewers' decision.
Second, the profile sequence that the viewers browse was generated in the same way across the control and
treatment groups, and the test group is only assigned after the creation of profile sequence for each viewer.
Such additional efforts help us isolate the effect of displayed TIC on the friendship formation process and
eliminate confounding.
The randomized experiment creates exogenous variation so that the displayed TIC in a pair a) is de-
coupled from actual TIC (i.e. exogenous variations of displayed TIC within each group in Figure 5), and
b) is independent of the interaction history and network structure for any viewer-profile pair. As a result,
any unobserved confounding factors that may drive friendship formation for a viewer-profile pair (Figure 1),
such as unobserved interaction (Currarini et al. 2009) and structural factor (sharing mutual friend or not),
are orthogonal to treatment assignment. Any difference in the friendship formation between viewer-profile
pairs in control and treatment groups (with the same actual things in common) can be attributed to difference
Displaying Things in Common to Encourage Friendship Formation
9
Fig. 5: Randomization. Number of TIC shown to the viewer follows a binomial distribution, grouped by
number of actual TIC shared between the pair. The empirical distribution perfectly matches our randomiza-
tion strategy, providing the randomization check.
in the displayed things in common. The exogenous variation created in the experiment allows us to cleanly
identify the causal impact of showing things in common on friendship formation, therefore also isolate the
role of preference over shared TIC in driving network formation.
For every viewer-profile pair in our experiment, we log 1) the actual things in common between the
pair, 2) things in common shown on the profile card (i.e. test group assignment), 3) whether they share
mutual friends and 4) some limited demographic information for both viewer and profile (gender, city, etc.),
as well as 5) the outcomes of the interaction (e.g. friend requests made by the viewer and friend requests
accepted by the profile's associated user). With the experiment data, we can cleanly identify the causal effect
of displaying 'things in common' on friendship formation, as well as its impact across different types of
things in common, on different types of viewers, and for weak ties versus strong ties.
We first present the summary statistics for our experiment in Table A.1 and Figures. As shown in Figure
A.1, the vast majority (>98%) of the viewer-profile pairs in our sample only have one or two things in
common (similar pattern when we separately draw the distribution for pairs with and without mutual friend,
Figure A.2). Thus we will focus on discussing the treatment effect for those pairs. Among all the pairs with
one TIC, the viewers and profiles are most likely to share mutual likes, followed by mutual hometown, city,
education and work (Figure B.1). Pairs with two TIC follows a similar ranking (Figure A.12). In total, only
53.3% of viewer-profile pairs in our experiment share at least one mutual friend (Table A.1) thus 46.7% of
pairs are weak ties.
On average, a viewer may browse multiple profiles during the experiment period (Figure A.3 left pane)
but a profile is very likely be browsed by only one viewer (Figure A.3 right pane). Since our randomization
4 Things in Common5 Things in Common1 Thing in Common2 Things in Common3 Things in Common012340123450101201230.00.10.20.30.40.50.00.10.20.30.40.5Number of Things in Common ShownFraction of Observations10
Tianshu Sun, Sean J. Taylor
at viewer-profile level, we sometimes sample the same viewer multiple times as s/he may browse multiple
profile cards. To account for dependence introduced by repeated observations from the same viewer in our
sample, we use a clustered bootstrap, randomly re-sampling 50% of viewers without replacement 500 times
and deriving 95% confidence intervals from the sampling variance of the bootstrap replicate means (Owen
et al. 2012). Bootstrapping for inference is a common practice in the analysis of experiments with depen-
dence between observations. Bakshy and Eckles (2013) provide detailed simulations of how dependence in
experimental data affect statistical inference in experiments, showing that bootstrapping is more conservative
than a variance estimator (that assumes independence) and reduces the probability of Type I errors10.
4. Results and Discussions
We present the findings from the experiment in this section. We organize the results and discussions based on
the managerial and theoretical perspective. The managerial perspective corresponds to our research question
Q1 and Q2, while the theoretical perspective corresponds to Q3.
4.1. Managerial
Our experiment generates three main findings, which may provide immediate managerial implications to
social network sites and policy makers. First (Q1), we find that showing things in common significantly
increases friendship formation. As shown in Figure 6, within each group with the same number of actual
TIC (1, 2 or 3), displaying TIC to the viewers would lead to a significant lift in their likelihood of sending
out a friend request. The relative lift, as compared to the control group within each TIC group, ranges from
2.1% for pairs with 1 TIC to 8.9% for pairs with 3 TIC. It suggests that providing information about things in
common may facilitate users' decision in friending process. Consistent with the pattern on friend request, we
find displaying all things in common may significantly increase the probability of friendship formation11:
a 1.3% increase in relative risk for pairs with 1 TIC and a 3.5% increase in relative risk for pairs with
2 TICs (we present the detailed estimates on the effect for both request and formation and the statistical
significance in Table A.2). The increase in friendship formation is largely driven by additional friend request
by the viewer (Step 2 in Figure 3), as revealed from the similar lift in the request and formation outcome in
Figure 612. Such an increase is significant given the very large volume of viewer-profile pairs in the browsing
session every day. Finally, we also compare the 'quality' of friendship ties formed in control and treatment
groups, as measured by follow-up interactions (e.g. like, comment) within the ties. We find the IT-enabled
friendship ties (with TIC display) is as good as regular ties in facilitating future interactions (Figure A.11).
Second and more interestingly (Q2), we find displaying things in common can effectively encourage
friendship formation between weak ties, i.e. people who share little in common (Aral and Walker 2014).
Specifically, We divide the sample into pairs of users with and without mutual friends, as shown in Figure
7. Displaying TIC can encourage additional friend requests for all viewers, but are especially effective when
the viewer and profile does not share any mutual friend (as revealed from the difference in y-scale). The
friendship formation outcome follows a similar pattern but are more salient. In contrast to viewer-profile
pairs with mutual friends (Figure 7 upper panel), displaying things in common can lead to a large and
10 Treatment effect from variance estimators yields the same point estimate and more statistically significant results.
11 Same pattern holds for pairs with 3 actual TIC (Figure A.4, A.5) but sample size is too small as shown in Figure A.1.
12 We are unable to find any evidence that the treatment induces any significant positive or negative effects on the rate that requests
are accepted (see Figure A.6 for detailed analysis).
Displaying Things in Common to Encourage Friendship Formation
11
Fig. 6: Effects of displaying things in common. Using pairs with zero things in common displayed as a base-
line, showing more things in common increases the relative risk of both friendship request and formation.
The effect are statistically significant for pairs with 1 and 2 actual things in common (left and middle pane).
95% confidence intervals are estimated using a bootstrap clustered on viewer with 500 bootstrap replicates.
significant increase in friendship formation rate for pairs without mutual friends (lower panel): 7.3% relative
increase for pairs with 1 TIC, and 10.3% for pairs with 2 TIC (see detailed estimates in Table A.3 for relative
risk and other estimates). An immediate implication of the above findings is that the proposed information
intervention could encourage the formation of weak ties. Displaying things in common may work without
structural constraint (i.e. mutual friend) and connect people with even modest similarity (i.e. 1 or 2 things
in common), therefore increase diversity of users' friendship ties and potentially reduce homophily and
clustering in the social network.
Third (Q2), we further explore the heterogeneity in the treatment effect, and find that the information in-
tervention works for a wide range of viewers with different demographics and friendship status. Specifically,
we find the effect of displaying things in common is effective for male and female viewers (Figure A.7),
and also fairly consistent across various gender combinations (Figure A.8, e.g. a male browsing a female
profile). In addition, we find the effects of displaying things in common is also consistent across viewers
with different number of friends (Figure A.913), even for the viewers who already have over 500 friends.
The above results are aligned with our main findings and suggest that TIC information intervention may be
equally applied to a large variety of viewers in the social networks and cultivate the formation of weak ties
for different subgroups.
13 For results in Figure A.7, A.8 and A.9, we also have tables with detailed regression results (available upon request)
lllll1 Thing in Common2 Things in Common010121.001.021.041.06Number of Things in Common ShownRelative Risk of OutcomelRequestFormation12
Tianshu Sun, Sean J. Taylor
Fig. 7: Effects of displaying things in common, for pairs with and without mutual friends. We group all pairs
by the number of things in common as well as the existence of mutual friends. Using pairs with zero things
in common shown as a baseline within each group, we find showing more things in common increases the
relative risk of friendship formation, but only for people with no mutual friends. 95% confidence intervals
are estimated using a bootstrap clustered on viewer with 500 bootstrap replicates.
Note: for display purpose, the y-axis scale for the upper panel and lower panel is different - the effects for
pairs with no mutual friends are much larger
4.2. Theoretical
Besides managerial implication, our findings also provide new insights about the friendship formation pro-
cess and contributes to the theory on network formation and homophily, in a few ways. First, as discussed
earlier, our study provides the first clean experimental evidence on the importance of individuals' preference
over thing in common in driving friendship formation. We show a direct evidence that after becoming more
aware of the shared similarity, the viewer is significantly more likely to send a friend request and form a
friendship with the profile. Very interestingly, we also find a variation in the preference over different types
of things in common (like, current city, hometown, education, work) and provide more details in Appendix
B (Figure B.1, B.2).
Second (Q3), we find individuals' preference over TIC plays a more prominent role when there is no
mutual friend between the pair. The contrast between treatment effect of displaying TIC for viewer-profiles
with and without mutual friends (Figure 7) suggests a substitution between preference factor and structural
factor in friendship formation process, i.e. when a viewer already has mutual friends with the profile, s/he
llllllllll1 Thing in Common2 Things in CommonMutual FriendsNo Mutual Friends010120.981.001.021.041.061.01.1Number of Things in Common ShownRelative Risk of OutcomelRequestFormationDisplaying Things in Common to Encourage Friendship Formation
13
may positively update her/his belief about having TIC with profile. Thus, showing things in common might
not reveal much additional information to the viewer thus cannot increase the probability of friendship
formation. In other words, mutual friends and things in common may communicate similar or redundant
information and thus the signals are not additive. The result is aligned with the belief update process where
the viewer's with a prior probability on sharing TIC with the profile is contingent on the existence of mutual
friend.
We can better understand the theoretical contributions and mechanisms using a formal model. Specifi-
cally, we can characterize i's friend request decision for j with the following equation14,
Yi j = βa Pr(Xia = Xja) + βaDi ja[1− Pr(Xia = Xja)] + γXi j +Ui j
where Pr(Xia = Xja) is the viewer i's prior probability of having a shared trait a with profile j when the
TIC is not displayed (Di ja = 0). The coefficient βa represents the "importance" of the TIC to the viewer and
captures the preference for the specific type of TIC is in driving the viewer's friending decision.
When the SN site displays a TIC (Di ja = 1), the new information leads to a positive update on viewer
i's belief about the shared TIC with profile j, i.e. [1 − Pr(Xia = Xja)], as the viewer is now 100% sure
about the shared trait a. The magnitude of the belief update clearly depends on the prior probability of
sharing a in common. If a mutual friend is observed between i and j, then the viewer i's ex-ante expec-
tation on the likelihood of having a TIC (a) with profile j, i.e. Pr(Xia = Xja), will be higher, thus the
belief update (or information gain: 1 − Pr(Xia = Xja)) from seeing TIC will be smaller. In other words,
1− Pr(Xia = Xjamutual friends = 0) > 1− Pr(Xia = Xjamutual friends = 1). Therefore, we expect the ef-
fect of displaying TIC should be larger and more significant for pairs without mutual friends, and the findings
confirm such belief update process.
The substitution effect between preference factor and structural factor also suggests another strength of
weak ties (Granovetter 1977) but during friendship formation stage: the marginal value of displaying TIC is
larger for weak ties in the tie formation stage, as ex-ante the users have lower expectation on having shared
attributes thus may gain more from TIC information. This insight is complementary to recent findings in the
social influence literature (Aral and Walker 2014, Bakshy et al. 2012a)15 and paints a complete picture of
the dynamics across tie formation stage and influence spread stage (Phan and Godes 2018, Aral and Walker
2012). In this way, our experiment findings shed light on the origin and evolution of homophily observed in
social networks16.
Third (Q3, Mechanism), we further examine the potential mechanism underlying the effect of showing
things in common on a viewer's friending behavior. As discussed above, displaying TICs may update an
individual's belief about the shared similarity with the profile (Goel et al. 2010), reduce the search cost and
lead to a significant information gain. Aligned with belief update process, we expect showing a TIC would
be more effective if the information is less expected by the viewer (Pr(Xia = Xja)) is small). Consider the
case of mutual hometown, a viewer i from a smaller city would encounter fewer profiles who share the same
hometown and thus ex-ante have a lower prior probability of sharing the same attribute with another user.
In other words, the viewer's expectation on a TIC would be small when the TIC is rarely encountered by
her/him. Displaying such TIC in turn would lead to a larger increase in friendship formation.17
14 Without loss of generalizability, we focus on the effect of one type of TIC ('a') in the discussion.
15 Social influence spread on existing ties is strongest when the tie shares mutual friends and multiple TICs.
16 Though preference over similar others is a underlying driver of homophily among weak ties, the preference, by itself, does not
reinforce tie formation among people who already share mutual friends thus cannot lead to a significant level of structural homophily.
Preference may connect people with different background, but the rest of network evolution might be driven by structural factor such
as meeting opportunities and triadic closure
17 Another potential mechanism is attention disruption: showing TIC on a profile card would disrupt the monotonicity of seeing many
profile cards in a row. Such additional attention may lead to an increase likelihood of friendship formation. The attention disruption
14
Tianshu Sun, Sean J. Taylor
We follow the information-theoretic framework (Shannon 1948) and operationalize the above hypothesis
using our data by computing the 'Surprisal' of encountering TIC (or 'Information gain', −log2(Pr(Xia =
Xja)), with bits as units for all viewers and attributes in the experiment. One bit is the information gain from
the display of a TIC when viewers' prior of observing the TIC is 50%. Viewers with rare profile attribute,
such as uncommon hometown or small current city, encounter profiles who share that TIC information only
rarely thus have a lower prior. As a result, the surprisal when the information revealed from displaying the
TIC is large. We compute the relative risk of friend requests as a function of whether the TIC was displayed
and the surprisal of that TIC in Figures 8. As shown by the x-scales, sharing a hometown (or current city)
with other profiles tends to contain about 2 to 16 bits of information. For viewer-profile pairs without mutual
friends, we observe a positive correlation between the surprisal of the TIC and the effect of displaying that
information18. For pairs with mutual friends there is no significant effect, indicating that the existence of
mutual friends attenuated the effect of TIC information and make it redundant.
In addition, the belief update mechanism and our operationalization based on the information-theory
may also guide social network sites to decide on whether and when to display multiple TICs. Show-
ing multiple TICs, as compared to showing one TIC would be valuable only when the additional TIC
shown can still bring incremental contribution on the information gain (i.e. 'surprisal', −log2(Pr(Xia =
Xjaother TICs displayed))). We find the evidence from the experiment aligned with the argument. As demon-
strated in Figure A.10, the effect of displaying TIC is stronger when the surprisal brought by displaying both
TIC (mutual hometown and current city) is larger than displaying only 1 TIC. SN sites can leverage the
principle and our information-theoretic framework ('surprisal') when designing a menu of TIC information
for display19.
explanation suggests that the effect of TIC is stronger in the early stage of browsing, especially during the transition between control
and treatment. However, we perform an exploratory analysis on whether the effect of displaying TIC would vary across profiles with
different positions in the browsing sequence but did not find any significant pattern. The evidence might indicate that attention disruption
is not playing a major role underlying the process. We thank one reviewer for the suggestion.
18 The positive correlation is tapering off at the right end (in the area where surprisal>9 shannons). Since the number of observations
is much smaller in this area (as revealed from the wider confidence interval), it does not strongly affect the overall trend. The coefficient
of surprisal is positive if we fit a linear relationship on the data.
19 Interestingly, at an aggregate 'type' level, the information across different types of TICs are likely to be substitutes for one an-
other. We can identify such relationship by examining the effect of TIC display when the viewer-profile pairs share two TIC (Fig-
ures A.12 and A.13). As shown from the 9 panels in Figures A.13, in most scenarios, the effect of displaying two types of things in
common is not additive, demonstrating no clear positive complementarity between them is identified. Thus, SN sites could use the
information-theoretic framework to guide the optimal display of TIC.
Displaying Things in Common to Encourage Friendship Formation
15
Fig. 8: Effect of Displaying Hometown, of Different Surprisal. We measured the 'Surprisal' of the hometown
by taking the negative (base 2) log probability of a viewer seeing a profile with that mutual hometown.
Higher bits indicates we would estimate the mutual hometown would be more suprising to the viewer. To
generate smooth curves, we fit LOESS regressions separately for the display and no-display conditions for
each of bootstrap replicate. The dashed lines are the 95% confidence intervals for the smoothed estimates
of the ratio, computed from a standard errors estimated using a bootstrap clustered on the viewer with 500
bootstrap replicates.
Note: for display purpose, the y-axis scale for the upper panel and lower panel is different - the effects for
pairs with no mutual friends are much larger
5. Conclusion and Future Research
Friendship formation is crucial for society in general: it may facilitate information transfer (Gee et al. 2017),
improve trust (Bapna et al. 2017), and broaden diversity (Eagle et al. 2010), yet little is known about how
policy makers and SN sites may actively encourage friendship formation, especially for those with relatively
little in common. Using a carefully-designed large-scale randomized experiment, our study is among the
first to demonstrate the causal effect of displaying things in common on friendship formed. Providing infor-
mation on shared traits, enabled by big data technology, may significantly reduce the information friction
in friendship formation. Such intervention encourages network formation among weak ties and may signif-
icant boost friendship diversity. Our experiment provides managerial implications and offer guidelines for
SN sites to design effective information intervention in a personalized way.
The findings also advance our theoretical understanding and contribute to the Marketing, Information
Systems and Social Network literature. First, our study provides the first experimental evidence on the role
of preference over different TIC in driving network formation. Moreover, interestingly, we identify and
explain a substitution effect between preference factor and structural factor in social network evolution.
Mutual FriendsNo Mutual Friends48120.9751.0001.0251.0501.0751.01.11.21.31.4Surprisal of Profile Hometown (shannons)Relative Risk of Friend RequestEffect of Displaying Hometown16
Tianshu Sun, Sean J. Taylor
Finally, our finding is aligned with a rational belief update process: the effect size of showing a certain
TIC is in proportion to the 'surprise' it creates for the viewer. SN can leverage our information-theoretic
framework when designing an optimal information set for display.
Our study proposes a new experiment design to engineer interpersonal relationship at large-scale and
reveals the potential of providing TIC 'information' in facilitating social interactions. We envision future
research may extend our study in a few ways. First, our study is conducted in the context of SN sites.
Future research may examine the effectiveness of displaying TIC information within organizations (through
enterprise social network like Slack, Jive and Yammer, Huang et al. (2015)), and also in other forms of social
interactions, such as hiring, team matching and dating (Bapna et al. 2016, Gee et al. 2017, Granovetter 1977,
Fisman et al. 2006). Second, new types of TIC are emerging on SN sites and researchers could evaluate
the effectiveness of those TICs (e.g. location or event check-in). It would be interesting to understand how
real-time environment (e.g. at the same event) would encourage friendship formation and interactions. Third,
our experiment focuses on the 'information' aspect, rather than the relative 'importance' in the individuals'
preference over different TIC (e.g. hometwon, interest). We believe 'information' can reduce friction in
social interactions and help individuals better understand each other, while 'importance' might be formed
based on an individual's experience and largely fixed. Future research may leverage exogenous shocks and
panel data to understand whether such preference would evolve over time (Phan and Airoldi 2015, B´enabou
and Tirole 2016, Bursztyn et al. 2017). Fourth, we focus on the effect of TIC display on the friendship
formation outcome at a viewer-profile level. More research could be done to understand the user behaviors
at the viewer level or even network level. For instance, future experiments with randomization at viewer
level could help understand whether there exists a 'saturation' stage in the users' need for friendship, i.e.
whether users have a quota of friend request or friendship formation that they have in mind. In that case,
different friendship may be substitutes to each other in the network formation process. In addition, future
research may also leverage simulation methods to understand how network structure and homophily evolves
over a longer period of time.
Finally, our study is among the first to demonstrate the possibility of directly engineering certain pref-
erence factors in the process of social network formation. Researchers in Marketing, Information Systems,
Economics and Organization Behavior can use our experiment design as a testbed to examine various pref-
erence and structural factors underlying interpersonal interactions in network formation. For instance, high-
lighting certain type of differences (rather than similarities) between two users often would be effective as
well, as users may be curious about people who are different from themselves (e.g. sharing a different in-
terest). It is valuable to understand and test what types of differences may be complementary and could be
displayed to encourage friendship formation. Our study provides an ideal experiment framework for future
inquiry into this broad research agenda on social network formation.
References
Altenburger, K. M. and Ugander, J. (2018). Monophily in social networks introduces similarity among friends-of-friends. Nature
Human Behaviour, 2(4):284.
Ameri, M., Honka, E., and Xie, Y. (2017). A structural model of network dynamics: Tie formation, product adoption, and content
generation. Working Paper.
Aral, S., Muchnik, L., and Sundararajan, A. (2009). Distinguishing influence-based contagion from homophily-driven diffusion in
dynamic networks. Proceedings of the National Academy of Sciences, 106(51):21544 -- 21549.
Aral, S. and Walker, D. (2011). Creating social contagion through viral product design: A randomized trial of peer influence in networks.
Management science, 57(9):1623 -- 1639.
Aral, S. and Walker, D. (2012). Identifying influential and susceptible members of social networks. Science, page 1215842.
Displaying Things in Common to Encourage Friendship Formation
17
Aral, S. and Walker, D. (2014). Tie strength, embeddedness, and social influence: A large-scale networked experiment. Management
Science, 60(6):1352 -- 1370.
Bakshy, E. and Eckles, D. (2013). Uncertainty in online experiments with dependent data: an evaluation of bootstrap methods. In
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1303 -- 1311.
ACM.
Bakshy, E., Eckles, D., Yan, R., and Rosenn, I. (2012a). Social influence in social advertising: evidence from field experiments. In
Proceedings of the 13th ACM Conference on Electronic Commerce, pages 146 -- 161. ACM.
Bakshy, E., Messing, S., and Adamic, L. A. (2015). Exposure to ideologically diverse news and opinion on facebook. Science,
348(6239):1130 -- 1132.
Bakshy, E., Rosenn, I., Marlow, C., and Adamic, L. (2012b). The role of social networks in information diffusion. In Proceedings of
the 21st international conference on World Wide Web, pages 519 -- 528. ACM.
Bala, V. and Goyal, S. (2000). A noncooperative model of network formation. Econometrica, 68(5):1181 -- 1229.
Bapna, R., Liangfei, Q., and Rice, S. (2017). Repeated interactions versus social ties: Quantifying the economic value of trust, forgive-
ness, and reputation using a field experiment. MIS Quarterly, 41(3).
Bapna, R., Ramaprasad, J., Shmueli, G., and Umyarov, A. (2016). One-way mirrors in online dating: A randomized field experiment.
Management Science, 62(11):3100 -- 3122.
Bapna, R. and Umyarov, A. (2015). Do your online friends make you pay? a randomized field experiment on peer influence in online
social networks. Management Science, 61(8):1902 -- 1920.
B´enabou, R. and Tirole, J. (2016). Mindful economics: The production, consumption, and value of beliefs. Journal of Economic
Perspectives, 30(3):141 -- 64.
Berscheid, E. and Reis, H. T. (1998). Attraction and close relationships. The Handbook of Social Psychology.
Brzozowski, M. J. and Romero, D. M. (2011). Who should i follow? recommending people in directed social networks. In ICWSM.
Burke, M. and Kraut, R. E. (2016). The relationship between facebook use and well-being depends on communication type and tie
strength. Journal of Computer-Mediated Communication, 21(4):265 -- 281.
Bursztyn, L., Egorov, G., and Fiorin, S. (2017). From extreme to mainstream: How social norms unravel. Technical report, National
Bureau of Economic Research.
Carrell, S. E., Sacerdote, B. I., and West, J. E. (2013). From natural variation to optimal policy? the importance of endogenous peer
group formation. Econometrica, 81(3):855 -- 882.
Centola, D. (2015). The social origins of networks and diffusion. American Journal of Sociology, 120(5):1295 -- 1338.
Church, K. W. and Hanks, P. (1990). Word association norms, mutual information, and lexicography. Computational linguistics,
16(1):22 -- 29.
Currarini, S., Jackson, M. O., and Pin, P. (2009). An economic model of friendship: Homophily, minorities, and segregation. Econo-
metrica, 77(4):1003 -- 1045.
Currarini, S., Jackson, M. O., and Pin, P. (2010).
Identifying the roles of race-based choice and chance in high school friendship
network formation. Proceedings of the National Academy of Sciences, 107(11):4857 -- 4861.
Dhar, V., Geva, T., Oestreicher-Singer, G., and Sundararajan, A. (2014). Prediction in economic networks.
Research, 25(2):264 -- 284.
Information Systems
Eagle, N., Macy, M., and Claxton, R. (2010). Network diversity and economic development. Science, 328(5981):1029 -- 1031.
Easley, D. and Kleinberg, J. (2010). Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University
Press.
Eckles, D., Kizilcec, R. F., and Bakshy, E. (2016). Estimating peer effects in networks with peer encouragement designs. Proceedings
of the National Academy of Sciences, 113(27):7316 -- 7322.
Ely, J., Frankel, A., and Kamenica, E. (2015). Suspense and surprise. Journal of Political Economy, 123(1):215 -- 260.
Felmlee, D., Sprecher, S., and Bassin, E. (1990). The dissolution of intimate relationships: A hazard model. Social Psychology
Quarterly, pages 13 -- 30.
Fischer, M. J. (2008). Does campus diversity promote friendship diversity? a look at interracial friendships in college. Social Science
Quarterly, 89(3):631 -- 655.
Fisman, R., Iyengar, S. S., Kamenica, E., and Simonson, I. (2006). Gender differences in mate selection: Evidence from a speed dating
experiment. The Quarterly Journal of Economics, 121(2):673 -- 697.
Fisman, R., Iyengar, S. S., Kamenica, E., and Simonson, I. (2008). Racial preferences in dating. The Review of Economic Studies,
75(1):117 -- 132.
18
Tianshu Sun, Sean J. Taylor
Fleder, D. and Hosanagar, K. (2009). Blockbuster culture's next rise or fall: The impact of recommender systems on sales diversity.
Management science, 55(5):697 -- 712.
Forman, C., Ghose, A., and Wiesenfeld, B. (2008). Examining the relationship between reviews and sales: The role of reviewer identity
disclosure in electronic markets. Information Systems Research, 19(3):291 -- 313.
Fradkin, A. (2017). Search, matching, and the role of digital marketplace design in enabling trade: Evidence from airbnb.
Gee, L. K., Jones, J. J., Fariss, C. J., Burke, M., and Fowler, J. H. (2017). The paradox of weak ties in 55 countries. Journal of Economic
Behavior & Organization, 133:362 -- 372.
Goel, S. and Goldstein, D. G. (2013). Predicting individual behavior with social networks. Marketing Science, 33(1):82 -- 93.
Goel, S., Mason, W., and Watts, D. J. (2010). Real and perceived attitude agreement in social networks. Journal of personality and
social psychology, 99(4):611.
Goes, P. B., Lin, M., and Au Yeung, C.-m. (2014). "popularity effect" in user-generated content: Evidence from online product reviews.
Information Systems Research, 25(2):222 -- 238.
Granovetter, M. S. (1977). The strength of weak ties. In Social networks, pages 347 -- 367. Elsevier.
Hartmann, W. R. (2010). Demand estimation with social interactions and the implications for targeted marketing. Marketing science,
29(4):585 -- 601.
Hartmann, W. R., Manchanda, P., Nair, H., Bothner, M., Dodds, P., Godes, D., Hosanagar, K., and Tucker, C. (2008). Modeling social
interactions: Identification, empirical methods and policy implications. Marketing letters, 19(3-4):287 -- 304.
Hosanagar, K., Fleder, D., Lee, D., and Buja, A. (2013). Will the global village fracture into tribes? recommender systems and their
effects on consumer fragmentation. Management Science, 60(4):805 -- 823.
Huang, Y., Singh, P. V., and Ghose, A. (2015). A structural model of employee behavioral dynamics in enterprise social media.
Management Science, 61(12):2825 -- 2844.
Ibarra, H. (1992). Homophily and differential returns: Sex differences in network structure and access in an advertising firm. Adminis-
trative science quarterly, pages 422 -- 447.
Iyengar, R., Van den Bulte, C., and Valente, T. W. (2011). Opinion leadership and social contagion in new product diffusion. Marketing
Science, 30(2):195 -- 212.
Jackson, M. O. (2008). Social and economic networks. Princeton university press.
Katona, Z. and Sarvary, M. (2008). Network formation and the structure of the commercial world wide web. Marketing Science,
27(5):764 -- 778.
Kossinets, G. and Watts, D. J. (2009). Origins of homophily in an evolving social network. American journal of sociology, 115(2):405 --
450.
Kwon, H. E., Oh, W., and Kim, T. (2017). Platform structures, homing preferences, and homophilous propensities in online social
networks. Journal of Management Information Systems, 34(3):768 -- 802.
Lerman, K., Jain, P., Ghosh, R., Kang, J.-H., and Kumaraguru, P. (2013). Limited attention and centrality in social networks. In Social
Intelligence and Technology (SOCIETY), 2013 International Conference on, pages 80 -- 89. IEEE.
Lewis, R. A. and Rao, J. M. (2015). The unfavorable economics of measuring the returns to advertising. The Quarterly Journal of
Economics, 130(4):1941 -- 1973.
Lin, M. and Viswanathan, S. (2015). Home bias in online investments: An empirical study of an online crowdfunding market. Man-
agement Science, 62(5):1393 -- 1414.
Linkedin (2016).
People you may know.
overview?lang=en.
https://www.linkedin.com/help/linkedin/answer/29/people-you-may-know-feature-
Marmaros, D. and Sacerdote, B. (2006). How do friendships form? The Quarterly Journal of Economics, 121(1):79 -- 119.
Mayer, A. and Puller, S. L. (2008). The old boy (and girl) network: Social network formation on university campuses. Journal of public
economics, 92(1-2):329 -- 347.
Mayzlin, D. and Yoganarasimhan, H. (2012). Link to success: How blogs build an audience by promoting rivals. Management Science,
58(9):1651 -- 1668.
McPherson, M., Smith-Lovin, L., and Cook, J. M. (2001). Birds of a feather: Homophily in social networks. Annual review of sociology,
27(1):415 -- 444.
Mele, A. (2017). A structural model of dense network formation. Econometrica, 85(3):825 -- 850.
Mollica, K. A., Gray, B., and Trevino, L. K. (2003). Racial homophily and its persistence in newcomers' social networks. Organization
Science, 14(2):123 -- 136.
Displaying Things in Common to Encourage Friendship Formation
19
Moricz, M., Dosbayev, Y., and Berlyant, M. (2010). Pymk: friend recommendation at myspace. In Proceedings of the 2010 ACM
SIGMOD International Conference on Management of data, pages 999 -- 1002. ACM.
Oestreicher-Singer, G., Libai, B., Sivan, L., Carmi, E., and Yassin, O. (2013). The network value of products. Journal of Marketing,
77(3):1 -- 14.
Oestreicher-Singer, G. and Sundararajan, A. (2012). Recommendation networks and the long tail of electronic commerce. Mis quar-
terly, pages 65 -- 83.
Owen, A. B., Eckles, D., et al. (2012). Bootstrapping data arrays of arbitrary order. The Annals of Applied Statistics, 6(3):895 -- 927.
Peng, J., Agarwal, A., Hosanagar, K., and Iyengar, R. (2018). Network overlap and content sharing on social media platforms. Journal
of Marketing Research, 55(4):571 -- 585.
Phan, T. Q. and Airoldi, E. M. (2015). A natural experiment of social network formation and dynamics. Proceedings of the National
Academy of Sciences, 112(21):6595 -- 6600.
Phan, T. Q. and Godes, D. (2018). The evolution of influence through endogenous link formation. Marketing Science, 37(2):259 -- 278.
Price, R. (2012). Growth hacking: leading indicators of engaged users. http://www.richardprice.io/post/34652740246/growth-hacking-
leading-indicators-of-engaged.
Shalizi, C. R. and Thomas, A. C. (2011). Homophily and contagion are generically confounded in observational social network studies.
Sociological methods & research, 40(2):211 -- 239.
Shannon, C. (1948). A mathematical theory of communication, bell system technical journal, vol. 27, 379-423 & 623-656, july &
october.
Shi, Z., Rui, H., and Whinston, A. B. (2014). Content sharing in a social broadcasting environment: evidence from twitter. MIS
Quarterly, 38(1):123 -- 142.
Shriver, S. K., Nair, H. S., and Hofstetter, R. (2013). Social ties and user-generated content: Evidence from an online social network.
Management Science, 59(6):1425 -- 1443.
Su, J., Sharma, A., and Goel, S. (2016). The effect of recommendations on network structure. In Proceedings of the 25th international
conference on World Wide Web, pages 1157 -- 1167. International World Wide Web Conferences Steering Committee.
Sundararajan, A. (2007). Local network effects and complex network structure. The BE Journal of Theoretical Economics, 7(1).
Susarla, A., Oh, J.-H., and Tan, Y. (2012). Social networks and the diffusion of user-generated content: Evidence from youtube.
Information Systems Research, 23(1):23 -- 41.
Thelwall, M. (2009). Homophily in myspace. Journal of the Association for Information Science and Technology, 60(2):219 -- 231.
Toubia, O. and Stephen, A. T. (2013). Intrinsic vs. image-related utility in social media: Why do people contribute content to twitter?
Marketing Science, 32(3):368 -- 392.
Tucker, C. (2008). Identifying formal and informal influence in technology adoption with network externalities. Management Science,
54(12):2024 -- 2038.
Ugander, J., Backstrom, L., Marlow, C., and Kleinberg, J. (2012). Structural diversity in social contagion. Proceedings of the National
Academy of Sciences, page 201116502.
Wang, C., Zhang, X., and Hann, I.-H. (2018). Socially nudged: A quasi-experimental study of friends' social influence in online product
ratings. Information Systems Research.
Yadav, M. S. and Pavlou, P. A. (2014). Marketing in computer-mediated environments: Research synthesis and new directions. Journal
of Marketing, 78(1):20 -- 40.
Yoganarasimhan, H. (2012). Impact of social network structure on content propagation: A study using youtube data. Quantitative
Marketing and Economics, 10(1):111 -- 150.
Zuckerberg, M. (2017). Bringing the world closer together. https://www.facebook.com/notes/mark-zuckerberg/bringing-the-world-
closer-together/10154944663901634/.
20
Appendices
A Tables and Figures
Tianshu Sun, Sean J. Taylor
Mutual
Friends
TICs
Displayed
TICs
Exposures
Requests
Accepts
1
2
3
1
2
3
no
no
no
no
yes
yes
yes
yes
Total
0
1
0
1
2
0
1
2
3
0
1
0
1
2
0
1
2
3
6.8e+06
6.8e+06
2.2e+06
4.5e+06
2.2e+06
6.8e+04
2.1e+05
2.1e+05
6.9e+04
2.3e+07
1.1e+07
1.1e+07
8.7e+05
1.7e+06
8.7e+05
1.6e+05
4.8e+05
4.8e+05
1.6e+05
2.7e+07
5.0e+07
3.4e+04
3.6e+04
1.0e+04
2.1e+04
1.1e+04
8.4e+02
2.7e+03
2.9e+03
9.4e+02
1.2e+05
1.2e+05
1.3e+05
1.7e+04
3.4e+04
1.7e+04
2.6e+03
8.0e+03
8.1e+03
2.8e+03
3.4e+05
4.6e+05
5.8e+03
6.2e+03
1.4e+03
2.9e+03
1.6e+03
1.1e+02
3.4e+02
3.4e+02
9.8e+01
1.9e+04
5.2e+04
5.2e+04
6.9e+03
1.4e+04
7.0e+03
7.3e+02
2.3e+03
2.3e+03
8.1e+02
1.4e+05
1.6e+05
Pr(Request) x
100
0.49
0.52
0.45
0.47
0.48
1.24
1.33
1.43
1.37
0.51
1.14
1.15
1.91
1.96
1.97
1.65
1.68
1.70
1.79
1.28
0.92
Pr(Accept) x
100
17.27
17.49
14.22
13.83
14.75
12.54
12.63
11.66
10.44
15.90
41.86
41.68
41.60
41.27
40.74
28.05
28.58
28.98
28.51
40.82
34.35
Table A.1: Summary Statistics
Overall the experiment includes about 50 million viewer-profile pairs. A large fraction of the sample comes
from viewer-profile pairs with one TIC ( 73%) and two TIC ( 25%). Among all pairs, about 23 million share
no mutual friends (upper panel) and 27 million pairs share mutual friends (lower panel). The friend request
rate is correlated with the number of TICs, while the accept rate is negatively correlated with it.
Displaying Things in Common to Encourage Friendship Formation
21
TICs
Displayed
TICs
1
2
3
1
1
2
1
2
3
Friend Requests
Friend Formations
RR
1.021
1.032
1.052
1.034
1.061
1.089
Effect
1.89
2.70
4.41
5.21
9.31
13.50
s.e.
(0.34)
(0.65)
(0.79)
(2.88)
(2.85)
(3.70)
p-value
0.00
0.00
0.00
0.03
0.00
0.00
RR
1.013
1.018
1.034
1.050
1.071
1.081
Effect
0.43
0.48
0.91
1.83
2.62
2.98
s.e.
(0.20)
(0.36)
(0.45)
(1.36)
(1.32)
(1.84)
p-value
0.01
0.10
0.03
0.09
0.03
0.04
Table A.2: Effect of Displaying TICs on Friend Requests and Formation
RR stands for relative risk and is calculated using the relative ratio in means compared to the baseline group
(i.e. viewer-profile pairs with the same number of actual TICs but zero TICs at display). RR corresponds to
the y-scale in Figure 6. Effect is measured using the absolute difference in means compared to showing zero
TICs (baseline) and denominated here in basis points for readability. Standard errors are estimated using a
clustered bootstrap on viewer with 500 bootstrap replicates.
Mutual
Friends
TICs
Displayed
TICs
no
no
no
yes
yes
yes
1
2
3
1
2
3
1
1
2
1
2
3
1
1
2
1
2
3
Friend Requests
Friend Formations
RR
1.056
1.036
1.073
1.075
1.145
1.099
1.011
1.028
1.036
1.022
1.035
1.086
s.e.
(0.38)
(0.56)
(0.71)
(5.37)
(5.4)
(5.95)
(0.49)
(1.87)
(2.05)
(3.61)
(3.67)
(4.66)
p-value
0.00
0.00
0.00
0.04
0.00
0.02
0.00
0.00
0.00
0.17
0.06
0.00
RR
1.073
1.002
1.103
1.119
1.126
0.961
1.006
1.020
1.016
1.041
1.066
1.100
s.e.
(0.16)
(0.21)
(0.26)
(1.66)
(1.68)
(2.10)
(0.30)
(1.18)
(1.42)
(1.84)
(1.76)
(2.42)
p-value
0.00
0.49
0.00
0.16
0.15
0.64
0.16
0.08
0.19
0.16
0.04
0.02
Table A.3: Effect of Displaying TICs on Friend Requests and Formation (Decomposed by Whether View-
Profile Pairs Share Mutual Friends)
RR stands for relative ratio and is calculated using the relative lift in means compared to the baseline group
(i.e. viewer-profile pairs with the same number of actual TICs but zero TICs at display). Standard errors are
estimated using a clustered bootstrap on viewer with 500 bootstrap replicates.
22
Tianshu Sun, Sean J. Taylor
Fig. A.1: Distribution. We group all pairs by the number of actual things in common shared between the
viewer-profile and draw its distribution. Most viewer-profile pairs have one thing in common.
Fig. A.2: Distribution. We group all pairs by the number of actual things in common shared between the
pairs and draw separate distribution for pairs with and without mutual friend.
0.00.20.40.612345Number of Things in CommonFraction of SampleMutual FriendsNo Mutual Friends12345123450.00.20.40.60.8Number of Things in CommonFraction of SampleDisplaying Things in Common to Encourage Friendship Formation
23
Fig. A.3: Distribution of profiles per viewer (left) and Distribution of viewers per profile (right).
Fig. A.4: Effects of displaying things in common. Same as Figure 6 with an additional panel for pairs with 3
TIC
Total = 1853349Mean = 26.8805000001000000150000020000000100200Number of Profiles ViewedCumulative Number of ViewersTotal = 39023089Mean = 1.280e+001e+072e+073e+074e+075101520Number of Users Viewing ProfileCumulative Number of Profileslllllllll1 Thing in Common2 Things in Common3 Things in Common0101201231.001.051.101.15Number of Things in Common ShownRelative Risk of OutcomelRequestFormation24
Tianshu Sun, Sean J. Taylor
Fig. A.5: Effects of displaying things in common, for pairs with and without mutual friends. Same as Figure
7 with an additional panel for pairs with 3 TIC
Fig. A.6: Acceptance Rate Conditional on Request
llllllllllllllllll1 Thing in Common2 Things in Common3 Things in CommonMutual FriendsNo Mutual Friends0101201231.001.051.101.151.200.81.01.21.4Number of Things in Common ShownRelative Risk of OutcomelRequestFormationDisplaying Things in Common to Encourage Friendship Formation
25
Fig. A.7: Effect of Displaying Thing in common on Friend Request, for male viewers and female viewers.
Fig. A.8: Effect of Displaying Thing in common on Friend Request, for gender combinations of viewers and
profiles.
26
Tianshu Sun, Sean J. Taylor
Fig. A.9: Effect of Displaying Thing in common on Friend Request, for viewers with different number of
friends.
Displaying Things in Common to Encourage Friendship Formation
27
Fig. A.10: Incremental Effect of displaying both things in Common, as compared to displaying one. Follow-
ing information theory, we measured the incremental information ('surprisal') of displaying two TIC (mutual
hometown and current city), as compared displaying one, using normalized pointwise mutual information
(PMI). We calculate normalized PMI using its formal definition (Church and Hanks 1990): the surprisal
(−log2(Pr(Xia = Xja))) of displaying mutual hometown plus the surprisal of displaying current city minus
the joint surprisal of displaying both mutual current city and hometown, normalized by joint surprisal. The
PMI measure, ranging from +1 to -1, captures the co-occurrence likelihood and is symmetric with respect
to the two TICs. An PMI with +1 indicates 100% likelihood of co-occurrence, thus displaying both mutual
hometown and current city would reveal little additional information or 'surprisal'. In contrast, a low PMI in-
dicates a small likelihood of co-occurrence thus displaying both TIC would would be more surprising to the
viewer given that they already know one of the TIC). The empirical finding is aligned with such mechanism
and further confirms the belief update process underlying the effectiveness of displaying TIC. To generate
smooth curves, we fit LOESS regressions separately for the display 2 TIC and display 1 TIC conditions for
each of 500 bootstrap replicates clustered on viewer. The dashed lines are the 95% bootstrap confidence
intervals for the smoothed estimates of the ratio.
28
Tianshu Sun, Sean J. Taylor
Fig. A.11: Comparison of Post-friendship Interaction score between friendship ties in control versus treat-
ment group. We categorize all the friendship ties formed in our experiment into two groups based on whether
certain TIC is shown during friendship formation process, and then calculate the difference between the
groups in the volume of their post-friendship interactions (like, comment, messaging). We do not find any
significant difference in the post-friendship interactions between the control and treatment group.
Fig. A.12: Distribution of things in common when the viewer-profile pair share two things in common.
Among the large number of combinations between the five types of TIC (mutual city, like, hometown,
education, work), we only show distributions for the nine most commonly seen combinations. The remaining
combinations consist of a very small portion of our sample.
0.00.10.2city or educationcity or hometowncity or likescity or workeducation or hometowneducation or likeshometown or likeshometown or worklikes or workThing in Common (Two Available)Fraction of ObservationsDisplaying Things in Common to Encourage Friendship Formation
29
Fig. A.13: Effects of showing zero, one, or both things in common when the viewer-profile pair share two
things in common. Among the large number of combinations between the five types of TIC (mutual city,
like, hometown, education, work), we only show the effect of TIC display for the nine most commonly seen
combinations. The remaining combinations consist of a very small portion of our sample.
llllllllllllllllllllllllllllllllllllhometown or likeshometown or worklikes or workcity or workeducation or hometowneducation or likescity or educationcity or hometowncity or likesnonehometownlikesbothnonehometownworkbothnonelikesworkbothnonecityworkbothnoneeducationhometownbothnoneeducationlikesbothnonecityeducationbothnonecityhometownbothnonecitylikesboth0.91.01.11.21.30.91.01.11.21.30.91.01.11.21.3Thing in Common Shown (Two Available)Relative Risk of Friend Request30
Tianshu Sun, Sean J. Taylor
B Effect of Displaying Different Types of Things in Common
The availability of multiple types of things in common in our experiment also enables us, for the first time,
to investigate the relative importance of a range of TIC documented in the literature (McPherson et al. 2001)
in the same context. Previous studies on homophily have separately documented different things in common
in social networks (Ibarra 1992, Currarini et al. 2010), but never compared the causal effect of them within
the same context.
We find a variation in the effect of showing different types of things in common (Figure B.1). We fo-
cus on presenting the results for viewer-profile pairs with only one thing in common, as they represent the
majority of the sample (Figure 6). There are three categories of things in common: past experience (mu-
tual hometown, mutual education, mutual work), current context (mutual city), common interests (overlap
of page like). As shown in Figure B.1, certain type of things in common, such as mutual likes, city and
hometown, may lead to a larger increase in friendship formation than other types of things in common
(mutual education). Previous studies on homophily has separately documented different type of things in
common across different situations (Ibarra 1992, Currarini et al. 2010, Thelwall 2009), but never compared
the relative importance of them within the same context. Similar to previous studies on social influence (Aral
and Walker 2014), we find that social factors such as current context (e.g. mutual city) and past experience
(mutual hometown) are associated with a large impact on friendship formation. However, we also find that
showing overlap of interest may also be effective: a finding that has not been established before. In this way,
we contribute to the literature on the role of different type of things in common (or similarity) in facilitating
interpersonal interaction (Berscheid and Reis 1998).
Displaying Things in Common to Encourage Friendship Formation
31
Fig. B.1: Distribution and effects of showing specific type of things in common when the viewer-profile pair
share one thing in common. Using zero things in common as a baseline, showing shared likes and hometown
significantly increases the relative risk of friendship formation, while we cannot reject the null hypothesis
that showing a shared city or education causes any change. 95% confidence intervals are computed from
standard errors estimated using a bootstrap clustered on viewer with 500 bootstrap replicates.
Fig. B.2: Effect of Specific Type of Thing in common, for pairs with and without mutual friends. We group all
pairs with one thing in common by the specific things in common as well as the existence of mutual friends.
Using pairs with zero things in common shown as a baseline within each group, we find showing certain
thing in common increases the relative risk of friendship formation, but only for people with no mutual
friends and for shared likes, hometown and city.
0.00.10.20.30.4likeshometowncityeducationworkThing in Common (One Available)Fraction of Observationslllll0.9500.9751.0001.0251.050likeshometowncityeducationworkThing in Common ShownRelative Risk of Friendship Formation32
Tianshu Sun, Sean J. Taylor
C Methodological: Correlation from Observational Data is Opposite to the Causal Effect of TIC
Finally, we want to demonstrate the importance and necessity of using a randomized experiment approach
to identify causal effect of showing TIC. We explicitly compare the estimates from our experiment with
those from a direct correlation analysis using observational data to highlight the advantage of our method. In
Figure C.1, we can see that interestingly the correlation between number of things in common and friendship
formation is in the opposite direction from the identified causal effect of showing things in common: for
viewer-profile pairs with mutual friends, the observed correlation suggests a very positive and significant
effect of showing more things in common, i.e. pairs with more TIC is more likely to form friendship, whereas
the true causal effect of TIC based on experiment results is zero; for viewer-profile pairs with no mutual
friends, the observed correlation suggests a zero or even slightly negative relationship between more TIC
and friendship formation, whereas the true causal effect of showing TIC is large and significant. This contrast
further highlights the importance of using a randomized experiment for causal inference. As shown above,
using the observed correlation in the secondary data may significantly bias the effect of displayed things in
common. We can cleanly identify the causal effect from correlation only by using a proper randomization.
Fig. C.1: Correlation vs Causal Effect of TIC on friendship formation. Correlation between number of things
in common in a pair and the friendship formation rate (Left) is biased and opposite to the true causal effect
of showing things in commons (middle and right).
Displaying Things in Common to Encourage Friendship Formation
33
D Theoretical Contribution: Identifying the Role of Individual Preference in Things in Common
(versus Structural Factor) in Network Formation
Besides practical importance, our findings from a carefully designed large-scale randomized experiment may
contribute to social network literature and improve our theoretical understanding of the origin of network
formation and homophily, in a few ways.
First, while strategic network formation have been studied in detail using analytical models (Bala and
Goyal 2000, Jackson 2008) and simulations (Phan and Godes 2018), empirical work designed to test theories
and examine the drivers of network formation is still in their infancy. Most of the empirical works on network
formation (Currarini et al. 2010, Mele 2017) impose strong functional assumptions and use network structure
for identification20. To the best of our knowledge, our study is the first randomized field experiment to
directly engineer the drivers of network formation (i.e. viewer's information about the alter as in our case).
Our experiment design and framework provides a new way to examine various factors underlying network
formation and the relative importance between them, in real networks and at a very large scale.
Second, as documented by a broad history of literature on homophily in social network (McPherson et al.
2001), an individual is more likely to form a friendship tie with someone that is similar to her/him in demo-
graphic and behavioral attributes (Centola 2015, Ameri et al. 2017, Goel and Goldstein 2013). However, the
origin of homophily is far from clear (Kossinets and Watts 2009, Currarini et al. 2010). Recent literature hy-
pothesizes that the homophily pattern in social network might be partially driven by individuals' preference
over similar others (termed as preference or choice homophily Currarini et al. (2009)), as opposed to the
structural factors. However, as far as we know, no study has provided clear empirical evidence on whether
and when preference for TIC would drive network formation. As the literature repeatedly acknowledge (Cur-
rarini et al. 2010, Phan and Airoldi 2015), such lack of insights is because preference factor and structural
factor in network formation process are inherently confounded in observational data and extremely hard to
disentangle: pairs with similar attributes are always more likely to have mutual friends. We address the chal-
lenge by designing a experiment to exogenously vary the prominence of things in common displayed during
friendship formation in a real social network. The randomization is independent of structural factor there-
fore allows us, for the first time, to demonstrate the importance of preference in driving friendship formation.
Third, we examine the relationship between preference and structural factor in network formation and find
that preference over TIC matters in the absence of structural factor (mutual friend) thus can be leveraged to
encourage formation of weak ties.
Finally and importantly, the variation in the treatment effect within each type of TIC (e.g. sharing mutual
hometowns of different size) sheds light on the underlying mechanisms: aligned with belief update process
(Ely et al. 2015), displaying TIC is more effective when the information shown is less expected, and the
effect size of a certain TIC is in proportion to the 'surprise' it creates to the viewer (measured by bits in
information theory). Our study is among the first to understand network formation and homophily from a
belief update perspective. SN sites can use our information-theoretic principles to optimally select specific
things in common to highlight in online friendship formation process. The information-theoretic framework
may also be extended to guide the personalized design of user profile for each viewer-profile interaction.
20 One exception is Phan and Airoldi (2015), in which the authors carefully design a long-term natural experiment of friendship
formation and social dynamics in the aftermath of a natural disaster.
|
1212.0146 | 1 | 1212 | 2012-12-01T18:41:34 | Efficient Community Detection in Large Networks using Content and Links | [
"cs.SI",
"physics.soc-ph"
] | In this paper we discuss a very simple approach of combining content and link information in graph structures for the purpose of community discovery, a fundamental task in network analysis. Our approach hinges on the basic intuition that many networks contain noise in the link structure and that content information can help strengthen the community signal. This enables ones to eliminate the impact of noise (false positives and false negatives), which is particularly prevalent in online social networks and Web-scale information networks.
Specifically we introduce a measure of signal strength between two nodes in the network by fusing their link strength with content similarity. Link strength is estimated based on whether the link is likely (with high probability) to reside within a community. Content similarity is estimated through cosine similarity or Jaccard coefficient. We discuss a simple mechanism for fusing content and link similarity. We then present a biased edge sampling procedure which retains edges that are locally relevant for each graph node. The resulting backbone graph can be clustered using standard community discovery algorithms such as Metis and Markov clustering.
Through extensive experiments on multiple real-world datasets (Flickr, Wikipedia and CiteSeer) with varying sizes and characteristics, we demonstrate the effectiveness and efficiency of our methods over state-of-the-art learning and mining approaches several of which also attempt to combine link and content analysis for the purposes of community discovery. Specifically we always find a qualitative benefit when combining content with link analysis. Additionally our biased graph sampling approach realizes a quantitative benefit in that it is typically several orders of magnitude faster than competing approaches. | cs.SI | cs |
Efficient Community Detection in Large
Networks using Content and Links
Yiye Ruan, David Fuhry, Srinivasan Parthasarathy
Department of Computer Science and Engineering
The Ohio State University
{ruan,fuhry,srini}@cse.ohio-state.edu
February 5, 2014
Abstract
In this paper we discuss a very simple approach of combining content and
link information in graph structures for the purpose of community discovery, a
fundamental task in network analysis. Our approach hinges on the basic intuition
that many networks contain noise in the link structure and that content information
can help strengthen the community signal. This enables ones to eliminate the
impact of noise (false positives and false negatives), which is particularly prevalent
in online social networks and Web-scale information networks.
Speci fically we introduce a measure of signal strength betwe en two nodes in
the network by fusing their link strength with content similarity. Link strength
is estimated based on whether the link is likely (with high probability) to reside
within a community. Content similarity is estimated through cosine similarity or
Jaccard coefficient. We discuss a simple mechanism for fusin g content and link
similarity. We then present a biased edge sampling procedure which retains edges
that are locally relevant for each graph node. The resulting backbone graph can
be clustered using standard community discovery algorithms such as Metis and
Markov clustering.
Through extensive experiments on multiple real-world datasets (Flickr, Wikipedia
and CiteSeer) with varying sizes and characteristics, we demonstrate the effective-
ness and efficiency of our methods over state-of-the-art lea rning and mining ap-
proaches several of which also attempt to combine link and content analysis for
the purposes of community discovery. Speci fically we always
find a qualitative
benefit when combining content with link analysis. Addition ally our biased graph
sampling approach realizes a quantitative benefit in that it
is typically several or-
ders of magnitude faster than competing approaches.
1 Introduction
An increasing number of applications on the World Wide Web rely on combining link
and content analysis (in different ways) for subsequent analysis and inference. For
example, search engines, like Google, Bing and Yahoo! typically use content and link
1
information to index, retrieve and rank web pages. Social networking sites like Twitter,
Flickr and Facebook, as well as the aforementioned search engines, are increasingly
relying on fusing content (pictures, tags, text) and link information (friends, followers,
and users) for deriving actionable knowledge (e.g. marketing and advertising).
In this article we limit our discussion to a fundamental inference problem — that
of combining link and content information for the purposes of inferring clusters or
communities of interest. The challenges are manifold. The topological characteristics
of such problems (graphs induced from the natural link structure) makes identifying
community structure difficult. Further complicating the is sue is the presence of noise
(incorrect links (false positives) and missing links (false negatives). Determining how
to fuse this link structure with content information efficie ntly and effectively is unclear.
Finally, underpinning these challenges, is the issue of scalability as many of these
graphs are extremely large running into millions of nodes and billions of edges, if not
larger.
Given the fundamental nature of this problem, a number of solutions have emerged
in the literature. Broadly these can be classified as: i) thos e that ignore content infor-
mation (a large majority) and focus on addressing the topological and scalability chal-
lenges, and ii) those that account for both content and topological information. From
a qualitative standpoint the latter presumes to improve on the former (since the null
hypothesis is that content should help improve the quality of the inferred communities)
but often at a prohibitive cost to scalability.
In this article we present CODICIL1 , a family of highly efficient graph simplifica-
tion algorithms leveraging both content and graph topology to identify and retain im-
portant edges in a network. Our approach relies on fusing content and topological (link)
information in a natural manner. The output of CODICIL is a transformed variant of
the original graph (with content information), which can then be clustered by any fast
content-insensitive graph clustering algorithm such as METIS or Markov clustering.
Through extensive experiments on real-world datasets drawn from Flickr, Wikipedia,
and CiteSeer, and across several graph clustering algorithms, we demonstrate the ef-
fectiveness and efficiency of our methods. We find that CODICI L runs several orders
of magnitude faster than those state-of-the-art approaches and often identifies commu-
nities of comparable or superior quality on these datasets.
This paper is arranged as follows. In Section 2 we discuss existent research efforts
pertaining to our work. The algorithm of CODICIL, along with implementation details,
is presented in Section 3. We report quantitative experiment results in Section 4, and
demonstrate the qualitative bene fits brought by CODICIL via case studies in Section 5.
We finally conclude the paper in Section 6.
2 Related Work
Community Discovery using Topology (and Content): Graph clustering/partitioning
for community discovery has been studied for more than five de cades, and a vast
number of algorithms (exemplars include Metis [15], Graclus [6] and Markov clus-
tering [27]) have been proposed and widely used in fields incl uding social network
1COmmunity Discovery Inferred from Content Information and Link-structure
2
analytics, document clustering, bioinformatics and others. Most of those methods,
however, discard content information associated with graph elements. Due to space
limitations, we suppress detailed discussions and refer interested readers to recent sur-
veys (e.g. [9]) for a more comprehensive picture. Leskovec et al. compared a multitude
of community discovery algorithms based on conductance score, and discovered the
trade-off between clustering objective and community compactness [16].
Various approaches have been taken to utilize content information for community
discovery. One of them is generative probabilistic modeling which considers both
contents and links as being dependent on one or more latent variables, and then esti-
mates the conditional distributions to find community assig nments. PLSA-PHITS [5],
Community-User-Topic model [29] and Link-PLSA-LDA [20] are three representa-
tives in this category. They mainly focus on studies of citation and email communica-
tion networks. Link-PLSA-LDA, for instance, was motivated for finding latent topics
in text and citations and assumes different generative processes on citing documents,
cited documents as well as citations themselves. Text generation is following the LDA
approach, and link creation from a citing document to a cited document is controlled
by another topic-specific multinomial distribution.
Yang et al. [28] introduced an alternative discriminative probabilistic model, PCL-
DC, to incorporate content information in the conditional link model and estimate the
community membership directly. In this model, link probability between two nodes
is decided by nodes’ popularity as well as community membership, which is in turn
decided by content terms. A two-stage EM algorithm is proposed to optimize com-
munity membership probabilities and content weights alternately. Upon convergence,
each graph node is assigned to the community with maximum membership probability.
Researchers have also explored ways to augment the underlying network to take
into account the content information. The SA-Cluster-Inc algorithm proposed by Zhou
et al. [30], for example, inserts virtual attribute nodes and attribute edges into the graph
and computes all-pair random walk distances on the new attribute-augmented graph.
K-means clustering is then used on original graph nodes to assign them to different
groups. Weights associated with attributes are updated after each k-means iteration
according to their clustering tendencies. The algorithm iterates until convergence.
Ester et al. [8] proposed an heuristic algorithm to solve the Connected k -Center
problem where both connectedness and radius constraints need to be satisfied. The
complexity of this method is dependent on the longest distance between any pair of
nodes in the feature space, making it susceptible to outliers. Biologists have studied
methods [13, 26] to find functional modules using network top ology and gene expres-
sion data. Those methods, however, bear domain-specific ass umptions on data and are
therefore not directly applicable in general.
Recently G unnemann et al. [12] introduced a subspace clustering algorithm on
graphs with feature vectors, which shares some similarity with our topic. Although
their method could run on the full feature space, the search space of their algorithm
is con fined by the intersection, instead of union, of the epsi lon-neighborhood and the
density-based combined cluster. Furthermore, the construction of both neighborhoods
are sensitive to their multiple parameters.
While decent performance can be achieved on small and medium graphs using
those methods, it often comes at the cost of model complexity and lack of scalability.
3
Some of them take time proportional to the number of values in each attribute. Oth-
ers take time and space proportional to the number of clusters to find, which is often
unacceptable. Our method, in contrast, is more lightweight and scalable.
Clustering/Learning Multiple Graphs: Content-aware clustering is also related to
multiple-view clustering, as content information and link structure can be treated as
two views of the data. Strehl and Ghose [23] discussed three consensus functions
(cluster-wise similarity partitioning, hyper-graph partitioning and meta-clustering) to
implement cluster ensembles, in which the availability of each individual view’s clus-
tering is assumed. Tang et al. [24] proposed a linked matrix factorization method,
where each graph’s adjacency matrix is decomposed into a “ch aracteristic ” matrix and
a common factor matrix shared among all graphs. The purpose of factorization is to
represent each vertex by a lower-dimensional vector and then cluster the vertices using
corresponding feature vectors. Their method, while applicable to small-scale problems,
is not designed for web-scale networks.
Graph Sampling for Fast Clustering: Graph sampling (also known as “sparsifica-
tion ” or “
filtering ”) has attracted more and more focus in rec
ent years due to the ex-
plosive growth of network data. If a graph’s structure can be preserved using fewer
nodes and/or edges, community discovery algorithms can obtain similar results using
less time and memory storage. Maiya and Berger-Wolf [17] introduced an algorithm
which greedily identifies the node that leads to the greatest expansion in each iteration
until the user-specified node count is reached. By doing so, a n expander-like node-
induced subgraph is constructed. After clustering the subgraph, the unsampled nodes
can be labeled by using collective inference or other transductive learning methods.
This extra post-processing step, however, operates on the original graph as a whole and
easily becomes the scalability bottleneck on larger networks.
Satuluri et al. [22] proposed an edge sampling method to preferentially retain edges
that connect two similar nodes. The localized strategy ensures that edges in the rela-
tively sparse areas will not be over-pruned. Their method, however, does not consider
content information either.
Edge sampling has also been applied to other graph tasks. Karger [14] studied the
impact of random edge sampling on original graph’s cuts, and proposed randomized
algorithms to find graph’s minimum cut and maximum flow. Aggar wal et al. [1] pro-
posed using edging sampling to maintain structural properties and detect outliers in
graph streams. The goals of those work are not to preserve community structure in
graphs, though.
3 Methodology
We begin by de fining the notations used in the rest of our paper . Let Gt = (V , Et , T )
be an undirected graph with n vertices V = v1 , . . . , vn , edges Et , and a collection of n
corresponding term vectors T = t1 , . . . , tn . We use the terms “graph ” and “network ”
interchangeably as well as the terms “vertex ” and “node ”. El
ements in each term vector
ti are basic content units which can be single words, tags or n-grams, etc., depending
on the context of underlying network. For each graph node vi ∈ V , let its term vector
be ti .
4
Our goal is to generate a simplified, edge-sampled graph Gsample = (V , Esample )
and then use Gsample to find communities with coherent content and link structure .
Gsample should possess the following properties:
• Gsample has the same vertex set as Gt . That is, no node in the network is added
or removed during the simplification process.
• Esample ≪ Et , as this enables both better runtime performance and lower
memory usage in the subsequent clustering stage.
• Informally put, the resultant edge set Esample would connect node pairs which
are both structure-wise and content-wise similar. As a result, it is possible for
our method to add edges which were absent from Et since the content similarity
was overlooked.
3.1 Key Intuitions
The main steps of the CODICIL algorithm are:
1. Create content edges.
2. Sample the union of content edges and topological edges with bias, retaining
only edges that are relevant in local neighborhoods.
3. Partition the simplified graph into clusters.
The constructed content graph and simplified graph have the s ame vertices as the
input graph (vertices are never added or removed), so the essential operations of the
algorithm are constructing, combining edges and then sampling with bias. Figure 1
illustrates the work flow of CODICIL.
1. Create content edges
Term vectors T
Content edges Ec
3. Sample edges with bias
2. Combine edges
Edge union Eu
Edge subset Esample
Topological edges Et
4. Cluster
Clustering C
Vertices V
Figure 1: Work flow of CODICIL
From the term vectors T , content edges Ec are constructed. Those content edges
and the input topological edges Et are combined as Eu which is then sampled with bias
to form a smaller edge set Esample where the most relevant edges are preserved. The
graph composed of these sampled edges is passed to the graph clustering algorithm
which partitions the vertices into a given number of clusters.
3.2 Basic Framework
The pseudo-code of CODICIL is given in Algorithm 1.
5
l , clusteralgo(·, ·),
Algorithm 1 CODICIL
Input: Gt = (V , Et , T ), k , normaliz e(·), α ∈ [0, 1],
similarity (·, ·)
Returns: C (a disjoint clustering of V )
1: \\Create content edges Ec
2: Ec ← ∅
3: for i = 1 to V do
foreach vj ∈ T opK (vi , k , T ) do
4:
Ec ← Ec ∪ (vi , vj )
5:
end for
6:
7: end for
8: \\Combine Et and Ec . Retain edges with a bias towards locally relevant ones
9: Eu ← Et ∪ Ec
10: Esample ← ∅
11: for i = 1 to V do
\\Γi contains vi ’s neighbors in the edge union
12:
Γi ← ngbr(vi , Eu )
13:
for j = 1 to Γi do simt
ij ← similarity (ngbr(vi , Et ), ngbr(γj , Et ))
14:
i ← normaliz e(simt
simnormt
i )
15:
for j = 1 to Γi do simc
ij ← similarity (ti , tγj )
16:
simnormc
i ← normaliz e(simc
i )
17:
for j = 1 to Γi do simij ← α · simnormt
ij + (1 − α) · simnormc
18:
ij
\\Sort similarity values in descending order. Store the corresponding node IDs
19:
in idxi
[vali , idxi ] ← descsort(simi )
for j = 1 to lpΓi m do
Esample ← Esample ∪ (vi , vidxij )
22:
end for
23:
24: end for
25: Gsample ← (V , Esample )
26: C ← clusteralgo(Gsample , l) \\Partition into l clusters
27: return C
20:
21:
CODICIL takes as input 1) Gt , the original graph consisting of vertices V , edges
Et and term vectors T where ti is the content term vector for vertex vi , 1 ≤ i ≤
V = T , 2) k , the number of nearest content neighbors to find for each vert ex, 3)
normaliz e(x), a function that normalizes a vector x, 4) α, an optional parameter that
specifies the weights of topology and content similarities, 5) l , the number of output
clusters desired, 6) clusteralgo(G , l), an algorithm that partitions a graph G into l
clusters and 7) similarity (x, y) to compute similarity between x and y . Note that
any content-insensitive graph clustering algorithm can be plugged in the CODICIL
framework, providing great flexibility for applications.
6
3.2.1 Creating Content Edges
Lines 2 through 7 detail how content edges are created. For each vertex vi , its k most
content-similar neighbors are computed2. For each of vi ’s top-k neighbors vj , an edge
(vi , vj ) is added to content edges Ec . In our experiments we implemented the T opK
sub-routine by calculating the cosine similarity of ti ’s TF-IDF vector and each other
term vector’s TF-IDF vector. For a content unit c, its TF-IDF value in a term vector ti
is computed as
tf -idf (c, ti ) = ptf (c, ti ) · log 1 +
The cosine similarity of two vectors x and y is
(1)
j=1 tf (c, tj ) ! .
T
PT
x · y
kxk2 · kyk2
.
cosine(x, y) =
(2)
The k vertices corresponding to the k highest TF-IDF vector cosine similarity val-
ues with vi are selected as the top-k neighbors of vi .
3.2.2 Local Ranking of Edges and Graph Simplification
Line 9 takes the union of the newly-created content edge set Ec and the original topo-
logical edge set Et . In lines 10 through 24, a sampled edge set Esample is constructed by
retaining the most relevant edges from the edge union Eu . For each vertex vi , the edges
to retain are selected from its local neighborhood in Eu (line 13). We compute the topo-
logical similarity (line 14) between node vi and its neighbor γj as the relative overlap
of their respective topological neighbor sets, I = ngbr(vi , Et ) and J = ngbr(γj , Et ),
using similarity (either cosine similarity as in Equation 2 or Jaccard coeffic ient as
de fined below):
j accard(I , J ) =
I ∩ J
I ∪ J
.
(3)
After the computation of the topological similarity vector simt
i finishes, it is nor-
malized by normaliz e (line 15). In our experiments we implemented normaliz e with
either z ero-one, which simply rescales the vector to [0, 1]:
z ero-one(~x) = (xi − min(~x))/(max(~x) − min(~x))
(4)
z -norm(~x) =
or z -norm3 , which centers and normalizes values to zero mean and unit variance:
~x
, µ = P~x
i=1 xi
Xi=1
~x
2Besides top-k criteria, we also investigated using all-pairs similarity above a given global threshold, but
this tended to produce highly imbalanced degree distributions.
3Montague and Aslam [19] pointed out that z -norm has the advantage of being both shift and scale
invariant as well as outlier insensitive. They experimentally found it best among six simple combination
schemes discussed in [10].
1
~x − 1
xi − µ
σ
, σ2 =
(xi − µ)2 .
(5)
7
Likewise, we compute vi ’s content similarity to its neighbor γj by applying similarity
on term vectors ti and tγj and normalize those similarities (lines 16 and 17). The
topological and content similarities of each edge are then aggregated with the weight
specified by α (line 18).
In lines 20 through 23, the edges with highest similarity values are retained. As
stated in our desiderata, we want Esample ≪ Et and therefore need to retain fewer
than Γi edges. Inspired by [22], we choose to keep ⌈pΓi ⌉ edges. This form has the
following properties: 1) every vertex vi will be incident to at least one edge, therefore
the sparsification process does not generate new singleton, 2) concavity and monotonic-
ity ensure that larger-degree vertices will retain no fewer edges than smaller-degree ver-
tices, and 3) sublinearity ensures that smaller-degree vertices will have a larger fraction
of their edges retained than larger-degree vertices.
3.2.3 Partitioning the Sampled Graph
Finally in lines 25 through 27 the sampled graph Gsample is formed with the retained
edges, and the graph clustering algorithm clusteralgo partitions Gsample into l clus-
ters.
3.2.4 Extension to Support Complex Graphs
The proposed CODICIL framework can also be easily extended to support community
detection from other types of graph. If an input graph has weighted edges, we can
modify the formula in line 18 so that simij becomes the product of combined similarity
and original edge weight. Support of attribute graph is also straightforward, as attribute
assignment of a node can be represented by an indicator vector, which is in the same
form of a text vector.
3.3 Key Speedup Optimizations
3.3.1 T opK Implementation
When computing cosine similarities across term vectors t1 , . . . , tT , one can truncate
the TF-IDF vectors by only keeping m elements with the highest TF-IDF values and
set other elements to 0. When m is set to a small value, TF-IDF vectors are sparser and
therefore the similarity calculation becomes more efficien t with little loss in accuracy.
We may also be interested in constraining content edges to be within a topological
neighborhood of each node vi , such that the search space of T opK algorithm can
be greatly reduced. Two straightforward choices are 1) “1-h op ” graph in which the
content edges from vi are restricted to be in vi ’s direct topological neighborhood, and
2) “2-hop ” graph in which content edges can connect
vi and its neighbors’ neighbors.
Many contemporary text search systems make use of inverted indices to speed up
the operation of finding the k term vectors (documents) with the largest values of Equa-
tion 2 given a query vector ti . We used the implementation from Apache Lucene for
the largest dataset.
8
3.3.2 Fast Jaccard Similarity Estimation
To avoid expensive computation of the exact Jaccard similarity, we estimate it by using
minwise hashing [3]. An unbiased estimator of sets A and B ’s Jaccard similarity can
be obtained by
j accard(A, B ) =
1
h
I (min(πi (A)) = min(πi (B ))) ,
h
Xi=1
where π1 , π2 , · · · , πh are h permutations drawn randomly from a family of minwise
independent permutations de fined on the universe A and B belong to, and I is the
identity function. After hashing each element once using each permutation, the cost
for similarity estimation is only O(h) where h is usually chosen to be less than A and
B .
(6)
3.3.3 Fast Cosine Similarity Estimation
Similar to Jaccard coefficient, we can apply random projecti on method for fast estimate
of cosine similarity [4]. In this method, each hash signature for a d-dimensional vector
x is h(x) = sgn (x, r), where r ∈ {0, 1}d is drawn randomly. For two vectors x and
y , the following holds:
P r[h(x) = h(y)] = 1 −
arccos (cosine(x, y))
π
.
(7)
3.4 Performance Analysis
Lines 3 –7 of CODICIL are a preprocessing step which compute f or each vertex its top-
k most similar vertices. Results of this one-time computation can be reused for any
k ′ ≤ k . Its complexity depends on the implementation of the T opK operation. On our
largest dataset Wikipedia this step completed within a few hours.
We now consider the loop in lines 11 –24 where CODICIL loops th rough each ver-
tex. For lines 14 and 16 we use the Jaccard estimator from Section 3.3.2 for which runs
in O(h) with a constant number of hashes h. The normalizations in lines 15 and 17
are O(Γi ) and the inner loop in lines 21 –23 is O(pΓi ). Sorting edges by weight in
line 20 is O(Γi log Γi ). The size of Γi , the union of topology and content neighbors,
is at most n but on average much smaller in real world graphs. Thus the loop in lines
11 –24 runs in O(n2 log n).
The overall runtime of CODICIL is the edge preprocessing time, plus O(n2 log n)
for the loop, plus the algorithm-dependent time taken by clusteralgo.
4 Experiments
We are interested in empirically answering the following questions:
• Do the proposed content-aware clustering methods lead to better clustering
than using graph topology only?
9
• How do our methods compare to existing content-aware clustering meth-
ods?
• How scalable are our methods when the data size grows?
4.1 Datasets
Three publicly-available datasets with varying scale and characteristic are used. Their
domains cover document network as well as social network. Each dataset is described
below, and Table 1 follows, listing basic statistics of them.
4.1.1 CiteSeer
A citation network of computer science publications4, each of which labeled as one of
six sub- fields. In our graph, nodes stand for publications an d undirected edges indi-
cate citation relationships. The content information is stemmed words from research
papers, represented as one binary vector for each document. Observe that the density
of this network (average degree 2.74) is significantly lower
than normally expected for
a citation network.
4.1.2 Wikipedia
The static dump of English Wikipedia pages (October 2011). Only regular pages be-
longing to at least one category are included, each of which becomes one node. Page
links are extracted. Cleaned bi-grams from title and text are used to represent each
document’s content. We use categories that a page belongs to as the page’s class la-
bels. Note that a page can be contained in more than one category, thus ground truth
categories are overlapping.
4.1.3 Flickr
From a dataset of tagged photos5 we removed infrequent tags and users associated with
only few tags. Each graph node stands for a user, and an edge exists if one user is in
another’s contact list. Tags that users added to uploaded photos are used as content
information. Flickr user groups are collected as ground truth. Similar to Wikipedia
categories, Flickr user groups are also overlapping.
Wikipedia
Flickr
CiteSeer
V
3,580,013
16,710
3,312
Et
162,085,383
716,063
4,536
# CC
10
4
438
CCmax
3,579,995
16,704
2,110
# Uniq. Content Unit Avg ti
202
1,459,335
44
1,156
3,703
32
# Class
595,355
184,334
6
Table 1: Basic statistics of datasets.
# CC: number of connected components.
CCmax : size of the largest connected component. Avg ti : average number of non-
zero elements in term vectors. # Class: number of (overlapping) ground truth classes.
4 http://www.cs.umd.edu/projects/linqs/projects/lbc/index.html
5 http://staff.science.uva.nl/ xirong/index.php?n=DataSet.Flickr3m
10
4.2 Baseline Methods
In terms of strawman methods, we compare the CODICIL methods with three exist-
ing content-aware graph clustering algorithms, SA-Cluster-Inc [30], PCL-DC [28] and
Link-PLSA-LDA (L-P-LDA) [20]. Their methodologies have been brie fly introduced
in Section 2. When applying SA-Cluster-Inc, we treat each term in T as a binary-
valued attribute, i.e. for each graph node i every attribute value indicates whether the
corresponding term is present in ti or not. For L-P-LDA, since it does not assume a
distinct distribution over topics for each cited document individually, only citing doc-
uments’ topic distributions are estimated. As a result, there are 2313 citing documents
in CiteSeer dataset and we report the F-score on those documents using their corre-
sponding ground-truth assignments.
Previously SA-Cluster-Inc has been shown to outperform k-SNAP [25] and PCL-
DC to outperform methods including PLSA-PHITS [5], LDA-Link-Word [7] and Link-
Content-Factorization [31]. Therefore we do not compare with those algorithms.
Two content-insensitive clustering algorithms are included in the experiments as
well. The first method, “Original Topo ”, clusters the origin
al network directly. The
second method samples edges solely based on structural similarity and then clusters
the sampled graph [22], and we refer to it as “Sampled Topo ” he
reafter.
Finally, we also adapt LDA and K-means6 algorithm to cluster graph nodes us-
ing content information only. When applying LDA, we treat each term vector ti as
a document, and one product of LDA’s estimation procedure is the distribution over
latent topics, θti , for each ti (more details can be found at the original paper by Blei et
al. [2]). Therefore, we treat each latent topic as a cluster and assign each graph node to
the cluster that corresponds to the topic of largest probability. We use GibbsLDA++7,
a C++ implementation of LDA using Gibbs sampling [11] which is faster than the
variational method proposed originally. Results of this method are denoted as “LDA”.
4.3 Experiment Setup
4.3.1 Parameter Selection
There are several tunable parameters in the CODICIL framework, first of which is k ,
the number of content neighbors in the T opK sub-routine. We propose the following
heuristic to decide a proper value for k : the value of k should let Ec ≈ Et . As a result,
k is set to 50 for both Wikipedia (Ec = 150, 955, 014) and Flickr (Ec = 722, 928).
For CiteSeer, we experiment with two relatively higher k values (50, Ec = 103, 080
and 70, Ec = 143, 575) in order to compensate the extreme sparsity in the original
network. Though simplistic, this heuristic leads to decent clustering quality, as shown
in Section 4.5, and avoids extra effort for tuning.
Another parameter of interest is α, which determines the weights for structural and
content similarities. We set α to 0.5 unless otherwise specified, as in Section 4.7. The
number of hashes (h) used for minwise hashing (Jaccard coefficient) is 30, and 51 2 for
random projection (cosine similarity). Experiments with both choices of similarity
6We do not report running time of K-means as it is not implemented in C or C++.
7 http://gibbslda.sourceforge.net/
11
|
1302.5235 | 2 | 1302 | 2013-03-01T10:21:08 | Predicting the Temporal Dynamics of Information Diffusion in Social Networks | [
"cs.SI",
"physics.soc-ph"
] | Online social networks play a major role in the spread of information at very large scale and it becomes essential to provide means to analyse this phenomenon. In this paper we address the issue of predicting the temporal dynamics of the information diffusion process. We develop a graph-based approach built on the assumption that the macroscopic dynamics of the spreading process are explained by the topology of the network and the interactions that occur through it, between pairs of users, on the basis of properties at the microscopic level. We introduce a generic model, called T-BaSIC, and describe how to estimate its parameters from users behaviours using machine learning techniques. Contrary to classical approaches where the parameters are fixed in advance, T-BaSIC's parameters are functions depending of time, which permit to better approximate and adapt to the diffusion phenomenon observed in online social networks. Our proposal has been validated on real Twitter datasets. Experiments show that our approach is able to capture the particular patterns of diffusion depending of the studied sub-networks of users and topics. The results corroborate the "two-step" theory (1955) that states that information flows from media to a few "opinion leaders" who then transfer it to the mass population via social networks and show that it applies in the online context. This work also highlights interesting recommendations for future investigations. | cs.SI | cs | Predicting the Temporal Dynamics of Information Diffusion
in Social Networks∗
Adrien Guille
ERIC Laboratory, Lyon 2
University
5 av. Pierre Mendes France,
69676 Bron, France
Adrien.Guille@univ-
lyon2.fr
Hakim Hacid
Bell Labs France
Route de Nozay, 91620 Nozay,
France
Hakim.Hacid@alcatel-
lucent.com
Cécile Favre
ERIC Laboratory, Lyon 2
University
5 av. Pierre Mendes France,
69676 Bron, France
Cecile.Favre@univ-
lyon2.fr
3
1
0
2
r
a
M
1
]
I
S
.
s
c
[
2
v
5
3
2
5
.
2
0
3
1
:
v
i
X
r
a
ABSTRACT
Online social networks play a major role in the spread of
information at very large scale and it becomes essential to
provide means to analyse this phenomenon. In this paper
we address the issue of predicting the temporal dynamics of
the information diffusion process. We develop a graph-based
approach built on the assumption that the macroscopic dy-
namics of the spreading process are explained by the topol-
ogy of the network and the interactions that occur through
it, between pairs of users, on the basis of properties at the
microscopic level. We introduce a generic model, called T-
BaSIC, and describe how to estimate its parameters from
users behaviours using machine learning techniques. Con-
trary to classical approaches where the parameters are fixed
in advance, T-BaSIC 's parameters are functions depending
of time, which permit to better approximate and adapt to
the diffusion phenomenon observed in online social networks.
Our proposal has been validated on real Twitter datasets.
Experiments show that our approach is able to capture the
particular patterns of diffusion depending of the studied sub-
networks of users and topics. The results corroborate the
"two-step" theory (1955) that states that information flows
from media to a few "opinion leaders" who then transfer it
to the mass population via social networks and show that
it applies in the online context. This work also highlights
interesting recommendations for future investigations.
1.
INTRODUCTION
The Web 2.0 -- through the concepts of "participatory"
and "social" web -- allows hundreds of millions of Internet
users worldwide to produce and consume content. Thus,
the Web provides access to a very vast source of informa-
tion on an unprecedented scale. Online social networks play
a major role in the diffusion of this information and have
proven to be very powerful in many situations, such as the
1This paper is an updated and extended version of [8].
.
2010 Arab Spring [10] or the 2008 U.S. presidential elections
[12]. They permit people to spread ideas, to organize groups
and actions in a new way and we can consequently consider
that they add a whole new layer to the human social life. In
consideration of the impact of online social networks on the
society, understanding the mechanics and dynamics of these
networks is a critical research objective. Since communica-
tions occurring online are recorded, very large amounts of
data are available for researchers who can exploit them to
develop predictive models for information diffusion in online
social networks. This proves to be a challenging task, due to
(i) the particular laws that govern these networks, (ii) the
wide diversity in users profiles and, obviously, (iii) the large
scale of these structures.
"Information diffusion" is a generic concept that refers to
all processes of propagation in a system, regardless of the
nature of the object in motion. The diffusion of innovation
over a network is one of the original reasons for studying
networks and the spread of disease among a population has
been studied for centuries. The models developed in the con-
text of social networks assume that people are influenced by
actions taken by their surrounding in the network, in other
words, they model processes of "information cascades" [3].
That is why the path followed by an information in the net-
work is often referred to as the "spreading cascade". In the
case of online social networks, one can be interested by the
spread of particular objects like hashtags on Twitter, URLs,
or even broader concepts like topics for instance.
PROBLEM DEFINITION: Having a set of users in a
social network (with explicit or inferred connexions), com-
municating through a messaging system in a closed environ-
ment, and a piece of information, how to predict the degree
of adoption of such information in the provided social net-
work for a given period of time, i.e. the temporal patterns
of the dynamics?
A closed environment here means that only internal con-
straints are considered. For example, we don't take into ac-
count the possibility that information may come from exter-
nal sources like news sites. Modeling information diffusion
first requires to define the set of actors that can potentially
be involved. In the context of online social networks, an ac-
tor is referred to as a node. The simplest way to describe the
spreading process is to consider that a node can be whether
activated or not (i.e. informed or not), and then, the prop-
agation process can be viewed as a sequence of activation
of nodes. A diffusion process occurring inside a network is
characterized by two aspects: (i) its topology and (ii) its
temporal dynamic.
Understanding, capturing, and being able to predict such
phenomenon can be helpful for several areas such as market-
ing, security, and Web search. These use-cases fall all un-
der either of these two well defined problems: (i) influence
maximization [14], e.g. maximizing spread of information,
and (ii) influence minimization, e.g. minimizing spread of
misinformation [4, 15]. Most of existing predictive models
focus on the topology of the process and are based on uni-
dimensional feature spaces. They intend to predict prop-
erties like the depth of the spreading cascade or the total
size of the reached population and vastly ignore the tem-
poral dimension.
In this paper, we consider the issue of
predicting the temporal dynamics of the diffusion process
-- more specifically the spread of topics -- in online social
networks. Our initial assumption is that the macroscopic
dynamics (i.e. observed overall the network) of the spread-
ing process are explained by the topology of the network and
the interactions that occur through it, between pairs of users,
on the basis of properties at the microscopic level (localized
in the network). The contributions of this paper are the
following:
1. An analytical discussion about how to detect spreading
topics and the features that may explain the diffusion
process. This step has been performed using a dataset
crawled from Twitter. It enabled us to understand the
overall process of information diffusion in a real social
network.
2. A new model for information diffusion modeling in on-
line social networks and a set of features used to esti-
mate its parameters. This new model, T-BAsIC, per-
mits a deeper and realistic integration of time in the
prediction process. The features are based on users be-
haviour and belong to three dimensions (social, topic,
and time).
3. An experimental evaluation that aims to assess the ef-
ficiency of our approach and the validity of the under-
lying assumption (i.e. the macroscopic diffusion pro-
cess is explained by the sum of microscopic interactions
that occur because of local properties).
The rest of this paper is organized as follows. Section 2
reviews various categories of related work and discusses their
relation to ours. In Section 3 we present the data and the
analysis we performed. Then in Section 4 we describes the
proposed model in details. In Section 5, a set of experiments
is described to evaluate the efficiency of our modeling and
the validity of the underlying assumption. We conclude and
provide some future work in Section 6.
2. RELATED WORK
In this section we review two categories of related work:
(i) general modeling of spreading processes in complex sys-
tems, classified into graphical and non-graphical approaches,
and (ii) recent predictive models of information diffusion in
online social networks (OSNs).
2.1 Diffusion in complex systems
Graph based approaches. Classical graph based ap-
proaches assume the existence of a graph structure and focus
on the topology of the process. They follow either Indepen-
dent Cascades (IC) [7] or Linear Threshold (LT) [14] model.
They are based on a directed graph where each node can
be activated (i.e. informed) or not, with a monotonicity as-
sumption, meaning that activated nodes cannot deactivate.
The IC model requires a diffusion probability to be associ-
ated to each edge whereas LT requires an influence degree
to be defined on each edge and an influence threshold for
each node. For both models, the diffusion process proceeds
iteratively in a synchronous way along a discrete time-axis,
starting from a set of initially activated nodes. In the case of
IC, for each iteration, the newly activated nodes try once to
activate their neighbours with the probability defined on the
edge joining them. In the case of LT, at each iteration, the
inactive nodes are activated by their activated neighbours
if the sum of influence degrees exceeds their own influence
threshold. Successful activations are effective at the next it-
eration. In both cases, the process ends when no new trans-
mission is possible, i.e. no neighbouring node can be con-
tacted. These two mechanisms reflect two different points of
view: IC is sender-centric while LT is receiver-centric. Both
models have the inconvenience to proceed in a synchronous
way along a discrete time-axis, which doesn't suit what is
observed in real social networks.
In order to make these
models more adapted to this particular context, Saito et al.
recently proposed asynchronous extensions of these models,
namely AsIC and AsLT [20], that use a continuous time-
axis and require a time-delay parameter on each edge of the
graph.
Non-graph based approaches. Classical non-graph
based approaches don't assume the existence of a graph
structure and have been mainly developed to model epidemi-
ological processes. They classify nodes into several classes
(i.e. states) and focus on the evolution of the proportions of
nodes in each class. The two most common models are SIR
and SIS [9, 18], where S stands for "susceptible", I for "in-
fected" (i.e. informed) and R for recovered (i.e. refractory).
In both cases, nodes in the S class switch to the I class with
a fixed probability β. Then, in the case of SIS, nodes in
the I class switch to the S class with a fixed probability
γ, whereas in the case of SIR they permanently switch to
the R class. The percentage of nodes in each class is given
by simple differential equations. Both models assume that
every node has the same probability to be connected to an-
other and thus connections inside the population are made
at random. But the topology of the nodes relations is very
important in social networks and thus the assumptions made
by these model are unrealistic.
2.2
Information diffusion in OSNs
Various studies in the context of social networks have been
conducted with the aim of predicting properties of the in-
formation spreading process. Most of them focus on topo-
logical properties. For instance, Bakshy et al. [1] proposed a
graphical approach that aims to predict the size of the cas-
cade generated by the diffusion of a URL in Twitter graph
of followers, starting with a single initial user. This sender-
centric model relies on a regression tree and some simple
social attributes and the past influence of the initial user
only. The influence of the initial user is approximated by
counting the number of cascades (implicit cascades inferred
from the follower graph) in which he was involved in the
past. Galuba et al.
[6] also studied the diffusion of URLs
in Twitter, but from a receiver-centric point of view, and
proposed to use the LT model to predict which users will
adopt which URL. Yang and Counts [21] used survival anal-
ysis to examine the impact of attributes from both users
and content to predict the size of the cascades generated
by the spread of topics in Twitter. In order to do so, they
exclusively focused on targeted tweets so they can directly
identify the explicit cascade of diffusion. They found that
both user and content attributes were relevant predictors of
the diffusion efficiency.
To the best of our knowledge, the Linear Influence Model
developed by Yang and Leskovec [22] is the only real predic-
tive model for the temporal dynamics that has already been
proposed. They studied the diffusion of hashtags in Twit-
ter and proposed a model based on the assumption that the
influence of a node depends on how many other nodes it
influenced in the past. However, there is a substantial dif-
ference with our work because this approach is non-graph
based and doesn't study nodes attributes. Therefore, this
approach doesn't take advantage of any knowledge about
the topology of the network. Moreover, in their modeling,
a node corresponds to the aggregation of 100 Twitter users,
which doesn't permit to study the diffusion at a "user to
user" level.
Given this state-of-the art, we propose a generic graph-
based method, so the topology of the network is exploited,
to model information diffusion. We also detail how to apply
it on Twitter to predict the temporal dynamics of the spread
of topics among users. This is a particularly interesting con-
tribution of our work since all existing approaches have been
mainly focusing on the prediction of depth of the cascades
and/or the final volume of the propagation.
3. DIFFUSION OBSERVATION AND REP-
RESENTATION
In this section, we discuss some observations we have per-
formed in order to understand the diffusion process in so-
cial networks and extract some underlying facts to represent
such phenomenon. For availability reasons mainly, we -- like
the majority of studies that address information diffusion
modeling in social networks which have used non-synthetic
data -- build the observation part of this paper on data com-
ing from Twitter. This allows us to easily position and com-
pare our approach with related work. Twitter is a micro-
blogging service that allows its users to publish public di-
rected or undirected short messages (140 characters at most)
and to follow other users that interest them. Send a di-
rected message is achieved by mentioning the targeted users
directly in the content with the convention "@username".
Both directed and undirected messages are automatically
forwarded to the followers but directed messages aim more
particularly at one or more specific users. Overall, Twitter
forms an online social network where the information flows
from place to place, in two different ways: (i) it flows in a
passive manner via the following ties and also (ii) actively
because of users that directly send information to others via
the mentioning practice. Mathematically, this network is
represented as a directed multi-graph comprised of two sets
of edges: (i) the set of following edges, which constitutes
the passive part of the network, commonly called "follower
graph"; (ii) the set of mentioning edges, that represents the
active part of the social network.
DEFINITION 1
(Active/Passive Directed Edge).
An active edge results from an explicit communication (i.e.
message passing) between two nodes in the network. It trans-
lates the existence of an active transmission of information
between two nodes. A passive edge simply means that a node
is exposed to the content produced by another.
We base our study on a 467 million Twitter posts dataset
from 20 million users covering a 7 months period from June
1, 2009 to December 31, 2009 gathered by Yang and Leskovec
[23]. Each tweet contains its author, its content, and the
time at which it has been posted. In addition to that, we
know the sets of followers and followees for each user thanks
to the capture of Twitter graph of followers (1.47 billion di-
rected edges) made by Kwak et al. [16] at the same time (i.e.
passive edges). Finally, we complete the network by extract-
ing the active edges based on the mentions contained in the
tweets. This data meets the common criteria for dataset val-
idation in social network analysis: (i) large-scale, (ii) com-
pleteness, and (iii) realism. A key task in the diffusion model
we are proposing is the identification and detection of topics,
a process explained in what follows.
3.1 Topic extraction and diffusion observation
We intend to predict the spread of information among
Twitter users. In contrast to studies that have investigated
the diffusion of simple objects, such as URL or hashtags
[22, 1, 6], we focus on topics as the main object to follow.
This allows us to have a global view of all the interactions
regarding a specific information. This also prevents from
several annoyances, like the side effects that potentially exist
between distinct URLs that point to similar resources for
instance. By cons, it is not so easy to detect spreading
topics. For the purpose of our study, we define a topic as
follows:
DEFINITION 2
(Topic). A topic is a minimal set of
co-occurring terms (i.e. keywords) that a related tweet should
contain and which spans over a given period of time.
We are interested by recurrent terms that experience a
peak in their usage during a significant period of time. It
means that we are not interested by non-recurrent terms
that are not observed before and after the period during
which they are popular. To find topics that fit this defini-
tion, we use the method described hereafter to find relevant
terms and then manually investigate further to precisely de-
fine interesting set of terms. We select all the tweets pub-
lished during the period of time we want to study and per-
form a discretization. To do so, the data is transformed
into an ordered collection of documents, where each doc-
ument is the aggregation of 4 hours of tweets1. Then we
compute the vector of the number of occurrences of a term
in each document, noted Oterm. We define the interesting-
ness of a term as the score computed by Equation 1. Note
that highest values are obtained by terms that maximize
the ratio max(Oterm)/avg(Oterm) and minimize the ratio
1This is done using the Lucene (http://lucene.apache.
org/core/ library to index their content).
term
christmas
snow
iphone
google
score
24.56
22.88
15.19
15.05
...
twitpic.com 6.64
6.34
5.14
5.12
twitter
bit.ly
...
lol
Table 1: Highest and lowest ranked terms accord-
ing to the interestingness score during the month of
December 2009.
min(Oterm)/avg(Oterm). Finally, we rank the terms accord-
ing to their score in order to identify which topics to focus
on.
score(term) =
avg(Oterm)2 + min(Oterm) × max(Oterm)
min(Oterm) × avg(Oterm)
(1)
See Table 1 for the 4 best and worst ranked terms in 2009.
Unsurprisingly, "christmas" is the top ranked term, because
it is a sustained discussion topic throughout the month and
suddenly becomes an extremely popular term right before
and after Christmas on December 25th. Therefore, this is
a particular case where the peak of activity is linked to
an annual event and doesn't result from the spread of an
interesting information between Twitter users. Let's con-
sider now the example of the term "iphone". We observe a
peak of usage starting around December 8th on Figure 1(b).
By searching through specialized websites, we find that a
rumour about the "release" date of the new version of the
smartphone surfaced on this day and then spread through
social networks. This is confirmed by a sharp increase in
the frequency of co-occurrence of these two terms ("iphone",
"release") in tweets published from December 8th to 15th.
Therefore, the set {"iphone","release"} defines an interesting
spreading topic. It is the same for the term "google", that
experiences a peak of activity in December because of the
spread of a rumor about the buyout of a company whose
technology could contribute to Google Wave (thus we define
the topic {"google","buy"}). On the contrary, "twitpic.com"
has a relatively steady volume (because it appears each time
a user posts a picture with her tweet) and is therefore bad
ranked.
Through this analysis, at least two dimensions that are
needed to capture the diffusion process have emerged: (i)
the topical dimension since we observed that the various
topics had different behaviours in terms of volumes for in-
stance, meaning that users are not interested in all topics
but generally in a subset of those topics; (ii) the temporal
dimension, because we observed a common cyclic pattern
to all topics that is due to, e.g.
the switch from day to
night, working hours, and the total time for the spread of
the information.
3.2 Representation of the propagation process
We exploit the data related to selected topics to observe
aspects of the diffusion process in Twitter. Thus, we build
the structure that transcribes "who influenced whom" for
e
c
n
e
r
r
u
c
c
o
f
o
#
e
c
n
e
r
r
u
c
c
o
f
o
#
e
c
n
e
r
r
u
c
c
o
f
o
#
e
c
n
e
r
r
u
c
c
o
f
o
#
(a) christmas
average
1
22
27
31
(b) iphone
average
1
8
(c) google
average
1
7
(d) twitpic.com
average
1
time (days)
31
31
31
Figure 1: Evolution of the volume of particular
terms during December 2009, namely, from top to
bottom, "christmas", "iphone", "google" and "twit-
pic.com".
each topic and we also capture the temporal dynamics of the
diffusion. This process is built on two concepts: activation
sequence and spreading cascade.
DEFINITION 3
(Activation Sequence). An activa-
tion sequence is an ordered set of nodes capturing the order
in which the nodes of the network adopted the topic, i.e. got
informed.
DEFINITION 4
(Spreading Cascade). A spreading
cascade is a tree having as a root the first node of the activa-
tion sequence. The tree captures the influence between nodes
(i.e. who transmitted the information to whom) and unfolds
in the same order as the activation sequence.
Having a topic and its minimal set of keywords, we can
easily detect all the related messages and generate the time-
series of the volume of tweets induced by the diffusion of the
topic (i.e.
its dynamics). We also determine the sequence
of nodes activation in the network. Then we aim to solve
the problem of reconstructing the graph of diffusion (i.e.
puted for each member of the network and finally we de-
scribe how they are used to estimate the model parameters.
Table 2 summarizes the notations used in this section.
4.1 Time-Based Asynchronous Independent Cas-
cades
We begin by reminding the definition of AsIC (i.e. Asyn-
chronous Independent Cascades Model) according to [20],
which is an extension of the IC model so the diffusion can
unfold in continuous-time. It models the diffusion of infor-
mation through a directed network G = (V, E), where V is
the set of all the nodes and E(⊂ V × V ) is the set of all
the links. For each link (vx, vy), two real values are fixed
in advance: ρvx,vy , with 0 < ρvx,vy < 1, and rvx,vy , with
rvx,vy > 0. ρvx,vy is referred to as the diffusion probability
and rvx,vy is referred to as the time-delay parameter. The
diffusion process unfolds in continuous-time and, as for IC,
starts from a given set of initially activated nodes S. Each
node vx that becomes activated at time t is given a single
chance to activate each of its inactive neighbours vy with
probability ρvx,vy at time t + rvx,vy . The stopping condi-
tion of the process is the same as for IC, i.e. when no more
activations are possible.
To enable a better capture of the dynamics underlying
the diffusion process in social networks, we propose another
manner in considering the parameters of the diffusion mod-
els, incorporated into the T-BAsIC model. Thus, in the
T-BAsIC model, a real value rvx,vy is fixed in advance and
a real function fvx,vy (t) is defined for each link (vx, vy), with
0 < fvx,vy (t) < 1. Unlike other models, the diffusion proba-
bility is not fixed in advance, but is a time dependent func-
tion fvx,vy (t) referred to as the diffusion function. Thus, the
propagation process unfolds in the same way as AsIC, but
the algorithm simulates the course of days by keeping a clock
and ρvx,vy is computed on-demand, according to fvx,vy (t).
We use the model to produce the time-series that represent
the evolution of the volume of tweets generated by the dif-
fusion of a topic introduced in a given social network by a
certain subset S of users. Figure 3 illustrates this principle
and shows the input and output of T-BaSIC.
Figure 3: The T-BaSIC Model predicts the cascade
of diffusion along a continuous time-axis based on
the time-delay and diffusion function on each edge,
and the initial active node set S.
4.2 Features space
Our model computes a diffusion probability relying on
three dimensions: social, semantic, and time. We denote
Figure 2: Example of a spreading cascade. Nodes
colored in light gray represent users that have
tweeted about the topic of interest at time t, with
t1 < t2 < t3. Users represented by nodes coloured in
dark grey didn't.
the spreading cascade) by connecting the activated nodes
between them. We base the construction of this graph on
the topology of the passive part of the network.
In other
words, we model the spreading process over the following
links. It means that for each activated node, we want to infer
which other previously activated node among its followees
had influenced her. As it is discussed in [2], in the case where
several followees are activated, there are basically three ways
to assign influence: (i) assign it to the followee that adopted
the topic first, (ii) assign it to the last followee to react, or
(iii) assign it to all the followees. In this study we assume
that individuals are influenced by the followee that adopted
the topic most recently (i.e.
the second method, referred
to as "Last Influence"). Let us illustrate how we build the
spreading cascade of a topic with the following example.
Let's say we have a social network of 6 users, where v2, v3,
v4 and v5 follow v1; v5 and v6 follow u4. Nodes v1, v4 and
v5 are activated in this order. Therefore, based on the "Last
Influence" principle, we say that instances of diffusion have
occurred between v1 and v4, and v4 and v5, whereas there
are instances of non-diffusion between v1 and v4, v4 and v6,
etc. Finally we can build the spreading cascade shown on
the Figure 2, where each edge is directed and labeled with
either "diffusion" or "non-diffusion".
With the methods we described, we are able to (i) detect
interesting spreading topics and (ii) capture their diffusion
process. Thus we can construct datasets for various topics,
consisting of instances belonging to the binary class {diffu-
sion, non-diffusion} and described by a pair of users and a
timestamp. Moreover, a third dimension is explicitly high-
lighted thanks to this representation: the social dimension
since the information flows due to influence between mem-
bers of the social network. As a result, the three dimensions
(social, topic, time) are the foundations of the model we are
proposing and which we describe in the next section.
4. PROPOSED METHOD
In this section we introduce the method we propose to pre-
dict the diffusion phenomenon observed in online social net-
works. To start, we formally define the Time-Based Asyn-
chronous Independent Cascades (T-BAsIC) Model underly-
ing our approach. Then, we present the list of features com-
Notation
vx ∈ V
V
S
E
M
Mv
Mv
Mv
tMv
K
ki ∈ K
Kv ⊂ K
C = {c1, c2, ..., cg}
ci = {k1, k2, ..., kp}
Description
the set of all vertices (i.e. users) in the social network
a particular node in the social network
a subset of vertices S ⊂ V
the set of all edges in the social network
all the messages (i.e. tweets) of the environment
the set of messages published by a user v ∈ V
the set of users who are mentioned in the messages of a user u ∈ U
the set of users who mentioned the user v ∈ V in their messages
all the messages which have mentioned a user v ∈ V
the set of all keywords used in the messages published inside the network
a specific keyword contained in the messages published inside the network
the set of keywords included in the messages published by a user v ∈ V
the set of all the topics. ci is a particular topic.
the vector of keywords kj ∈ K describing a topic ci
Table 2: Notations used in this paper.
pvxvy (i, t) = fvx,vy (t) the diffusion probability of an infor-
mation i associated to a topic ci at time t between users
vx ∈ V (sender) and vy ∈ V (receiver). The attributes
we derive from these dimensions are either numerical values
varying between 0 and 1 or boolean values. Their calcula-
tion is based on the past activity of the user(s) for a given
time period. Here we give the metrics formulations for a
period of one month.
Social dimension: This dimension intends to quantify
the social interactions occurring between users. It is based
on metrics that mainly rely on topological properties of the
active part of the Twitter social network. This choice is
motivated by the predictive power of these links in the dif-
fusion process, as Yang and Counts stated in [21]. These
five metrics concern whether a user or a pair of users and
are described below.
• Activity (I): an activity index expresses users' volume
of tweets they produce. The activity is computed as
the average amount of tweets emitted per hour bounded
by 1. For a user u, the formula is as follows:
(cid:26) Mv
1
I(v) =
if Mv <
Otherwise
(2)
with = 30.4 × 24 to obtain the hourly frequency.
• Social homogeneity (H): a social homogeneity index
for vx ∈ V and vy ∈ V reflects the overlap of the sets
of users they interact with. It is computed with the
Jaccard similarity index that we defined as the size of
the intersection of the sets divided by the size of their
union.
H(vx, vy) =
(3)
Mvi ∩ Mvj
Mvi ∪ Mvj
• The ratio of directed tweets for each user (dT R) pro-
vides an idea about the role she plays in the spread
of information. A user with an important ratio of di-
rected tweets tends to play an active role whereas a
user with a low ratio can be seen as a more passive ac-
tor. It should be noted that our definition of directed
tweets includes retweets. This ratio is computed as
follows:
(cid:26) Dv
Mv
0
dTR(v) =
if Mv > 0
Otherwise
(4)
• A boolean value for each user regarding the mention-
ing behaviour to capture the existence of an active in-
teraction in the past. This feature can be somehow
regarded as a "friendship" indicator in the case where
both users have a positive value. This constitutes a
different definition of friendship than the one given by
Huberman et al. [11], where a user is friend with users
she mentioned at least twice.
(cid:26) 1 if vy ∈ Mvx
0 Otherwise
hM(vx, vy) =
(5)
• The mention rate (mR) [21] of each user represents
the volume of directed tweets she receives. Thus, the
higher the value is, the higher the node centrality de-
gree on the active part of the network is. All in all,
this feature expresses the popularity of the user and
the amount of information she is exposed to.
mR(v) =
µ
1
if tMv < µ
Otherwise
(6)
(cid:26) tMv
Based on our empirical observation of the distribution
of the mention rates we have chosen µ = 200.
Semantic/Topical dimension: In addition to the so-
cial features that exploit the structure of the network, we
consider the exchanged content to refine our perception of
users' behaviour. The proposed metric applies to a user and
a topic and it states in a binary way if the user has already
tweeted about the given topic.
(cid:26) 1 if c1
i ∈ Kv
0 Otherwise
hK(v, i) =
(7)
Temporal dimension: Finally, we consider the tem-
poral dimension so that we can capture the fluctuation of
users attention through time. The varying attention of the
individuals is an important characteristic of online social
networks that is strongly connected to the day/night cycle
and working hours. To represent how the attention of a user
evolves during a day, we define a receptivity function A(u, t).
We model it in a non-parametric way and thus partition a
day into 6 bins of 4 hours each, in order to obtain a signif-
icant and smooth representation even for less active users.
We define the receptivity level of a user at the time of the
day t as the percentage of all the tweets she produced in the
4 hours interval [tx; ty], where tx < t < ty. The function is
stored in a 6-dimensional non-negative vector noted V , with
(cid:80)5
t=0 V t = 1.
A(v, t) = V t(cid:48)
(cid:48)
v , where t
= (cid:98) t
4
(cid:99)
(8)
For instance, if a user posted 60 messages through the
month, 50 of which between 4 and 8 pm and the rest be-
tween 8 and 12 am, her receptivity function would be Vu =
{0, 0, 0.167, 0, 0.833, 0}.
Global feature space: Overall, the metrics we just
detailed form a 3-dimensional feature space, with 13 values
describing each set (vx ∈ V , vy (cid:54)= vx ∈ V , ci ∈ C, t). Figure
4 illustrates a possible instantiation of that vector.
Figure 4: A pair of user (vx,vy) is described by 13
features w.r.t a topic ci and a time of the day t.
The figure above shows how the 3 dimensions of the
feature space are connected.
Once the features space is constructed, the parameters of
the model can be learned and estimated. This is performed
through machine learning techniques and is detailed in the
following section.
4.3 Diffusion function parameters estimation
First, we build a sample of data comprising 4 experimental
social networks (sub-graphs). To build them, we first choose
4 Twitter users at random among the millions contained in
the data and then by selecting all users distant from at most
2 hops according to the "following links". Each social net-
work presents particular characteristics in terms of level of
activity, density of the passive and active parts, and global
size. See Table 3 for details. In each network, we capture the
diffusion of several topics during December 2009 and build
the spreading cascades with the method we described earlier
in Section 3. We describe each instance of "diffusion" and
"non-diffusion" by the 13 features related to the two con-
cerned users, according to their activity during November
2009. Table 4 provides the mean and standard deviation
of the numerical features of that learning dataset (balanced
binary dataset of 20,000 instances).
We train several classification algorithms on the super-
vised task P (Y F ), with Y ={diffusion,non-diffusion} and F
the 13-dimensional feature vector. Results obtained by a
C4.5 regression tree, linear and multilayer (1 hidden layer
of 14 nodes) Perceptrons and the Bayesian logistic regres-
sion (BLR) are shown on Table 5. All classifiers perform
equally, apart from C4.5 that has a slightly better precision
rate. Because the regression tree is more vulnerable to over-
fitting, and linear and multilayer Perceptrons give similar
Feature
Mean
I(src)
I(dst)
mR(src)
mR(dst)
dTR(src)
dTR(dst)
A(src,t)
A(dst,t)
H(src,dst)
0.148
0.104
0.163
0.22
0.488
0.47
0.306
0.247
0.004
Standard
deviation
0.185
0.143
0.258
0.324
0.242
0.276
0.178
0.192
0.02
Table 4: Mean and standard deviation of the nu-
merical features of the learning dataset.
results, we use the Bayesian logistic regression to define the
diffusion function.
Classifier
C4.5
Linear Perceptron
Multilayer Perceptron
Bayesian logistic regression
Correctly classified
instances
91%
85%
86%
85%
Table 5: Classifiers performances on a 5 folds cross-
validation.
The BLR assumes a parametric form for the distribution
P (Y F ). The parametric model used by the logistic regres-
sion is as follows (as defined in [17]):
1
1 + exp(w0 +(cid:80)13
exp(w0 +(cid:80)13
1 + exp(w0 +(cid:80)13
a=1 waFa)
a=1 waFa)
a=1 waFa)
P (Y = diffusionF ) =
P (Y = non-diffusionF ) =
In more details, the Bayesian logistic regression has a pre-
cision rate of 79% based on the attributes belonging to the
social dimension and obtains a gain of 7% with the addi-
tion of both temporal and semantic dimensions, leading to
a precision rate 85% with the full feature space. Figure 5
illustrates the absolute normalized values of the weights (i.e.
wa/ max(wa)) that the logistic regression accords to each
feature. The "social homogeneity" has the highest coeffi-
cient, because it has a mean of 0.004, which is much lower
than the other features. One can also see that the most
significant properties of the receiving node are the level of
activity and the connection to the topic. Concerning the
sending node, the mention rate is the most relevant prop-
erty.
4.4 Time-delay estimation
For each instance of the "diffusion" class from the dataset,
we know at what time the two users adopted the topic (i.e.
tweeted about it), so we are able to compute the real diffu-
sion delay. As we have just seen, the activity index of the
receiving user is a critical parameter and we base the approx-
imation of the time-delay on it, with the following formula:
rvx,vy = (1 − I(vy)) × σ. Therefore, for each instance of
diffusion we can compare real and estimated diffusion delay.
In order to determine the optimal value of σ, we define two
Social # of users # of tweets # of following edges
active network density
passive network density
network
(November)
1
2
3
4
24,571
44,410
11,614
29,625
303,564
469,775
169,689
226,753
1,928,999
4,398,953
308,849
2,507,768
(November)
5.15 × 10−6
4.23 × 10−6
7.30 × 10−6
2.79 × 10−6
6.39 × 10−3
5.13 × 10−3
4.58 × 10−3
5.71 × 10−3
Table 3: Properties of the four experimental social networks.
t
n
e
i
c
ffi
e
o
c
d
e
z
i
l
a
m
r
o
n
1
0.5
0
)
c
r
s
(
I
)
t
s
d
(
I
)
i
)
i
c
r
s
(
K
h
t
s
d
(
K
h
)
t
s
d
c
r
s
(
M
h
)
c
r
s
t
s
d
(
M
h
)
c
r
s
(
R
m
)
t
s
d
(
R
m
)
c
r
s
(
R
T
d
)
t
s
d
(
R
T
d
)
t
)
t
c
r
s
(
A
t
s
d
(
A
)
t
s
d
c
r
s
(
H
Figure 5: Visualization of the normalized weights
computed by the Bayesian logistic regression.
vectors, (i) the vector of real diffusion delays and (ii) the
vector of estimated diffusion delays. Then we define E(σ)
the Euclidean distance between these two vectors depending
of the value of σ. We find that E(σ) is minimal for σ = 10
and so the formula used to estimate the diffusion delay be-
comes rvx,vy = (1−I(vy))×10. It means that the maximum
diffusion delay in our modeling is of 10 hours. This aligns
well with observations made in previous studies [6, 22], that
reveal that diffusion events occur across a time-frame of at
most 8 to 12 hours.
4.5 Generalization of the approach
Having established how to estimate T-BaSIC parameters,
we use it as a prediction engine. The required input is: (1)
a topic, as defined in Section 3; (2) a social network de-
scribed by: (i) the set of users V and their 3-dimensional
description, (ii) the topology of their interconnection based
on the following links; and (3) a subset of users S ⊂ V that
inject the topic in the network and thus initiate the diffu-
sion. Given this input, the algorithm unfolds and manages a
clock, which is used to reproduce the course of day and the
variations of users receptivity. In output, the engine gener-
ates time-series representing the volume of tweets induced
by the spread of the topic inside the network.
T-BaSIC is a generic model, but the estimation of its pa-
rameters depends on the social platform one wants to adapt
it to. The approach we have presented can be applied to
any social network based on the explicit declaration of so-
cial links and that permits its users to publish both directed
and undirected messages. The coefficients of the diffusion
function and the time-delay can be then adjusted to the
data during the learning step.
5. EXPERIMENTS
We evaluate the efficiency of our approach and model-
ing on the task of predicting the temporal dynamics of the
spread of topics selected with the method described in Sec-
tion 3. We denote Pci (t) the predicted daily volume of tweets
for topic ci in the network and Rci (t) the real daily volume
of tweets (i.e. observed in the data). The different networks
used for the experiments are described in Table 3. We choose
the users constituting the starting set S by selecting the first
s users observed in Rci (t). Hereafter we present the results
we obtained with the optimal value of s for selected exam-
ples.
5.1 Qualitative results
Figure 6 shows the comparison of real and predicted time-
series for the topic {"iphone","release"} in experimental net-
works #1 and #2. The x axis represents time units in days
and the y axis represents the activity level with tweets vol-
ume as unit. The gray dashed curve corresponds to the real
volume measured in the data while the black curve corre-
sponds to the volume predicted by T-BaSIC. After varying
the value of s in the experiments, the optimal prediction is
obtained using s = 8 for network #1 and s = 5 for network
#2.
In both cases we observe a particular wave pattern,
with different phase and amplitude. One can see that the
model accurately captures these variations but slightly un-
derestimates the volume. We examine more in details the
prediction made by T-BaSIC by analysing the population of
users involved throughout the diffusion process. We classify
them into two groups, based on definitions by Daley and
Kendall [5]: (i) transmitters, i.e. users who received the in-
formation and then transmitted it to others, and (ii) stiflers,
i.e. users that received the information but never transmit-
ted it. We show on Figure 7 the evolution of the density of
stiflers for the prediction made on network #1. The corre-
lation between the volume shape and the density of stifler is
clearly visible. Five days after the appearance of the infor-
mation, the density of stifler is continuously rising. This is
due in part to the low connectivity of these users. Indeed,
they are reached by the information later in the process and
have a lower potential of diffusion. This shows the relevance
of the graph-based approach.
In order to allow comparison, we now show the results ob-
tained for another topic, {"google","buy"} in the same two
networks. After varying the value of s in the experiments,
the optimal prediction is obtained using s = 11 for network
#1 and s = 14 for network #2. Again, we can see a wave-
pattern, but this time it is less strong, which reveals people
are less interested by this topic. This highlights the impor-
tance of taking into account the topical dimension into the
computation of the diffusion probabilities. Also, once again,
the predicted volume is inferior to the real volume.
We obtained similar results with all the selected topics
(a) network #1
(b) network #2
(a) network #1
(b) network #2
s
t
e
e
w
t
f
o
e
m
u
l
o
V
60
40
20
0
20
10
0
s
t
e
e
w
t
f
o
e
m
u
l
o
V
30
20
10
0
40
30
20
10
0
2
4
6
8
2
4
6
8
5
10
5
10
Time (days)
Time (days)
Time (days)
Time (days)
Rci
Pci
Rci
Pci
Figure 6: Comparison of real and predicted time-
series for the topic {"iphone","release"} in experi-
mental networks #1 and #2.
Figure 8: Comparison of real and predicted time-
series for the topic {"google","buy"} in experimental
networks #1 and #2.
e
g
a
t
n
e
c
r
e
P
100%
50%
0%
(cid:112)(cid:80)
(cid:112)(cid:80)
t(Pci (t) − Rci (t))2
t Rci (t)2
volume errorci =
We then compute the relative error on dynamics according
0
5
Time (days)
Transmitters
Stiflers
to this formula:
dynamics errorci =
(cid:112)(cid:80)
(cid:112)(cid:80)
t(d(Rci (t)) − d(Pci (t)))2
t Rci (t)2
Figure 7: Density of transmitters and stiflers. The
curve represents the cumulation of the number of
users that adopted the topic.
and predictions on the four experimental social networks,
with the size of S varying between 5 and 20. It means that,
starting from a few informed people we are able to predict
when peaks of attention will occur and in which propor-
tion. This result is consistent with the "two-step flow of
communication" theory introduced by Katz and Lazarsfeld
[13], that hypothesizes information flows from media to few
"opinion leaders" who then spread it to the "mass" via social
networks. However we found that our modeling always un-
derestimates the global volume. This can be explained by
the fact that we consider that individuals, apart from those
constituting the starting set S, get information exclusively
via their social network, as explicitly stated in the problem
formulation referred to as the "closed environment". But in
reality, information is injected into Twitter throughout the
diffusion process and not only at the beginning.
5.2 Quantitative results
We now quantitatively asses the efficiency of our modeling
by computing the reduction in prediction error over the 1-
time lag predictor [22], according to two aspects: (i) volume
and (ii) dynamics. The 1-time lag predictor, introduced by
(cid:48)
ci (t),
Yang and Leskovec, is a simple predictor that gives P
ci (t) = Rci (t − 1). We compute the relative error
such as P
on volume estimation with the formula below:
(cid:48)
where d is the derivative for each point of the time-series
that we compute in this way:
d(Rci (t)) =
Rci (t + 1) − Rci (t − 1)
2
We report the reduction in prediction error on volume
and dynamics of our approach over the 1-time lag predictor
in Table 6 for four particular shapes of volume over time.
These shapes correspond to the examples we just detailed.
Overall, and as we can see it, the results are satisfactory,
translated by the overall gain measure.
6. CONCLUSION
In this paper, we propose the T-BAsIC model and its
application to data issued from Twitter. To achieve this,
we determined with a preliminary study a set of pertinent
features that ensure a generic model for representing infor-
mation diffusion whose parameters are estimated with the
considered data themselves.
Indeed, this model allows to
predict information diffusion taking into account both so-
cial, semantic, and temporal dimensions. More precisely,
this model is derived from the AsIC [20] theoretical model
and relies on time-dependent parameters. We infer the dif-
fusion probabilities between nodes of the network with a
machine learning technique, i.e. Bayesian logistic regres-
sion. We performed a set of experiments for different top-
ics. The experimental results show mainly that the model
predicts well the dynamic of the diffusion (our initial ob-
jective). The prediction of the volume is slightly underesti-
mated due to our initial assumption of considering a "closed
environment". This ignores the impact of external informa-
tion sources on the networks, which may explain the gap in
the predicted volume and the observed volume. Still, our
Shape 1
Shape 2
Shape 3
Shape 4
ALL
reduction on dynamics
reduction on volume
overall gain
25.19%
42.89%
34.04%
39.23%
47.70%
43.46%
29.21%
34.49%
31.85%
3.22%
40.07%
21.65%
24.21%
41.29%
32.75%
Table 6: Reduction in prediction error on volume and dynamics over the 1-time lag predictor for four shapes
of volume over time.
results support the "two-step theory" that hypothesizes that
only a few "opinion leaders" relay information from media
to the "mass population" via social networks and show that
it also apply to online social networks.
The perspectives opened by this work are numerous. Among
them, we determined the four main issues we want to inves-
tigate. First, since the T-BAsIC model parameters are not
fixed in advance, it should allow us to take into account the
evolution, over time, of the environment for the estimation
of diffusion probabilities. Thus it could help us to consider
the phenomenon of "complex contagion" as introduced by
[19] (i.e. repeated exposures to a topic have a positive im-
pact on the probability that the user adopts it). Concerning
the genericity of the model, another issue consists in apply-
ing our approach on other social data from other platforms
to study both common points and specificities of the infor-
mation diffusion process according to the platform. A third
one consists in enriching the semantic dimension. The use
of text mining techniques could be useful for this challenge,
taking into account that depending on the social platform,
there are some specificities that must be taken into account.
Finally, T-BAsIC is based on the AsIC theoretical model,
that means it is built from the point of view of the diffuser
node. It could be interesting to envision the dual approach
considering a T-BAsLT model based on the AsLT [20] ap-
proach focusing on the point of view of receiving node. The
comparison of the two approaches could be of interest and
may bring interesting insights.
7. REFERENCES
[1] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J.
Watts. Everyone's an influencer: quantifying influence
on twitter. WSDM'11, pages 65 -- 74, 2011.
[2] E. Bakshy, I. Rosenn, C. Marlow, and L. A. Adamic.
The role of social networks in information diffusion.
WWW'12, pages 519 -- 528, 2012.
[3] A. V. Banerjee. A simple model of herd behavior. The
Quarterly Journal of Economics, 107(3):797 -- 817,
August 1992.
[4] C. Budak, D. Agrawal, and A. E. Abbadi. Limiting
the spread of misinformation in social networks.
WWW'11, pages 665 -- 674, 2011.
[5] D. J. Daley and D. G. Kendall. Stochastic rumours.
1:42 -- 55, 1965.
[6] W. Galuba, K. Aberer, D. Chakraborty,
Z. Despotovic, and W. Kellerer. Outtweeting the
twitterers - predicting information cascades in
microblogs. WOSN'10, pages 3 -- 12, 2010.
[7] J. Goldenberg, B. Libai, and E. Muller. Talk of the
network: A complex systems look at the underlying
process of word-of-mouth. Marketing Letters, 2001.
[8] A. Guille and H. Hacid. A predictive model for the
temporal dynamics of information diffusion in online
social networks. WWW '12 Companion, pages
1145 -- 1152, 2012.
[9] H. W. Hethcote. The mathematics of infectious
diseases. SIAM REVIEW, 42(4):599 -- 653, 2000.
[10] P. N. Howard and A. Duffy. Opening closed regimes,
what was the role of social media during the arab
spring? Project on Information Technology and
Political Islam, pages 1 -- 30, 2011.
[11] B. A. Huberman, D. M. Romero, and F. Wu. Social
networks that matter: Twitter under the microscope.
First Monday, 14(1):1 -- 9, 2008.
[12] A. Hughes and L. Palen. Twitter adoption and use in
mass convergence and emergency events. International
Journal of Emergency Management, 6(3):248 -- 260,
2009.
[13] E. Katz and P. F. Lazarsfeld. Personal Influence: The
Part Played by People in the Flow of Mass
Communications, volume 21. Free Press, 1955.
[14] D. Kempe. Maximizing the spread of influence through
a social network. KDD'03, pages 137 -- 146, 2003.
[15] M. Kimura, K. Saito, and H. Motoda. Blocking links
to minimize contamination spread in a social network.
ACM Trans. Knowl. Discov. Data, 3:9:1 -- 9:23, April
2009.
[16] H. Kwak, C. Lee, H. Park, and S. Moon. What is
Twitter, a social network or a news media? WWW'10,
pages 591 -- 600, 2010.
[17] T. M. Mitchell. Machine learning. McGraw Hill series
in computer science. 1997.
[18] M. E. J. Newman. The structure and function of
complex networks. SIAM Review, 45:167 -- 256, 2003.
[19] D. M. Romero, B. Meeder, and J. Kleinberg.
Differences in the mechanics of information diffusion
across topics: idioms, political hashtags, and complex
contagion on twitter. WWW '11, pages 695 -- 704, 2011.
[20] K. Saito, M. Kimura, K. Ohara, and H. Motoda.
Selecting information diffusion models over social
networks for behavioral analysis. PKDD'10, pages
180 -- 195, 2010.
[21] J. Yang and S. Counts. Predicting the speed, scale,
and range of information diffusion in twitter.
ICWSM'10, pages 355 -- 358, 2010.
[22] J. Yang and J. Leskovec. Modeling information
diffusion in implicit networks. ICDM'10, pages
599 -- 608, 2010.
[23] J. Yang and J. Leskovec. Patterns of temporal
variation in online media. WSDM'11, pages 177 -- 186,
2011.
|
1701.02729 | 1 | 1701 | 2017-01-11T18:44:05 | Digital Advertising Traffic Operation: Flow Management Analysis | [
"cs.SI",
"math.OC"
] | In a Web Advertising Traffic Operation the Trafficking Routing Problem (TRP) consists in scheduling the management of Web Advertising (Adv) campaign between Trafficking campaigns in the most efficient way to oversee and manage relationship with partners and internal teams, managing expectations through integration and post-launch in order to ensure success for every stakeholders involved. For our own interest we did that independent research projects also through specific innovative tasks validate towards average working time declared on "specification required" by the main worldwide industry leading Advertising Agency. We present a Mixed Integer Linear Programming (MILP) formulation for end-to-end management of campaign workflow along a predetermined path and generalize it to include alternative path to oversee and manage detail-oriented relationship with partners and internal teams to achieve the goals above mentioned. To meet clients' KPIs, we consider an objective function that includes the punctuality indicators (the average waiting time and completion times) but also the main punctuality indicators (the average delay and the on time performance). Then we investigate their analytical relationships in the advertising domain through experiments based on real data from a Traffic Office. We show that the classic punctuality indicators are in contradiction with the task of reducing waiting times. We propose new indicators used for a synthesize analysis on projects or process changes for the wider team that are more sustainable, but also more relevant for stakeholders. We also show that the flow of a campaign (adv-ways) is the main bottleneck of a Traffic Office and that alternate paths cannot improve the performance indicators. | cs.SI | cs | Digital Advertising Traffic Operation:
Flow Management Analysis
Massimiliano Dal Mas
me @ maxdalmas.com
Abstract
In a Web Advertising Traffic Operation the Trafficking Routing Problem (TRP) consists in scheduling the
management of Web Advertising (Adv) campaign between Trafficking campaigns in the most efficient way
to oversee and manage relationship with partners and internal teams, managing expectations through
integration and post-launch in order to ensure success for every stakeholders involved.
For our own interest we did that independent research projects also through specific innovative tasks
validate towards average working time declared on "specification required" by the main worldwide
industry leading Advertising Agency.
We present a Mixed Integer Linear Programming (MILP) formulation for end-to-end management of
campaign workflow along a predetermined path and generalize it to include alternative path to oversee
and manage detail-oriented relationship with partners and internal teams to achieve the goals above
mentioned.
To meet clients' KPIs, we consider an objective function that includes the punctuality indicators (the
average waiting time and completion times) but also the main punctuality indicators (the average delay
and the on time performance).
Then we investigate their analytical relationships in the advertising domain through experiments based on
real data from a Traffic Office. We show that the classic punctuality indicators are in contradiction with the
task of reducing waiting times. We propose new indicators used for a synthesize analysis on projects or
process changes for the wider team that are more sustainable, but also more relevant for stakeholders.
We also show that the flow of a campaign (adv-ways) is the main bottleneck of a Traffic Office and that
alternate paths cannot improve the performance indicators.
Keywords
Digital Advertising, Online Advertising, Trafficking, eCommerce, Customers, Clients, Advertising agencies,
Stakeholders, Marketing, Products, Shopping, Display, DEM, Programmatic Adv, Native Adv, Social Adv, Affiliation
Adv, Branded Content, Content Recommendation, AdServer, Adv Operations Management, Account Manager, Media
planning, Ad Platforms, Industry leading third party Ad Servers, Mixed Integer Linear Programming (MILP),
Optimization, Routing problem, Scheduling, Collision Avoidance, Avoidance Constraints, Receding-horizon
Formulation, Baseline Algorithm, Scalability, Mobile, Tablet, Web, Creative, Detail-oriented, Analytical Skills,
Synthesize analysis, People management skills, Relationships, Effective campaigns, Technical/operational
capabilities, Product development, Operations, Technology team, Project Management, End-To-End management,
Campaign Workflow, Creative delivery, Campaign Performance, Key Metrics, KPI, CTR, Fill Rate, eCPM, CPA, CPG,
Impression, Click, Lead scoring, Reach, ROI, Revenue, A/B Testing, Multivariate Testing, Path Analysis, HTML5,
CSS, Flash, Web Responsive, SQL, Advanced Excel
_______
If you have read this paper and wish to be included in a mailing list (or other means of communication)
that I maintain on the subject, then send email to: me @ maxdalmas.com
1. Introduction
This paper is a preprint of an extensive research soon to be described in a full paper.
On Web Advertising over the last years, the Adv traffic kept growing. Due to this ceaseless increase of
the number of Adv in the Web, Traffic Offices are becoming an important bottleneck of Adv Traffic.
Hence, using decision support systems and optimization tools is more and more critical.
The Adv uploads play an important role in the Adv emissions and the workflow. The Adv creativities and
tracking are also key components of the Adv Traffic Office. It also represents a non negligible part of
trafficking cost. A better routing optimization allows to save costs on the Adv campaign management.
The Trafficking Routing Problem (TRP) consists in scheduling the management of Web Advertising (Adv)
campaign between Trafficking campaigns without conflicts and in the most effective way. An incoming
Adv has to be routed from its input acceptance to its staging area. While a delivering Adv has to be routed
from its current incoming position to its delivering runway.
The Adv movements occur on a network of path of management that we call "adv-ways" which link Adv
campaigns (see Figure 1) [1-12]. In practice this problem is issued by Adv Traffic Controllers (ATCs) on
an operational window of typically 10 to 40 minutes.
The main constraints of the problem are related to the efficient Adv Loading: campaigns have to be
separated from each other to avoid conflicts. Several other routing constraints must also be taken into
account such as waiting times of the campaigns.
It is often difficult to design an optimum system of an Adv-way network. The Adv-way system may have a
decisive influence on the capacity of the loading queue system, and thereby also the overall capacity of
the Traffic Office. Considering that the load bearing strength of an Adv-way network represents an
important item in the total investment costs. Therefore it is necessary to optimize the Adv-way network
system layout to provide efficient wait for a campaign without undue expense.
The Adv-way network should permit safe, fluent and expeditious movement of the campaigns. They
should provide the shortest and most expeditious connection of the loading queue with the staging area.
The safety of campaigns is enhanced if the Adv-way network is designed as one-way operation, and
crossing other Adv-ways, and particularly loading queue, is minimized. In those Traffic Office where the
number of campaigns movements during the peak hour traffic is relatively small, it is usually sufficient to
provide only a short Adv-way to the loading queue to connect it to the loading of the campaign.
Figure 1: Flow chart of a Traffic Office
Figure 2: Loading Queue
Determination of the delivering runway length to be provided for the campaigns' workflow [1] is one of the
most important decision in designing a Traffic Office. The runway length determines the types of
campaign that may be used by the Traffic Office. The basic requirements for the runway parameters may
be specified from market research into the types of campaigns to be delivered, the networks of the
campaigns and prognoses of further market development at the Traffic Office in question.
The first step in specifying the necessary delivering runway length is to create a list of campaigns that
may wish to use the Traffic Office. It is advisable to divide the campaigns into groups which are
characterized by:
-
-
type of materials required for the adv
payload (monetary value for the adv)
Each of the campaigns groups requiring approximately the same runway length. In the majority of cases,
only a small group of campaigns requires the longest class of delivering runway length, or even only one
campaign: the "critical" campaign. The number of movements of critical campaign is sometimes so small
that there is no economic justification for extending adv-way fulfils its requirements. In that case the
operation of a critical type is usually still possible from the existing runway, though with an extra campaign
cost, or reduced features of the campaign, or both at some times of the day and year. However, the
Traffic Office will not use such a campaign if it would frequently require considerable limitation of the
features of the campaign respect the cost.
The quality of a routing schedule can be defined by several Key Performance Indicators (KPIs).
In this paper, we focus on four KPIs:
•
•
•
•
the average waiting time,
the average completion time,
the average delay and
the On Time Performance (OTP).
The waiting time measures the time an Adv spends on Traffic Office, between push back (i.e. leaving the
incoming position) and take-off for loading. It includes any waiting time (e.g. queuing time due to others
Adv management) and not just the time spent managing a single Adv.
The time consumption is not accurately known for the waiting process nowadays, but it mainly depends
on the waiting. Other influencing factors have been identified, such as the number of stops, but their
effects are less clear and of minor importance in comparison to the waiting time.
We are also interested in minimizing the completion times, i.e. the Adv upload times for departing Advs.
In peak hours, the "adv-way" is often the main bottleneck of the Traffic Office. Minimizing upload times
reduces the risk of "adv-way" starving and ensures a good use of its capacity. Minimizing waiting times
reduces the Adv creativities and tracking time, which increases the quality of service.
In the Adv traffic industry, the main indicators of punctuality are the average delay per Adv and the OTP.
The average delay is measured with respect to the scheduled times of waiting time and push back. For
example, an arriving Adv creativity is 5 minutes late if the Adv creativity arrives at the staging area 5
minutes after the scheduled time and an uploading Adv is 5 minutes late if the Adv is pushed back from
its staging area 5 minutes after the scheduled time. The OTP L is the percentage of Advs having a delay
less than L minutes. The most common value of L in the industry is 15 minutes and OTP 15 is simply
called OTP.
A common practice in Traffic Office is to push back Adv as soon as possible and to put it on hold to the
"adv-way". It reduces the risk of "adv-way" starting and is beneficial for the upload delay and OTP.
However, especially during peak hours, the "adv-way" capacity is often exceeded and a push back as
soon as possible policy results in a take-off queue (see Figure 2). We call this process: staging area
holding. Nevertheless, if an incoming Adv is held too long, it may not reach the "adv-way" in time for
uploading and some "adv-way" capacity can be wasted. It may also prevent an arriving Adv from using
the staging area (staging area blockage).
Accurate estimations of Adv ready times and waiting times are required to schedule the Adv loading
adequately, i.e. holding staging area as much as possible in order to reduce waiting times, but without
wasting the "adv-way" capacity. Accurate estimations of ready times are not always available in Traffic
Office: those are often informed of an Adv ready time only when the Agent mails the Adv Order or the Adv
creativity/tracking for push back and start up approval for Adv Loading. That is why the Traffic Offices
designed the Collaborative Decision Making (CDM) project which main goal is precisely to improve
predictability and information sharing between all stakeholders [10-13]. In a CDM Traffic Offices, Agents
and Clients handlers are required to communicate and update an accurate "ready time" (typically 3 to 4
days in advance respect the online of the Adv). The ready time is called the Target Off-Block Time
(TOBT) and corresponds to an estimation of the time at which the Adv creativity/tracking will be ready to
push back on Adv Loading (all creativities are correct, tracking is correct, etc). In the Adv traffic industry,
the push back scheduling is called often the "pre-upload sequencing".
In literature, it has been shown that staging area can reduce waiting times significantly without impacting
the adv-way capacity (see Section 2). Nevertheless, the impact of staging area on the KPIs of the
industry (OTP and delay) has not been investigated. In this paper, we propose a model including the OTP
and delay indicators. We then address the following questions through a numerical study based on
realistic instances from an Adv Traffic Office. How do the performance indicators compete ? Are the key
indicators of the industry consistent with a sustainable development ? Can we propose better indicators ?
Can we reduce waiting times by considering alternative paths ? What is the bottleneck in Adv-traffic
routing operations ? The remainder of this paper is organized as follows.
A review of the literature and a summary of our contributions are presented in Section 2. In Section 3, we
propose a model for the TRP and formulate it as a Mixed Integer Linear Programming (MILP) [5] in which
only some of the variables are constrained to be integers, while other variables are allowed to be non-
integers. We provide details on the data set and instances from a Traffic Office in Section 4. Then the
results of our numerical study are given in Section 5. Finally, a conclusion and discussion of our results
are presented in Section 6.
2. Paper contributions
The input of our model is the upload sequence of an Adv while the input of most of the models is the
upload schedule with targeted upload times. We did this choice because manipulate sequences is more
convenient than schedules for ATCs.
In that way, our model can be used as a tool for supporting adv-way sequencing decisions: it provides
optimal upload times from a sequence, while accurately taking into account routing considerations.[13-14]
Moreover besides the waiting time and completion time indicators we include the punctuality indicators of
the industry (OTP and delay) in the objective function and we add staging blockage constraints.
In the TRP we consider the OTP and delay. We analyze the impact of including these KPIs in the
optimization for a numerical study. We demonstrate that they are in contradiction with the objective to
reduce waiting times in uploading Adv. As result we propose new indicators that are more sustainable,
but also more relevant for stakeholders.
Our experiments show that the alternative paths method does not succeed in improving the KPIs
significantly. That confirm the adv-way as the main bottleneck in Traffic Office.
3. Traffic Routing Problem formulation
In this section, we formulate the TRP as a MILP and we introduce the main notations. We present the
model with a single path for each upload of an Adv.
For the proposed model, the main inputs are:
•
•
•
•
the adv-way allocation,
the adv loading,
the scheduled incoming new campaign and
the staging allocation plan (including the sequence of Adv upload operation for every staging
area).
3.0 Mixed Integer Linear Programming MILP
Mixed Integer Linear Programming (MILP) formulations are widely used by exact solution methods in
Operational Research. In comparison to Linear Programming (LP) formulations where the objective
function and constraints all have to be linear, MILP formulations introduce an additional restriction of
integrality for some variables. Unfortunately, since this restriction changes the nature of the search space
from continuous to discrete, it often leads to problems which are much harder to solve, so that solution
times for large problems may no longer be practical [15-22].
3.1. Single path model
Traffic network
The Traffic Network is composed by three networks (Material Network, Waiting Network, Ad-way
Network) and it's modeled as a graph G = (N;E) with N the set nodes and E the set of edges [18-19].
There is a node for each intersection among the three networks and additional nodes in the Material
Networks to represent the incoming materials. An edge represents an elementary segment of the
network.
C
∪
Overall the set of incoming and delivering campaigns is
For a campaign i, the single path from its origin oi to its destination di is
Let the set of nodes and edges that campaign i can use. Note that the origin oi and the
destination di are fixed by the adv-way and loading queue allocation (see Figure 2).
Adv characteristics
i C∈
An Adv campaign i is ready to leave its origin oi at time Toi For an Adv campaign , it
corresponds to the Target Off-Block Time (TOBT) estimated by the Traffic Officer and the Agent.
The scheduled time for campaign i is SBi, this time is used to measure the delay and the OTP.
For an incoming new campaign, it is the Scheduled In-Block Time (SIBT), i.e. the time a campaign is
supposed to arrive at its adv-loaded allocation.
A campaign i can spend a minimum (maximum) time Tmin iuv (Tmax iuv ) on edge
These times can be directly computed from the minimum and maximum times allowed to cross an edge
uv for a campaign i and from the edge length (see Section 4).
The adv-loading sequence is an input of our model. The position of departure in the take-off
sequence is
Interactions between campaigns
Campaigns i and j must have a minimum separation time at each node : if campaign i arrives
first at node u at time t, then j cannot cross node u before t+Siju.
uv E∈
loading
P
=
i
u N
∈ ∩
C C
=
( )iΓ
N E
,
i C∈
d−
,
1
i
o u
,
i
2
,...,
u
⊂
E
incoming
N
i
⊂
N
j
i
C
i
i
incoming
i
(
)
loading
i
i
i
iiot
t
iid
)
1
1
G C
⊂
×
C
loading
i
j
incoming
SB−
i
SB−
i
u N
Lδ >
i
(
max 0,
u N∈
iidt
0L ≥
(
t
max 0,
iio
N
∈ ∩
Let the set of possible staging blockages. A pair of campaigns (i, j) belongs to G if
loading i and incoming j are assigned to the same staging and i is scheduled before j (in the staging
allocation plan). In this case, loading i must leave the staging area before arrival j arrives in staging
blockages.
Decision variables
The main decisions in the single path approach is the time taken by the campaign to reach each node of
the path. Our algorithm uses the following variables:
iut
: the time when campaign i reaches node . The origin time corresponds to the working time
to load an Adv campaign. The loading time corresponds to the loading time for an incoming new
campaign.
if campaign i is delayed by more than with respect to the scheduled reference
iβ =
time SBi (if ) , 0 otherwise.
iuδ
: the delay of campaign i to its scheduled reference time SBi. The delay is
)
for an incoming campaign while for a loaded campaign is
ijuz =
if campaign i arrives before campaign j in node , 0 otherwise.
Objective function
We aim in minimizing the following performance indicators.
i C β∈∑
: number of campaigns delayed by more than L
i Cδ∈∑
: total time delay
(
∑
i C t
: total waiting time
(
∑
i C t
: total completion time
MILP formulation for Single path model
The single path problem can be formulated by Mixed Integer Linear Programming (MILP) define in (1)
and (2) and the relative constraints (3)
The following objective function is a linear combination of the above four indicators using non negative
coefficients :
Indexing the coefficients we can differentiate campaigns: as a campaign waiting to be uploaded will block
the uploading of other campaigns.
∑
i C
∈
iβ
Constraints (2) ensure the definition of delay variables and OTP variables .
Constraints (3) specify the domains of the variables.
( )2
( )
1
i C
i C
iO
i
L M
≤ +
δ ≥
i
δ ≥
SB
i
SB
i
∑
i C
∈
iδ
∀ ∈
i C
t
iO
i
t
∑
i C
∈
∑
i C
∈
∀ ∈
∀ ∈
,
k
δ
i
+
β
i
+
−
T
O
i
−
T
O
i
,
k
,
k
)
)
(
t
id
i
(
t
id
i
)
+
−
−
−
t
iO
i
−
t
iO
i
k
ct
k
OTP
k
delay
k
wait
incoming
id
i
id
i
delay
wait
ct
k
OTP i
,
∈
∈
loading
loading
)
i
δ
i
β
i
V
j
)
loading
)
ct
δ
i
wait
i
,
∈
iO
i
jl
j
i
,
i
iju
k
delay
k
OTP
−
t
iO
i
t
iu
≥
(
t
id
i
≤
t
(
t
id
i
t
iO
i
+
k
+
k
−
T
O
i
δ ≥
i
β
i
+
∑
i C
∈
∑
i C
∈
∑
i C
∈
∑
i C
∈
i C
}
}
∀
0
( )3
∀ ∈ ∀ ∈
i C u N
,
i C
∀ ∈
i
( )
4 min
∀ ≠ ∈ ∀ ∈ ∩
j C u V
i
)
(
j G
i C
( )
t
5
( )6
β ∈
z
0
∀ ∈
{
0,1
{
0,1
∈
Note that generalizing the coefficient it is possible to minimize the number of campaigns delayed by more
than L that is equivalent to maximizing the percentage of campaigns with a delay less than L, that we
define as OTP L
Bounding constraints
Constraints (5) ensure that new campaigns cannot push back before they are ready to.
Constraints (6) ensure that incoming new campaigns start waiting as soon as they arrive to the Traffic
Office, in order to free the adv-way.
Staging blockage constraints
Constraints (7) ensure that an incoming campaign does not be loaded until the previous campaign has
ended the loading (staging blockage constraints).
Time constraints
Constraints (8) ensure the respect of minimum and maximum time spent on every edge (time
constraints). The maximum time spent on an edge allows to prevent adv campaign from stopping in
certain adv-way segments (e.g. adv-way crossing). It also ensures that the capacity of the edge is not
exceeded (i.e. no more campaign that its length allows it).
Runway sequencing constraints
Constraints (9) ensure the definition of sequencing variables ziju, i.e. either campaign i arrives before
campaign j in node u 2 Vi \ Vj or the opposite.
Constraints (10) ensure that the campaign upload sequence is respected.
∀ ∈ ∀ ∈ ∩
j C u N
∀ ∈ ∀ ∈
i C uv E
(
)10
( )7
( )9
( )
8
1
1
∀ ∈
j C
i
,
∀ ∈
i C
T
max,
T
min,
∀ ∈
incoming
,
d
i
=
u
T
O
i
=
d
T
O
i
z
iju
+
z
t
iO
i
z
iju
N
j
≤
t
jv
−
t
ju
≤
=
jiu
loading
j
i
,
,
=
≥
,
i
iuv
iuv
i
=
t
ju
)
iju
iu
iju
≥
t
−
z
+
S
−
K
(
1
(
11
)
Separation constraints
Constraints (11) prevent campaign from bumping into each other at every node with a priority conflict (see
Figure 3), where K is supposed to be a high enough value (e.g. 10 times the time window is largely
sufficient, it remains in forcing every campaign to end waiting to be uploaded in less than 10 times the
time window which is reasonable).
Overtake and Head-on constraints
Constraints (12) prevent two campaigns to be done concurrently - from using an edge in opposite
directions simultaneously (see Figure 3). Constraints (9) also prevent a campaign from overtaking another
one on an edge, which is impossible (see Figure 3).
∀ ∈ ∀ ∈ ∩
(
)12 z
∀ ∈ ∀ ∈ ∩
j C u N
j C uv E
,
z
ijv
N
j
E
j
=
iju
i
,
,
i
i
,
i
Figure 3: Safety constraints
4. Instances for an operational day
In this section we present our instances and how they were generated. Each instance represents an
operational day in a Traffic Office.
For our own interest we did that independent research projects also through specific innovative tasks
validate towards average working time declared on "specification required" by the main worldwide
industry leading Advertising Agency.
http://www.sizmek-sea.com/Spec
http://support.adform.com/...specifications/general-specifications
http://creative-weborama.com/category/uncategorized
http:// groupm.dk/Banner-sizes-and-specifications
As discussed in the Introduction the campaigns were divided into two groups characterized by: type of
materials required for the adv and payload (monetary value for the adv). Relative data about those
metrics was desumed on "specification required" by the main worldwide industry leading Advertising
Agency mentioned above.
Delivering runway configuration.
The most frequent delivering campaign in a Traffic Office is the Display with start on a working day night
and stop after one day.
In the month of September 2016, we have selected 8 busy days (with more than 800 campaigns) in which
more than 70% of campaigns were operated in this adv-way configuration. The average number of
incoming Adv new campaign and loaded campaign by hour is presented in Figure 4. Minimum delivering
runway separation times used at the Traffic Office are presented in Table 1.
An edge represents an elementary segment of the three linked networks. A node needs to be defined for
each intersection. There is also a node for each campaign-delivering.
The graph is composed of:
• 28 nodes (Materials Network: 11 nodes, Waiting Network: 10 nodes, Adv-Way Network: 7 nodes),
• 35 edges (Materials Network: 12 edges, Waiting Network: 12 edges, Adv-Way Network: 11 edges).
The standard path between each campaign-delivering and each adv-way was provided by the Traffic
Office, as well as the standard push back scheme and its duration, for each campaign-delivering. We
observed that standard paths were used for more than 83% of campaigns.
Campaign flow data around the Network also provides an estimation of the maximal time spent. Based on
these data, we assume a maximal time of 15 days for the campaigns around the Adv-way Network (in
blue in Figure 5), of 5 days for the campaigns on Material Network (in red in Figure 5) and of 10 days for
the other Waiting Network.
To ensure the respect of minimum and maximum time spent on every edges we assume a minimum time
of 2 days. The minimum separation time (Siju) between two campaign is assumed to be 40 seconds for
every nodes (except the runways, see Table 1).
Campaigns
Direct information on campaigns are not delivered with the campaign-flow but only records composed of
campaign identifier, position in the Traffic Office and time stamp while the Traffic operational database
provides other useful data for each campaign.
It gives the Scheduled In-Block Time (SIBT), denoted by SBi in our model. For each arriving campaign, it
also provides the Actual Incoming Time (AIT) which can be used to define the release time Toi.
As a push back as soon as possible policy is used in the Traffic Offices most of the time, we have
decided to take the Actual Off-Block Time (AOBT) to define the release date Toi for departing campaigns.
Finally, the take-off sequence is the actual one which can be derived from the Actual Take-Off Times
(ATOTs) [22-26].
Average performance indicators.
All results are averaged among the campaign for 5 working days. For instance, an average waiting time
of 10 minutes means that it takes on average 10 minutes for a campaign to stay in the waiting area,
among the 5 working days. We choose the OTP 10 indicator (L = 10) as punctuality indicators.
Networks for Adv-Way, Waiting and Materials. Figure 5 presents the graph of the Adv-way Network with
the Waiting Network and the Materials Network.
Figure 4: Average profile of instances
Time [s]
Incoming
campaign
S
M
L
Loading campaign
L
S
90
120
90
60
60
60
M
120
60
60
Table 1: Minimum adv-way separation time at Traffic Office (S = short time, M = medium time and L =
long time)
5. Results on quantitative data
The results are presented for the single path problem, except in Section 5.3 where we study the effect of
the number of paths [16]. We set k.wait = 1 without loss of generality, as we vary the other weights k.ct,
k.delay and k.OTP. Results of mixed integer programs were obtained with C.plex 12.4 solver using
default parameter tuning on a personal computer (Intel Core i7 Extreme 3.70Ghz, 16Go RAM) under
Ubuntu 14.04 LTS operating system. Java Concert API was used to define the models.
5.1. Sliding window optimization
It is not possible to schedule the movements of a campaign for the entire day as there are many
stochastic events. Usually in literature and practice a routing problem – as the Trafficking Routing
Problem (TRP) – is solved dynamically with a sliding window approach. With large time window a better
solutions on TRP can be found but the computation times increase too.
The optimization does not need to be performed continuously but only when a new campaign enters the
system. Once a campaign has started to be worked by the Traffic Office, changing its schedule is not
allowed in the next time windows, but it has to be taken into account to ensure a conflict free routing.
In the rest of the numerical study we set a time window of 30 minutes. This assumption seems
reasonable in the context of a usual approach in which Clients and Traffic Office are required to
communicate accurate ready times 3 to 4 days in advance.
With a 30 minutes time window, computation times were always below two seconds for the single path
approach. It appears that a time window of 15 minutes is sufficient in our test case, i.e. longer time
windows do not provide better solutions. This value may be Traffic Office dependent and cannot be
generalized without experiments in other Traffic Offices.
5.2. Including the punctuality key performance indicators
We consider the OTP and the average delay as main punctuality indicators for campaigns and Traffic
Offices. However the client generally focuses on waiting time and completion time indicators. In this
section, we study the impact of including the average delay and the OTP in the optimization.
5.2.1. Average delay
Figure 6 presents the effect of the weight k.delay on all KPIs for incoming campaigns (dashed lines) and
delivering campaigns (solid lines) with different values of k.ct.
For arrivals, we observe that KPIs are not much impacted by k.delay, which can be explained as follows.
The contribution of a delayed arriving campaign i to objective function (1) is fixed (see constraints (3))
because the loading time is fixed.
We consider the variables tidi for the KPIs because including the delay adds redundancy been correlated
with the waiting time.
i C
∈
(
(13)
)
)
t
(
k
}
SB L
+
i
SB
i
1
{
t
delay
+
k
+
k
t
id
i
>
id
i
wait
ct
id
i
OTP
>
arr
+
k
Figure 5: The Adv-way network, Waiting Network and Materials Network
While for new campaign, increasing k.delay reduces delays but increases waiting times.
When k.delay = k.wait we can observe a threshold effect between the delay and the waiting time due to
the contribution of a delayed departure i 2 Fdep (tioi > SBi) to the objective function, which is, within a
constant,
It clearly highlights an opposition of the waiting time and the delay for delivering the campaign.
(14)
1
{
t
delay
}
SB L
+
i
OTP
)
t
(
k
−
k
−
k
)
t
>
iO
i
+
k
(
k
ct
id
i
+
wait
iO
i
wait
When k.delay – k.wait > 0, pushing back campaign earlier (which reduces t.ioi) is preferable as it reduces
delays. But it leads to longer waiting times when the loading queue is congested.
When k.delay – k.wait < 0, holding campaign at staging areas as much as possible (which increases t.ioi)
is more profitable and avoids loading queuing. It consequently decreases waiting times, but implies larger
delays.
To further illustrate the opposition between the waiting time and the delay for loading the campaign,
Figure 7 details the results along the day with a 30 minutes time window and a 5 minutes step. For
instance, at 9h05, Figure 7(a) plots the number of a loading campaign in the time interval [9h05,9h35].
Figure 7 plots the additional waiting time and the additional delay when instead of k.delay = 0 we set
k.delay = 2
In lows hours campaign go to the loading queue in the shortest time to be put online immediately and all
performance indicators are optimized.
While during the peaks hours, the loading queue is saturated and campaigns cannot be put online as
soon as they reach the campaign queue. They must either wait at staging areas or at the loading queue.
When k.delay = 0, staging holding is preferred since it reduces the waiting time. When k.delay = 2,
pushing-back earlier is preferred in order to reduce delays to the scheduled push back time.
In conclusion, delays cannot be significantly reduced without degrading waiting times in peak hours.
5.2.2. New delivered punctuality indicators
Staging holding succeeds in reducing the waiting time significantly by transferring loading queuing time
without materials for the campaign on to the staging areas. We observed in Figure 7 that it is particularly
efficient during delivery peaks of all the campaigns. Nevertheless, our analysis also shows that this
practice degrades the punctuality indicators. Hence Traffic Office may be reluctant to use staging holding
and may prefer a push back ASAP policy to ensure good departure indicators. In this section, we
question the relevance of OTP and delay indicators for campaigns of a Traffic Offices and propose new
punctuality indicators.
For Traffic Offices measuring the punctuality with respect to push back times is not accurate as additional
delays occur during the waiting process and particularly in the loading queue.
Moreover campaigns are not accountable for the delay between the ready time and the push back time.
Consequently an idea could be to base the measure of loading punctuality for campaigns on the ready
time and not on the push back time.
We propose to define the Schedule Loading Time (SLT) as Scheduled In-Block Time (SIBT) plus a
constant depending on the Traffic Office, for instance the average loading completion time. Our models
can easily be adapted to measure the delay and the OTP with respect to SLT. Constraints (10) can be
merged with constraints (11) as follows :
where SB0i is the Scheduled In-block Time (SIBT) for incoming new campaign and the Schedule Loading
Time (SLT) for delivered new campaign. OTP constraints (12) are unchanged.
L M
+ +
SB
'
i
i C
∀ ∈
β
i
∀ ∈
i C
SB
'
i
−
id
i
i
t
id
δ
i
≤
t
≥
Average delay
Average completion time
OTP
Figure 6: Effect of including the delay indicator in the optimization for incoming new campaign (dashed
lines) and departures (solid lines) (k.wait = 1, k.OTP = 0)
5.3. Bottleneck (constraint) analysis
A bottleneck (or constraint) in a supply chain determine the throughput of a supply chain, it means the
resource that requires the longest time in operations of the supply chain for certain demand.
The adv-way network can be divided in three distinct parts: the runway, the staging areas and the adv-
way area. In this section, we evaluate the impact of each area on the routing, by relaxing its constraints in
the optimization.
Figure 8 presents the results of this analysis.
All constraints means that all constraints are taken into account.
Adv-way means that constraints of the adv-way area are relaxed.
Stage means that constraints of the stage area are relaxed.
Runway means that separation constraints of the runway are relaxed.
(a) Profile
(b) Additional waiting time and delay when k.delay = 2 instead of k.delay = 0
Figure 7: Effect of including the delay indicator in the optimization along the day (departures only, k.ct = 2,
k.wait = 1)
Besides no loading adv sequence is forced. No constraint is the case where all the above constraints are
relaxed and campaign stage at minimum time without stopping anywhere. The delay and the OTP are
measured with respect to SIBT / SLT (as defined in Section 5.2.2).
Figure 8 shows that the adv-way is the main bottleneck: all indicators are consequently impacted,
particularly the completion time, the delay and the OTP. It also shows that the staging area has a limited
impact on indicators, which join the conclusion of previous section.
We also observe that the stage area impacts all indicators in a significant way.
The lack of benefits provided by the alternate path can be explained by the structure of the Waiting
Network in Figure 5.
Most of head-on conflicts between incoming and delivered new campaigns are avoided because there
are two main parallel adv-ways serving the staging areas and each one can be used in a different
direction in the single path approach.
Figure 8: Bottleneck analysis (k.ct = 2; k.wait = 1; k.OTP = k.delay = 0, new OTP and delay)
While the area around the staging areas is much more intricate and generally offers a single adv-way. So
the alternative paths model do not allow to avoid much more conflicts that the single path model. This
intuition is further explored in the next section through an analysis of the Traffic Office bottlenecks.
6. Conclusion
In this paper, we formulate the Trafficking Routing Problem (TRP) as a Mixed Integer Linear
Programming (MILP). We present a formulation with a single path. Our model takes into account the
classical performance indicators (average delay and OTP 10).
In a numerical study based on data from a virtual Traffic Office (validate towards average working time
declared on "specification required" by the main worldwide industry leading Advertising Agency), we first
show how the punctuality indicators are in contradiction with a sustainable management of Traffic Office.
The punctuality of departures is currently measured with respect to push back times, which encourages to
push back as soon as possible and results in large waiting times in peak hours because of adv-way
congestion.
Including the delay in the objective function leads to a waiting time increase of 1 minute in average for
departures at the Traffic Office. In more congested situations, this increase can reach 6 minutes.
Including the OTP 10 in the objective function has less impact in current traffic situations. However, in
more congested situations, it also leads to longer waiting times.
We propose to measure the punctuality of Adv Traffic Office with respect to adv loading times and not
with respect to push back times. We show that this new measure of punctuality do not prevent staging
area holding. Besides they are more appropriate since they capture additional delays between push back
and adv loading.
We also show that the adv way is the main bottleneck of a Traffic Office and that considering alternative
paths do not improve the performance indicators significantly.
Numerical experiments were performed in a Traffic Office and we may wonder to what extent our results
can be generalized to Traffic Offices.
In congested Traffic Offices, the delay and OTP indicators will intuitively not be adequate to measure
punctuality, as they encourage to ask for adv materials as soon as possible and lead to long waiting
times. In non congested Traffic Office, it will not matter as an asking for adv materials as soon as possible
policy should be nearly optimal.
The main parallel adv ways serving the "waiting areas" in a Traffic Office prevent most of head-on
conflicts in the adv way area. Such a structure is very common and is used in the most frequented Traffic
Offices in the world. In such configurations, the alternate path approach will probably not bring much with
respect to the single path approach. However, the alternate path approach is certainly more beneficial in
Traffic Offices with more complex adv way layout, typically with adv way crossing.
Massimiliano Dal Mas is an engineer working on webservices, trafficking and online advertising and is interested in knowledge
engineering. In the last years he had to play a critical role at Digital Advertising business, cultivating relationships with key
publisher partners with experience managing a team. Been responsible for all day to day operations with partners and consult
on the best ways to monetize their properties. His interests include: user interfaces and visualization for information retrieval,
automated Web interface evaluation and text analysis, empirical computational linguistics, text data mining, knowledge
engineering and artificial intelligence. He received BA, MS degrees in Computer Science Engineering from the Politecnico di
Milano, Italy. He won the thirteenth edition 2008 of the CEI Award for the "best degree thesis" with a dissertation on "Semantic
technologies for industrial purposes" (Supervisor Prof. M. Colombetti). In 2012, he received the "best paper award" at the IEEE
Computer Society Conference on Evolving and Adaptive Intelligent System (EAIS 2012) at Carlos III University of Madrid,
Madrid, Spain. In 2013, he received the "best paper award" at the ACM Conference on Web Intelligence, Mining and Semantics
(WIMS 2013) at Universidad Autónoma de Madrid, Madrid, Spain. His paper at 2013 W3C Workshop on Publishing using CSS3 &
HTML5 has been appointed as "position paper", Paris, France.
References
[1] M. Dal Mas, "Digital Advertising Traffic Operation: Machine Learning for Process Discovery".
2017, CORR – Arxiv (https://arxiv.org/abs/1701.00001 )
[2] M. Newman, A. Barabasi, D. Watts, "The Structure and Dynamics of Networks". Princeton
University Press, Princeton, 2006
[3] M. Dal Mas, "Folksodriven Structure Network". Ontology Matching Workshop (OM-2011) collocated
with the 10th International Semantic Web Conference (ISWC-2011), CEUR WS vol. 814
(http://ceur-ws.org/Vol-814), 2011
[4] M. Dal Mas, "Elastic Adaptive Ontology Matching on Evolving Folksonomy Driven Environment" in
Proceedings of IEEE Conference on Evolving and Adaptive Intelligent System (EAIS 2012),
Madrid, Spain, 35-40, IEEE, (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6232801)
DOI: 10.1109/ EAIS.2012.6232801
[5] M. Dal Mas, "Elasticity on Ontology Matching of Folksodriven Structure Network". Accepted for the
4th Asian Conference on Intelligent Information and Database Systems (ACIIDS 2012) -
Kaohsiung Taiwan R.O.C., 2012, CORR – Arxiv (http://arxiv.org/abs/1201.3900)
[6] M. Dal Mas, "Elastic Adaptive Dynamics Methodology on Ontology Matching on Evolving
Folksonomy Driven Environment". Journal Evolving Systems 5(1): 33-48 (2014)
(http://link.springer.com/article/10.1007%2Fs12530-013-9086-5)
[7] M. Dal Mas, "Modelling web user synergism for the similarity measurement on the ontology
matching: reasoning on web user felling for uncertain evolving systems". Proceedings of the 3rd
International Conference on Web Intelligence, Mining and Semantics, Article No. 17, ACM New
York, NY, USA (http://dl.acm.org/citation.cfm?doid=2479787.2479799 ) ISBN: 978-1-4503-1850-1
DOI:10.1145/2479787.2479799
[8] L. Mussel, "Conformazione e struttura di bio-polimeri". Dip. di Scienze Chimiche – Università di
Padova – Padova Digital University Archive, 1964
[9] D. Watts, S. Strogatz, "Collective dynamics of 'small-world' networks". Nature, 1998, 393:440–442.
[10] D. J. Watts, "Small Worlds" Princeton University Press, 1999
[11] B. Bollobas, "Random Graphs". Cambridge University Press, 2001
[12] P. Lind, M. Gonzalez, H. Herrmann, "Cycles and clustering in bipartite networks. Physical Review",
2005
[13] Vangelis Th. Paschos "Concepts of Combinatorial Optimization", 2nd Edition August 2014, Wiley-
ISTE
[14] Z. Chen, "Computational Intelligence for Decision Support". Ed. CRC Press, 2000
[15] W. Duch, "Towards comprehensive foundations of computational intelligence". Challenges for
Computational Intelligence. Springer, 2007
[16] H. Aljazzar, S. Leue, "A heuristic search algorithm for finding the k shortest paths". Artificial
Intelligence Volume 175, Issue 18, December 2011, Pages 2129-2154
[17] R. Haberman, "Mathematical models." Prentice-Hall, Inc. New Jersey, 1977, 255-394.
[18] R. Courant R., D. Hilbert, "Methods of Mathematical
Physics", vol II. Ed. Interscience. Ed.
Wiley, 2008
[19] B. Ganter, R. Wille, "Formal Concept Analysis". Mathematical Foundations, Springer Verlag, 1999
[20] Y. I. Manin, "A Course in Mathematical Logic" Springer-Verlag, New York, 1997
[21] E. Mendelson, "Introduction to Mathematical Logic", 3d ed. Wadsworth, Inc., Belmont, Calif., 1987
[22] A. Barrat, M. Barthelemy, R. Satorras, A. Vespignani, "The architecture of complex weighted
networks", 2004
[23] I. Vragovic, E. Louis, A. Diaz-Guilera, "Efficiency of information transfer in regular and complex
networks.", Phys Rev E 71:026122, 2005
[24] U. Brandes, T. Erlebach, "Network analysis: methodological foundations". Lecture notes in
computer science, vol 3418. Springer, New York, 2005
[25] S.P. Borgatti, A. Mehra, D.J. Brass, G. Labianca, "Network analysis in the social sciences".
Science 2009 323(5916):892–895
[26] G. Bretti, R. Natalini, B. Piccoli, A Fluid-Dynamic "Traffic Model on Road Networks", Archives of
Computational Methods in Engineering 14 (2007), 139-172
|
1808.03281 | 1 | 1808 | 2018-08-09T18:00:05 | Who Falls for Online Political Manipulation? | [
"cs.SI",
"cs.HC",
"physics.soc-ph"
] | Social media, once hailed as a vehicle for democratization and the promotion of positive social change across the globe, are under attack for becoming a tool of political manipulation and spread of disinformation. A case in point is the alleged use of trolls by Russia to spread malicious content in Western elections. This paper examines the Russian interference campaign in the 2016 US presidential election on Twitter. Our aim is twofold: first, we test whether predicting users who spread trolls' content is feasible in order to gain insight on how to contain their influence in the future; second, we identify features that are most predictive of users who either intentionally or unintentionally play a vital role in spreading this malicious content. We collected a dataset with over 43 million elections-related posts shared on Twitter between September 16 and November 9, 2016, by about 5.7 million users. This dataset includes accounts associated with the Russian trolls identified by the US Congress. Proposed models are able to very accurately identify users who spread the trolls' content (average AUC score of 96%, using 10-fold validation). We show that political ideology, bot likelihood scores, and some activity-related account meta data are the most predictive features of whether a user spreads trolls' content or not. | cs.SI | cs |
Who Falls for Online Political Manipulation?
The case of the Russian Interference Campaign in the 2016 US Presidential Election
ADAM BADAWY, Information Sciences Institute, University of Southern California
KRISTINA LERMAN, Information Sciences Institute, University of Southern California
EMILIO FERRARA, Information Sciences Institute, University of Southern California
Social media, once hailed as a vehicle for democratization and the promotion of positive social change across
the globe, are under attack for becoming a tool of political manipulation and spread of disinformation. A
case in point is the alleged use of trolls by Russia to spread malicious content in Western elections. This
paper examines the Russian interference campaign in the 2016 US presidential election on Twitter. Our aim is
twofold: first, we test whether predicting users who spread trolls' content is feasible in order to gain insight
on how to contain their influence in the future; second, we identify features that are most predictive of users
who either intentionally or unintentionally play a vital role in spreading this malicious content. We collected
a dataset with over 43 million elections-related posts shared on Twitter between September 16 and November
9, 2016, by about 5.7 million users. This dataset includes accounts associated with the Russian trolls identified
by the US Congress. Proposed models are able to very accurately identify users who spread the trolls' content
(average AUC score of 96%, using 10-fold validation). We show that political ideology, bot likelihood scores,
and some activity-related account meta data are the most predictive features of whether a user spreads trolls'
content or not.
Additional Key Words and Phrases: Political Manipulation, Russian Trolls, Bots, Social Media
Cite as:
Adam Badawy, Kristina Lerman, and Emilio Ferrara. 2018. Who Falls for Online Political Manipulation? Arxiv
Pre-print v1, August 2018
1 INTRODUCTION
The initial optimism about the role of social media as a driver of social change has been fading
away, following the rise in concerns about the negative consequences of malicious behavior online.
Such negative outcomes have been particularly evident in the political domain. The spread of
misinformation [Shorey and Howard 2016; Tucker et al. 2017] and the increasing role of bots [Bessi
and Ferrara 2016] in the 2016 US presidential elections has increased the interest in automatic
detection and prediction of malicious actor activity.
In this study, we focus on the role of Russian trolls in the recent US presidential elections. Trolls
are usually described as users who intentionally "annoy" or "bother" others in order to elicit an
emotional response. They post inflammatory messages to spread discord and cause emotional
reactions [Phillips 2015]. In the context of the 2016 US election, we define trolls as users who exhibit
a clear intent to deceive or create conflict. Their actions are directed to harm the political process and
cause distrust in the political system. Our definition captures the new phenomenon of paid political
trolls who are employed by political actors for a specified goal. The most recent and important
example of such phenomenon is the Russian "troll farms" -- trolls paid by the Russian government
to influence conversations about political issues aimed at creating discord and hate among different
groups [Gerber and Zavisca 2016].
Authors' addresses: Adam Badawy, Information Sciences Institute, University of Southern California, abadawy@usc.
edu; Kristina Lerman, Information Sciences Institute, University of Southern California, [email protected]; Emilio Ferrara,
Information Sciences Institute, University of Southern California, [email protected].
© 2018 The Authors
This is the author's version of the work. It is posted here for your personal use.
:2
Adam Badawy, Kristina Lerman, and Emilio Ferrara
Survey data from the Pew Research Center [Gottfried and Shearer 2016] show that two-thirds of
Americans get their news from Social Media. Moreover, they are being exposed to more political
content written by ordinary people than ever before. Bakshy et al. [2015] report that 13% of posts by
Facebook users -- who report their political ideology -- are political news. This raises the question of
how much influence the Russian trolls had on the national political conversation prior to the 2016
US election, and how much influence such trolls will have in the upcoming elections. Although we
do not discuss the effect that these trolls had on the political conservation prior to the election, we
focus our efforts in this paper on the following two questions:
RQ1: Can we predict which users will become susceptible to the manipulation campaign by
spreading content promoted by Russian trolls?
RQ2: What features distinguish users who spread trolls' messages?
The goal of these questions is, first, to test whether it is possible to identify the users who will
be vulnerable to manipulation and participate in spreading the messages trolls post. We refer to
such users as spreaders in this paper. Our second goal is to better understand what distinguishes
spreaders form non-spreaders. If we can predict who will become a spreader, we can design a
counter-campaign, which might stop the manipulation before it achieves its goal.
For this study, we collected Twitter data over a period of seven weeks in the months leading
up to the election. By continuously pulling the Twitter Search API for relevant, election-related
content using hashtag- and keyword-based queries, we obtained a dataset of over 43 million tweets
generated by about 5.7 million distinct users between September 16 and November 9, 2016. First,
we cross-referenced the list of Russian trolls published by the US Congress with our dataset and
found that 221 Russian trolls accounts exist in our dataset. Next, we identified the list of users who
retweeted the trolls. We gather important features about the users and use a machine learning
framework to address the questions posed earlier.
We used different machine learning classifiers on different models (each model includes a subset
of the features, with the full model including all the features). We are able to achieve an average
AUC score of 96% for a 10-fold validation in terms of distinguishing spreaders form non-spreaders
using Gradient Boosting for the full model on a subset of the dataset where the outcome variable
has roughly equal number of spreaders vs. non-spreaders. Moreover, we verified our results on
the full dataset as well as datasets where we increase the features but drop any rows with missing
values. We are able to still achieve over 90% average AUC score in the full model using Gradient
Boosting. In terms of feature importance, political ideology is the most prominent for the balanced
dataset, as well as in the validation settings. Number of followers, statuses (no. tweets), and bot
scores were also in the top most predictive features both in the balanced and other datasets.
2 RELATED LITERATURE
The use of trolls and bots in political manipulation campaigns around the globe is well documented
through an array of reports by mainstream media outlets and academics (see Tucker et al. [2018]
for a comprehensive review on the role of misinformation, bots, and trolls on social media). This
phenomenon is not entirely new: researchers warned about the potential for online political
manipulation for over a decade [Howard 2006; Hwang et al. 2012]. Reports tracking and studying
this phenomenon date back to the early 2010s [Metaxas and Mustafaraj 2012; Ratkiewicz et al.
2011b,a]. Since then, an increasing account of such events has been recorded in the context of
several elections, both in the United States [Bessi and Ferrara 2016; Kollanyi et al. 2016; Marwick
and Lewis 2017; Shorey and Howard 2016; Wang et al. 2016; Woolley 2016; Woolley and Howard
2016] and all over the world, including in South America [Forelle et al. 2015; Suárez-Serrato et al.
2016], the U.K. [Howard and Kollanyi 2016], and Italy [Cresci et al. 2017].
Who Falls for Online Political Manipulation?
:3
Although trolls do not necessarily need to be automated accounts, in many cases bots play
a substantial role in political manipulation. Bessi and Ferrara [2016] report that 400k bots were
responsible for posting 3.8 million tweets in the last month of the 2016 US presidential election,
which is one-fifth of the total volume of online conversations they collected. Specifically, Russian
political manipulation campaigns did not only target the US [Badawy et al. 2018]: there is evidence
of Russian interference in German electoral campaigns [Applebaum and Colliver. 2017], British
elections [Gorodnichenko et al. 2018], and the Catalonian referendum [Stella et al. 2018]. Russian-
affiliated accounts were also reported in the 2017 French presidential elections, where bots were
detected during the so-called MacronLeaks disinformation campaign [Ferrara 2017]. Moreover, a
recent NATO report claims that around 70% of accounts tweeting in Russian and directed at Baltic
countries and Poland are bots.
Russian political manipulation online did not stop at Russia's borders. Domestically, there is
strong evidence that trolls and bots were present at multiple occasions. Ananyev and Sobolev
[2017] provides evidence of Russian government-affiliated trolls being able to change the direction
of conversations on the LiveJournal blog, a popular platform in Russia in the 2000s. Moreover, the
same entity that controlled many of the trolls studied in this paper, the Russian "troll factory", run
by the Internet Research Agency, had its trolls contribute to Wikipedia in support of positions and
historical narratives put forward by the current Russian government [Labzina 2017].
Online political manipulation is not only a Russian phenomenon. There is strong evidence of
similar efforts by various governments to control political discussion online, particularly with the
use of bots. [King et al. 2017] shows that the so-called "50-centers" -- low-paid government workers
who work online on behalf of the Chinese government -- try to distract Chinese citizens online form
politically controversial topics. Even further, [Miller and Gallagher 2018] estimate that Chinese
astroturfers produce about 15% of all comments made on the 19 popular Chinese news websites. In
Korea, bots were utilized as a part of a secret intelligence operation in support of the incumbent
party's candidate reelection [Keller et al. 2017].
There is strong evidence that political manipulation campaigns are on the rise, but how effective
are they? In the case of the recent US presidential elections, Allcott and Gentzkow [2017] find that,
even though "fake news" stories were widely shared on social media during the 2016 election, an
average American saw only few of these stories. Despite this finding, we should not underestimate
the potential role misinformation might play in distorting the views of citizens. Misinformed
individuals hold consistently different opinions from those who are exposed to more factual
knowledge. In some experimental studies, people who were exposed to accurate information about
political issues often changed their views accordingly[Gilens 2001; Sides et al. 2016]. Other studies
show that ignorance distorts collective opinion from what it would be if people were provided with
more information about politics [Althaus 1998; Bartels 1996; Gilens 2001] .
This distortion of individual opinion can lead to distortions at the aggregate level, as in the
collective public opinion. On many occasions, these distortions might be initiated, encouraged,
and exploited by domestic political elites or foreign powers. Manipulating actors are attempting to
construct their own "truth" and push their version of the story in the public sphere to be adopted
by their target audience. For example, some politicians might resort to distortion to win elections
or avoid accountability for their performance in office [Flynn et al. 2017; Fritz et al. 2004]. Examples
of misperceptions, whether caused by misinformation or not, that distort modern public policy
debates in the US are abound. For example, US citizens hold drastically exaggerated perceptions
about the amounts of the U.S. federal welfare, foreign aid, and the number of immigrants in the
country. A recent Kaiser Family Foundation poll found that, on average, Americans estimated that
31% of the federal budget goes to foreign aid, with very few people aware that the actual percentage
does not exceed 1% [DiJulio and Brodie. 2016]. Similarly, another survey found that fewer than
:4
Adam Badawy, Kristina Lerman, and Emilio Ferrara
one in ten respondents knew that welfare spending amounts to less than 1% of the federal budget
[Kuklinski et al. 2000]. Moreover, it has been found that Americans tend to overestimate the size of
the immigrant population [Hopkins et al. 2018]. All these political misperceptions play a negative
role in American political life and strengthen the already polarized environment that the US finds
itself in right now. In case of the recent presidential elections, we could see that trolls were spreading
misinformation about immigration, minority issues, and the government in general. The similarities
with the above-mentioned cases of misinformation are obvious: trolls adopt classical techniques
aimed at spreading misperceptions to push the agenda of the initiator of such campaigns.
In recent years, growing ideological and affective polarization was accompanied by the increase
in conspiracy theories and partisan misinformation. Belief in false and unsupported claims is
frequently skewed by partisanship and ideology, suggesting that our vulnerability to them is
increased by directionally motivated reasoning. Directionally motivated reasoning is defined as
the tendency to selectively accept or reject information depending on its consistency with our
prior beliefs and attitudes [Kunda 1990; Taber and Lodge 2006]. This tendency makes the recent
US presidential elections a good target for misinformation by internal and external actors: in
an environment of severe polarization, both at the elite and mass level, false or misrepresented
information that reinforces a person preexisting motivated perception/opinion can be quite effective.
Nyhan and Reifler [2010] and Flynn et al. [2017] show that motivated reasoning can even undermine
the effectiveness of corrective information, which sometimes fails to reduce misperceptions among
vulnerable groups.
3 DATA COLLECTION
3.1 Twitter Dataset
We created a list of hashtags and keywords that relate to the 2016 U.S. Presidential election. The list
was crafted to contain a roughly equal number of hashtags and keywords associated with each major
Presidential candidate: we selected 23 terms, including five terms referring to the Republican Party
nominee Donald J. Trump (#donaldtrump, #trump2016, #neverhillary, #trumppence16, #trump), four
terms for Democratic Party nominee Hillary Clinton (#hillaryclinton, #imwithher, #nevertrump,
#hillary), and several terms related to debates. To make sure our query list was comprehensive,
we also added a few keywords for the two third-party candidates, including the Libertarian Party
nominee Gary Johnson (one term), and Green Party nominee Jill Stein (two terms).
By querying the Twitter Search API continuously and without interruptions between September
15 and November 9, 2016, we collected a large dataset containing 43.7 million unique tweets posted
by nearly 5.7 million distinct users. Table 1 reports some aggregate statistics of the dataset. The data
collection infrastructure ran inside an Amazon Web Services (AWS) instance to ensure resilience
and scalability. We chose to use the Twitter Search API to make sure that we obtained all tweets
that contain the search terms of interest posted during the data collection period, rather than a
sample of unfiltered tweets. This precaution we took avoids known issues related to collecting
sampled data using the Twitter Stream API that had been reported in the literature [Morstatter
et al. 2013].
3.2 Russian Trolls
We used a list of 2,752 Twitter accounts identified as Russian trolls that was compiled and released
by the U.S. Congress.1 Table 2 offers some descriptive statistics of the Russian troll accounts. Out of
the accounts appearing on the list, 221 exist in our dataset, and 85 of them produced original tweets
(861 tweets). Russian trolls in our dataset retweeted 2,354 other distinct users 6,457 times. Trolls
1See https://www.recode.net/2017/11/2/16598312/russia-twitter-trump-twitter-deactivated-handle-list
Who Falls for Online Political Manipulation?
:5
Table 1. Twitter Data Descriptive Statistics.
Count
Statistic
43,705,293
# of Tweets
31,191,653
# of Retweets
# of Distinct Users
5,746,997
# of Tweets/Retweets with a URL 22,647,507
retweeted each other only 51 times. Twitter users can choose to report their location in their profile.
Most of the self-reported locations of accounts associated with Russian trolls were within the U.S.
(however, a few provided Russian locations in their profile), and most of the tweets were from users
whose location was self-reported as Tennessee and Texas (49,277 and 26,489 respectively). Russian
trolls were retweeted 83,719 times, but most of these retweets were for three troll accounts only:
'TEN_GOP', received 49,286 retweets; 'Pamela_Moore13', 16,532; and 'TheFoundingSon', 8,755.
These three accounts make up for over 89% of the times Russian trolls were retweeted. Overall,
Russian trolls were retweeted by 40,224 distinct users.
Table 2. Descriptive Statistics on Russian trolls.
# of Russian trolls
# of trolls in our data
# of trolls wrote original tweets
# of original trolls' tweets
Value
2,735
221
85
861
3.3 Spreaders
Users who rebroadcast content produced by Russian trolls, hereafter referred to as spreaders, may
tell a fascinating story, thus will be the subject of our further investigation. Out of the forty thousand
total spreaders, 28,274 of them produced original tweets (the rest only generated retweets). Overall,
these twenty-eight thousand spreaders produced over 1.5 Million original tweets and over 12
Million other tweets and retweets -- not counting the ones from Russian trolls (cf., Table 3).
Table 3. Descriptive statistics of spreaders, i.e., users who retweeted Russian trolls.
# of spreaders
# of times retweeted trolls
# of spreaders with original tweets
# of original tweets
# of other tweets and retweets
Value
40,224
83,719
28,274
>1.5 Million
>12 Million
4 DATA ANALYSIS & METHODS
In order to answer the questions posed in this paper, we gather a set of features about the users
to (i) predict the spreaders with the highest accuracy possible and (ii) identify feature(s) which
:6
Adam Badawy, Kristina Lerman, and Emilio Ferrara
Table 4. List of features employed to characterize users in our dataset
Engagement
LIWC
Word Count
Retweet variables
Postive Emotion Mention variables
Negative Emotion Reply variables
Anxiety
Quote variables
Anger
Sadness
Analytic
Metadata
# of followers
# of favourites
# of friends
Status count
Listed count
Default Profile
Geo-enabled
Background-image Clout
Verified
Account Age
Affection
Tone
Other
Activity
# of characters Political Ideology
# of hashtags
# of mentions
# of urls
Bot Score
Tweet Count
best distinguish spreaders from the rest. Table 4 shows all the features we evaluated in this paper,
grouped under the following categories: Metadata, Linguistic Inquiry and Word Count (LIWC),
Engagement, Activity, and Other variables.
To understand what each variable in the Metadata and LIWC categories means, see the Twitter
documentation page2 and [Pennebaker et al. 2015], respectively. The Activity variables convey the
number of characters, hashtags, mentions, and URLs produced by users, normalized by the number
of tweets they post. Tweet Count, under Other, is the number of user's tweets appearing in our
dataset. The remaining variables are more involved and warrant a detailed explanation: we explain
how Political Ideology, Bot Scores, and Engagement variables were computed in the following
sections. One may wonder how much the features evaluated here correlate with each other, and
whether they provide informative signals in terms of predictive power about the spreaders. Figure
1 shows that, besides Engagement variables, most of the features are not highly correlated among
each other (Pearson correlation is shown, results do not vary significantly for Spearman correlation).
There are however a few notable exceptions: Word Count and Tweet Count, LIWC Positive Emotion
and Affection, Anxiety and Anger -- these pairs all show very high correlation. This is not surprising,
considering that these constructs are conceptually close one another. As for the Engagement
variables, we can see a "rich get richer" effect here, where users who have higher scores in terms of
some of the sub-features in the Engagement category, are also higher in other sub-features. For
example, by construction the Retweet h-index will be proportional to the number of times a user
is retweeted, and similarly for replies, quotes and mentions -- all these Engagement features are
explained in great detail in a section §4.3.
4.1 Political Ideology
4.1.1 Classification of Media Outlets. We classify users by their ideology based on the political
leaning of the media outlets they share. We use lists of partisan media outlets compiled by third-
party organizations, such as AllSides3 and Media Bias/Fact Check.4 The combined list includes 249
liberal outlets and 212 conservative outlets. After cross-referencing with domains obtained in our
Twitter dataset, we identified 190 liberal and 167 conservative outlets. We picked five media outlets
from each partisan category that appeared most frequently in our Twitter dataset and compiled
2 https://developer.twitter.com/en/docs/tweets/data-dictionary/overview/user-object
3https://www.allsides.com/media-bias/media-bias-ratings
4https://mediabiasfactcheck.com/
Who Falls for Online Political Manipulation?
:7
Fig. 1. Feature correlation heat map for the all users in the dataset.
a list of users who tweeted from these outlets. The list of media outlets/domain names for each
partisan category is reported in Table 5.
Table 5. Liberal & Conservative Domain Names.
Conservative
Liberal
www.huffingtonpost.com www.breitbart.com
thinkprogress.org
www.politicususa.com
shareblue.com
www.dailykos.com
www.thegatewaypundit.com
www.lifezette.com
www.therebel.media
theblacksphere.net
We used a polarity rule to label Twitter users as liberal or conservative depending on the number
of tweets they produced with links to liberal or conservative sources. In other words, if a user
had more tweets with links to liberal sources, he/she would be labeled as liberal and vice versa.
Although the overwhelming majority of users include links that are either liberal or conservative,
:8
Adam Badawy, Kristina Lerman, and Emilio Ferrara
we remove any users that had equal number of tweets from each side5 -- this to avoid the conundrum
of breaking ties with some arbitrary rule. Our final set of labeled users include 29,832 users.
4.1.2 Label Propagation. We used label propagation6 to classify Twitter accounts as liberal or
conservative, similar to prior work [Conover et al. 2011]. In a network-based label propagation
algorithm, each node is assigned a label, which is updated iteratively based on the labels of the node's
network neighbors. In label propagation, a node takes the most frequent label of its neighbors as
its own new label. The algorithm proceeds updating labels iteratively and stops when the labels no
longer change (see [Raghavan et al. 2007] for more information). The algorithm takes as parameters
(i) weights, in-degree or how many times node i retweeted node j; (ii) seeds (the list of labeled
nodes). We fix the seeds' labels so they do not change in the process, since this seed list also serves
as our ground truth.
We construct a retweet network where each node corresponds to a Twitter account and a link
exists between pairs of nodes when one of them retweets a message posted by the other. We use the
29K users mentioned in the media outlets sections as seeds, those who mainly retweet messages
from either the liberal or the conservative media outlets in Table 5, and label them accordingly. We
then run label propagation to label the remaining nodes in the retweet network.
Table 6. Breakdown for overall users, trolls and spreader by political ideology
# of users
# of trolls
# of spreaders
Liberal Conservative
>3.4 M >1 M
107
1,991
108
38,233
To validate results of the label propagation algorithm, we applied stratified 5-fold cross validation
to the set of 29K seeds. We train the algorithm on four-fifths of the seed list and test how it performs
on the remaining one-fifth. The averge precision and recall scores are both over 91%.
To further validate the labeling algorithm, we notice that a group of Twitter accounts put media
outlet URLs as their personal link/website. We compile a list of the hyper-partisan Twitter users
who have the domain names from Table 5 in their profiles and use the same approach explained
in the previous paragraph (stratified 5-fold cross-validation). The average precision and recall
scores for the test set for these users are above 93%. Table 7 shows the average precision and recall
scores for the two validation methods we use: both labeled over 90% of the test set users correctly,
cementing our confidence in the performance of the labeling algorithm.
Table 7. Precision & Recall scores for the seed users and hyper-partisan users test sets.
Seed Users Hyper-Partisan Users
Precision 91%
Recall
91%
93%
93%
5We use five categories, as in left, left center, center, right center, right, to make sure we have a final list of users who are
unequivocally liberal or conservative and do not fall in the middle. The media outlet lists for the left/right center and center
were compiled from the same sources.
6We used the algorithm in the Python implementation of the IGraph library [Csardi and Nepusz 2006]
Who Falls for Online Political Manipulation?
:9
4.2 Bot Detection
Determining whether either a human or a bot controls a social media account has proven a very
challenging task [Ferrara et al. 2016; Subrahmanian et al. 2016]. We use an openly accessible
solution called Botometer (a.k.a. BotOrNot) [Davis et al. 2016], consisting of both a public Web site
(https://botometer.iuni.iu.edu/) and a Python API (https://github.com/IUNetSci/botometer-python),
which allows for making this determination with high accuracy. Botometer is a machine-learning
framework that extracts and analyses a set of over one thousand features, spanning six sub classes:
User : Meta-data features that include the number of friends and followers, the number of
Friends : Four types of links are considered here: retweeting, mentioning, being retweeted,
and being mentioned. For each group separately, botometer extracts features about language
use, local time, popularity, etc.
tweets produced by the users, profile description and settings.
Network : Botometer reconstructs three types of networks: retweet, mention, and hashtag co-
occurrence networks. All networks are weighted according to the frequency of interactions
or co-occurrences.
various time periods and distributions of time intervals between events.
Temporal : Features related to user activity, including average rates of tweet production over
Content : Statistics about length and entropy of tweet text and Part-of-Speech (POS) tagging
techniques, which identifies different types of natural language components, or POS tags.
Sentiment : Features such as: arousal, valence and dominance scores [Warriner et al. 2013],
happiness score [Kloumann et al. 2012], polarization and strength [Wilson et al. 2005], and
emotion score [Agarwal et al. 2011].
We utilize Botometer to label all the spreaders, and we get bot scores for over 34K out of the total
40K spreaders. Since using Botometer to get scores all non-spreaders (i.e., over 5.7M users) would
take an unfeasibly long time (due to Twitter's restrictions), we randomly sample the non-spreader
user list and use Botometer to get scores for a roughly equivalent-size list of non-spreader users.
The randomly-selected non-spreader list includes circa 37K users. To label accounts as bots, we
use the fifty-percent threshold which has proven effective in prior studies [Davis et al. 2016]: an
account is considered to be a bot if the overall Botometer score is above 0.5. Figure 2 shows the
probability distribution for spreaders vs. non-spreaders. While most of the density is under the 0.5
threshold, the mean of spreaders (0.3) is higher than the mean of non-spreaders. Additionally, we
used a t-test to verify that the difference is significant at the 0.001 level (p-value).
As for the plots in Figure 3, it is evident that the spreaders are different on almost all the Botometer
subclass scores, except for the temporal features. The differences in all plots are statistically
significant (p <0.001). Besides, looking at the distributions, we can see that the difference in user
characteristics (metadata), friends, and network distributions, are substantively different as well.
Moreover, the mean of spreaders is higher in all the subclass features.
4.3 Engagement
We plan to measure user engagement in four activities: retweets, mentions, replies, and quotes.
Engagement of a user is measured through three components: the quantity, longevity, and stability
in each activity. For instance, for a set of N users, this measure would calculate the engagement
index score of user i ∈ N by including the following:
1) number of retweets, replies, mentions, and quotes by N − i users for user i;
2) time difference between the last and the first quote, reply, and retweet per tweet;
3) consistency of mentioning, replying, retweeting, and quoting by N − i users for user i across
time (per day);
:10
Adam Badawy, Kristina Lerman, and Emilio Ferrara
Fig. 2. Probability density distributions of bot scores assigned to spreaders (red) and non-spreaders (blue).
4) number of unique users who retweeted, commented, mentioned, and quoted user i
Item three is measured using h-index [Hirsch 2005]. The measure captures two notions: how
highly referenced and how continuously highly referenced a user is by other members in the
network [Lietz et al. 2014]. This measure was originally proposed to quantify an individual's
scientific research output. In this context, a user has index h if for h days, he/she is referenced at
least h times and in all but h days no more than h times.
5 RESULTS
Predicting spreaders on the original dataset may be considered a daunting task: only a relatively
small fraction of users engaged with Russian trolls' content (about 40K out of 5.7M users). However,
for the same reason, if a model were to trivially predict that no user will ever engage with Russian
trolls, the model would be accurate most of the time (i.e., most users won't be spreaders), even if its
recall would be zero (i.e., the model would never correctly predict any actual spreaders) -- provided
that we want to predict spreaders, this model would not be very useful in practice. In other words,
our setting is a typical machine-learning example of a highly-unbalanced prediction task.
To initially simplify our prediction task, we created a balanced dataset that is limited to users
who have bot scores.7 This balanced dataset has about 72K users, with 34K spreaders and 38K
non-spreaders. To test our ability to detect spreaders and to see which features are most important
in distinguishing between the two groups, we leverage multiple classifiers and multiple models: the
first model serves as a baseline with each model including more variables until we reach the full
model. Since our goal was not that to devise new techniques, we used four off-the-shelf machine
learning algorithms: Extra Trees, Random Forest, Adaptive Boosting, and Gradient Boosting. We
train our classifiers using Stratified 10-fold cross-validation with the following preprocessing steps
(i) replace all categorical missing values with the most frequent value in the column (ii) replace
missing values with the mean of the column.
Table 8 shows all the models we evaluate, from the simplest baseline model (Metadata) to the
full model that includes all the features we present in Table 4.
For Gradient Boosting, which is the best performing classifier among the four we evaluate, we
obtained average AUC scores for the 10 folds that range from 85% to 96%. Figure 4 shows the ROC
7Will get back to the original prediction task on the highly-unbalanced dataset later in this section.
Who Falls for Online Political Manipulation?
:11
(a) Content
(b) Friend
(c) Network
(d) Sentiment
(e) Temporal
(f) User
Fig. 3. Distribution of the probability density of Botometer subfeature scores for spreaders vs. nonspreaders.
curve plots for each model (using the fold/model with the highest AUC score among the trained
ones). The jump from 89% to 96% for the AUC scores from Model 4 to 5 shows that the addition of
bot scores and political ideology are meaningful in distinguishing spreaders from non-spreaders
(the legend in Figure 4 shows the average AUC score for each model). To better understand the
contribution of the features in predicting the target values (i.e., spreader vs. non-spreader), we
look at the variable importance plot of the Gradient Boosting results for Model 5. The Variable
Importance plot (cf., Figure 5) provides a list of the most significant variables in descending order
by a mean decrease in the Gini criterion. The top variables contribute more to the model than the
:12
Adam Badawy, Kristina Lerman, and Emilio Ferrara
Table 8. Machine Learning Models from the Baseline (Metadata) to Full Model.
Model
1
2
3
4
5
Features
Metadata
Metadata + LIWC
Metadata + LIWC + Activity
Metadata + LIWC +Activity + Engagement
Metadata + LIWC +Activity + Engagement + Other
Fig. 4. Area under the ROC curve plot for the five models under evaluation using Gradient Boosting. We show
five models, in each we use the fold/model that yields the highest AUC among the trained ones. It is evident
that the addition of bot scores, political ideology, and tweet count variables are important in improving the
performance of the classifiers. The legend shows the average AUC scores for each model.
bottom ones and can discriminate better between spreaders and non-spreaders. In other words,
features are ranked based on their predictive power according to the given model. Figure 5 shows
that, according to Model 5 and Gradient Boosting, political ideology is the most predictive feature,
followed by number of followers, statuses/tweets count (obtained from the metadata), and bot score,
in a descending order of importance. The plot does not show all the features, since the omitted
features contribute very little to the overall predictive power of the model.
Feature importance plots reveal which features contribute most to classification performance, but
they do not tell us the nature of the relationship between the outcome variable and the predictors.
Although predictive models are sometime used as black boxes, Partial Dependence plots (cf., Fig.
6) can tell us a lot about the structure and direction of the relationship between the target and
independent variables. They show these relationships after the model is fitted, while marginalizing
Who Falls for Online Political Manipulation?
:13
Fig. 5. Relative importance of the features using Gradient Boosting for the full model (best performing fold) in
predicting users as spreaders vs. non-spreaders. Political Ideology explains over 25% of the variance, followed
by Followers Count, Statuses Counts, and Bot Scores, each explaining roughly 5% to 10% of the variance.
over the values of all other features. The dependency along the x-axis captures the range of a given
feature, with that feature values normalized between 0 and 1.8
Using Partial Dependence, we illustrate that the target variable (spreader) has positive relation-
ships with the following features: political ideology, statuses count, bot scores, and friends count.
Figure 6a visualizes these relationships (we put political ideology on a different y-axis in order to
show that its magnitude of influence on the target variable is significantly higher compared to all
other features, including downward trend features in Figure 6b). This suggests that moving from
left to right political leaning increases the probability of being a spreader; larger number of posts,
more friends (a.k.a. followees), and higher bot scores are also associated with higher likelihood of
being a spreader.
On the other hand, we can see that the outcome variable has a negative relationship with
followers count, account age, characters count, and word count, as shown in Figure 6b. This means
that having fewer followers, having a recently-created account, posting shorter tweets with fewer
words, are all characteristics associated with higher probability of being a spreader.
Going back to the original highly-unbalanced dataset, we aim to validate the results above using
two strategies: (i) we run Gradient Boosting (with the same preprocessing steps) on the whole
dataset of 5.7M for the five models we outlined in table 8; (ii) we run Gradient Boosting classifier
on models without imputations and with all missing observations deleted. For the first approach,
the average AUC scores ranged form 83% for the baseline model to 98% for the full model. For
the second approach, due to the sparsity of some features, the overall number of observations
decreases significantly when these features are added. Putting the overall number of observations
aside, the average ROC scores for a 10-fold validation for the roughly same set of models specified
8Political ideology should be considered in the range from 0 (to identify left leaning users), to 1 (for right-leaning ones).
:14
Adam Badawy, Kristina Lerman, and Emilio Ferrara
(a) Upward Trends
(b) Downward Trends
Fig. 6. Partial Dependence plots for some of the features considered in the full model (best preforming fold).
These partial dependence plots are for the Gradient Boosting Classifier fitted to the balanced dataset. Each
plot shows the dependence of feature (spreader) on the feature under consideration, marginalizing over the
values of all other features (Note: x-axis values are CDF-normalized).
earlier range from 84% to 91%. In terms of feature importance, political ideology is again the most
important in the full model, with status count and bot scores following it in importance. In summary,
the results above remain consistent when validating on the highly-unbalanced prediction task.
6 DISCUSSION AND LIMITATIONS
The results in previous section show that (i) with some insight on users who spread or produce
malicious content, we are able to predict the users that will spread their message to a broader
audience; (ii) in the case we focus on, the 2016 US presidential elections, political ideology was
highly predictive of who is going to spread trolls' messages vs. not. Moreover, looking at the top
predictive features in Figure 5, basic metadata features give a strong signal in terms of differentiating
spreaders from non-spreaders, along with the bot score. Looking at the subclass features from
Botometer, Figures 3b, 3c, and 3f show that spreaders and non-spreaders are significantly different
on the dimensions of friends, network, and user metadata, with spreaders having higher bot scores
on all three (thus, they have a higher likelihood of being a bot according to those subclasses).
Looking at the partial dependence plots, we can deduce that spreaders write a lot of tweets
(counting retweets as well), have higher bot scores, and tend to be more conservative (conservative
is labeled as the highest numerical value in the political ideology feature). Also, since the range
of the y-axis tells us about the range of influence a feature has on the target value, it is evident
that political ideology has by far the most influence on distinguishing between spreaders and
non-spreaders. On the other hand, we can also deduce that spreaders do not write much original
content, tend not have that many followers, and have more recently established user accounts. In
the downward trends in Figure 6b, we can see that followers count and account age have more
influence on the target value in comparison to the other features in this plot.
Although our analysis shows that certain features might be predictive of spreaders, there are
certain limitations to how generalizable these findings can be. First and foremost, our data does
not capture all the trolls in the trolls' list. The rest of the trolls might not be present in our dataset
due to various reasons; perhaps, they were simply not that active during the period of our data
collection. In any case, it is virtually impossible to gauge the effect of such missingness on our
results and conclusions. Second, we lack sufficient information on how the troll list was compiled
Who Falls for Online Political Manipulation?
:15
in the first place. This might be an issue, since the methodology taken to identify these trolls could
include certain biases that might affect our conclusions. Third, while political ideology emerged as
the most predictive feature among the ones included in the paper, it is important to note that a large
portion of the trolls' tweets were targeting conservatives in the first place. Thus, this finding gives
us some insight into the conservatives' reaction to political manipulation; however, it does not tell
us much about the respective reaction on the liberal side. Fourth, certain tools used in the paper
might work better on some types of data than others [Hoffman et al. 2017]. For example, some of
LIWC categories might work better on longer and more elaborate texts than tweets, particularly
on types of text that capture more sophisticated emotions beyond simply negative and positive
valence. Lastly, and this goes for any case study, our conclusions could be influenced by the special
circumstances of the 2016 US presidential elections, and the same phenomenon may or may not
unfold in the similar manner in a different context.
Despite the above-mentioned limitations of our approach and data, it is important to note
that understanding massive online political manipulation campaigns is, nevertheless, extremely
important, and that the threat of such attacks on our democratic systems will not go away any
time soon. In this paper, we used a dataset collected through keywords that, in our view, fully
encompass the political event under study. Using the list of trolls published by the Congress, we
were able to study a phenomenon we do not yet fully understand, to comprehend how it functions,
and to start a conversation on whether it can be stopped or prevented in a duly manner. Overall,
we employed a variety of rigorous computational tools to analyze and predict trolls' activities in
the recent US presidential elections.
7 CONCLUSION
This work focused on predicting spreaders who fall for online manipulation campaigns. We believe
that identifying likely victims of political manipulation campaigns is the first step in containing the
spread of malicious content. Access to reliable and trustworthy information is a cornerstone of any
democratic society. Declining trust of citizens of democratic societies in mainstream news and their
increased exposure to content produced by ill-intended sources poses a great danger to democratic
life. Social science literature shows a lot of evidence that mis-perceptions on the individual level
can aggregate into a distortion in the collective public opinion [Bartels 2002; Baum and Groeling
2009], which can have severe policy implications [Flynn et al. 2017; Fritz et al. 2004]. Thus, we
believe that studying how and who spreads political manipulation content is extremely important,
and it is an issue that many social media platforms should attempt to contain.
ACKNOWLEDGMENTS
The authors gratefully acknowledge support by the Air Force Office of Scientific Research (award
#FA9550-17-1-0327). The views and conclusions contained herein are those of the authors and
should not be interpreted as necessarily representing the official policies or endorsements, either
expressed or implied, of AFOSR or the U.S. Government.
REFERENCES
Apoorv Agarwal, Boyi Xie, Ilia Vovsha, Owen Rambow, and Rebecca Passonneau. 2011. Sentiment analysis of twitter data.
In Proceedings of the workshop on languages in social media. Association for Computational Linguistics, 30 -- 38.
Hunt Allcott and Matthew Gentzkow. 2017. Social media and fake news in the 2016 election. Journal of Economic Perspectives
31, 2 (2017), 211 -- 36.
Scott L Althaus. 1998. Information effects in collective preferences. American Political Science Review 92, 3 (1998), 545 -- 558.
Maxim Ananyev and Anton Sobolev. 2017. Fantastic Beasts and Whether They Matter: Do Internet Trolls Influence Political
Conversations in Russia? In preparation (2017).
:16
Adam Badawy, Kristina Lerman, and Emilio Ferrara
(1996), 194 -- 230.
117 -- 150.
Monday 21, 11 (2016).
Peter Pomerantsev Melanie Smith Applebaum, Anne and Chloe Colliver. 2017. "MAKE GERMANY GREAT AGAINâĂİ
Kremlin, Alt-Right and International Influences in the 2017 German Elections. (2017).
Adam Badawy, Emilio Ferrara, and Kristina Lerman. 2018. Analyzing the Digital Traces of Political Manipulation: The 2016
Russian Interference Twitter Campaign. arXiv preprint arXiv:1802.04291 (2018).
Eytan Bakshy, Solomon Messing, and Lada A Adamic. 2015. Exposure to ideologically diverse news and opinion on Facebook.
Science 348, 6239 (2015), 1130 -- 1132.
Larry M Bartels. 1996. Uninformed votes: Information effects in presidential elections. American Journal of Political Science
Larry M Bartels. 2002. Beyond the running tally: Partisan bias in political perceptions. Political behavior 24, 2 (2002),
Matthew A Baum and Tim Groeling. 2009. Shot by the messenger: Partisan cues and public opinion regarding national
security and war. Political Behavior 31, 2 (2009), 157 -- 186.
Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. First
M Conover, B Gonçalves, J Ratkiewicz, A Flammini, and F Menczer. 2011. Predicting the Political Alignment of Twitter
Users. In Proc. 3rd IEEE Conference on Social Computing. 192 -- 199.
Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The paradigm-shift
of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the 26th International Conference on
World Wide Web Companion. International World Wide Web Conferences Steering Committee, 963 -- 972.
Gabor Csardi and Tamas Nepusz. 2006. The igraph software package for complex network research. InterJournal, Complex
Systems 1695, 5 (2006), 1 -- 9.
Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. Botornot: A system to
evaluate social bots. In Proc. 25th International Conference on World Wide Web. 273 -- 274.
Mira Norton DiJulio, Bianca and Mollyann Brodie. 2016. AmericansâĂŹ Views on the U.S. Role in Global Health.âĂİ. (2016).
Emilio Ferrara. 2017. Disinformation and social bot operations in the run up to the 2017 French presidential election. First
Monday 22, 8 (2017).
of the ACM 59, 7 (2016), 96 -- 104.
Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Comm.
DJ Flynn, Brendan Nyhan, and Jason Reifler. 2017. The nature and origins of misperceptions: Understanding false and
unsupported beliefs about politics. Political Psychology 38, S1 (2017), 127 -- 150.
Michelle Forelle, Phil Howard, Andrés Monroy-Hernández, and Saiph Savage. 2015. Political bots and the manipulation of
public opinion in Venezuela. arXiv preprint arXiv:1507.07109 (2015).
Ben Fritz, Bryan Keefer, and Brendan Nyhan. 2004. All the president's spin: George W. Bush, the media, and the truth. Simon
and Schuster.
379 -- 396.
Theodore P Gerber and Jane Zavisca. 2016. Does Russian propaganda work? The Washington Quarterly 39, 2 (2016), 79 -- 98.
Martin Gilens. 2001. Political ignorance and collective policy preferences. American Political Science Review 95, 2 (2001),
Yuriy Gorodnichenko, Tho Pham, Oleksandr Talavera, et al. 2018. Social media, sentiment and public opinions: Evidence
from# Brexit and# USElection. Technical Report.
Jeffrey Gottfried and Elisa Shearer. 2016. News Use Across Social Medial Platforms 2016. Pew Research Center.
Jorge E Hirsch. 2005. An index to quantify an individual's scientific research output. Proceedings of the National academy of
Sciences of the United States of America 102, 46 (2005), 16569.
Erin R. Hoffman, David W. McDonald, and Mark Zachry. 2017. Evaluating a Computational Approach to Labeling Politeness:
Challenges for the Application of Machine Classification to Social Computing Data. Proc. ACM Hum.-Comput. Interact. 1,
CSCW, Article 52 (Dec. 2017), 14 pages. https://doi.org/10.1145/3134687
Daniel J Hopkins, John Sides, and Jack Citrin. 2018. The muted consequences of correct information about immigration.
Philip Howard. 2006. New media campaigns and the managed citizen.
Philip N Howard and Bence Kollanyi. 2016. Bots,# strongerin, and# brexit: Computational propaganda during the uk-eu
referendum. Browser Download This Paper (2016).
Tim Hwang, Ian Pearce, and Max Nanis. 2012. Socialbots: Voices from the fronts. Interactions 19, 2 (2012), 38 -- 45.
Franziska B Keller, David Schoch, Sebastian Stier, and JungHwan Yang. 2017. How to Manipulate Social Media: Analyzing
Political Astroturfing Using Ground Truth Data from South Korea.. In ICWSM. 564 -- 567.
Gary King, Jennifer Pan, and Margaret E Roberts. 2017. How the Chinese government fabricates social media posts for
strategic distraction, not engaged argument. American Political Science Review 111, 3 (2017), 484 -- 501.
Isabel M Kloumann, Christopher M Danforth, Kameron Decker Harris, Catherine A Bliss, and Peter Sheridan Dodds. 2012.
Positivity of the English language. PloS one 7, 1 (2012), e29484.
(2018).
Who Falls for Online Political Manipulation?
:17
Bence Kollanyi, Philip N Howard, and Samuel C Woolley. 2016. Bots and automation over Twitter during the first US
Presidential debate. (2016).
James H Kuklinski, Paul J Quirk, Jennifer Jerit, David Schwieder, and Robert F Rich. 2000. Misinformation and the currency
of democratic citizenship. Journal of Politics 62, 3 (2000), 790 -- 816.
Ziva Kunda. 1990. The case for motivated reasoning. Psychological bulletin 108, 3 (1990), 480.
Elena Labzina. 2017. Rewriting Knowledge: Russian Political Astroturfing as an Ideological Manifestation of the National
Role Conceptions. In preparation (2017).
Haiko Lietz, Claudia Wagner, Arnim Bleier, and Markus Strohmaier. 2014. When politicians talk: Assessing online conversa-
tional practices of political parties on twitter. Proceedings of the Eighth International AAAI Conference on Weblogs and
Social Media (2014).
Alice Marwick and Rebecca Lewis. 2017. Media manipulation and disinformation online. New York: Data & Society Research
Panagiotis T Metaxas and Eni Mustafaraj. 2012. Social media and the elections. Science 338, 6106 (2012), 472 -- 473.
Blake Miller and Mary Gallagher. 2018. The Progression of Repression: When does online censorship move toward real
Institute (2017).
world repression? (2018).
(2016).
Fred Morstatter, Jürgen Pfeffer, Huan Liu, and Kathleen M Carley. 2013. Is the Sample Good Enough? Comparing Data from
Twitter's Streaming API with Twitter's Firehose. In ICWSM. 400 -- 408.
Brendan Nyhan and Jason Reifler. 2010. When corrections fail: The persistence of political misperceptions. Political Behavior
James W Pennebaker, Ryan L Boyd, Kayla Jordan, and Kate Blackburn. 2015. The development and psychometric properties of
Whitney Phillips. 2015. This is why we can't have nice things: Mapping the relationship between online trolling and mainstream
32, 2 (2010), 303 -- 330.
LIWC2015. Technical Report.
culture. Mit Press.
Usha Nandini Raghavan, Réka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures
in large-scale networks. Physical review E 76, 3 (2007), 036106.
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Gonçalves, Snehal Patil, Alessandro Flammini, and Filippo Menczer.
2011b. Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference
companion on World wide web. ACM, 249 -- 252.
Jacob Ratkiewicz, Michael Conover, Mark R Meiss, Bruno Gonçalves, Alessandro Flammini, and Filippo Menczer. 2011a.
Detecting and tracking political abuse in social media. ICWSM 11 (2011), 297 -- 304.
Samantha Shorey and Philip N Howard. 2016. Automation, Algorithms, and Politics: A Research Review. Int. J Comm. 10
John Sides, Michael Tesler, and Lynn Vavreck. 2016. The electoral landscape of 2016. The ANNALS of the American Academy
Massimo Stella, Emilio Ferrara, and Manlio De Domenico. 2018. Bots sustain and inflate striking opposition in online social
of Political and Social Science 667, 1 (2016), 50 -- 71.
systems. arXiv preprint arXiv:1802.07292 (2018).
Pablo Suárez-Serrato, Margaret E Roberts, Clayton Davis, and Filippo Menczer. 2016. On the influence of social bots in
online protests. In International Conference on Social Informatics. Springer, 269 -- 278.
VS Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara,
Alessandro Flammini, and Filippo Menczer. 2016. The DARPA Twitter bot challenge. Computer 49, 6 (2016).
Charles S Taber and Milton Lodge. 2006. Motivated skepticism in the evaluation of political beliefs. American Journal of
Political Science 50, 3 (2006), 755 -- 769.
Joshua Tucker, Andrew Guess, Pablo Barberá, Cristian Vaccari, Alexandra Siegel, Sergey Sanovich, Denis Stukal, and
Brendan Nyhan. 2018. Social Media, Political Polarization, and Political Disinformation: A Review of the Scientific
Literature. (2018).
Joshua A Tucker, Yannis Theocharis, Margaret E Roberts, and Pablo Barberá. 2017. From liberation to turmoil: social media
and democracy. Journal of democracy 28, 4 (2017), 46 -- 59.
Yu Wang, Yuncheng Li, and Jiebo Luo. 2016. Deciphering the 2016 US Presidential Campaign in the Twitter Sphere: A
Comparison of the Trumpists and Clintonists.. In ICWSM. 723 -- 726.
Amy Beth Warriner, Victor Kuperman, and Marc Brysbaert. 2013. Norms of valence, arousal, and dominance for 13,915
English lemmas. Behavior research methods 45, 4 (2013), 1191 -- 1207.
Theresa Wilson, Janyce Wiebe, and Paul Hoffmann. 2005. Recognizing contextual polarity in phrase-level sentiment analysis.
In Proceedings of the conference on human language technology and empirical methods in natural language processing.
Association for Computational Linguistics, 347 -- 354.
Samuel C Woolley. 2016. Automating power: Social bot interference in global politics. First Monday 21, 4 (2016).
Samuel C Woolley and Philip N Howard. 2016. Automation, Algorithms, and Politics: Introduction. Int. Journal of Commun.
10 (2016).
|
1912.12861 | 1 | 1912 | 2019-12-30T09:23:51 | Wisdom of collaborators: a peer-review approach to performance appraisal | [
"cs.SI",
"cs.CY"
] | Individual performance and reputation within a company are major factors that influence wage distribution, promotion and firing. Due to the complexity and collaborative nature of contemporary business processes, the evaluation of individual impact in the majority of organizations is an ambiguous and non-trivial task. Existing performance appraisal approaches are often affected by individuals biased judgements, and organizations are dissatisfied with the results of evaluations. We assert that employees can provide accurate measurement of their peer performance in a complex collaborative environment. We propose a novel metric, the Peer Rank Score (PRS), that evaluates individual reputations and the non-quantifiable individual impact. PRS is based on pairwise comparisons of employees. We show high robustness of the algorithm on simulations and empirically validate it for a genetic testing company on more than one thousand employees using peer reviews over the course of three years. | cs.SI | cs | Wisdom of collaborators: a peer-review
approach to performance appraisal
Sofia Dokuka1*, Ivan Zaikin2,3, Kate Furman2, Maksim Tsvetovat4 and Alex Furman2
1 Institute of Education, HSE University, Moscow, Russia
2 Invitae Corporation, San Francisco, USA
3 School of Computer Science & Robotics, Tomsk Polytechnic University, Tomsk, Russia
4 The George Washington University, Washington, DC, USA
* Corresponding author email: [email protected]
Abstract
Individual performance and reputation within a company are major factors that influence
wage distribution, promotion and firing. Due to the complexity and collaborative nature of
contemporary business processes, the evaluation of individual impact in the majority of
organizations is an ambiguous and non-trivial task. Existing performance appraisal
approaches are often affected by individuals' biased judgements, and organizations are
dissatisfied with the results of evaluations. We assert that employees can provide accurate
measurement of their peer performance in a complex collaborative environment. We
propose a novel metric, the Peer Rank Score (PRS), that evaluates individual reputations
and the non-quantifiable individual impact. PRS is based on pairwise comparisons of
employees. We show high robustness of the algorithm on simulations and empirically
validate it for a genetic testing company on more than one thousand employees using peer
reviews over the course of three years.
Keywords: performance management, performance appraisal,
individual performance,
organizations, peer review, wisdom of crowds
The performance and productivity of an individual in an organization is a key factor in
employee compensation, development, promotion and firing1. In the modern transforming market
economy, the systematic performance appraisal is a part of the strategic integration of human
1
resources (HR) and business processes2. The majority of companies conduct employee
performance evaluations at least annually3. However, this area has been one of the most troubling
and costly in HR management for decades4; employees and management express considerable
dissatisfaction with their appraisal mechanisms1,3,5. The majority of managers (up to 90%) feel
that they fail to obtain accurate performance information6, while most employees characterize
performance appraisal as frustrating, too bureaucratic and often irrelevant1. Overall, many
organizations (even giants such as Accenture, Deloitte and Microsoft) have reconsidered the use
of performance appraisal7. Another problematic issue with the performance appraisal is the
scarcity of this topic in broad scientific discussions, which can result in fast decisions made by
management without expert consideration and external validation.
In today's workplace, many employees cannot be quantitatively evaluated due to the
complex and collaborative nature of their work. Although managers and HR specialists can often
identify the best and worst employees, they often stumble in the case of middle-performing
employees and make evaluation errors8. They can also manipulate performance ratings by over-
or underrating their colleagues3, which results in a systematic bias.
Here we argue that the most accurate information on employee performance can be
obtained directly from the company staff. We propose a mechanism for individual performance
assessment that is based on peer review of the employee's close collaborators who have almost
full information about her/his impact. Evaluations from direct collaborators are crucial, because
reviewers observe the employee's performance, which is essential for rating quality3,9,10. Adler et
al.1 outline that reviews from multiple raters can diminish or even eliminate the bias. Empirical
evidence shows that collective intelligence judgements (the so-called "wisdom of crowds") can be
more accurate than estimates of individual experts11 -- 14 due to the absence of factors such as social
influence and social desirability.
Peer Rank Score (PRS) serves as a proxy for individual impact and reputation in innovative
organizations with cross-functional responsibilities and evolving duties. PRS is evaluated using
2
the data from the employees' relative comparisons, which can be viewed as a series of pairwise
comparisons. Similar to Elo15 and TrueSkill16, the PRS rating system is dynamically self-
correcting. The idea of PRS is that employees who work together can correctly and accurately
evaluate the impact of their peers.
The PRS evaluation needs a special data collection mechanism. Each employee regularly
gives feedback on their colleagues' performance and simultaneously ranks them on a 2D-grid
(which is similar to a 360-degree methodology). The horizontal axis represents "teamwork", which
means activity and productivity in collaboration (a grid example is on Fig. 1). The vertical axis
represents "skill," which means professional qualifications and knowledge of the employee.
Together, these two parameters capture the major part of the individual's performance in an
organization.
The PRS is an iterative algorithm based on pairwise comparisons. In the peer evaluation,
the reviewer ranks their colleagues on the grid. Each evaluation of n employees by one reviewer
is considered as a set of pairwise comparisons. The number of pairs compared is equal to the
number of all possible combinations (Equation 1):
(Equation 1)
where N is the number of pairwise comparisons, and n is the number of compared peers.
Thus, if the reviewer evaluates five peers, the 2D-grid creates data on 10 unique pairwise
comparisons.
The outcome of each pairwise comparison is a win for the employee who receives a higher
score during the evaluation procedure and a loss for their counteragent. For example, if A is
evaluated higher than B, A receives points, while B loses the same number of points. Employees
are reviewed on two scales: teamwork and skills, so that we can evaluate their reputation on both
dimensions, as well as on the aggregate level. For the aggregate level, we propose the hypotenuse
(Equation 2).
3
)!2(!2!−=nnN (Equation 2)
At the beginning of the algorithm, each employee has zero PRS. After each evaluation, s/he is
attributed the sum of the points (increments) that were lost or gained during the comparisons of
this evaluation (Equation 3).
(Equation 3)
The increment is a function of three factors: 1) the Reviewer Score (RS), which reflects the
reputation of the person evaluating (reviewer); 2) the Expectation Score (ES), which is the
expectation of such a comparison; 3) the Score Spread (SS), which is the spread in scores between
the compared employees in this particular set of comparisons (Equation 4). The increment can also
be artificially restricted by the maximum value.
(Equation 4)
Reviewer score
Individual performance varies and we are more likely to rely on persons with higher
expertise and better reputation or, in other words, on employees with a high ranking position in
the PRS distribution. The reviewer score, which varies continuously on a scale from 1 to 4, equals
4 for the reviewer with the highest PRS, and 1 for the reviewer with the lowest PRS (Equation 5),
(Equation 5)
where PRSMax and PRSMin are the maximum and minimum PRS values in the overall distribution
(in the whole company), and PRSReviewer is the PRS value of the employee who is doing the
reviewing in this particular comparison.
Expectation score
The result of a pairwise comparison can be predictable or unpredictable. If we compare
two employees, A and B, with a similar PRS, the probability that A wins is 0.5 (Equation 6.1).
While in the case of the comparison of peers C and D with a clear dominance of C over D, we
expect the victory of C with a high probability. Thus, if C wins, the pairwise comparison brings
4
22skillsteamworkaggregate+=+−=)()1()(tincrementstPRStPRS3**SSESRSincrement=13*Re+−−=MinMaxMinviewerPRSPRSPRSPRSRSno surprise and the current PRS of the employees looks correct for these two particular persons. If
the outcome is predictable, we expect little changes and a low expectation score. In the case of
PRSlos< PRSwin the expectation score is calculated using Equation 6.2. The maximum of the
expectation score is 0.5, which means that there is no difference between the PRS scores of the
winning and losing employees. The minimum value of the expectation score is 0.01, which means
that these employees are far apart in the distribution.
However, if D beats C, the pairwise comparison outcome puts into question the current
PRS structure and should seriously impact the PRS distribution and reallocate the employees in
the ranking based on the new information. If the outcome is unpredictable (PRSlos > PRSwin), then
the expectation score is calculated using Equation 6.3. It varies from 0.5 (in case of no difference
in PRS between the winning and the losing employees) to 1 (in case of a large difference between
evaluated peers).
Score spread
(Equation 6.1)
(Equation 6.2)
(Equation 6.3)
Each employee has an individual ranking pattern8. Some of them put their peers' marks
close to each other on the grid, while others place them far apart. This specificity in ranking can
result in biased estimates and shows the necessity of normalizing the scores received by each
particular reviewer. We consider the position of the two particular evaluated peers in the context
of all the evaluated colleagues in a particular review and use the normalized scores for the score
spread calculation (Equation 7),
(Equation 7)
5
5.0)5.0;01.0max(rangeloswinPRSPRSPRS−−)1;5.0min(rangeloswinPRSPRSPRS−+MinMaxScoreScoreScoreScoreSS−−=21where Score1 and Score2 are the scores of the two compared peers, Scoremax is the maximum score
in this particular set of the pairwise comparisons by this reviewer, and Scoremin is the minimum
score, respectively. Due to the filtering mechanisms, the score spread varies from 0.05 to 1. The
lower value (0.05) means that employee scores are close to each other, while the higher value (1)
shows that the employees' performances are different in this particular comparison set.
Fig 1. 2D-grid for Peer Rank Score data gathering. The dots of the different colors represent
employees. The area on the right for non-reviews.
Simulations
We estimated the performance of the model with simulations of organizations of differing
sizes with the randomly assigned performance and network of collaboration between the
employees. We assume that each individual knows (to some extent) the performance of their
collaborators. We then create the evaluation network and compute the PRS for each employee and
compare it with performance.
Step 1. Communication network formation
Using the Erdős-Renyi algorithm17, we construct a weighted random network with a fixed
size of the organization (N) and the density of the employee communication connections (p). For
6
each employee, we select m peers who were in closest connection with that employee in the
simulated communication network.
Step 2. Performance assignment
From the normal distribution, we randomly assign the performance level (x) for each
employee. We consider this to be a measure of ideal performance of the employee to be evaluated.
Step 3. Evaluation
Each employee evaluated the performance (x, which was assigned at Step 2) of their close
collaborators (who were selected at Step 1).
Step 4. Correlation calculation
Based on the evaluations from Step 3, we calculate the PRS for each employee. Then, we
measure the Spearman correlation coefficient between the computed PRS and the assigned
employee performance (x, Step 2).
Step 5. Noise
In order to evaluate the algorithm resilience, we added random noise (noise) to the system.
Random noise means that employees can make an incorrect evaluation in the assessment of their
colleagues. The level of random noise varies from 0 (a system without noise) to 1 (a system with
random feedback only). In the case of random noise, the evaluation is the following (Equation 8).
(Equation 8)
Simulation results
We perform simulations for organizations that vary in the following parameters: the size
of the organization (from 100 to 1,000 employees), the level of the noise (from 0 to 1), the number
of peers evaluated simultaneously. For each organization, we performed 30 simulations. After each
of the evaluation cycles, we calculate the Spearman rank correlation coefficient between the
obtained PRS and performance x. The simulation results are on Fig. 2-3. After five evaluation
rounds, the correlation between the actual performance and PRS is high (more than 0.9). Overall,
the correlation between actual performance and PRS is high, even in the case of random noise.
7
noiseRandomnoiseScoreScoreTrueNoise*)1(+−=These results support the idea that groups are able to generate accurate estimates of their peers'
performance, as well as the general idea of the wisdom of crowds.
Fig 2. Correlation between actual performance and PRS in systems with the different noise
levels. The organization size is 500 employees.
Fig 3. Correlation between actual performance and PRS for organizations of different size.
The number of reviews is 20.
8
Empirical evidence
The PRS methodology was investigated in the case of Invitae corporation, a genetic testing
company founded in 2010 and headquartered in San Francisco. Genetic tests produced by Invitae
are complex and comprehensive products produced through the collaboration of many experts
from different disciplines. The company has more than 1,000 employees.
The information on employee pairwise reviews has been collected staring in 2015.
Employees were asked to review their colleagues in two surveys: team reviews and sampling
reviews. In team review, each employee ranked up to twenty colleagues quarterly. In sampling
review, conducted twice a month, each employee ranked five colleagues with whom s/he had
recently communicated (based on Google calendar, email and Slack data). These two types of
reviews cover both the strong and weak ties of the employees and reflect their view on their
colleagues' performance. Employees have no information about how they were evaluated by
others and receive no information from HR about the external assessments of their own
performance. Each evaluation is carried out by the individual employee independently and
anonymously, and no one can impact the final results. We expect no external impact and social
influence on individual reviews. We outline the independence of employee reviews, because,
according to many empirical and theoretical views, the wisdom of crowds is based on independent
judgements with uncorrelated errors12.
For validation, we study the connection between employee PRS and compensations, and
PRS and positive feedback in 2017. The data on employee reviews has been collected starting in
2015, so we have more than two years of the reviews with more than 67,000 evaluations. The PRS
algorithm was implemented in the HR system in April 2018; thus, there can be no influence from
the PRS index on executive decisions about base salaries and grants.
For salaries, we focus on 248 employees who started their careers at Invitae before January
1, 2017 and did not leave the company in 2017. We excluded from the sample executives and top
9
management due to the different mechanisms of their salary formation (5% of the sample). For
each of the selected employees, we collected information about the overall pay they received from
Invitae in 2017. The overall pay has two parts: the base salary and the performance-based equity
grant (grant). The base salary, which is the fixed amount per month or per hour, depending on the
type of contract, is influenced by internal and external factors, and external determinants such as
market forces are crucial for the US system. The grant is not influenced by extrinsic circumstances
and is mostly determined by individual efforts. This information is confidential: it is important
that employees have no information about both the base salaries and the grants of their colleagues.
For each of the selected employees, we also calculated the overall amount of money earned
during the year and the share the grant represents in overall compensation in the overall
compensation. The PRS was calculated to the date of December 31, 2017. For each compensation
type (base salary, grant, overall compensation and the share the grant represents in overall
compensation), we calculated the Pearson correlation with PRS on the last day of 2017 (Fig. 4-7).
We find that there is a relatively low correlation between the base salaries and PRS (r=0.14,
P=0.03). The connection between the grants and the PRS is much higher (r=0.51, P<0.0001). The
overall compensation and PRS also have a medium correlation (r=0.30, P<0.0001). The highest
correlation is between PRS and the share the grant represents in overall compensation (r=0.58,
P<0.0001).
These results show that PRS is highly correlated with the grant and the grant part in the
salary. In contrast to the baseline salary, grants are highly linked to management's perception of
the employee's performance and impact. High correlation scores between PRS and grants also
demonstrate the high degree of agreement in performance evaluation between the company staff
overall and management.
In the second part of the validation, we trace the connection between positive feedback and
PRS. Each Invitae employee can voluntary write a review of their colleague (spot review) at any
10
time. This is a peer-driven way to reward excellent performance: employees who receive positive
feedback can get bonuses such as dinner for two or a weekend getaway.
We consider a sample of 262 persons who were employed for the entire duration of 2017.
For this sample, there were 164 spot review bonuses. Ninety-nine persons from the sample (38%)
were nominated for bonuses in a spot review at least once, while 163 persons (62%) had no bonus
nominations. The mean PRS of employees who have at least one spot review is significantly higher
rather than the mean PRS of employees who have no such reviews (M=32.03 and M=11.03,
respectively, P<0.0001). We also find a significant correlation between the number of spot bonuses
and PRS (r=0.22, P<0.001).
These empirical evidences demonstrate the validity and effective performance of the PRS
approach. The peer rank scores are highly correlated with both employee performance-based
compensation, which mostly reflect the views of management and experts on the individual's
impact, and positive feedback given by other employees as a reward for performance.
11
Fig 4. Interaction between the base salary and PRS. Base salaries are normalized.
Fig 5. Interaction between the performance-based equity grants and PRS. Grants are
normalized.
12
Fig 6. Interaction between the overall compensation and PRS. Overall compensation values
are normalized.
Fig 7. Interaction the share the grant represents in overall compensation and PRS.
13
Discussion
Performance appraisal is one of the most challenging areas in human resource
management. Along with the methodological difficulties, management does not always have
sufficient expertise to evaluate individual impact. Still, measurements of individual performance
are necessary for making decisions regarding promotion, firing, wage distribution and, in the
whole, understanding the employee dynamics and opportunities in a given organization.
In this paper, we propose an algorithm for the assessment of employee impact in the case
of complex product with obscure key performance indicators. We show that employee impact can
be evaluated by the employee's immediate collaborators and peers. We propose an iterative
algorithm, which is based on pairwise comparisons of employees. Numerically and empirically,
we show that Peer Rank Score (PRS) serves as a good measure of individual impact, which is
crucial for the management purposes. In our approach, we avoid absolute measurements of the
performance and consider each employee in connection with their working environment.
These results are in line with the recent agenda of the Science of Success studies, which
shows that the success of the individual is the construct of group perception and recognition18. Our
results also support the prominent idea about high performance of the wisdom of crowds11. We
show that the expertise of even a small crowd is a powerful mechanism for the assessment of
individual performance.
We also acknowledge that PRS and similar performance ratings should not be considered
as an optimal outcome measurement tools in the systems with clearly defined performance metrics,
e.g. call-centers or sales departments. In the case of easily determined performance with almost
no collaboration, the mechanism of complex performance evaluation is not necessary. However,
there is little attention given to the mechanisms of evaluation of complex tasks, which is why we
emphasize the importance of such discussions in expert and scientific communities.
14
References
1.
Adler, S. et al. Getting rid of performance ratings: Genius or folly? A debate. Ind. Organ.
Psychol. 9, 219 -- 252 (2016).
2.
Fletcher, C. Performance appraisal and management: The developing research agenda. J.
Occup. Organ. Psychol. 73, 473 -- 487 (2001).
3.
Schleicher, D. J. et al. Putting the system into performance management systems: A
review and agenda for performance management research. J. Manage. 44, 2209--2245
(2018).
4.
Austin, J. T. & Villanova, P. The criterion problem: 1917--1992. J. Appl. Psychol. 77, 836
(1992).
5.
Schleicher, D. J., Baumann, H. M., Sullivan, D. W. & Yim, J. Evaluating the effectiveness
of performance management: A 30-year integrative conceptual review. J. Appl. Psychol.
104, 851 -- 887 (2019).
6.
Council, C. L. Improving employee performance in the economic downturn. Four cost-
effective strategies to improve employee outcomes. Corporate executive board. (2012).
7.
Culbert, S. A. Get Rid of the Performance Review!: How Companies Can Stop
Intimidating, Start Managing--and Focus on What Really Matters. (2010).
8.
Lunenburg, F. C. Performance Appraisal: Methods and Rating Errors. Int. J. Sch. Acad.
Intellect. Divers. 14, 1 -- 9 (2012).
9.
Ilgen, D. R., Barnes-Farrell, J. L. & McKellin, D. B. Performance appraisal process
research in the 1980s: What has it contributed to appraisals in use? Organ. Behav. Hum.
Decis. Process. 54, 321--368 (1993).
10. Rothstein, H. R. Interrater reliability of job performance ratings: Growth to asymptote
level with increasing opportunity to observe. J. Appl. Psychol. 75, 322 (1990).
11. Galton, F. Presents Vox Populi ( The Wisdom of Crowds ). Nature 75, 450 -- 451 (1949).
15
12. Becker, J., Brackbill, D. & Centola, D. Network dynamics of social influence in the
wisdom of crowds. Proc. Natl. Acad. Sci. U. S. A. 114, E5070 -- E5076 (2017).
13. Kelley, E. K. & Tetlock, P. C. How Wise Are Crowds? Insights from Retail Orders and
Stock Returns. J. Finance 68, 1229 -- 1265 (2013).
14. Toyokawa, W., Whalen, A. & Laland, K. N. Social learning strategies regulate the
wisdom and madness of interactive crowds. bioRxiv 326637 (2018). doi:10.1101/326637
15. Elo, A. E. The rating of chessplayers, past and present. (Arco Pub., 1978).
16. Herbrich, R., Minka, T. & Graepel, T. TrueSkillTM: a Bayesian skill rating system. in
Advances in neural information processing systems 569--576 (2007).
17. Erdos, P. & Renyi, A. On the evolution of random graphs. Publ. Math. 6, 290 -- 297 (1959).
18. Barabási, A.-L. The Formula: The Universal Laws of Success. (2018).
16
Supplementary Information
The data collection procedure
Every three months, each employee in the company gets a notification to review their team
peers. S/he has 15 days to complete the review; if s/he does not complete the procedure in this
period, s/he gets a notification to fill out the form during the following 15 days. The review
procedure implies an evaluation of the set of peers on a 2D-grid. The horizontal axis represents
"teamwork", which means the activity and productivity in collaboration. In the survey description,
it is outlined in the following manner: "We think of teamwork as being made up of two factors: 1)
Someone we trust to put the needs of the team above their own, who can be counted on to help out
when needed. 2) Someone who pushes us to excel and keeps us accountable when we're not pulling
our weight". The vertical axis represents "skill", which means the following: "How good the
person is at their job, how much knowledge, experience, judgement they bring to the table to
effectively push the team forward". These two parameters together are designed to capture the
overall individual performance.
The employee sees the empty grid on the left side of the window and the subset of peers
that should be evaluated below the grid. Then s/he has to drag the icons of corresponding
employees into the grid according to her/his individual perception of their performance. If the
reviewing employee does not know a colleague or cannot evaluate them due to other factors, s/he
can move the icon of this peer out of the 2D-grid. Each review is collected once, with all the
employees reviewed at the same time (an example on Fig. 1).
Sampling formation
In team review, an employee has to evaluate 20 peers, while in sampling review, they have
to evaluate five peers.
In team review, we propose up to twenty employees to be evaluated in a single session. If
the person does not have communication with at least twenty colleagues, s/he would be evaluated
by fewer peers.
17
In contrast to team review, sampling review aims to evaluate the individual performance
with a less cohesive group (so-called "weak ties"). For this purpose, we collected sampling reviews
that included both teammates and peers from other teams who have been in contact (via offline
meetings, emails or Slack contacts) with the reviewer in the last 90 days. In sampling review, the
number of teammates that can be reviewed is limited to two.
18
|
1705.02239 | 3 | 1705 | 2017-11-27T16:15:28 | A Polya Contagion Model for Networks | [
"cs.SI",
"math.OC",
"math.PR",
"physics.soc-ph"
] | A network epidemics model based on the classical Polya urn scheme is investigated. Temporal contagion processes are generated on the network nodes using a modified Polya sampling scheme that accounts for spatial infection among neighbouring nodes. The stochastic properties and the asymptotic behaviour of the resulting network contagion process are analyzed. Unlike the classical Polya process, the network process is noted to be non-stationary in general, although it is shown to be time-invariant in its first and some of its second-order statistics and to satisfy martingale convergence properties under certain conditions. Three classical Polya processes, one computational and two analytical, are proposed to statistically approximate the contagion process of each node, showing a good fit for a range of system parameters. Finally, empirical results compare and contrast our model with the well-known discrete time SIS model. | cs.SI | cs | A Polya Contagion Model for Networks
Mikhail Hayhoe, Fady Alajaji, Senior Member, IEEE, and Bahman Gharesifard, Member, IEEE
1
7
1
0
2
v
o
N
7
2
]
I
S
.
s
c
[
3
v
9
3
2
2
0
.
5
0
7
1
:
v
i
X
r
a
stochastic properties
Abstract-A network epidemics model based on the classical
Polya urn scheme is investigated. Temporal contagion processes
are generated on the network nodes using a modified Polya
sampling scheme that accounts for spatial
infection among
neighbouring nodes. The
and the
asymptotic behaviour of the resulting network contagion process
are analyzed. Unlike the classical Polya process, the network
process is noted to be non-stationary in general, although
it is shown to be time-invariant in its first and some of its
second-order statistics and to satisfy martingale convergence
properties under certain conditions. Three classical Polya
processes, one computational and two analytical, are proposed
to statistically approximate the contagion process of each node,
showing a good fit for a range of system parameters. Finally,
empirical results compare and contrast our model with the
well-known discrete time SIS model.
Index terms-Polya contagion networks, epidemics on net-
works, non-stationary stochastic processes, martingales.
I. INTRODUCTION
In this paper we examine the dynamics and properties of
a contagion process, or epidemic, on a network. Here an
epidemic can represent a disease [2], a computer virus [3], the
spread of an innovation, rumour or idea [4], or the dynamics
of competing opinions in a social network [5].
Many different models for the study of infection propagation
and curing exist in the literature. Our model, the network
Polya contagion process, bears similarities to the well-known
susceptible-infected-susceptible (SIS) infection model [6]. In
this model, all nodes may initially be healthy or infected.
As the epidemic spreads, nodes that are infected can be
cured to become healthy, but any healthy node may become
infected at any time, regardless of whether they have been
cured previously. Epidemics on networks have been intensively
studied in recent years; see [7] and references therein and
thereafter. The model that we present is an adaptation of the
classical Polya contagion process [8], [9], [10] to a network
setting by accounting for spatial infection between nodes. The
classical Polya model has been used to study a variety of
epidemics such as the bubonic plague in Peru [11] and the
spread of chlamydia in a closed population [12], as well as a
wide range of other applications; see [13] for a survey. In this
work we will examine the stochastic evolution of the network
Polya contagion process.
Mikhail Hayhoe is with the Department of Electrical and Systems
the University of Pennsylvania, Philadelphia, PA, USA
Engineering at
[email protected].
Fady Alajaji and Bahman Gharesifard are with the Department of Math-
ematics and Statistics at Queen's University, Kingston, ON, Canada, {fa,
ghareb}@queensu.ca.
This work was partially supported by the Natural Sciences and Engineering
Research Council of Canada. Parts of this work were presented at the 2017
American Control Conference [1].
Our model is motivated by the classical Polya contagion
process, which evolves by sampling from an urn containing
a finite number of red and black balls [8], [9], [10]. In the
network Polya contagion model, each node of the underlying
network is equipped with an individual urn; however, instead
of sampling from these urns when generating its contagion
process, each node has a "super urn", created by combining
the contents of its own urn with those of its neighbours'
urns. This adaptation captures the concept of spatial infection,
since having infected neighbours increases the chance that an
individual is infected in the future. This concept of the super
urn sampling mechanism for incorporating spatial interactions
was originally introduced in [14] in the context of the image
segmentation and labeling problem. We herein adapt the image
model of [14] for a network setting and analyze the resulting
contagion process affecting each node of the network.
More specifically, we study the time evolution and stochastic
properties of the proposed network contagion process. We
derive an expression for the temporal n-fold joint probabil-
ity distribution of the process. We show that this process,
unlike the classical Polya urn process, is in general non-
stationary, and hence not exchangeable. For the special case
of complete networks, we analytically find the 1-dimensional
and 2-dimensional (n, 1)-step marginal distributions of the
contagion process. These results show that, even though it
is not stationary,
the process in this case is nevertheless
identically distributed with its later two marginal distributions
being invariant to time shifts. We also establish several mar-
tingale properties regarding the network urn compositions,
proving that
the proportions of red balls in each node's
urn as well as the network average urn proportion converge
almost surely to a limit as time grows without bound. We
next provide three approximations to the network contagion
process by modelling each node's contagion process via a
classical stationary Polya process [10]. In the first one, we
approximate each node's process with the classical Polya
process whose correlation parameter is empirically selected
so that the Kullback-Leibler divergence measure between its
n-fold joint distribution and that of the original node process
is minimized. In the second approximation, we propose an
analytical model whose parameters are chosen by matching
its first and (n, 1)-step second-order statistics with those of
the original node process, which fits well for large networks.
The last approximation uses a classical Polya model with
parameters chosen analytically that we show fits well for small
networks. Finally, simulation results are presented to support
the validity of these approximations and to compare our model
with the traditional discrete time SIS model, which suggests
that the network Polya contagion process captures certain
properties of the SIS model, while offering new insights in
2
the case of widespread infection.
The rest of the paper is organized as follows. Section II out-
lines some preliminary knowledge that will be used through-
out the paper. Section III introduces the network contagion
process, and Section
IV presents its stochastic properties
and asymptotic behaviour. Section V proposes three approx-
imations for the individual node contagion processes in the
network, along with numerical modelling results. Lastly, Sec-
tion VI concludes the paper.
II. PRELIMINARIES
For a sequence vi = (vi,1, ..., vi,n), we use the notation vt
i,s
with 1 ≤ s < t ≤ n to denote the vector (vi,s, vi,s+1, ..., vi,t).
Our technical results rely on notions from stochastic processes,
some of which we recall here. Throughout, we assume that the
reader is familiar with basic notions of probability theory.
Let (Ω, F , P ) be a probability space, and consider the
stochastic process {Zn}∞
n=1, where each Zn is a random
variable on Ω. We often refer to the indices of the process
as "time" indices. We recall that the process {Zn}∞
n=1 is
stationary if for any n ∈ Z≥1, its n-fold joint probability
distribution (i.e., the distribution of (Z1, ..., Zn)) is invari-
ant to time shifts. Further, {Zn}∞
n=1 is exchangeable if for
any n ∈ Z≥1,
its n-fold joint distribution is invariant to
permutations of the indices 1, ..., n. It directly follows from
the definitions that an exchangeable process is stationary.
Lastly, the process {Zn}∞
n=1 is called a martingale (resp.
supermartingale, submartingale) with respect to the process
{Yn}∞
n=1 if E[Zn] < ∞ and E[Zn+1Yn] = Zn almost
surely (resp. less than or equal to, greater than or equal to),
for all n. Precise definitions of all notions, including that of
ergodicity, can be found in standard texts (e.g., [15], [16]).
We now recall the classical version of the Polya contagion
process [8], [10]. Consider an urn with R ∈ Z>0 red balls and
B ∈ Z>0 black balls. We denote the total number of balls by
T , i.e., T = R + B. At each time step, a ball is drawn from
the urn. The ball is then returned along with ∆ > 0 balls of
the same colour. We use an indicator Zn to denote the colour
of ball in the nth draw:
Zn =(1
0
if the nth draw is red
if the nth draw is black.
Let Un denote the proportion of red balls in the urn after the
nth draw. Then
Un :=
t=1 Zt
R + ∆Pn
T + n∆
=
ρc + δcPn
1 + nδc
t=1 Zt
,
where ρc = R
T is the initial proportion of red balls in the urn
and δc = ∆
T is a correlation parameter. Since we draw balls
from this urn at each time step, the conditional probability of
drawing a red ball at time n, given Z n−1 = (Z1, · · · , Zn−1),
is given by
P (Zn = 1 Z n−1) =
t=1 Zt
T + (n − 1)∆
R + ∆Pn−1
= Un−1.
It can be easily shown that {Un}∞
The process {Zn}∞
n=1 is a martingale [17].
n=1, whose n-fold joint distribution is
and 1−ρc
δc
nPn
denoted by Q(n)
, is also exchangeable (hence stationary)
ρc,δc
and non-ergodic with both Un and the process sample average
1
i=1 Zi converging almost surely as n → ∞ to a random
variable governed by the Beta distribution with parameters
ρc
; we denote this probability density function
δc
(pdf) by Beta( ρc
) [17], [18]. Lastly, the 1-dimensional
δc
distribution of the Polya process is Q(1)
(a) = P (Zn = a) =
(ρc)a(1 − ρc)1−a, for all n ∈ Z≥1 and a ∈ {0, 1}. The above
classical Polya process {Zn}∞
n=1 is fully described by its
parameters ρc and δc, and thus we denote it by Polya(ρc, δc).
, 1−ρc
δc
ρc,δc
III. NETWORK POLYA CONTAGION PROCESS
In this section, we introduce a generalization of the Polya
contagion process to networks, where each individual node in
the underlying graph that describes the network topology is
still equipped with an urn; however, the node's neighbouring
structure affects the evolution of its process. This model hence
captures spatial contagion, since infected neighbours increase
the chance of a node being infected in the future.
Consider an undirected graph G = (V, E), where V =
{1, . . . , N } is the set of N ∈ Z≥1 nodes and E ⊂ V × V
is the set of edges. We assume that G is connected, i.e.,
there is a path between any two nodes in G. We use Ni to
denote the set of nodes that are neighbours to node i, that is
Ni = {v ∈ V : (i, v) ∈ E}, and N ′
i = V for
all i ∈ V , the network is called complete; if Ni = Nj for
all i, j ∈ V , we call it regular. Each node i ∈ V is equipped
with an urn, initially with Ri ∈ Z>0 red balls and Bi ∈ Z>0
black balls (we do not let Ri = 0 or Bi = 0 to avoid any
degenerate cases). We let Ti = Ri + Bi be the total number
of balls in the ith urn, i ∈ {1, · · · , N }. We use Zi,n as an
indicator for the ball drawn for node i at time n:
i = {i}∪Ni. If N ′
Zi,n =(1 if the nth draw for node i is red
0 if the nth draw for node i is black.
However, instead of drawing solely from its own urn, each
node draws simultaneously from a "super urn" created by
combining all the balls in its own urn with the balls in its
neighbours' urns; see Figure 1. This allows the spatial rela-
tionships between nodes to influence their state. This means
that Zi,n is the indicator for a ball drawn from node i's super
urn, and not its individual urn. Hence, the super urn of node
Bj
Rj red balls, ¯Bi = Pj∈N ′
Tj balls in total.
i
i initially has ¯Ri = Pj∈N ′
black balls, and ¯Ti =Pj∈N ′
i
i
We further consider a time-varying version of the classical
Polya contagion process, following [19], where at time t for
node i ∈ V , after a red ball is drawn it is returned along with
∆r,i(t) red balls to node i's urn, and ∆b,i(t) black balls along
with the drawn ball are added to node i's urn when a black
ball is drawn. When ∆r,i(t) = ∆b,i(t) for all t ∈ Z≥1, we
write ∆i(t) instead; if the ∆'s are not node-dependent, we
omit the node index. We assume throughout that ∆r,i(t) ≥
0, ∆b,i(t) ≥ 0, for all t ∈ Z≥1 and that there exists i ∈ V and
t such that ∆r,i(t) + ∆b,i(t) 6= 0; otherwise we are simply
sampling with replacement.
Node 1's super urn
PSfrag replacements
1
2
3
4
4
2
5
6
7
3
Node 1's super urn
1
Fig. 1.
Illustration of a super urn in a network.
In the context of epidemics, the red and black balls in an urn,
respectively, represent units of "infection" and "healthiness";
for example, bacteria and white blood cells. In a super urn,
the bacteria can infect others in the area and the white blood
cells contribute to the overall health in the neighbourhood of
an individual. Drawing red at time t means the bacteria in
the neighbourhood were successful in reproduction and so the
individual was more infected, otherwise they were healthier
since the white blood cells reproduced. Thus when Zi,n = 1,
we declare that node i is infected at time n, and if Zi,n = 0,
then it is healthy. We add more units of bacteria once they
reproduce, but commonly assume this number, ∆r,i(t), is the
same across all individuals and time because the bacteria does
not evolve or become altered. The amount of white blood
cells created, ∆b,i(t), may change since we can give more
medicine to certain people to increase their immune response,
or vaccinate them so they are better able to fight the disease.
To express the proportion of red balls in the individual
urns of the nodes, we define the random vector Un =
(U1,n, . . . , UN,n), where Ui,n is the proportion of red balls
in node i's urn after the nth draw, i ∈ V . For node i,
t=1 Zi,t∆r,i(t)
,
t=1 Zi,t∆r,i(t) + (1 − Zi,t)∆b,i(t)
Ri +Pn
Ui,n :=
Ti +Pn
where the numerator represents the total number of red balls
in node i's urn after the nth draw, while the denominator is
the total number of balls in the same urn. Note that Ui,0 = Ri
Ti
is the initial proportion of balls in node i's urn. For ease of
notation, let
n
Xt=1
Xj,n = Tj +
Zj,t∆r,j(t) + (1 − Zj,t)∆b,j(t).
(1)
the
random vector Sn
define
the proportion of
=
Furthermore, we
(S1,n, ..., SN,n) as
in the
super urns of the nodes after the nth draw, so that Si,n is the
proportion of red balls in node i's super urn after n draws.
Hence, for node i,
red balls
t=1 Zj,t∆r,j(t)
Xj,n
Si,n :=
i Pn
¯Ri +Pj∈N ′
Pj∈N ′
= Pj∈N
Pj∈N
Uj,nXj,n
Xj,n
′
i
′
i
i
.
¯Ri
¯Ti
Note that Si,0 =
draw variables of the network, and in particular of {Z n
. Si,n is in fact a function of the random
j }j∈N ′
,
i
3
1 , · · · , Z n
but for ease of notation, when the arguments are clear, we write
Si,n(Z n
N ) = Si,n. Then the conditional probability of
drawing a red ball from the super urn of node i at time n given
the complete network history, i.e. given all the past n − 1
draw variables for each node in the network {Z n−1
}N
j=1 =
{(Z1,1, · · · , Z1,n−1), · · · , (ZN,1, · · · , ZN,n−1)}, satisfies
j
j
}N
P(cid:0)Zi,n = 1{Z n−1
j=1(cid:1)
i Pn−1
¯Ri +Pj∈N ′
Pj∈N ′
= Si,n−1.
=
i
t=1 Zj,t∆r,j(t)
Xj,n−1
(3)
That is, the conditional probability of drawing a red ball for
node i at time n given the entire past {Z n−1
}N
j=1 is the
proportion of red balls in its super urn, Si,n−1. This is however
analogous to the original Polya case, but instead of relying
on the individual proportion of red balls Un to describe the
conditional probability of drawing red balls, we use the super
urn proportion of red balls since we now draw from there.
j
Remark 3.1: (Non-Markovity): While (3) may appear to
suggest some sort of Markovity property, the process is non-
Markovian in general. This can easily be seen due to the fact
that a draw at time n requires knowledge of all previous draws
for the entire neighbourhood.
A main objective throughout the rest of this paper is to
study the evolution and stochastic properties of the process
defined above. Using the above conditional probability, we can
determine the n-fold joint probability of the entire network G:
for an
i ∈ {0, 1}n, i ∈ {1, ..., N }, we have that
P (n)
G (an
1 , · · · , an
N )
i = an
i }N
n
=
:= P (cid:0){Z n
Yt=1
Yt=1
i=1(cid:1)
P (cid:0){Zi,t = ai,t}N
Yi=1(cid:16)Si,t−1(cid:17)ai,t(cid:16)1 − Si,t−1(cid:17)1−ai,t
i=1 {Z t−1
=
N
i = at−1
n
i
}N
i=1(cid:1)
,
(4)
1, · · · , at
where Si,t = Si,t(at
N ) is defined in (3). With the
above explicit joint distribution, it is possible to determine
the distributions of each node's process. More specifically,
using (4), the n-fold distribution of node i's process at time
t ≥ n is
P (n)
1, · · · , at
P (t)
G (at
i,t (ai,t−n+1, ..., ai,t) := Xat−n
N ).
i ∈{0,1}t−n
at
j ∈{0,1}t:j6=i
In order to measure the spread of contagion in the network at
any given time, we wish to see how likely it is, on average,
for a node to be infected at that instant. We hence define the
average infection rate in the network at time n as the average
marginal probability of drawing a red ball,
In :=
1
N
(2)
P (Zi,n = 1) =
1
N
P (1)
i,n (1).
N
Xi=1
N
Xi=1
Note that In is a function of the network topology (V, E),
the initial placement of balls Ri and Bi,
the draw pro-
cesses {Zi,t}n
t=1, and number of balls added {∆r,i(t)}n
t=1
4
and {∆b,i(t)}n
t=1 for each node i ∈ V . Unfortunately for
an arbitrary network, the above quantity does not yield an
exact analytical formula (except in the simple case of complete
networks). As such, in general it is hard to mathematically
analyze the asymptotic behaviour of In, which we wish to
minimize when attempting to cure an epidemic. Instead we
examine the asymptotic stochastic behavior of a closely related
variable given by the average individual proportion of red balls
at time n, namely
Un :=
1
N
Ui,n,
N
Xi=1
which we call the network susceptibility. This quantity is
related to the conditional probability of drawing a red ball,
as seen in (2). Since the individual urn of node i is in every
super urn in the neighbourhood, if Ui,n increases then Sj,n
increases for every j ∈ N ′
i , and hence given the past history
those nodes are more likely to exhibit infected behaviour as
seen from (3). Note that similarly to In, Un is a function of
the network variables.
Remark 3.2: (Finite Memory): It is worth pointing out that
a practical adaptation to our model can be considered, where
urns have "finite memory" in the sense that the balls added
after each draw are only kept in each node's urn for a finite
number of future draws. This model is developed in [18]
for the classical Polya process in the context of modelling
communication channels, where it is shown that the resulting
finite memory contagion process is stationary, Markovian and
ergodic. We present the following result that states that in this
case the entire state is Markovian and hence it is a limited
reinforcement model, but leave an in-depth investigation to a
•
future work.
Proposition 3.3: (Finite Memory Markovity): The entire
n=1 with
state of the network Polya contagion process {Zn}∞
finite memory M is Markovian with memory M .
Proof: By (1) and (3) and the fact that added balls are
removed after M steps, we have for n > M that
j
=
}N
P(cid:0)Zi,n = 1 {Z n−1
j=1(cid:1)
i Pn−1
¯Ri +Pj∈N ′
i Pn−1
¯Ti +Pj∈N ′
j=1(cid:17) .
= P (cid:16)Zi,n = 1 {Z n−1
j,n−M }N
t=n−M Zj,t∆r,j(t)
t=n−M Zj,t∆r,j(t) + (1 − Zj,t)∆b,j(t)
Using the above result along with conditional independence,
for (a1, . . . , aN ) ∈ {0, 1}N we have for n > M that
j=1(cid:1)
j
j
N
=
}N
}N
P (cid:0)Z1,n = a1, . . . , ZN,n = aN {Z n−1
Yi=1
Yi=1
= P(cid:16)Z1,n = a1, . . . , ZN,n = aN {Z n−1
P (cid:0)Zi,n = 1 {Z n−1
P (cid:16)Zi,n = 1 {Z n−1
j=1(cid:1)
j=1(cid:17)
j,n−M }N
=
N
and hence the entire network process {Zn}∞
with memory M .
j,n−M }N
j=1(cid:17) ,
n=1 is Markovian
IV. STOCHASTIC PROPERTIES
We next examine the stochastic properties of the network
contagion process. We assume throughout the beginning of
this section that ∆r,i(t) = ∆b,i(t) = ∆ > 0, for all i ∈ V and
times t; that is the net number of red and black balls added
are equal and constant in time for all nodes. In the case of
a complete network, the composition of every nodes' super
urn is identical, since there is only one super urn that is being
drawn from. Thus for a complete network the super urn model
is analogous to one urn where multiple draws occur with
replacement, which has been recently studied in detail [20].
However, the analysis in [20] is carried out in an aggregate
sense, i.e., only for the entire urn and not individual processes.
Unfortunately, this aggregate approach does not work in a
network setting, whereas the super urn model proposed here
is applicable.
A. Complete Network Marginal Distributions
We first focus on the special case of complete networks to
derive some useful probability distributions; later on, we will
obtain other stochastic properties that apply to more general
networks.
PN
Given that the network is complete, we focus on one of
the nodes, say i ∈ V . For ease of notation, we define ¯Tj =
k=1 Tk =: ¯T , and similarly, ¯Rj =: ¯R, ¯Bj =: ¯B, for all j ∈
V . Defining the events An−1 = {Zi,n−1 = an−1, ..., Zi,1 =
a1} and Wn−1 = {An−1, {Z n−1
∈
{0, 1}n−1, and parameters ρ = ¯R
, we can write
¯T
using (3) under the above assumptions, that
}j6=i} with bn−1
and δ = N ∆
¯T
j,1 = bn−1
j
j
P (Zi,n = 1, An−1)
P (Zi,n = 1Wn−1)P (Wn−1)
∈{0,1}n−1:j6=i
:j6=i
¯R + ∆Pn−1
¯T +Pn−1
N Pn−1
t=1 (cid:16)at +Pj6=i bj,t(cid:17)
t=1 ∆ +Pj6=i ∆
t=1 (cid:16)at +Pj6=i bj,t(cid:17)
1 + (n − 1)δ
ρ + δ
P (Wn−1)
P (Wn−1)
P (An−1, {Z n−1
= bn−1
}j6=i)
j
j
1 + (n − 1)δ
j
j
=Xbn−1
=Xbn−1
=Xbn−1
=Xbn−1
j
j
:j6=i
:j6=i"ρ
Xt=1 at
δ
N
n−1
+
+Xj6=i
P (An−1, {Z n−1
= bn−1
}j6=i)
j
j
1 + (n − 1)δ
= bn−1
j
}j6=i)
bj,tP (An−1, {Z n−1
j
1 + (n − 1)δ
!#.
(5)
By examining an arbitrary term k 6= i in the final sum above,
for fixed t ∈ {1, ..., n − 1}, we can sum out all the other draw
variables:
Xbn−1
j
∈{0,1}n−1:j6=i
bk,tP (An−1, {Z n−1
j
= bn−1
j
}j6=i)
bk,tP (An−1, Z n−1
k = bn−1
k
bk,tP (An−1, Zk,t = bk,t)
k ∈{0,1}n−1
= Xbn−1
= Xbk,t∈{0,1}
= P (An−1, Zk,t = 1).
5
)
We next show that each node's draw process is not sta-
tionary in general, and hence is different from the classical
Polya(ρc, δc) process.
Remark 4.2: (Non-Stationarity of the Network Conta-
gion Process): Consider a 2-node complete network. Then,
using (4), one can obtain (after some simplifications) that
(6)
Further, by the law of total probability,
P (An−1, {Z n−1
j
= bn−1
j
}j6=i) = P (An−1).
(7)
Xbn−1
j
∈{0,1}n−1:j6=i
So using (6) and (7), (5) becomes
ρP (An−1) + δ
NPn−1
t=1hatP (An−1) +Pj6=iP (An−1, Zj,t = 1)i
1 + (n − 1)δ
P (Z1,2 = 1, Z1,1 = 1) = ρ
P (Z1,3 = 1, Z1,2 = 1)
ρ + (1 + ρ) δ
2
1 + δ
,
P (Z1,1 = a1, {Z1,t = 1}3
t=2, {Z2,t = bt}3
t=1)
=Xa1∈{0,1}
b3∈{0,1}3
= ρ
4ρ + δ(2 + 14ρ) + δ2(6 + 14ρ) + δ3(5 + 3ρ)
4(1 + δ)2(1 + 2δ)
,
Thus, using the law of total probability, we have
and hence the network process is not stationary.
•
P (Zi,n = 1) = Xan−1∈{0,1}n−1
P (Zi,n = 1, An−1)
= Xan−1
ρ + δ
=
ρP (An−1) + δ
t=1 atP (An−1)
N Pn−1
1 + (n − 1)δ
+
δ
N Pn−1
t=1 PN
N Pn−1
1 + (n − 1)δ
t=1 Pj6=i P (An−1, Zj,t = 1)
1 + (n − 1)δ
j=1 P (Zj,t = 1)
.
(8)
An interesting corollary of this derivation is as follows.
Lemma 4.1: (Complete Network Marginal Distribution):
The 1-dimensional marginal distribution of node i's contagion
draw process {Zi,n}∞
n=1 for the N -node complete network is
given by
P (1)
i,n = P (Zi,n = a) = ρa(1 − ρ)1−a,
where i ∈ V , n ≥ 1, and a ∈ {0, 1}.
Proof: We proceed using strong induction on n ≥ 1,
showing that P (Zi,n = 1) = ρ, for all nodes i ∈ V and all n.
The base case readily holds, since at time n = 1,
P (Z1,1 = 1) = · · · = P (ZN,1 = 1) = PN
PN
i=1 Ri
i=1 Ti
Now, assuming that P (Zj,t = 1) = ρ for all j ∈ V and t ≤ n
and using (8), we have
= ρ.
P (Zi,n+1 = 1) =
=
=
j=1 P (Zj,t = 1)
t=1PN
1 + nδ
δ
N N ρ
t=1 ρ
= ρ,
ρ + δ
N Pn
ρ +Pn
ρ + δPn
1 + nδ
t=1
1 + nδ
which completes the induction argument. The result now
follows using the fact that
P (Zj,n = 1) + P (Zj,n = 0) = 1 ⇒ P (Zj,n = 0) = 1 − ρ,
for all j ∈ V and all n.
Since every exchangeable process is necessarily stationary,
Remark 4.2 implies that the network Polya process is not ex-
changeable in general. However, some notions of stationarity
remain; in our next result, we will see that there is a consistent
relationship between the draws at the 1st and nth time steps.
Lemma 4.3: (Complete Network (n, 1)-step Marginal
Probability): For the complete network, the 2-dimensional
marginal probability that node i's draw variables at times n
and 1 are both one is given by
P (Zi,n = 1, Zi,1 = 1) = ρ
ρ + (1 + (N − 1)ρ) δ
N
1 + δ
for i ∈ V , n ≥ 2. Furthermore, for any other node k,
ρ + (1 + (N − 1)ρ) δ
N
P (Zk,n = 1, Zi,1 = 1) = ρ
1 + δ
,
.
Proof: By Lemma 4.1 we have that P (Zk,1 = 1) = ρ for
all k ∈ V , so it is enough to show that
P (Zk,n = 1 Zi,1 = 1) =
ρ + (1 + (N − 1)ρ) δ
N
1 + δ
(9)
for all n and nodes i and k. Using the law of total prob-
ability, (3), and after some simplifications, with defining
Wn−1 = {Z n−1
j,1 }j6=i} (note that
Wn−1 is a function of {bn−1
j,1 }j6=i, but for simplicity we omit
this), we have that
i,2 = an−1
j,1 = bn−1
, {Z n−1
2
P (Zi,n = 1 Zi,1 = 1)
P (Zi,n = 1 Zi,1 = 1, Wn−1)P (Wn−1 Zi,1 = 1)
= Xan−1
2 ∈{0,1}n−2
bn−1
j,1 ∈{0,1}n−1:j6=i
ρ + δ
N (1 +Pn−1
t=2 at +Pn−1
1 + (n − 1)δ
t=1 Pj6=i bj,t)
= Xan−1
,bn−1
2
j,1 :j6=i
× P (Wn−1 Zi,1 = 1)
j,1 :j6=i"(cid:18)ρ +
= Xan−1
,bn−1
2
+
δ
N
δ
1 + (n − 1)δ
N(cid:19) P (Wn−1 Zi,1 = 1)
Xt=2
atP (Wn−1 Zi,1 = 1)
1 + (n − 1)δ
n−1
6
+
δ
N
bj,tP (Wn−1 Zi,1 = 1)
1 + (n − 1)δ
#.
n−1
Xt=1
Then, after arranging terms and using the law of total proba-
bility for
bj,tP (Wn−1 Zi,1) = P (Zj,t = 1 Zi,1 = 1),
Xan−1
2
,bn−1
j,1 :j6=i
we have
P (Zi,n = 1 Zi,1 = 1)
PSfrag replacements
0.215
=
(ρ + δ
N )(1)
1 + (n − 1)δ
+
δ
N Pn−1
t=2 P (Zi,t = 1Zi,1 = 1)
1 + (n − 1)δ
ρ + δ
=
+
+
δ
1 + (n − 1)δ
N Pn−1
t=1 Pj6=i P (Zj,t = 1Zi,1 = 1)
N Pj6=i P (Zj,1 = 1)
N h1 +PN
j=1Pn−1
t=2 P (Zj,t = 1Zi,1 = 1)i
1 + (n − 1)δ
1 + (n − 1)δ
δ
=
ρ(1 + (N − 1) δ
1 + (n − 1)δ
N )
δ
N h1 +PN
j=1Pn−1
t=2 P (Zj,t = 1 Zi,1 = 1)i
1 + (n − 1)δ
+
. (10)
It can be similarly shown by symmetry of the complete
network that (10) holds for P (Zk,n = 1 Zi,1 = 1) if k 6= i.
In order to show (9), we proceed using strong induction on
n ≥ 2. For the base case, setting n = 2 in (10), we have for
any i, k ∈ V ,
P (Zk,2 = 1Zi,1 = 1) =
=
ρ(1 + (N − 1) δ
N ) + δ
N
1 + δ
ρ + (1 + (N − 1)ρ) δ
N
1 + δ
,
as desired. Assume now that P (Zk,t = 1 Zi,1 = 1) is given
by (9), for 2 ≤ t ≤ n − 1 and any i, k ∈ V . Then by (10),
P (Zk,n = 1 Zi,1 = 1)
=
ρ(1 + (N − 1) δ
1 + (n − 1)δ
N )
δ
N h1 +PN
j=1Pn−1
+
ρ(1 + (N − 1) δ
N ) + δ
1 + (n − 1)δ
t=2 P (Zj,t = 1 Zi,1 = 1)i
N hN (n − 2) ρ+(1+(N −1)ρ) δ
1 + (n − 1)δ
1+δ
N
i
1
1 + (n − 1)δ"(1 + δ)
ρ + (1 + (N − 1)ρ) δ
N
1 + δ
+δ(n − 2)
ρ + (1 + (N − 1)ρ) δ
N
1 + δ
#
ρ + (1 + (N − 1)ρ) δ
N
1 + δ
,
=
=
=
which completes the induction argument.
Although the draw process is not stationary in general,
simulated results suggest that it satisfies some asymptotic sta-
tionarity properties, in the sense that given sufficient time the
process settles and deviations become very small in magnitude.
A representative example is shown in Figure 2 for the 2-
dimensional distribution at times n and n − 1 in the 5-node
network shown in Figure 3(d).
Empirical value
Settled value
0.2025
0.195
500
1, 000
Fig. 2. Simulated values for P (Zi,n = 1, Zi,n−1 = 1) for an arbitrary node
i averaged over 50,000 simulated trials on the network shown in Fig. 3(d). All
parameters remained constant throughout all trials; see http://bit.ly/2tnBix5 for
a complete list of them.
B. Martingale Theorems
We now turn our attention to the martingale properties of the
network contagion process, where we do not assume that the
network is necessarily complete. Recall that by the martingale
convergence theorem [15], [16], if a process {Zn}∞
n=1 is a
martingale (or supermartingale, or submartingale), there exists
a random variable Z such that {Zn}∞
n=1 converges almost
surely to Z as n → ∞.
Theorem 4.4: (Individual Urn Proportion Martingale):
For a network G = (V, E), ∆r,i(n) = ∆b,i(n) = ∆ and Ti =
T , for all i ∈ V and all n, the individual proportion of red
balls {Ui,n}∞
n=1 is a martingale with respect to the draws for
the whole network {Zn}∞
n=1 if and
only if, almost surely,
n=1 = {(Z1,n, ..., ZN,n)}∞
1
Ni Xj∈Ni
Uj,n−1 = Ui,n−1.
Proof: Using the expression for Ui,n, (2), and (3), we
have almost surely
E[Ui,n Zn−1]
= E(cid:20) ∆Zi,n + Ui,n−1(T + (n − 1)∆)
T + n∆
Ui,n−1(T + (n − 1)∆)
∆E[Zi,n Zn−1]
Zn−1(cid:21)
(cid:12)(cid:12)(cid:12)
+
=
T + n∆
T + (n − 1)∆
T + n∆
+
∆P (Zi,n = 1Z n−1)
T + n∆
= Ui,n−1
= Ui,n−1(cid:18)1 −
T + n∆(cid:19)+
= Ui,n−1 −
T + n∆
∆
∆Ui,n−1
T + n∆
= Ui,n−1 + ∆hPj∈Ni
Uj,n−1(T + (n − 1)∆)
i (T + (n − 1)∆)
Uj,n−1
+ ∆
i
(T + n∆)N ′
∆Pj∈N ′
Ui,n−1 +Pj∈Ni
Uj,n−1i − NiUi,n−1
i (T + n∆)
N ′
(T + n∆)(Ni + 1)
= Ui,n−1 +
∆Pj∈Ni
(Uj,n−1 − Ui,n−1)
(T + n∆)(Ni + 1)
.
(11)
=
aij(Nj − Ni)
(Ni + 1)(Nj + 1)(cid:16)Uj,n−1 − Ui,n−1(cid:17).
7
From above, it is clear that this term is zero for all i and j
by setting Nj = Ni, i.e. in any regular network, and so
{ Un}∞
n=1 is a martingale with respect to {Zn}∞
n=1.
We next allow the net number of black balls ∆b,i(·) to
evolve stochastically in time as a function of the past draw
history in the network in order to steer {Ui,n}∞
n=1 to a limit
for every node i.
Theorem 4.6: (Individual Urn Proportion Categories): In
a general network G = (V, E) with ∆r,i(n) = ∆r for all
n ∈ Z≥1 and i ∈ V , if we choose {∆b,i(n)}∞
n=1 so that
∆b,i(n) ≥
∆r(1 − Ui,n−1)Si,n−1
Ui,n−1(1 − Si,n−1)
almost surely for all n ∈ Z≥1 and i ∈ V (resp. equal to, less
than or equal to) then {Ui,n}∞
n=1 is a supermartingale (resp.
martingale, submartingale) with respect to {Zn}∞
n=1.
Proof: We will start with the case of a supermartingale.
That is, we wish to show that almost surely for all n ∈ Z≥1,
E[Ui,n Zn−1] − Ui,n−1 ≤ 0.
Define ¯Zi,n = Pn
have almost surely
t=1 Zi,t, and take Xi,n as in (1). Then, we
Ui,n − Ui,n−1
Ri + ∆r( ¯Zi,n−1 + Zi,n)
Ri + ∆r ¯Zi,n−1
−
Xi,n
(Ri + ∆r ¯Zi,n−1)(Xi,n − Xi,n−1)
Xi,n−1
=
=
=
=
−
−
∆rZi,n
Xi,n
∆rZi,n
Xi,n
1
Xi,n−1Xi,n
Ui,n−1(Xi,n − Xi,n−1)
Xi,n
Xi,n(cid:20)∆rZi,n − Ui,n−1(∆rZi,n + ∆b,i(n)(1 − Zi,n))(cid:21),
since Xi,n > 0 for all n ∈ Z≥1 almost surely, we can ignore
it. Now, since Ui,n−1 is almost surely constant given Zn−1,
That is we wish to check if, almost surely,
E(cid:2)∆rZi,n(1− Ui,n−1)− ∆b,i(n)Ui,n−1(1− Zi,n)Zn−1(cid:3) ≤ 0.
Now if
∆b,i(n) ≥
almost surely, we have
∆r(1 − Ui,n−1)Si,n−1
Ui,n−1(1 − Si,n−1)
E(cid:2)∆rZi,n(1 − Ui,n−1) − ∆b,i(n)Ui,n−1(1 − Zi,n)Zn−1(cid:3)
≤ E"∆rZi,n(1 − Ui,n−1) − Ui,n−1(1 − Zi,n)
Ui,n−1(1 − Si,n−1) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Zn−1#
1 − Si,n−1(cid:12)(cid:12)(cid:12)(cid:12)
= ∆r(1 − Ui,n−1)E(cid:20)Zi,n − (1 − Zi,n)
∆r(1 − Ui,n−1)Si,n−1
Si,n−1
Zn−1(cid:21)
×
This implies that {Ui,n}∞
{Zn}∞
n=1 if and only if
n=1 is a martingale with respect to
Uj,n−1 − Ui,n−1 = 0 ⇔
Xj∈Ni
1
Ni Xj∈Ni
Uj,n−1 = Ui,n−1.
almost surely.
nPn
If the condition in Theorem 4.4 holds, then for any i both
Ui,n and 1
t=1 Zi,t converge almost surely to a limit as n →
∞. However, the condition of Theorem 4.4, barring the trivial
single node scenario, is not verifiable. To resolve this issue,
we instead examine the evolution of the average proportion of
red balls (i.e., the susceptibility) in a regular network.
Theorem 4.5: (Regular Network Susceptibility Martin-
gale): For a regular network G = (V, E) with ∆r,i(n) =
∆b,i(n) = ∆ and Ti = T for all nodes i ∈ V and times n, the
network susceptibility { Un}∞
i=1 Ui,n,
is a martingale with respect to {Zn}∞
n=1, where Un = 1
n=1.
N PN
Proof: We have, similar to Theorem 4.4, that
E[ Un Zn−1]
E[Ui,n Zn−1]
=
=
1
N
1
N
N
N
Xi=1
Xi=1(cid:20)Ui,n−1 +
N
∆Pj∈Ni
(Uj,n−1 − Ui,n−1)
(T + n∆)(Ni + 1)
(cid:21)
= Un−1 +
Xi=1
∆Pj∈Ni
(Uj,n−1 − Ui,n−1)
.
N (T + n∆)(Ni + 1)
n=1 is a martingale with respect to {Zn}∞
Let us examine the second term of the last equality. If this term
is zero, { Un}∞
n=1.
We now define the adjacency matrix [aij ] of our network,
where the (i, j)th entry aij is 1 if (i, j) ∈ E, and 0 otherwise.
Since we assumed that our network was undirected, [aij ] is
symmetric, i.e., aij = aji for all i, j ∈ V . So,
N (T + n∆)(Ni + 1)
j=1 aij (Uj,n−1 − Ui,n−1)
N (T + n∆)(Ni + 1)
N
∆Pj∈Ni
Xi=1
∆PN
Xi=1
=
N
∆
=
N (T + n∆)
N
N
Xi=1
Xj=1
aij (Uj,n−1 − Ui,n−1)
Ni + 1
Now, we examine the sum of the (i, j) and (j, i) components
of the double sum, where (i, j) ∈ E (otherwise both terms are
zero). Recall that (i, i) 6∈ E, ∀i. We have
aij(Uj,n−1 − Ui,n−1)
Ni + 1
+
aji(Ui,n−1 − Uj,n−1)
Nj + 1
=
aij(Uj,n−1 − Ui,n−1)(Nj + 1)
(Ni + 1)(Nj + 1)
aji(Ui,n−1 − Uj,n−1)(Ni + 1)
(Ni + 1)(Nj + 1)
+
(Uj,n−1 − Ui,n−1)
E[Ui,n Zn−1]−Ui,n−1 ≤ 0 ⇒ E[Ui,n −Ui,n−1 Zn−1] ≤ 0.
8
= ∆r(1 − Ui,n−1)(cid:20)Si,n−1 − (1 − Si,n−1)
= 0,
Si,n−1
1 − Si,n−1(cid:21)
where the second to last equality comes from the fact that
E[Zi,nZn−1] = P (Zi,n = 1Zn−1) = Si,n−1 almost surely
by (3), and that Si,n−1 is almost surely constant given Zn−1.
Thus as long as ∆b,i(n) obeys this bound almost surely for
all n ∈ Z≥1, {Ui,n}∞
n=1 is a supermartingale with respect to
{Zn}∞
n=1. Similarly, if ∆b,i(n) is almost surely equal (resp.
less than or equal) to this bound, {Ui,n}∞
n=1 is a martingale
(resp. submartingale) with respect to {Zn}∞
n=1.
Theorem 4.6 tells us what bounds for {∆b,i(n)}∞
n=1 must
be obeyed almost surely to guarantee that {Ui,n}∞
n=1 admits
an asymptotic limit for all i ∈ V in any general network.
this tells us that by choosing ∆b,i(t) = 0
For instance,
almost surely for all i ∈ V and t ∈ Z≥1, {Ui,n}∞
n=1
will be a submartingale and will converge to some limiting
random variable. While this result is interesting for modelling
contagion, it is especially useful in the context of curing.
V. MODEL APPROXIMATIONS
As previously noted, the dynamics of the network contagion
process are complicated, especially when considered on gen-
eral networks. For this reason, in this section we develop two
useful approximations to this process on a general network
that allow us to shed some light on its asymptotic behaviour.
Throughout this section, unless stated otherwise, we consider
general network topologies with ∆r,i(t) = ∆b,i(t) = ∆ for
all t ∈ Z≥1 and i ∈ V . However, to match the 1-step and
(n, 1)-step distributions, we make the simplifying assumption
that the neighbourhood of each node i can be represented as
a complete network, i.e., all of its neighbours are connected
to one another, in order to apply Lemmas 4.1 and 4.3.
A. Approximation: Computational Model
We now introduce our first approximation technique, where
we approximate the contagion process of each node in the
network with a classical Polya urn process.
Model I: (Computational Model): We approximate the
dynamics of any node i's contagion process using a classical
Polya process Polya(ρc = ρi, δc = δi), with
ρi = Pj∈N
Pj∈N
with
′
i
′
i
Rj
Tj
,
Q(n)
ρi,δ
(an) =
and δi = arg min
δ
ρi,δ(cid:17) ,
1
n
i,n Q(n)
D(cid:16)P (n)
+ n − ¯an(cid:17)
δ (cid:17) Γ(cid:16) 1−ρi
δ (cid:17)
δ
,
Γ(cid:16) 1
δ
δ(cid:17) Γ(cid:16) ρi
Γ(cid:16) 1
+ ¯an(cid:17) Γ(cid:16) 1−ρi
+ n(cid:17) Γ(cid:16) ρi
δ
where Γ(·) is the Gamma function, an = (a1, ..., an) ∈
{0, 1}n, and ¯an = a1 + · · · + an.
•
Here ρc is chosen to be the proportion of red balls ρi in the
node's super urn, so that the 1-dimensional distributions of the
classical Polya process and the node process {Zi,n} coincide,
while δi is set by performing a minimization to find the value
that best fits Q(n)
n=1 of node
ρi,δi
i ∈ V . We use a divergence measure, denoted by D(··), to
observe the quality of the fit.
to the distribution of {Zi,n}∞
The explicit derivation of the distribution Q(n)
ρi,δi
can be
found in [17], [21]. This method ensures that the fit of Q(n)
ρi,δi
is as close as possible under the given divergence measure.
Since we are measuring the error in using an approximating
distribution, we use the Kullback-Leibler divergence [22]; we
thus have that
δi = arg min
δ
= arg max
δ
1
n Xan∈{0,1}n
n Xan∈{0,1}n
1
P (n)
i,n (an) log
P (n)
i,n (an)
Q(n)
an)
ρi,δ
i,n (an) log Q(n)
P (n)
ρi,δ
(an)
it
i,n (an) log P (n)
since P (n)
i,n (an) is independent of δ. The ap-
proximating process is stationary and exchangeable, as it is
a classical Polya process. We also know (from Section II)
is non-ergodic with its sample average converging
that
almost surely to the Beta( ρi
) distribution. Calculating
δi
an analytic expression for the minimizing δi is not feasible
in general, and hence should be performed computationally.
However, due to the above minimization, the value of δi is,
by definition, the best way to fit a Polya process to the process
{Zi,n}∞
n=1 for a given n.
, 1−ρ)i
δi
B. Approximation: Analytical Models
An alternative to Model I is to attempt to find approxima-
tions whose parameters can be determined analytically.
Model II(a): (Large-Network Analytical Model): For any
given node i, we approximate the dynamics of its process
{Zi,n}∞
n=1 by using a classical Polya process Polya(ρc =
ρi, δc = δ′
i), with
Rj
Tj
,
and δ′
i =
δi
N + (N − 1)δi
,
ρi = Pj∈N
Pj∈N
′
i
′
i
where δi = N ∆
P
j∈N
′
i
.
Tj
•
Here the parameters of the classical Polya process are
chosen by directly matching its first and (n, 1)-step second-
order statistics with those of {Zi,n}∞
n=1. This method avoids
the computational burden of the previous model by yielding
an analytical expression for the correlation parameter of the
classical Polya process.
We next prove that under some stationarity and symmetry
assumptions, the contagion process running on each node in
the network is statistically identical to the classical Polya
process of Model II(a).
Lemma 5.1: (Exact Representation): Suppose that
(i) P (Zi,1 = 1 Z n−1
(ii) P (Zi,t = 1Z n−1
j,1 = an−1) = ρi, and
j,1 = an−1) = P (Zk,n = 1Z n−1
j,1 =
an−1),
for all n ≥ 1, 2 ≤ t < n, i, j, k ∈ V , an−1 ∈ {0, 1}n−1. Then
for any node i in a complete network, {Zi,n}∞
n=1 is given
exactly by the Polya(ρi, δ′
i) process.
which is the conditional probability P (Zn = 1Z n−1
for a Polya(ρi, δ′
performed for P (Zi,n = 0 Z n−1
1 = an−1)
i) process. A similar calculation can be
i,1 = an−1).
9
Proof: For any node i, we wish to show that for all
the n-dimensional distributions of {Zi,n}∞
n,
n=1 and the
Polya(ρi, δ′
i) process are identical. It is enough to show that
the conditional probability of one event given the whole past
is the same, since any joint probability can be written as a
product of conditional probabilities. Let us define the events
An−1 = {Z n−1
j,1 }j6=i.
Then,
i,1 = an−1} and Bn−1 = {Z n−1
j,1 = bn−1
Pin := P (Zi,n = 1 An−1)
P (Zi,n = 1 An−1, Bn−1)P (Bn−1 An−1)
j,1 ∈{0,1}n−1:j6=i
= Xbn−1
=Xbn−1
=Xbn−1
j,1 :j6=i
j,1 :j6=i
ρi + δi
N Pn−1
1 + (n − 1)δi
P (Bn−1 An−1)
t=1 (at +Pj6=i bj,t)
iPn−1
t=1 (at +Pj6=i bj,t)
1 + (N (n − 2) + 1)δ′
i
i) + δ′
ρi(1 − (N − 1)δ′
P (Bn−1 n−1A)
bj,tP (Bn−1 An−1)
× P (Bn−1 An−1)
i) + δ′
ρi(1 − (N − 1)δ′
=
+
1 + (N (n − 2) + 1)δ′
i
= (cid:16)ρi(1 − (N − 1)δ′
j,1 :j6=i
δ′
i
n−1
j,1 :j6=i
t=1 at
1 + (N (n − 2) + 1)δ′
iPn−1
i Xbn−1
Xt=1Xj6=i Xbn−1
t=1 at(cid:17) · 1
iPn−1
iPn−1
t=1 Pj6=i P (Zj,t = 1 An−1)
iPn−1
1 + (N (n − 2) + 1)δ′
i
1 + (N (n − 2) + 1)δ′
i
ρi(1 − (N − 1)δ′
i) + δ′
i) + δ′
.
1 + (N (n − 2) + 1)δ′
i
δ′
+
Pin =
Then using assumption (i), we have
t=1 at + δ′
i(N − 1)ρi
δ′
+
1 + (N (n − 2) + 1)δ′
i
iPn−1
t=2 Pj6=i P (Zj,t = 1 An−1)
t=1 hat +Pj6=i P (Zj,t = 1 An−1)i
iPn−1
1 + (N (n − 2) + 1)δ′
i
ρi + δ′
=
Now using assumption (ii), we get
Pin =
=
ρi + δ′
ρ + δ′
1 + (N (n − 2) + 1)δ′
i
i(cid:16)Pn−1
i(cid:16)Pn−1
t=2 Pj6=i Pin(cid:17)
t=1 at +Pn−1
t=1 at + (n − 2)(N − 1)Pin(cid:17)
1 + (N (n − 2) + 1)δ′
i
.
Thus, we have that
Pin =
⇒Pin =
ρi + δ′
t=1 at + (n − 2)(N − 1)Pin(cid:17)
i(cid:16)Pn−1
iPn−1
1 + (N (n − 2) + 1)δ′
i
ρi + δ′
t=1 at
1 + (n − 1)δ′
i
,
Unfortunately in a general network setting assumptions (i)
and (ii) above do not hold true. However, this result motivates
the fact that this analytical approximation is reasonable to use
for situations where these assumptions hold within tolerable
margins of error; empirical evidence indicates that this occurs
for large values of N , since as N increases the quality of
the fit improves. This approximation, nevertheless, drastically
reduces the complexity in analyzing the individual contagion
draw processes, as closed-form expressions for the process
parameters are available.
Model II(b): (Small-Network Analytic Model): Given any
node i in the network with a small to moderate number of
nodes, we approximate the dynamics of its contagion process
{Zn}∞
n=1 using a Polya(ρi, δ⋆
i ) process, where
′
i
′
i
ρi = Pj∈N
Pj∈N
δ⋆
i =
Rj
Tj
, and
δi/N
N + (N − 1)δi/N
=
δi
N 2 + (N − 1)δi
,
where δi = N ∆
P
j∈N
′
i
.
Tj
•
, and so we divide each instance of δi in δ⋆
The idea behind this model is that we want to remove the
dependence on the number of nodes N from the parameter
δi = N ∆
i by N .
¯Ti
The idea is that as n grows, it eventually becomes significantly
larger than the relatively small number of nodes N , and so
nNi ≈ n for all i ∈ V . Hence, we may consider that
for a sufficiently large time, we have added n∆ balls to the
super urn. Effectively, this means we are using a correlation
parameter of ∆
. Simulation results confirm
¯Ti
that this approximation captures the limit distribution of the
original process better than Model II(a) when the number of
nodes is small. Figure 3 displays this relationship. A summary
of all models presented in this section, and the scenarios under
which they are most suitable, is provided in Table I.
instead of δ = N ∆
¯Ti
TABLE I
APPROXIMATION USAGE SCENARIOS
Model
I
II(a)
II(b)
Usage Scenario
Exactness valued over analytic simplicity
Larger values of N , i.e., large network
Small to moderate values of N , i.e., small network
, 1−ρi
δ′
i
nPn
We close this section with numerical demonstrations on
the fitness of all models. Figure 3 shows a representative
comparison between the Beta( ρi
) pdf and the simulated
δ′
i
histogram of 1
t=1 Zi,n, where n = 1000, for an arbitrary
node i in the given networks. Recall that the Beta( ρi
),
δi
Beta( ρi
) pdfs are the distributions
δ′
i
of the limit random variables to which the sample average of
the draw processes of Models I, II(a) and II(b) (respectively)
converge almost surely, as n → ∞ (see Section II). We
use complete networks since they satisfy the assumption that
all neighbourhoods are complete, as well as Barabasi-Albert
) and Beta( ρi
δ⋆
i
, 1−ρi
δ⋆
i
, 1−ρi
δ′
i
, 1−ρi
δi
10
15
5
0
PSfrag replacements
PSfrag replacements
Empirical
Model I
Model II(a)
Model II(b)
0.2
0.3
0.4
0.5
0.6
150
25
0.45
Empirical
Model I
Model II(a)
Model II(b)
0.5
0.55
(a) 10-node complete network histogram.
(b) 100-node complete network histogram.
4.5
4
Empirical
Model I
Model II(a)
Model II(b)
PSfrag replacements
Empirical
2
0
0
25
5
0
0.3
0.3
0.6
0.9
(c) 5-node Barabasi-Albert network histogram.
(d) 5-node Barabasi-Albert network [23].
Empirical
Model I
Model II(a)
Model II(b)
0.45
0.5
0.55
0.7
(e) 100-node Barabasi-Albert network histogram.
(f) 100-node Barabasi-Albert network [23].
Fig. 3. Comparison of normalized simulated histograms for the sample average of draws 1
Beta( ρi
) pdfs from Models I, II(a), and II(b), respectively, for an arbitrary node i with n = 1000, averaged over 5, 000 simulated trials. Here the
δ⋆
i
parameters ∆ as well as Ri and Bi, for all i ∈ V , were uniformly randomly assigned for each network, and were consistent throughout all trials. See
http://bit.ly/2tnBix5 for a complete list of all parameters used for each network.
t=1 Zi,t and the Beta( ρi
δi
n Pn
), Beta( ρi
δ′
i
,
), and
,
1−ρi
δ⋆
i
1−ρi
δ′
i
,
1−ρi
δi
networks which have been shown to be a good model for real-
world social networks [23] and do not satisfy this assumption;
however, our results show that the approximations still fit quite
well. As expected, Model I provides the best approximation
in all scenarios, albeit without an analytic expression for its
parameters which can provide insight into the behaviour of
the underlying process. Model II(a) fits quite well when the
number of nodes in the network is large, as seen in Figures 3(b)
and 3(e), but fits poorly for a small number of nodes, which is
evident in Figures 3(a) and 3(c). Model II(b) is the complement
of Model II(a) in the sense that it fits very well for a small
number of nodes but poorly for a large network. Hence if
analytic expressions for parameters are desired, Models II(a)
and II(b) can be used depending on the number of nodes to
provide approximations that are marginally worse than the
computational exactness of Model I.
C. Comparison with SIS model
We now provide a number of empirical results in which
we compare our model, with both finite and infinite memory,
to the traditional discrete time SIS model [24]. In the SIS
model, the parameter δSIS denotes the probability that a node
will recover from infection, and βSIS is the probability that
a node will become infected through contact with a single
infected neighbour. The dynamics are described through the
probability that any node i will be infected at time t, Pi(t),
which evolves according to the equation
Pi(t + 1)
=Pi(t)(1 − δSIS) + (1 − Pi(t))(cid:16)1 − Yj∈Ni
(1 − βSISPj(t))(cid:17).
Note in particular that this model exhibits Markovian be-
haviour, since the evolution of the process depends only on
the probability of infection from the previous time step. We
make the simplifying assumption that δSIS and βSIS remain
the same for all nodes and throughout time, and hence we will
compare it with the network Polya contagion process when ∆r
and ∆b are similarly fixed in time and throughout the network.
The concept of an epidemic threshold for the SIS model
gives a value through which one may determine whether
the epidemic dies, a priori using only the system parame-
ters [24]. The threshold condition is directly related to the
largest-magnitude eigenvalue λmax of the adjacency matrix
of the underlying graph of the network, and states that if
δSIS > βSISλmax then the epidemic will be eliminated after
some time n, i.e., eventually Pi(t) = 0 for all i and all t > n.
Furthermore, it has been shown that this threshold is tight, and
indeed if δSIS < βSISλmax then some non-zero convergence
point exists, called an endemic state, and the epidemic will
never be eliminated [25].
Figure 4 compares the behaviour of the SIS model and the
network Polya contagion process for different selections of
these parameters. The initial probabilities of infection Pi(0)
to coincide with the initial
for the SIS model were set
individual proportions of red balls for the nodes Ri
. Further,
Ti
we relate in Figures 4(a)–4(c) the parameters βSIS and δSIS to
∆r and ∆b, respectively, using ratios of the largest-magnitude
eigenvalue λmax of the adjacency matrix of the graph shown
in Figure 4(d).
Figure 4(a) shows a comparison when the SIS model is
displaying endemic behaviour. We see here that after a very
short time, the SIS model settles and shortly thereafter the
finite memory process settles (albeit to a different value),
while for the infinite memory process the individual rates of
infection and hence the average In continue to increase in
time. Since both the SIS model and the finite memory process
have limited reinforcement, while the infinite memory process
does not, these results are to be expected. Figure 4(b) displays
a comparison where the epidemic threshold is met and the
epidemic dies out for the SIS model. Here we note that In
for both the infinite and finite memory processes decreases
and approaches zero, albeit not as quickly as the SIS model.
Hence we observe that when the curing parameter ∆b is much
larger (in fact, more than five folds larger) than the infection
parameter ∆r the epidemic is eliminated, as we expect, and
this behaviour of the SIS model is captured by the network
Polya contagion process. However, the finite memory process
does not fully approach zero, since the initial conditions Ri
and Bi have a much larger influence relative to the infinite
memory process. Finally, Figure 4(c) shows the case where the
epidemic does not vanish and the parameters in both models
are set to be equal (δSIS = βSIS and ∆b = ∆r). We observe
a similar trend between all models, with the finite and infinite
memory processes exhibiting near-identical behaviour.
Through these observations, we may conclude that both
versions of the network Polya contagion process may apply
to the modelling of epidemics, albeit in different applications.
The finite memory process exhibits behaviour that is more
closely related to the SIS model since they are both limited
reinforcement processes, and hence it may be best suited to
traditional biological diseases. The infinite memory process
obeys similar trends, but
in the endemic state there are
some interesting differences since the effects of the infection
continue to spread throughout the population. On the other
hand, the SIS model quickly settles and does not change
in time. Thus with infinite memory our process is better
suited to modelling opinion dynamics, the spread of ideas,
and advertising schemes.
11
VI. CONCLUSION
We introduced a network epidemics model based on the
classical Polya urn scheme, and we investigated its stochastic
properties and asymptotic behaviour in detail. We showed
that under certain conditions the proportion of red balls in
individual urns and the network susceptibility, which are pro-
cesses used to measure infection, admit limits. Three classical
Polya processes were proposed, one computational and two
analytical, to statistically approximate the contagion process
of each node. Empirical results were presented which show
that the approximations are a good fit for a range of system
parameters. Our process was also compared empirically with
the discrete-time SIS model, showing a similar behaviour,
particularly in the finite memory mode, while providing dif-
ferent degrees of reinforcement in the endemic state, with
the largest reinforcement occurring under the infinite memory
mode. Future directions of research include investigations into
the curing of these processes, and the further study of the
network contagion process with finite memory.
REFERENCES
[1] M. Hayhoe, F. Alajaji, and B. Gharesifard, "A Polya urn-based model
for epidemics on networks," Proc. 2017 American Cont. Conf., 2017.
[2] L. Kim, M. Abramson, K. Drakopoulos, S. Kolitz, and A. Ozdaglar,
"Estimating social metwork structure and propagation dynamics for an
infectious disease," in Proc. Int. Conf. Social Computing, Behavioral-
Cultural Modeling, and Prediction, pp. 85–93, Springer, 2014.
[3] M. Garetto, W. Gong, and D. Towsley, "Modeling malware spreading
dynamics," in Proc. IEEE Int. Conf. Comp. Commun., vol. 3, pp. 1869–
1879, 2003.
[4] E. M. Rogers, Diffusion of Innovations. 5 ed., 2003.
[5] E. Adar and L. A. Adamic, "Tracking information epidemics in
IEEE/WIC/ACM Int. Conf. Web Intelligence,
blogspace," in Proc.
pp. 207–214, 2005.
[6] D. Easley and J. Kleinberg, Networks, Crowds and Markets: Reasoning
about a Highly Connected World. Cambridge Univ. Press, 2010.
[7] P. V. Mieghem, J. Omic, and R. Kooij, "Virus spread in networks,"
IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 1–14, 2009.
[8] F. Eggenberger and G. Polya, " Uber die statistik verketteter vorgange,"
Z. Angew. Math. Mech., vol. 3, no. 4, pp. 279–289, 1923.
[9] G. Polya and F. Eggenberger, "Sur l'interpr´etation de certaines courbes
de fr´equences," Comptes Rendus C. R., vol. 187, pp. 870–872, 1928.
[10] G. Polya, "Sur quelques points de la th´eorie des probabilit´es," Annales
de l'institut Henri Poincar´e, vol. 1, no. 2, pp. 117–161, 1930.
[11] A. Rosenblatt, "Sur le concept de contagion de M. G. Polya dans le
calcul des probabilites," Acad. Nac. de Cien. exactas, Fis. Nat., pp. 186–
204, 1940.
[12] C. F. Martin, L. J. S. Allen, and M. S. Stamp, "An analysis of the
transmission of chlamydia in a closed population," Jour. Diff. Eqns.
Appl., vol. 2, pp. 1–29, 1996.
[13] R. Pemantle, "A survey of random processes with reinforcement,"
Probab. Surveys, vol. 4, no. 0, pp. 1–79, 2007.
[14] A. Banerjee, P. Burlina, and F. Alajaji, "Image segmentation and labeling
using the Polya urn model," IEEE Trans. Image Proc., vol. 8, no. 9,
pp. 1243–1253, 1999.
[15] R. Ash and C. Dol´eans-Dade, Probability and Measure Theory. Aca-
demic Press, 2000.
[16] G. R. Grimmett and D. R. Stirzaker, Probability and Random Processes.
Oxford Univ. Press, 3 ed., 2001.
[17] W. Feller, An Introduction to Probability Theory and its Applications,
vol. 2. New York: Wiley, 2 ed., 1971.
[18] F. Alajaji and T. Fuja, "A communication channel modeled on conta-
gion," IEEE Trans. Inf. Theory, vol. 40, no. 6, pp. 2035–2041, 1994.
[19] R. Pemantle, "A time-dependent version of Polya's urn," Journal of
Theor. Probab., vol. 3, no. 4, pp. 627–637, 1990.
[20] M. Chen and M. Kuba, "On generalized Polya urn models," Journal of
Appl. Probab., vol. 50, no. 4, pp. 1169–1186, 2013.
[21] N. L. Johnson and S. Kotz, Urn Models and Their Application. 1977.
0.475
PSfrag replacements
SIS average
Memory 50 In
Inf. memory In
Average ρ
0.025
1, 000
SIS average
Memory 50 In
Inf. memory In
Average ρ
500
1, 000
(b) δSIS
βSIS
=
∆b
∆r
= 1.01λmax.
(a) δSIS
βSIS
500
∆b
∆r
=
= λmax
10 .
12
1
PSfrag replacements
0.9
0.75
0.475
PSfrag replacements
0.475
0.469
SIS average
Memory 50 In
Inf. memory In
Average ρ
500
1, 000
(c) δSIS
βSIS
=
∆b
∆r
= 1 and λmax > 1.
(d) 100-node Barabasi-Albert network [23].
Fig. 4. Comparison between discrete time SIS model average infection rate 1
i=1 Pi(n) and the network Polya contagion process average infection rate
In. Simulation results were averaged over 5, 000 trials, and the initial parameters Ri and Bi for all nodes were randomly assigned but consistent throughout
all trials for a given case. Here λmax ≈ 5.05, βSIS = 0.15 and ∆r = 2 for all cases, while δSIS and ∆b were set according to the ratios given above.
N PN
[22] T. M. Cover and J. A. Thomas, Elements of Information Theory. 2006.
[23] R. Albert and A. L. Barab´asi, "Statistical mechanics of complex net-
works," Reviews of Modern Physics, vol. 74, no. 1, pp. 47–97, 2002.
[24] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic
spreading in real networks: an eigenvalue viewpoint," in Proc. 22nd
Intl. Symp. Reliable Dist Sys., pp. 25–34, 2003.
[25] H. J. Ahn and B. Hassibi, "Global dynamics of epidemic spread over
complex networks," in 2013 Conf. Dec. & Cont., pp. 4579–4585, 2013.
Fady Alajaji
(S'90 - M'94 - SM'00) received the
B.E. degree with distinction from the American Uni-
versity of Beirut, Lebanon, and the M.Sc. and Ph.D.
degrees from the University of Maryland, College
Park, all in electrical engineering,
in 1988, 1990
and 1994, respectively. He then held a postdoctoral
appointment
in 1994 at the Institute for Systems
Research, University of Maryland.
In 1995, he joined the Department of Mathemat-
ics and Statistics at Queen's University, Kingston,
Ontario, where he is currently a Professor of Math-
ematics and Engineering. Since 1997, he has also held a cross-appointment
with the Department of Electrical and Computer Engineering at the same
university. In 2013-2014, he served as acting head of the Department of
Mathematics and Statistics, and from 2003 to 2008, he served as chair of
the Queen's Mathematics and Engineering program. His research interests
include information theory, joint source-channel coding, error control coding,
data compression and digital communications.
Dr. Alajaji served as Area Editor for Source-Channel Coding and Signal
Processing from 2008 to 2015 and as Editor for Source and Source/Channel
Coding from 2003 to 2012 for the IEEE Transactions on Communications.
He served as organizer and Technical Program Committee member for
several international conferences and workshops. He received the Premier's
Research Excellence Award from the Province of Ontario in recognition for
his research in "the theory and practice of joint source-channel coding in
telecommunication systems."
Mikhail Hayhoe received the B.Sc. degree in Math-
ematics and Engineering in 2015 and the M.A.Sc.
degree in Applied Mathematics in 2017, both from
Queens University, Kingston, ON, Canada.
He is currently a Ph.D. student with the De-
partment of Electrical and Systems Engineering at
the University of Pennsylvania, Philadelphia, PA,
USA. He was a finalist for the Student Best Paper
Award at ACC 2017. His research interests include
systems and control, optimization, social networks,
information theory, big data, and machine learning.
Bahman Gharesifard (M'13) received the B.Sc.
degree in Mechanical Engineering, in 2002, and the
M.Sc. degree in Control and Dynamics, in 2005,
from Shiraz University, Iran. He received the Ph.D.
degree in Mathematics, in 2009, from Queen's Uni-
versity, Canada.
He held postdoctoral positions with the Depart-
ment of Mechanical and Aerospace Engineering at
University of California, San Diego 2009-2012 and
with the Coordinated Science Laboratory at the Uni-
versity of Illinois at Urbana-Champaign from 2012-
2013. He held a visiting faculty position at the Institute for Systems Theory
and Automatic Control at the University of Stuttgart in summer of 2016. He
is currently an Assistant Professor with the Department of Mathematics and
Statistics at Queen's University. His research interests include systems and
controls, distributed control and optimization, social and economic networks,
game theory, geometric control and mechanics, and Riemannian geometry.
|
1804.09070 | 2 | 1804 | 2018-10-17T21:34:47 | International Research Collaboration: Novelty, Conventionality, and Atypicality in Knowledge Recombination | [
"cs.SI"
] | Research articles produced through international collaboration are more highly cited than other work, but are they also more novel? Using measures developed by Uzzi et al. (2013), and replicated by Boyack and Klavans (2014), this article tests for novelty and conventionality in international research collaboration. Scholars have found that coauthored articles are more novel and have suggested that diverse groups have a greater chance of producing creative work. As such, we expected to find that international collaboration tends to produce more novel research. Using data from Web of Science and Scopus in 2005, we failed to show that international collaboration tends to produce more novel articles. In fact, international collaboration appears to produce less novel and more conventional knowledge combinations. Transaction costs and communication barriers to international collaboration may suppress novelty. Higher citations to international work may be explained by an audience effect, where more authors from more countries results in greater access to a larger citing community. The findings are consistent with explanations of growth in international collaboration that posit a social dynamic of preferential attachment based upon reputation. | cs.SI | cs | International Research Collaboration:
Novelty, Conventionality, and Atypicality in Knowledge Recombination
Authors: Caroline S. Wagner1, Travis A. Whetsell2*, Satyam Mukherjee3
Abstract: Research articles produced through international collaboration are more highly cited
than other work, but are they also more novel? Using measures developed by Uzzi et al. (2013),
and replicated by Boyack and Klavans (2014), this article tests for novelty and conventionality in
international research collaboration. Scholars have found that coauthored articles are more novel
and have suggested that diverse groups have a greater chance of producing creative work. As
such, we expected to find that international collaboration tends to produce more novel research.
Using data from Web of Science and Scopus in 2005, we failed to show that international
collaboration tends to produce more novel articles. In fact, international collaboration appears to
produce less novel and more conventional knowledge combinations. Transaction costs and
communication barriers to international collaboration may suppress novelty. Higher citations to
international work may be explained by an audience effect, where more authors from more
countries results in greater access to a larger citing community. The findings are consistent with
explanations of growth in international collaboration that posit a social dynamic of preferential
attachment based upon reputation.
Keywords
international collaboration; novelty; creativity; bibliometrics; public policy
1 John Glenn College of Public Affairs, The Ohio State University, Columbus, OH USA 43210
[email protected]
2 Department of Public Policy & Administration, Steven J. Green School of International and
Public Affairs, Florida International University, Miami, FL, USA, 33155
[email protected] *Corresponding author
3 Department of Operations Management, Quantitative Methods and Information Systems, Indian
Institute of Management, Udaipur, India
[email protected]
Preprint 10/18
1 - Introduction
International collaboration in scholarly research, resulting in published articles, has risen at a
spectacular rate for three decades. The phenomenon has attracted a good deal of attention,
focusing inductively on measurement rather than providing theoretical explanations. Literature
shows that internationally coauthored articles tend to be more highly cited than national
coauthorships or sole authored work (Glänzel & Schubert, 2001; Glänzel and deLange, 2002);
that the more elite the scholar, the more likely it is that they are working at the international level
(Jones et al., 2008; Parker et al., 2010); and that it tends to be more interdisciplinary (van Raan,
2003), suggesting new combinations. We do not know if international research is more novel
than domestic or sole-authored research. This article explores the gap in the literature by
applying measures of novelty and conventionality to international collaborative publications.
Creativity and novelty are universally valued in scholarship, but this value is difficult to measure.
The team of Brian Uzzi, Satyam Mukherjee, Mark Stringer, and Ben Jones, hypothesized that
truly novel advances are accompanied by strength in conventional know-how, joined to a novel
idea, often resulting from unique or atypical combinations of prior knowledge (Uzzi et al., 2013).
Drawing upon the tradition where the reference to preceding work serves as an elementary
building block of the scholarly attribution and reward system, they used this artifact as a proxy
for novelty. Using this model of novelty and conventionality, they tested whether referencing
behavior with deep conventionality combined with novelty is also more highly cited than just
conventional or just novel work. The analysis of more than 17 million articles from the Web of
Science (WoS) database supported the hypothesis.
We follow this premise about the value of examining combinations of novelty and
conventionality at the level of the full database. Further, we add to the original Uzzi et al. (2013)
WoS data, and include data from a replication study using Scopus, to examine the validity of the
approach. We examine the relationship between atypical combinations of conventionality and
novelty and internationally coauthored work with the expectation that international collaboration
would also be more likely to produce atypical combinations. This article presents the results of
this test.
Preprint 10/18
The article is organized as follows: First, we review the literature on international collaboration,
atypicality, and creativity. Next, we present the data, variables, and methods for this study. We
then present the results of our analysis by examining international collaboration in light of the
conventionality/novelty data. We further explore the data by testing for differences between
natural science and engineering, social sciences, and the arts and humanities, as well as at the
level of six disciplines. Finally, we discuss the findings and their implications for future research
and for public policy.
2 -- Literature Review
2.1 Growth of International Collaboration in Science
International collaboration is defined here as occurring when researchers from two or more
nations list their names and addresses as authors on a scholarly article. We do not know if the
coauthors operated as teams, collaborations, or inter-institutional cooperators (Katz & Martin,
1997). However, we dub these artifacts to be 'collaborations,' assuming that they reflect mutual
intellectual and social influence. International collaboration has grown more than 10-fold since
1991 for the most advanced countries, and 20-fold for the BRICs (Brazil, Russia, India, and
China) (Adams, 2013). Many more nations participate in these publication activities than was the
case two decades ago (Bornmann et al., 2015).
In Web of Science (WoS) the percentage of articles, notes, and letters that are internationally
coauthored has grown from 10% in 1990 to 25% in 2011(Wagner et al. 2015). The number of
authors per article has also grown. Wuchty et al. (2007) analyzed what they called "team size,"
showing growth in numbers of coauthors across all fields of scholarship (national and
international) in the Web of Science from over a 45-year period. Gazni et al. (2012) supported
Glänzel and de Lange (2002) showing growth in the number of coauthorships per article at the
international level. Using SCImago Institutions Rankings, Benavent-Perez et al. (2012) show
decreases in sole-authored publications. Figure 1 shows the changes by selected regions and
countries, where the United States, the European Union, and Japan have produced steadily
increasing international research, while China, Taiwan, and South Korea have lagged behind.
Preprint 10/18
Figure 1 -- Percent of Research Articles with International Coauthorships by Major Scientific
Contributors, 1989-2009, Source: National Science Board, 2012
International works are more likely to be highly cited (Smart & Bayer, 1986; Glänzel and
Schubert, 2001; Persson et al., 2004; He, 2009; Ganzi et al., 2012). Narin et al. (1991) showed
that internationally coauthored articles were cited two times the rate of ones from a single
country. Wagner et al. (2017) examined international collaborations in six scientific disciples
showing that a rise in the number of countries-per-article was also linked to higher citations. The
number of countries per article is also shown to be significant for increased citations (Didegah &
Thelwall, 2013; Wagner et al., 2017). Glänzel (2001) showed that international publications have
higher-than-expected citation rates in all scientific fields. Glänzel and de Lange (2002) showed
growth in the number of authors per article at the international level, as well as growth in the
average number of organizations and nations per co-publication. Internationally collaborative
research seems to be attracting greater attention than domestically produced research (Lariviere
et al., 2015).
Lancho-Barrantes et al. (2013) and Archambault et al. (2016) support Presser (1980) in finding
that international collaboration is associated with greater scientific quality. Lariviere et al. (2015)
showed that multiple-countries per article are more likely to have atypical combinations of
Preprint 10/18
referenced work than single or pair-authored articles. Others have pointed to improved
performance of international collaborations (Fleming, 2007). More heterogeneous teams or
collaborations, which we assume is the case with international projects, have greater opportunity
to leverage the expertise of members and to bring a wider range of information to the knowledge
creation process (Bercovitz & Feldman, 2011; Cohen & Levinthal, 1990).
2.2 - Atypical combinations reflecting novel contributions
Originality is a core goal of scholarship, but scholars must show mastery of a field when
introducing new findings. A fine balance must be struck between demonstrating depth and
mastery of a discipline and bringing original ideas. Depth is required to demonstrate bona fides,
signaling to in-groups, using common language, accepted methods, and citations to the work of
others. The "new" contributions, ones that bring original ideas, often involve incorporating ideas
from different disciplines, research traditions, or frameworks4. Novel claims are validated based
upon strong evidence, but in cases where new ideas are incorporated across disciplines, the fresh
concepts can take longer to assimilate because they do not fit the conventional narrative,
language, or culture (Wang et al., 2016; Cetina, 2009). This can make it risky for researchers to
introduce truly novel ideas (Stephan et al., 2017; Simonton, 2004), especially without tying them
to precedents.
In discussing the intellectual and social organization of the sciences, Whitley (1984) suggested
that disciplines are "systems of jointly controlled novelty production in which researchers have
to make new contributions to knowledge in order to acquire reputations from particular groups of
colleagues…" (p. 85). Reputation is often the result of producing scholarly work that offers a
novel discovery, new method, advanced theorem, or insight -- something that solves a puzzle or
gives a new perspective on one. Stephan (2012) follows Merton (1973) defining reputation as
"being built by being the first to communicate a finding, thereby establishing priority of
discovery…." (p. 5).
The scholarly article is the venue to communicate findings. Price (1965) and Merton (1973)
regarded the publication of a scientific article as acknowledgment of its original contribution.
4 Combinatorics is distinct from discovery, where a new object, such as an exoplanet or a bacteria, may be found
but no new combinations of knowledge are indicated in the references of publications announcing it.
Preprint 10/18
Articles contain lists of references, citing prior work; by doing so, scholars reconstruct the
intellectual antecedents and sources of their knowledge claims (Fujigaki, 1998). In theory, an
article that has passed peer review should be adding something new to a field. However, more
than 50 percent of published articles are not cited at all, suggesting that some material does not
capture attention (Hamilton, 1990). Whether the contribution is acknowledged is often a social
outcome with acquaintances, colleagues, and co-nationals citing one another for social, as well as
research-related reasons (Bornmann & Daniel, 2008; Garfield & Merton, 1979). Highly cited
work contributes to setting the agenda for further research. This part of the process may require a
communication strategy, combined with reputation, as much as it does the introduction of new
ideas. Whether a finding is truly novel--in the sense of highly creative, risky, or revolutionary--
often cannot be determined at the time of publication; instead, it may require some length of time
for the scholarly community to recognize the validity of a new finding, or time for promoters of
the ideas to disseminate them. Examining citations over time can provide some insight into the
variety of impacts among scholarly publications (van Raan, 2014; Bornmann & Daniel, 2008).
The need to publish and gain attention to one's work means that there are few high-risk articles.
The ones who take risks may be well positioned to gain attention, but "the additional reward
does not compensate for the risk of failing to publish…." (Foster et al., 2015, p. 875). Similarly,
Estes & Ward (2002) said "creative ideas are often the result of attempting to determine how two
otherwise separate concepts may be understood together…" (p. 149), which can represent new
ideas, but which is a risky strategy, especially if the separate concepts are from different
disciplines. Interdisciplinary articles may fail peer review: "…creative thought calls for the
combination and reorganization of extant categories…." (Mobley et al., 1992, p. 128). However,
they also point out the higher risk of failure (see also Stephan et al., (2017)).
There are no specific signals for identifying the originality, novelty, or creativity likely to
produce a highly cited article. Rather, decisions about the potential contribution of new research
are likely to be made as judgments by editors and reviewers during the peer-review process. If an
article does not introduce a new idea in a way that satisfies the reviewers or journal editors, the
work may be criticized as "too conventional", i.e. not adding something new to the literature. On
the other hand, if an article is too novel, radical, or revolutionary it may not pass muster with
reviewers and editors.
Preprint 10/18
One way to measure this combinatorial dynamic is after publication by searching lists of
references for unexpected combinations. The resulting atypical referencing behavior serves as a
proxy measure for recombination of knowledge. Börner et al. (2012) visually maps fields of
science, showing the distance between them and just how unlikely it might be to bridge gaps
between, for example, fields such as brain research and ecology. These combinations can be
indicated in diverse reference pairs (See Schilling & Green, 2011 for an excellent literature
review). To explore this, Uzzi et al. (2013) hypothesized that the highest impact articles are
likely to reference novel combinations of existing knowledge, which remain embedded in and
supported by deeply conventional knowledge. In other words, novel findings will emerge from
depth of understanding of supporting knowledge, joined to the new idea. Further, variety and
cross-cultural diversity ("cognitive distance") could be contributing to greater creativity and
therefore drawing attention to this work (Lee et al., 2015; Alshebli et al., 2018). The reach of an
international network might extend the "search space" of a group and thereby result in access to
more new ideas (Schilling and Green 2015). Larivière et al. (2015) examined 9.2 million
interdisciplinary research articles published between 2000 and 2012 and showed that the
majority (69.9%) of referenced interdisciplinary pairs resulted in "win-win" relationships, i.e.,
articles that cite these diverse articles have higher citation impact. Articles with "atypical
combinations" -- statistically rare journal-journal combinations--attracted the highest relative
number of citations.
We expect those participating in international collaboration to have enhanced access to a
diversity of ideas. The cultural differences brought by researchers from different countries may
enrich idea generation. Schilling & Green (2015) note: "The work on recombinant search lends
support to this position by noting that unfamiliar or atypical combinations of knowledge yield
novel outcomes with greater variance in performance…" (p. 1320). They further note that
"…[k]nowledge creation occurs when new information is integrated within the network, or when
the existing information within the network is recombined in new ways…" (p. 1323), conditions
that are more likely to be found in international groups. These insights lead to the question of
how researchers might measure creativity and novelty to produce general insights relevant to
science policy. This finding motivated our research.
2.3 - Creativity and novelty in scholarly publications
Preprint 10/18
There are many different definitions of creativity and novelty in the literature, and the literature
is quite extensive. It is beyond this paper to survey the entire field. This paper focuses on those
efforts to measure the phenomenon. Directly relevant literature suggests that creativity and
novelty are likely to emerge from diverse teams of people (Falk-Krzesinski et al., 2010; Fiore,
2008; Stokols et al., 2008; Wuchty et al., 2007; Uzzi & Spiro, 2005). Mâsse et al. (2008) suggest
that groups of researchers have a greater chance of creating novel findings because they are
"integrating the concepts and methods drawn from multiples disciplines and analytic levels…"
(p.S152). Estes & Ward (2002) discuss the literature around creative functioning of groups,
noting that "a common thread connecting these views is that creative ideas are often the result of
attempting to determine how two otherwise separate concepts may be understood together…."
(p. 149). Schilling & Green (2011), citing Simonton (1995, 1999), note that "…research suggests
that ideas are more likely to be high impact when they are the result of a successful connection
forged between seemingly disparate bodies of knowledge…" (p. 1321). Guimera et al. (2005)
suggest "creativity is spurred when proven innovations in one domain are introduced into a new
domain, solving old problems and inspiring fresh thinking…" (p.697).
Scientific achievements are often described as a search in space of combinatorial possibilities,
leading to fresh insights and technological breakthroughs. Prior works on technology, history,
anthropology, and archaeology have addressed the key role of "combinations" in linking
innovation and scientific and technological impact. Azoulay et al. (2011) note that most efforts to
model the creative process consider it as cumulative, interactive recombinations of existing bits
of knowledge, combined in novel ways. In their review seeking novelty in patent data, Youn et
al. (2015) cited earlier work that "…posits the combination of new and existing technological
capabilities as the principal source of technological novelty and invention…" (p.1).
Foster et al. (2015) noted that "[a]n innovative publication is more likely to achieve high impact
than a conservative one…" (p. 875) but these actions fail more frequently than they succeed.
Stephan et al. (2017) found that high risk articles are more likely to be in the top 1% highly cited
articles, although recognition can be delayed (Wang et al, 2017). Wang et al. (2017) found that
highly novel articles are more likely to be found in journals with lower Impact Factors --
suggesting that atypical combinations may have a difficult time finding acceptance in the canon
of literature. Schilling & Green (2011) note that atypical variance can lower average
Preprint 10/18
performance of outcomes, but they also can contribute to exceptionally high-performing
outcomes.
The Uzzi et al. (2013) team showed that works with a combination of high novelty and high
conventionality were twice as likely as the average article to be 'hit' articles. For their analysis,
the team used Web of Science's 50-year data set of articles to analyze journal-journal references.
They sought to determine whether pairs of cited references are conventional (more than expected
by chance) or novel (less than expected by chance). Using cited references from nearly 18
million articles, they calculated actual and expected counts for 302 million references to 15,613
journals. For each referenced journal pair, these were converted into z-scores. Ten Monte-Carlo
simulations were run that reassigned edges in random ways, while preserving temporal and
distributional characteristics of the original citation network.
Boyack and Klavans (2014) conducted a complementary analysis to replicate the Uzzi et al.
(2013) findings, this time using Scopus 10-year data set of articles and conference papers. They
used a K50 statistics method for journal pairs rather than using the z-scores and Monte Carlo
simulations. They claim that K50 has the same general formulation as the ones used by Uzzi et
al. (2013). The difference is that the expected and normalization values for K50 are calculated
using row and column sums from the square co-citation count matrix rather than using a Monte
Carlo technique. Boyack and Klavans (2014) were able to reproduce the Uzzi et al. (2013)
findings for z-score distributions and citations to a high degree, despite using a different
database. However, they found a disciplinary effect (discussed below).
Using a similar approach, Stephan, Veugelers & Wang (2017) and Wang, Veugelers & Stephan
(2017) also tested published articles for atypicality. They drew from WoS for the year 2001 and
used a "commonality score" which measured the expected number of co-citations. This is
measured as a joint-probability of co-occurrence of two journals in a reference list, times the
number of all journal pairs. The difference between Stephan et al. (2017) and Uzzi et al. (2013)
is in the novelty score: Uzzi et al. (2013) measured the z-scores using a null model. Stephan et al.
(2017) used a ratio of observed over expected, where 'expected' is analytically estimated based
upon data in the analysis. Further, Stephan et al. (2017) examined a second-order co-citation
distance based on previous years' co-citations, or, journal pairs that were not co-cited before
Preprint 10/18
(similarity equals to 0 based on first-order co-citations), and then they examine similarity based
on co-cited journals (that is, measuring their similarity using second order co-citations). They
found that more novel articles were more likely to be either a big hit or ignored, supporting
Foster et al. (2015) and partially supporting Uzzi et al. (2013).
These articles have explored the effects of novelty and conventionality on citation impact,
providing evidence that atypical combinations of novelty and conventionality have the highest
probability of producing a 'hit' article. In this article, we are more concerned with identifying
whether international collaboration tends to produce, novel, conventional, or atypical referencing
behavior. This article is more focused on the antecedents of novelty, conventionality, and
atypicality, than the citation impact of international collaboration. The following section
describes the data, variables, and methods used in this article.
3 - Data, Variables, and Methods
Our primary data set is from the Uzzi et al. (2013) study, which contains roughly 850,000
articles from Web of Science in the year 2005 and includes metadata on authors, affiliations,
fields, references, and citations. For robustness checks, we added four years of WoS data (2001-
2004), which together with 2005 data comprised roughly four million observations. We also used
2005 Scopus data, employed by Boyack and Klavans (2014), which included roughly one
million observations (see Section 4.1 and Appendix for robustness checks).
We applied the Uzzi et al. (2013) method of identifying conventionality and novelty to test
whether internationally collaborative articles fall into the 'atypical' (high-novel/high-
conventional) quadrant. The computation analyzed pairwise combinations of references in the
bibliography of each article from the Web of Science for the 5 years studied. The counts
measured the frequency of each referenced journal pair across all articles in the database (not
disciplinary specific) and compared the observed frequency to those expected by chance. Z-
scores for each journal pair were derived by comparing the observed frequency with the
frequency distribution created with the randomized citation network. This procedure resulted in
two summary statistics: the 10th percentile z-score of a article, and the median z-score of that
Preprint 10/18
article. While the former quantifies the novelty of an article, the latter tells us about the central
tendency of the journal combinations of the article (Mukherjee et al., 2015).
In Figure 2 we illustrate the probability distribution of 10th percentile z-scores of all articles
published in 2005, as indexed in WoS database. Using the approach from Uzzi et al. (2013), a
journal pair with 10th percentile z-score less than 0 signifies a "novel combination". Note, for the
analysis where 10th percentile z-score is used as a continuous measure, the variable was reverse
coded for consistent interpretation as "novelty".
Figure 2. Probability Distribution of 10th percentile z-score, 2005. The figure shows the
distribution of z-scores where values below zero are considered novel, else conventional.
Figure 3 shows the probability distribution of median z-score of all articles published in 2005.
Since a z-score value more than 0 signifies an observed journal pair frequency appears more than
what is expected by chance, we call these "conventional combinations" (Mukherjee et al., 2015).
Preprint 10/18
Figure 3. Probability distribution of median z-score, 2005. The Figure shows values below zero
are considered more novel. For the analysis, we consider values above the grand median are
highly conventional.
In keeping with the procedure specified in Uzzi et al. (2013), these continuous variables are
binarized and then combined into a nominal variable. For novelty, 10th percentile z-score values
below zero are coded as 1, representing high novelty, or HN; values above or equal to zero are
coded as 0, representing low novelty, or LN. For conventionality, median z-score value above or
equal to the overall median is coded as 1 for high conventionality, or HC; and below the overall
median is coded as a 0, for low conventionality, or LC. We combine two binary variables into a
nominal variable, illustrated in Figure 4, where Category 1 is high novel and high conventional,
or HN/HC; Category 2 is high novel and low conventional, or HN/LC; Category 3 is low novel
and high conventional, or LN/HC; and Category 4 is low novel and low conventional, or LN/LC.
Figure 4 also shows the frequency of articles that belong to each category. Note that the
categories in Figure 4 are employed in the multinomial logistic regression models in Tables 4
and A.6.
Preprint 10/18
Figure 4. Nominal variable categorizing articles based on a combination of novel and
conventional reference combinations. The numbers in the parentheses provide the percentage of
papers in each category.
Finally, we included control variables for 1) number of authors per article (Authors), 2) number
of references per article (References), and 3) a subject category variable including 238 WoS
categories (Field). For robustness checks we also made use of log transformations of countries
and authors, as well as variables for number of continents (Continents) and a variable capturing
language heterogeneity (Languages) (see Appendix).
We use three types of regression analyses. First, for the continuous measures of novelty and
conventionality we use OLS regression models. Second, we used logistic regression models to
test the binary novelty and conventionality measures separately, using the same controls. Third,
we use multinomial logistic regression, where the dependent variable has four categories, as
described in Figure 4. All models include controls for number of authors, number of references,
and field fixed effects. Including the field fixed effect is an important modeling decision, since
novelty and conventionality are likely to vary significantly across scientific disciplines.
4 - Results
Table 1 shows the descriptive statistics and bivariate correlations for all variables used in the
subsequent analyses. All correlations are significant at a p-value below 0.0001, except for the
Preprint 10/18
correlation between Novelty and number of authors (Authors), which has a p-value of 0.1087.
The correlations show a negative relationship between number of countries (Countries) and
Novelty and a positive relationship with Conventionality. The same pattern is observed with the
binary versions of these variables (Novelty Bin) and (Conventionality Bin). These correlations
suggest the need for further multivariate analysis.
Table 1 -- Descriptive Statistics and Correlations, 2005
Variable
1- Novelty
2- Novelty Bin
-56.9
840468
840468
0.35
840468 301.6
3- Conventionality
4- Conventionality Bin 840468
841546
847512
847512
5- Countries
6- Authors
0.5
1.3
4.4
22.2
N Mean Std Dev
3
4
5
6
2
1
1
1
0.179
-0.600
-0.213
-0.026
0.002
0.105
274.8
0.5
664.8
0.5
0.7
9.0
16.2
1
1
-0.231
-0.440 0.389
-0.014 0.075 0.048
0.028 0.013 0.012 0.390
0.113 0.007 0.080 0.076 0.054
1
1
7- References
Table 1 Notes: All Correlations are significant = p-value<0.0001, except Authors-Novelty;
which is non-significant; Data source, WoS.
To illustrate the negative relationship between number of countries and novelty we show the
mean tenth percentile z-score by number of countries in Figure 5. The figure shows that the
average novelty score decreases slightly as the number of countries grows. This is consistent
with the negative correlations observed in Table 2.
Preprint 10/18
Figure 5. Mean Tenth Percentile Z-Score by Number of Countries, 2005. The z-score has been
reverse-coded to be consistent with the analysis as a score for "novelty", showing a decrease in
novelty as the number of countries increases.
To illustrate the positive relationship between number of countries and conventionality, Figure 6
shows that the mean of the median z-score increases by number of countries.
Preprint 10/18
Figure 6. Median z-score by Country Count, 2005. The figure shows an increase in the average
conventionality score as the number of countries increases.
Table 2 shows the OLS regression analysis where the dependent variables are novelty and
conventionality respectively in the first and second models, measured as continuous z-scores.
Each model includes an intercept, Countries, Authors, References, and Field fixed effect.
Against expectation, an increase in Countries is negatively associated with Novelty, and
positively associated with Conventionality. The opposite is observed for Authors, which are
positively associated with Novelty and negatively associated with Conventionality.
Table 2 -- OLS Regression Models, 2005
139
Novelty Conventionality
-61.583
(3.89)
-2.47
(0.475)
0.317
(0.035)
1.614
(0.02)
Fixed
835698
0.086
(8.337)
17.77
(1.018)
-1.613
(0.074)
0.173
(0.043)
Fixed
835698
0.288
Intercept
Countries
Authors
References
Field
N
R2
Table 2 Notes: All estimates significant, p-value<.0001; standard errors in parentheses; Data
source WoS.
Table 3 shows the logistic regression results, where the dependent variables are binary. The
results are similar to the regression models in Table 2. Against expectation, Countries is
Preprint 10/18
negatively associated with Novelty and positively associated with Conventionality. The opposite
is true for Authors, which is positively associated with Novelty and negatively associated with
Conventionality. All estimates are significant, p<.0001, so asterisks are not shown for p-values.
Table 3 -- Logistic Regression Models, 2005
Intercept
Countries
Authors
References
Field
N
AIC
Wald
-1.444
(0.036)
-0.055
(0.004)
0.003
-0.647
(0.03)
0.063
(0.004)
-0.001
(0.0003)
Novelty Bin Conventionality Bin
(0.0002)
Fixed
835698
0.012
(0.0002)
Fixed
835698
(0.0003)
0.008
1017311.7
53534.34
1084349.5
60068.87
Table 3 Notes: All estimates significant, p<.0001; except Authors in model 1, p=0.0063; Data
source, WoS.
Figure 7 illustrates the number of Countries by multinomial category with highest number of
articles belonging to Category 3 (LN/HC).
Preprint 10/18
Figure 7. Number of papers by number of countries. For each of the four categories
demonstrated in Figure 4, we plot the number of papers published in 2005 as a function of
number of countries (country count).
Table 4 shows the results of four multinomial logistic regression models: 1) "All Fields"; 2)
"Sciences"; 3) "Social Sciences"; and 4) "Arts and Humanities". Category 4 (LN/LC) is the
reference category for all models. For brevity, we do not show the intercept estimates in the
models. Against expectation, in the All Fields model (238 fields), Countries is most strongly
associated with Category 3 (LN/HC), and Authors is most strongly associated with Category 2
(HN/LC). The Sciences model (165 fields) shows a similar pattern to the All Fields model. The
Social Sciences model (42 fields) is different from the Sciences and All Fields models -- the sign
on the coefficient for Countries is positive for Category 1 (HN/HC). However, the p-value is
.0627, thus the estimate is not significant. The Arts and Humanities model shows a similar
pattern, with a positive sign on Category 2 (HN/LC) and 3 (LN/HC) for Countries. However, the
Arts and Humanities model also shows a stronger estimate for Countries' association with
Category 3 (HN/LC). The Arts and Humanities model does not include the field fixed effect
because the model could not converge, and the results could vary depending on the specific sub-
field. Also, the Arts and Humanities tend to not have reference lists on articles, which make the
novelty/conventionality analysis impossible for many articles.
Preprint 10/18
Table 4 -- Multinomial Logistic Regression Models, 2005
All Fields Sciences Social Sciences
Arts &
Humanities
Countries
1 - (HN, HC)
2 - (HN, LC)
-0.012
(0.0083)
-0.053***
Authors
2 - (HN, LC)
3 - (LN, HC)
(0.006)
0.025***
(0.005)
1 - (HN, HC) 0.029***
(0.0013)
0.031***
(0.0013)
0.028***
(0.0013)
References 1 - (HN, HC) 0.036***
(0.0004)
0.029***
(0.0003)
0.03***
(0.0003)
3 - (LN, HC)
2 - (HN, LC)
3 - (LN, HC)
-0.016
(0.0084)
-0.057***
(0.0061)
0.021***
(0.0056)
0.03***
(0.0013)
0.032***
(0.0013)
0.029***
(0.0013)
0.037***
(0.0004)
0.029***
(0.0003)
0.03***
(0.0003)
Field
N
AIC
Wald
Fixed
835698
Fixed
788691
1824255
1914595.1
124820.25 107647.96
0.164
(0.088)
-0.001
(0.039)
0.123***
(0.028)
-0.035
(0.031)
0.072***
(0.01)
-0.037***
(0.0086)
0.009**
(0.0033)
0.018***
(0.0013)
0.023***
(0.0009)
Fixed
39880
76992.56
5434.09
0.203
(0.499)
0.355**
(0.131)
0.535***
(0.113)
0.198
(0.133)
0.262***
(0.037)
-0.027
(0.037)
0.03
(0.015)
0.035***
(0.0042)
0.028***
(0.0035)
n/a
6069
11506.7
261.42
Table 4 Notes: p<.05*, p<.01**, p<.001***; standard errors in parentheses; Category 4 is
reference category; Data source, WoS.
Preprint 10/18
4.1 Disciplinary Affects
We also tested whether these results were consistent within specific disciplines, which have been
shown to range in terms of citation patterns (Harzing 2010; Ioannidis et al. 2016). Uzzi et al.
(2013) also examined the relationship between novelty, conventionality, and disciplines and
found that the relationships generally held true, but that differences can be seen when controlling
for disciplines. Boyack and Klavans (2014) examined disciplinary effects by taking the top 5%
of highly cited articles by discipline, using the article-based discipline-level structure. Their
findings suggested that highly cited disciplines have an affect on the relationship between
novelty and conventionality. When disciplinary weights are considered, the relationship between
novelty/conventionality and citation strength is not as prominent. Although their results
confirmed the approximate relationship between categories of novelty and conventionality on
citation impact, Boyack and Klavans found that weighting for disciplines influenced the
outcome.
We chose fields to reflect a range of referencing behavior, from astrophysics, which has high
citing activity, to mathematics, which has low citing activity. We replicated the analysis for six
scientific specialties that were analyzed in previous research (Wagner, Whetsell, & Leydesdorff
2017) using WoS data. At this disciplinary level, the results were either non-significant or they
supported the main results in Table 4. We expected to find that high-citation fields also show a
stronger relationship with Category 1. However, in all six fields, international collaboration was
either positively associated with conventionality or negatively associated with novelty, or non-
significant. For astrophysics and astronomy, international collaboration was not significant for
Category 3 (LN/HC) but there was a significant negative association with Category 2 (HN/LC),
suggesting international collaboration tends not to produce novel work. The same patterns held
for geoscience/multidisciplinary. For virology, we observed that international collaboration was
not significantly associated with any category. For polymers, we found a significant negative
association with Category 1 (HN/HC). For agriculture and soil science, we found a significant
positive association with Category 3 (LN/HC). Finally, for mathematics, we found negative
associations with all categories.
4.2 Robustness Checks
Preprint 10/18
We conducted robustness checks, detailed in the Appendix. First, we added four years of data,
2001 up to 2005, and performed identical OLS regressions for each year. We tested the models
using different potentially confounding variables. We used number of continents and language as
variables, but these move consistently with Countries. We tested models using the natural log of
number of Countries and Authors to test for a potential non-linear effect, again with consistent
results; Countries has a positive sign for Conventionality and a negative sign for Novelty, and the
opposite for Authors. We tested a multinomial logistic regression model where median-z-score
calculated by field. These checks produced results that were consistent with the main findings.
5 - Discussion
Based upon findings that international collaboration is more highly cited, more diverse, and
possibly structured for combinatorial dynamics, we expected to find that it also would be fall into
the Uzzi et al. (2013) characterization of articles that are both highly novel and highly
conventional, or consisting of "atypical" references, combining diverse parts into new
knowledge (Category 1). This is not upheld by the analysis. International collaboration, in
aggregate, indicates high conventional measures and low novelty measures for reference
combinations. The results were tested for source publications for 2005 in two independent
datasets, one using Web of Science used by Uzzi et al. (2013), and one using Scopus by Boyack
and Klavans (2014), plus four additional years of WoS data. In addition, using a slightly different
method of measuring atypicality, Jian Wang reported similar findings using Web of Science data
for the year 2001, in a personal communication5.
The negative finding against highly atypical referencing behavior in international collaboration,
against expectations, led us to consider several possible explanations. We initially considered
three possible explanations: 1) the higher transaction costs of international research may mitigate
against high novelty; and 2) reliance on information technologies to communicate may reduce
interjection of tacit knowledge -- which has been shown to contribute to creativity; and 3) the
need to rely on English as a common language may limit exchange of information. While these
features may hinder creativity, they do not explain why international collaboration is more highly
cited than other work. For that, we turned to 4) sociological explanations: an audience effect,
5 July 2018.
Preprint 10/18
which is almost surely at work, and a preferential attachment feature, which is consistent with all
the data.
5.1- High transaction costs
International projects may face higher levels of complexity resulting in higher transactions costs,
such as the costs of coordination and communication (e.g., Williamson 1991; Ou, Varriale, &
Tsui 2012; Lauto & Valentin 2013). The higher complexity can include the 1) awkwardness of
working across time zones; 2) the need to travel periodically long distances to work together; 3)
the loss of information due to sub-optimal communication routines; and 4) clashes of
management systems (e.g. Leung 2013; Jeong 2014). Any one or combination of these obstacles
may suppress otherwise creative or atypical knowledge pairing behavior, as international
participants may withhold differences of opinion and defer to a lead author. In this sense,
international collaboration may lean towards more hierarchical governance centralized around
single or fewer leaders. Different worldviews, nomenclatures, languages, and expectations, can
have the effect of slowing the integration of ideas, and may encumber the quality and validity of
the results.
Our initial hypothesis suggested that international collaboration might enhance creativity,
supported by Stahl et al. (2010) who reported a meta-analysis of 108 multicultural teams and
found that cross-cultural connections can lead to increased creativity and satisfaction. Fiore
(2008) also found that diverse connections bring creativity to teams. But the results suggest that
diversity may also introduce greater transaction costs that could hinder the communication
leading to novel or creative ideas. The alternative hypothesis is supported also by Stahl et al.
(2010) who found that "cultural diversity leads to process losses through task conflict and
decreased social integration…." (p.690) and may create losses through task conflict and
decreased social integration.
5.2 - Reliance on the English Language
Language differences may be more problematical than cultural differences, especially for those
working across countries. Many scholars work in English, even if it is their second language.
Lagerström and Andersson (2003) found that members of multilingual teams may not understand
Preprint 10/18
questions, assignments or results formulated in English if one or both communicators are not
native speakers. Other researchers have also shown the negative effects of language differences
on team activities (see Tenzer & Pudelko, 2012). This barrier may reduce opportunities for
highly creative discussion that would lead to novel work among collaborators.
5.3 - Limitations on implicit communications
Similar to the transaction costs logic discussed above, a further explanation of conventionality
could involve the reliance on information-communications technologies (ICTs), which limits the
ability to share tacit or implicit knowledge. Groups working at a distance are more likely than
physically proximate groups to be using information-communications technologies (ICTs) to
exchange information. ICTs favor the transmission of knowledge that can be codified and
reduced to data (Roberts 2010). ICTs do not facilitate the exchange of tacit knowledge, defined
as the tradition, inherited practices, implied values, and prejudgments held by people involved in
a communications process. Polanyi said that tacit knowledge is a crucial part of scientific
knowledge (1966). Tacit knowledge is shared through a socialization process; it becomes explicit
through externalization (Leonard & Sensiper, 1998). Leonard & Sensiper (1998) wrote:
"Researchers stimulating implicit learning found, in fact, that forcing individuals to describe
what they thought they understood about implicitly learned processes often resulted in poorer
performance than if the individuals were allowed to utilize their tacit knowledge without explicit
explanation," (P. 114) meaning learning by doing and imitation are likely more effective ways of
transmitting information than 'telling.' Further, they identify three types of tacit knowledge
exercised in innovation processes: 1) problem solving, 2) problem finding, and 3) prediction and
anticipation, all of which occur within group settings that are "born out of conscious,
semiconscious, and unconscious mental sorting, grouping, matching, and melding…" (p. 115).
These processes occur at an interpersonal level and are much richer in person than through a
written medium. It may be that ICTs cannot substitute for the exchange of tacit knowledge as a
critical component of innovation that take place face-to-face. The process of drawing
conclusions and making observations will likely occur in a linear fashion, whereas theory
suggests that innovation is an iterative process of divergence and convergence in concentric
circles (Nonaka, 1994; Leonard & Sensiper, 1998). Distance could make this process difficult or
unattainable. This part of the knowledge-creation process may be missing from virtual
Preprint 10/18
collaboration, lessening the opportunities for novel outcomes. Leonard and Sensiper (1998)
showed that learning by doing and imitation are likely more effective ways of transmitting tacit
information than the cognitive process of 'telling' someone about a task or idea. Wuestman et al.
(2018) said that "face-to-face interaction between scientists is … necessary to transfer the tacit
knowledge that is required to judge the meaning … of a new finding…." (p. 2) ICTs, or the lack
of collocation of collaborators enabling tacit information exchange, may inhibit emergence of
creative ideas.
More teammates or collaborators may introduce even more complications to the knowledge
exchange process. Our research partially supports this proposition in that larger teams of authors
are associated with higher novelty and negatively associated with conventionality. This support
Wang et al. (2017), in that high-risk taking without shared depth in conventional knowledge has
a higher risk of failure, and that large domestic teams produce more high-risk work than large
international teams. Thus, face-to-face cooperation and communication may be more important
factors for novelty than has been considered in the past. Distance collaborations may not allow
the 'bandwidth' for communications needed for creative findings. Sugimoto et al. (2017) showed
that researchers who are more mobile have about 40% higher citation rates than non-mobile
ones, again supporting the need for face-to-face work. Similarly, Wagner, et al. (2018) found that
more 'open' countries -- those welcoming newcomers, sending researchers to work abroad, and
coauthoring internationally -- had higher citation impacts than other countries. These findings
suggest that people working side-by-side may have a better outcome than those working
virtually.
5.4 - Audience effect of international coauthorship
Transaction costs, communication obstacles, and cultural differences are possible explanations
for the high conventionality of international collaboration; however, these factors do not explain
why international coauthorships are more highly cited. One would expect that less creative work
would be less cited than other work. This spurred us to query other literature that has suggested
that international collaborative articles are benefitting from an agglomeration effect, an audience
factor (Zitt & Small, 2008), or a "bonus effect" (Kato & Ando, 2013). Network studies show that
when performance is difficult to measure -- as it is with scientific or other scholarly pursuits --
Preprint 10/18
network connections, more than performance, are closely tied to success (Guimera et al., 2005).
Schmoch and Schubert (2008) suggested that international articles are more highly cited because
their readership community is larger. Börner et al. (2006) found that citations tended to occur in
geographically proximate places first before diffusing outward. People may cite others close-by
at first, so articles with multiple, dispersed addresses, may have broader citation possibilities. In
this case, international collaboration might be a "force multiplier" for the numbers of people in
the network of readers and citers (Lancho-Barrantes et al., 2012). More countries and more
authors could mean more citations, whether or not the work is more creative. While an audience
effect is a more satisfying explanation for the greater attention to international work than the
three discussed above, one more part of the puzzle still defies explanation: why citation strength
for international work persists over long periods of time. It could be argued that an audience
effect could help citations in the short term, but not in the longer term. One would expect the
audience effect to fade quickly.
To explore this question, we turned to a sociological explanation. The findings fully support a
social dynamic related to gaining citations through a process of preferential attachment, where
reputation (rather than novelty) is the operative dynamic. Wagner and Leydesdorff (2005)
showed that international collaborative networks are evolving through a pattern of preferential
attachment -- where researchers seek to attach themselves to more reputed collaborators in order
to enhance their own reputation. The process is one of aspirational collaboration with a person of
high or higher reputation and resources. In the process of making an aspirational connection, one
enhances one's own reputation-by-affiliation, and thereby gains attention to one's work.
Moreover, a reputation effect has the further virtue of explaining why international collaboration
is growing at a high rate. More practitioners worldwide are scrambling for recognition and
reward, even as resources remain flat. Seeking attention on a broad 'stage' (offered at the
international level) reaps rewards at the disciplinary and institutional levels.
This explanation resonates with Whitley (2000) who observed that scholarship contains a tension
distinguished by a commitment to produce novelty, on one hand, and the need for reputation, on
the other. Indeed, Whitley says: "…the emphasis of the system on fame and fortune following
from convincing a large number of influential colleagues of the importance of one's work
ensures general adherence to current procedural norms…." (p. 23), suggesting that strong
Preprint 10/18
reputation may even mitigate against novelty. Once reputation is gained, maintaining it can be
done by adding incremental quanta of knowledge that do not risk disciplinary controversy, nor
risk falling through the cracks between disciplines. In addition, the academic reward system does
not always recognize value in interdisciplinary work such as those articles that may contain
'atypical' referencing pairs. Goring et al. (2014) point out that "….even within interdisciplinary
organizations such as LTER [Long-Term Ecological Research], early career researchers still
largely engage in projects within the single discipline" because of concern about adverse
promotion and tenure impacts.
The citation environment at the international level, then, could lean towards rewarding reputation
as much or more than novelty, in part because the number of ties are higher and the reach to
others is less specialized. It may also be the case, as Reagans and McElviy (2003) showed, that
network range and social cohesion ease knowledge transfer. Thus, it is consistent with the
findings in this article that citation strength of international work reflects network strength as
much or more than quality or novelty. Indeed, within networks, reputation is a core driver of
cohesion. Reputation is "sticky" and it can persist even beyond the point where an author's work
is not particularly novel. The suggestion here is that international collaborations are notable
because of the reputation of more elite scholars: others seek to attach to them, and as they do,
reputation is enhanced in a virtuous cycle. The resulting output is cited because of the reputations
of the authors. This could account for both a negative finding around novelty, but higher citation
counts in both the short and the long term. This needs more exploration, especially within
individual disciplines.
6 - Policy Implications & Conclusions
Policymakers and program managers have tended to favor international collaboration in funding
decisions (He, 2009). As more elite scientists participate in international collaboration, funding
has followed. International projects claim substantial shares of national research and
development budgets. No doubt, many international projects are productive and useful.
However, the findings here suggest that there may be losses of creativity and novelty associated
with distance.
Preprint 10/18
International collaboration is undertaken for many reasons, as discussed by Beaver and Rosen
(1978), and Katz and Martin (1997). In some cases, such as "big science" collaborations, large-
scale equipment is needed. The infrastructure costs of research preclude any single country from
undertaking it. Huge up-front investments are required to research particle physics, astrophysics,
or geophysics. Other work, such virology, can require visits with on-the-ground researchers
facing a specific outbreak, like the Zika virus, springing up in a unique location. Still other works
can only proceed by sharing data or samples. These types of projects require collaborations.
Other collaborations, such as those seeking an audience effect or reputation enhancement, may
not have the characteristics of research that engenders highly creative work. In these cases,
attention to facilitating enriched communications may be needed. This may mean ensuring that
projects have enough budget to support frequent face-to-face meetings. It may also mean
discouraging very large teaming arrangements (especially those that do not center around large
equipment), as these seem to be antithetical to novelty/conventionality sweet spot
communication identified by Uzzi et al. (2013). Further, it may mean, in some cases, finding
alternatives to international collaboration when research is highly exploratory and where a good
deal of cross-disciplinary discussion is required to move the field forward. An explicit plan to
nurture research in this sweet spot may be needed for internationally collaborative projects.
Preprint 10/18
References
Adams, J. (2013). The fourth age of research. Nature 497 557-559.
Adams, J. Black, G, Clemmons, R. Stephan, P. Scientific teams and institutional collaborations:
Evidence from U.S. universities, 1981 -- 1999 (2005), Research Policy 34, 259-285.
Alshebli, B. Rahwan, T. Woon, W.L. (2018) Ethnic Diversity Increases Scientific Impact.
ArXiv:1803.02282v1. 6 March 2018. { https://arxiv.org/abs/1803.02282, accessed
9/2018]
Archambault, E., Beauchesne, O., Cote, G. Roberge, G. (2016) Scale Adjusted Metrics of
Scientific Collaboration. Montreal: Science-Metrix.
Azoulay, P., Graff Zivin, J. S., & Manso, G. (2011). Incentives and creativity: evidence from the
academic life sciences. The RAND Journal of Economics, 42(3), 527-554.
Barjak, F., & Robinson, S. (2008). International collaboration, mobility and team diversity in the
life sciences: impact on research performance. Social Geography, 3(1), 23-36.
Beaver, D., & Rosen, R. (1978). Studies in scientific collaboration: Part I. The professional
origins of scientific co-authorship. Scientometrics, 1(1), 65-84.
Bercovitz, J., & Feldman, M. (2011). The mechanisms of collaboration in inventive teams:
Composition, social networks, and geography. Research Policy, 40(1), 81-93.
Börner, K., Klavans, R., Patek, M., Zoss, A. M., Biberstine, J. R., Light, R. P., & Boyack, K. W.
(2012). Design and update of a classification system: The UCSD map of science. PloS
one, 7(7), e39464.
Börner, K., Penumarthy, S., Meiss, M., & Ke, W. (2006). Mapping the diffusion of scholarly
knowledge among major US research institutions. Scientometrics, 68(3), 415-426.
Bornmann, L., & Daniel, H. D. (2008). What do citation counts measure? A review of studies on
citing behavior. Journal of documentation, 64(1), 45-80.
Bornmann, L., Wagner, C., & Leydesdorff, L. (2015). BRICS countries and scientific
excellence: A bibliometric analysis of most frequently cited papers. Journal of the
Association for Information Science and Technology, 66(7), 1507-1513.
Boyack, K., Klavans, R. (2014). Atypical combinations are confounded by disciplinary effects.
International Conference on Science and Technology Indicators, September 3-5, 2014,
Leiden, Netherlands.
Cetina, K. K. (2009). Epistemic cultures: How the sciences make knowledge. Harvard University
Press.
Preprint 10/18
Cole, S., & Cole, J. R. (1967). Scientific output and recognition: A study in the operation of the
reward system in science. American sociological review, 377-390.
Cohen, W. M., & Levinthal, D. A. (2000). Absorptive capacity: A new perspective on learning
and innovation. In Strategic Learning in a Knowledge economy (pp. 39-67).
De Vaan, M., Stark, D., & Vedres, B. (2015). Game changer: The topology of
creativity. American Journal of Sociology, 120(4), 1144-1194.
Didegah, F., & Thelwall, M. (2013). Which factors help authors produce the highest impact
research? Collaboration, journal and document properties. Journal of Informetrics, 7(4),
861-873.
Estes, Z., & Ward, T. B. (2002). The emergence of novel attributes in concept
modification. Creativity Research Journal, 14(2), 149-156.
Falk‐Krzesinski, H. J., Börner, K., Contractor, N., Fiore, S. M., Hall, K. L., Keyton, J., ... &
Uzzi, B. (2010). Advancing the science of team science. Clinical and translational
science, 3(5), 263-266.
Fiore, S. M. (2008). Interdisciplinarity as teamwork: How the science of teams can inform team
science. Small Group Research, 39(3), 251-277.
Fleming, L., King, C., & Juda, A. (2007). Small worlds and innovation. Organization
Science, 18(6), 938-954.
Fontana, M., Iori, M., Montobbio, F., Sinastra, R. (2018) A bridge over troubled water:
interdisciplinarity, novelty, and impact. Conference paper, Science, Technology, and
Innovation Indicators Conference, Leiden, Netherlands, September.
Foster, J. G., Rzhetsky, A., & Evans, J. A. (2015). Tradition and innovation in scientists'
research strategies. American Sociological Review, 80(5), 875-908.
Fujigaki, Y. (1998). Filling the Gap Between Discussions on Science and Scientists' Everyday
Activities: Applying the Autopoiesis System Theory to Scientific Knowledge. Social
Science Information, 37(1), 5-22.
Garfield, E., & Merton, R. K. (1979). Citation indexing: Its theory and application in science,
technology, and humanities (Vol. 8). New York: Wiley.
Gazni, A., Sugimoto, C. R., & Didegah, F. (2012). Mapping world scientific collaboration:
Authors, institutions, and countries. Journal of the American Society for Information
Science and Technology, 63(2), 323-335.
Glänzel, W., & Schubert, A. (2001). Double effort= double impact? A critical view at
international co-authorship in chemistry. Scientometrics, 50(2), 199-214.
Preprint 10/18
Glänzel, W., De Lange, C. (2002), A distributional approach to multinationality measures of
international scientific collaboration, Scientometrics, 54: 75 -- 89.
Goring, S. J., Weathers, K. C., Dodds, W. K., Soranno, P. A., Sweet, L. C., Cheruvelil, K. S., ...
& Utz, R. M. (2014). Improving the culture of interdisciplinary collaboration in ecology
by expanding measures of success. Frontiers in Ecology and the Environment, 12(1), 39-
47.
Guimerá, R., Uzzi., B., Spiro, J., Amaral, L. (2005) Team Assembly Mechanisms Determine
Collaboration Network Structure and Team Performance. Science, 308(5722) 29 April
2005, 697-702.
Hamilton, D. P. (1990). Publishing by -- and for? -- the numbers. Science, 250(4986), 1331-1332.
Harzing, A. W. (2010). Citation analysis across disciplines: the impact of different data sources
and citation metrics. URL http://www. harzing. com/data metrics comparison. htm.
He, T. (2009). International scientific collaboration of China with the G7 countries.
Scientometrics, 80(3), 571-582.
Heinze, T., Shapira, P., Rogers, J. D., & Senker, J. M. (2009). Organizational and institutional
influences on creativity in scientific research. Research Policy, 38(4), 610-623.
Ioannidis, J. P., Klavans, R., & Boyack, K. W. (2016). Multiple citation indicators and their
composite across scientific disciplines. PLoS biology, 14(7), e1002501.
Jeong, S., Choi, J. Y., & Kim, J. Y. (2012). On the drivers of international collaboration: The
impact of informal communication, motivation, and research resources. Science and
Public Policy, 41(4), 520-531.
Jones, B. F., Wuchty, S., & Uzzi, B. (2008). Multi-university research teams: Shifting impact,
geography, and stratification in science. Science, 322(5905), 1259-1262.
Kato, M., & Ando, A. (2013). The relationship between research performance and international
collaboration in chemistry. Scientometrics, 97(3), 535-553.
Katz, J. S., & Martin, B. R. (1997). What is research collaboration?. Research policy, 26(1), 1-
18.
Larivière, V., Gingras, Y., Sugimoto, C. R., & Tsou, A. (2015). Team size matters: Collaboration
and scientific impact since 1900. Journal of the Association for Information Science and
Technology, 66(7), 1323-1332.
Lagerström, K., & Andersson, M. (2003). Creating and sharing knowledge within a transnational
team -- the development of a global business system. Journal of World Business, 38(2),
84-95.
Preprint 10/18
Lancho-Barrantes, B. S., Guerrero-Bote, V. P., Chinchilla-Rodriguez, Z. & de Moya-Anegón, F.
(2012). Citation Flows in the Zones of Influence of Scientific Collaborations. Journal of
the American Society for Information Science and Technology 63(3): 481-489.
Lancho-Barrantes, B. S., Guerrero-Bote, V. P., & de Moya-Anegón, F. (2013). Citation
increments between collaborating countries. Scientometrics, 94(3), 817-831.
Lauto, G., & Valentin, F. (2013). How Large‐Scale Research Facilities Connect to Global
Research. Review of Policy Research, 30(4), 381-408.
Lee, Y. N., Walsh, J. P., & Wang, J. (2015). Creativity in scientific teams: Unpacking novelty
and impact. Research Policy, 44(3), 684-697.
Leonard, D., & Sensiper, S. (1998). The role of tacit knowledge in group innovation. California
management review, 40(3), 112-132.
Leung, R. C. (2013). Networks as sponges: International collaboration for developing
nanomedicine in China. Research Policy, 42(1), 211-219.
Mâsse, L. C., Moser, R. P., Stokols, D., Taylor, B. K., Marcus, S. E., Morgan, G. D., ... &
Trochim, W. M. (2008). Measuring collaboration and transdisciplinary integration in
team science. American journal of preventive medicine, 35(2), S151-S160.
Merton, R. (1973) The Sociology of Science. Chicago: University of Chicago Press.
Mobley, M. I., Doares, L. M., & Mumford, M. D. (1992). Process analytic models of creative
capacities: Evidence for the combination and reorganization process. Creativity Research
Journal, 5(2), 125-155.
Mukherjee, S., Uzzi, B., Jones, B., Stringer, M. (2015). A New Method for Identifying
Recombinations of Existing Knowledge Associated with High-Impact Innovation,
Product Innovation Management (33)2, 224-236.
Narin, F., Stevens, K., & Whitlow, E. (1991). Scientific co-operation in Europe and the citation
of multinationally authored papers. Scientometrics,21(3), 313-323.
Narin, F., Stevens, K., & Whitlow, E. S. (1991). Scientific co-operation in Europe and the
citation of multinationally authored papers. Scientometrics, 21(3), 313-323.
Narin, F., & Whitlow, E. S. (1990). Measurement of scientific cooperation and coauthorship in
CEC-related areas of science. Commission of the European Communities Directorate-
General Telecommunications, Information Industries and Innovation.
Nonaka, I., Byosiere, P., Borucki, C. C., & Konno, N. (1994). Organizational knowledge
creation theory: a first comprehensive test. International Business Review, 3(4), 337-351.
Preprint 10/18
Ou, A. Y., Varriale, L., & Tsui, A. S. (2012). International collaboration for academic
publication: Implications from the resource-based view and transaction cost theory.
Group & Organization Management, 37(4), 407-451.
Parker, J. N., Lortie, C., & Allesina, S. (2010). Characterizing a scientific elite: the social
characteristics of the most highly cited scientists in environmental science and
ecology. Scientometrics, 85(1), 129-143.
Persson, O., Glänzel, W., & Danell, R. (2004). Inflationary bibliometric values: The role of
scientific collaboration and the need for relative indicators in evaluative studies.
Scientometrics, 60(3), 421-432.
Presser, S. (1980). Collaboration and the quality of research. Social Studies of Science, 10(1), 95-
101.
Polanyi, M. (1966). The logic of tacit inference. Philosophy, 41(155), 1-18.
Price, D. J. d. (1963), Little Science, Big Science…and Beyond, New York: Columbia
University Press. Roberts, J. (2000). From know-how to show-how? Questioning the role
of information and communication technologies in knowledge transfer. Technology
Analysis & Strategic Management, 12(4), 429-443.
Reagans, R., & McEvily, B. (2003). Network structure and knowledge transfer: The effects of
cohesion and range. Administrative science quarterly, 48(2), 240-267.
Schilling, M. A., & Green, E. (2011). Recombinant search and breakthrough idea generation: An
analysis of high impact papers in the social sciences. Research Policy, 40(10), 1321-
1331.
Schmoch, U., & Schubert, T. (2008). Are international co-publications an indicator for quality of
scientific research? Scientometrics, 74(3), 361-377.
Simonton, D. K. (1999). Origins of genius: Darwinian perspectives on creativity. Oxford
University Press.
Simonton, D. K. (2004). Creativity in science: Chance, logic, genius, and zeitgeist. Cambridge
University Press.
Stahl, G. K., Maznevski, M. L., Voigt, A., & Jonsen, K. (2010). Unraveling the effects of
cultural diversity in teams: A meta-analysis of research on multicultural work
groups. Journal of international business studies, 41(4), 690-709.
Stokols, D., Misra, S., Moser, R. P., Hall, K. L., & Taylor, B. K. (2008). The ecology of team
science: understanding contextual influences on transdisciplinary collaboration. American
journal of preventive medicine, 35(2), S96-S115.
Stephan, P. E. (2012). How Economics Shapes Science. Cambridge, MA: Harvard University
Press.
Preprint 10/18
Stephan, P., Veugelers, R., & Wang, J. (2017). Blinkered by bibliometrics. Nature, 544(7651),
411-412.
Tenzer, H., & Pudelko, M. (2012). Leading Across Language Barriers: Strategies to Mitigate
Negative Language-induced Emotions in Multinational Corporations.
Uzzi, B., Mukherjee, S., Stringer, M., & Jones, B. (2013). Atypical combinations and scientific
impact. Science, 342(6157), 468-472.
Uzzi, B., & Spiro, J. (2005). Collaboration and creativity: The small world problem. American
journal of sociology, 111(2), 447-504.
Van Raan, A. F. (2004). Sleeping beauties in science. Scientometrics, 59(3), 467-472.
Van Raan, A. F. (2003). The use of bibliometric analysis in research performance assessment
and monitoring of interdisciplinary scientific developments. Technology Assessment-
Theory and Practice, 1(12), 20-29.
Wagner, C. S., Horlings, E., Whetsell, T. A., Mattsson, P., & Nordqvist, K. (2015). Do Nobel
Laureates create prize-winning networks? An analysis of collaborative research in
physiology or medicine. PloS one, 10(7), e0134164.
Wagner, C.S., & Leydesdorff, L. (2005). Network structure, self-organization, and the growth of
international collaboration in science. Research policy,34(10), 1608-1618.
Wagner, C. S., Park, H. W., & Leydesdorff, L. (2015). The continuing growth of global
cooperation networks in research: A conundrum for national governments. PLoS
One, 10(7), e0131816.
Wagner, C. S., Whetsell, T. A., & Leydesdorff, L. (2017). Growth of international collaboration
in science: revisiting six specialties. Scientometrics, 110(3), 1633-1652.
Wagner, C. S., Whetsell, T., Baas, J., & Jonkers, K. (2018). Openness and impact of leading
scientific countries. Frontiers in Research Metrics and Analytics, 3, 10.
Whitley, R. (1984), The Intellectual and Social Organisation of the Sciences, Oxford, England:
Oxford University Press. Oxford: Oxford University Press.
Wang, J., Veugelers, R., & Stephan, P. (2017). Bias against novelty in science: A cautionary tale
for users of bibliometric indicators. Research Policy, 46(8), 1416-1436.
Williamson, O. E. (1991). Comparative economic organization: The analysis of discrete
structural alternatives. Administrative Science Quarterly, 269-296.
Wuchty, S., Jones, B.F., & Uzzi, B. (2007). The increasing dominance of teams in production of
knowledge. Science, 316(5827), 1036-1039.
http://science.sciencemag.org/content/316/5827/1036.full
Preprint 10/18
Youn, H., Strumsky, D., Bettencourt, L. M., & Lobo, J. (2015). Invention as a combinatorial
process: evidence from US patents. Journal of The Royal Society Interface, 12(106),
20150272. Youn, H., Strumsky, D., Bettencourt, L. M., & Lobo, J. (2015). Invention as a
combinatorial process: evidence from US patents. Journal of The Royal Society
Interface, 12(106), 20150272.
Zeng, S. X., Xie, X. M., & Tam, C. M. (2010). Relationship between cooperation networks and
innovation performance of SMEs. Technovation, 30(3), 181-194.
Preprint 10/18
Appendix - Robustness Checks & Tests
We conducted the following robustness checks: (1) logistic regression and multinomial
regression models using Scopus data for 2005 (Table A.1; A.3); (2) OLS regressions for four
additional years of data (Table A.3); (3) Fixed-effects models using different potentially
confounding variables, using number of Continents and a language variable (Table A.4); (4)
OLS models using the natural log of number of countries and authors to test for a potential non-
linear effect (Table A.5); (5) a multinomial logistic regression model where the median z-score,
used to create the nominal variable, was first created by field to account for within field variation
(Table A.6); (6) a replication test of the effect of international collaboration on citation strength,
showing a strong effect (Table A.7). All of the robustness checks were consistent with the main
results.
The results of the logistic regression analysis on the Scopus data are presented in Table A.1.
Consistent with the primary results, the number of countries affiliated is negatively and
significantly related to novelty and is positively and significantly related to conventionality.
Table A.1 - Logistic Regression, Scopus Data, 2005
Intercept
Novelty Bin Conventionality Bin
-0.2393
(0.00452)
Countries -0.0796
N
AIC
Wald
(0.00326)
1048575
1423358
595.3256
-0.1201
(0.00445)
0.1045
(0.0032)
1048575
1452500.7
1065.4101
Table A.1 notes: all estimates significant, p<.0001, standard errors in parentheses
Preprint 10/18
Table A.2 shows the results of the multinomial logistic regression on the Scopus data. Category
4 is the reference. Consistent with the Table 4, The number of countries is most strongly
associated with Category 3. Number of countries is also negatively associated with Category 2.
Table A.2 - Multinomial Logistic Regression, Scopus Data, 2005
Intercept
Countries
N
AIC
Wald
1 - (HN, HC) 2 - (HN, LC) 3 - (LN, HC)
-0.7255
(0.00911)
0.0519
(0.0065)
1048575
2604447.8
1152.6412
0.7193
(0.00687)
-0.0375
(0.00502)
0.7986
(0.0064)
0.0858
(0.0046)
Table A.2 notes. All estimates significant, p<.0001, standard errors in parentheses
Next, Table A.3 shows the results of the analysis by year to demonstrate the consistency of the
results across time. The results are consistent with the primary results in the full article.
Countries is positively associated with conventionality, and negatively associated with novelty.
The opposite is true for authors.
Preprint 10/18
Table A.3 -- OLS Regression Analysis by Year, 2001-2004
Conven.
144.972**
Conven.
132.869**
Conven.
142.942**
Conven.
147.079**
Novelty
Novelty
Novelty
Novelty
-
-
-
-
Intercept
*
*
*
*
73.16***
65.151***
70.427***
68.999***
(8.537)
(7.876)
(8.814)
(8.633)
(4.147)
(3.937)
(4.264)
(4.15)
Countries
11.775***
15.512***
17.73***
14.183***
-1.297*
-1.558**
-2.105***
-0.86
(1.14)
(1.032)
(1.101)
(1.043)
(0.554)
(0.516)
(0.533)
(0.502)
Authors
-1.416***
-1.432***
-1.342***
-1.507***
0.256***
0.303***
0.362***
0.282***
Reference
s
Year
Field
R2
(0.101)
(0.095)
(0.105)
(0.08)
(0.049)
(0.048)
(0.051)
(0.038)
0.251*
0.087***
0.251***
0.293***
1.894***
1.764***
1.836***
1.742***
(0.046)
(0.042)
(0.045)
(0.045)
(0.023)
(0.021)
(0.022)
(0.021)
2001
Fixed
0.272
2002
Fixed
0.272
2003
Fixed
0.311
2004
Fixed
0.316
2001
Fixed
0.093
2002
Fixed
0.096
2003
Fixed
0.112
2004
Fixed
0.1
N
Table A.3 Notes. p<.05*, p<.01**, p<.001***, standard errors in parentheses
718148
754690
698599
792861
698599
718148
754690
792861
Next, Table A.4 shows the analysis of alternative variables, including number of continents, and
a variable for linguistic composition. Because a straightforward addition of languages is
complicated by the fact that many individual countries have multiple languages, we calculated
whether the article included no-common languages, a value of one, or at least one common
language, zero. We employed a two-way fixed effects approach, where the field and the year are
included as fixed classification variables in the regression, while using the full five years of data.
However, because of high variance inflation, between continents and languages, we chose to
treat each variable in a separate model.
Preprint 10/18
Table A.4 -- Two-Way Fixed Effects Regression, Continents & Languages, 2001-2005
Intercept
Continents
Languages
Authors
References
Conven.
138.609
(3.891)
24.869
(0.763)
Conven.
164.163
(3.798)
13.118
(0.724)
-1.046
(0.037)
0.223
(0.02)
Fixed
Fixed
0.29
-1.159
(0.037)
0.209
(0.02)
Fixed
Fixed
0.29
Novelty
-67.17
(1.871)
-1.63
(0.367)
0.266
(0.018)
1.762
(0.01)
Fixed
Fixed
0.096
Novelty
-69.254
(1.827)
1.487
(0.348)
0.247
(0.018)
1.757
(0.01)
Fixed
Fixed
0.096
Year
Field
R2
N
Table A.4 notes. All estimates significant, p<.0001, standard errors in parentheses
3799996
3799996
3799996
3799996
The Table A. 5 shows log transformed variables for countries and authors. The results are
consistent with the primary results. Log of countries is positively related to conventionality and
negatively related to novelty. The opposite is true of log of authors.
Table A.5 -- OLS Regression, Log-Transformed Variables, 2005
Intercept
Log_Countries
Log_Authors
176.907
(8.305)
35.194
(1.934)
-28.776
(1.127)
Conventionality Novelty
-72.792
(3.875)
-6.384
(0.902)
11.139
(0.526)
1.601
(0.02)
0.086
835698
0.2
References
R2
N
Table A.5 notes. All estimates significant, p<.0001, standard errors in parentheses
(0.044)
0.289
835698
Preprint 10/18
Next, Table A.6 shows the results of the multinomial logistic regression analysis where the
median z-score, is first calculated within individual fields, rather than across all fields, before
binarizing and compiling into a nominal four category variable. The results are very similar to
Table 4. However, the effect of countries on category 1 is now positive, but not significant. The
estimate on category 2 remains negative and significant, and the association with category 3
remains positive and significant.
Table A.6 -- Multinomial Logistic Regression, Conventionality by Field, 2005
Countries
1 - (HN, HC)
2 - (HN, LC)
All Fields
0.015
(0.008)
-0.044***
Author
3 - (LN, HC)
3 - (LN, HC)
2 - (HN, LC)
(0.006)
0.036***
(0.005)
1 - (HN, HC) 0.003***
(0.0005)
0.003***
(0.0004)
-0.001***
(0.0004)
References 1 - (HN, HC) 0.039***
(0.0003)
0.029***
(0.0003)
0.03***
(0.0003)
FIXED
834998
2 - (HN, LC)
3 - (LN, HC)
Field
N
AIC
Wald
Table A.6 notes. p<.05*, p<.01**, p<.001***, standard errors in parentheses
1975932.1
80123.21
Preprint 10/18
Since the argumentation regarding a potential audience effect relies on the citation strength of
international collaboration, Table A.7 shows the citation analysis. The analysis shows a strong
significant estimate of 4.15 for Countries on Citations.
Table A.7 -- International Collaboration and Citations, 2005
Citations
-6.224
(0.587)
4.154
(0.072)
0.146
(0.005)
0.504
(0.003)
Fixed
Field
R2
N
Table A.7 notes. All est. sig. p<.0001, standard
errors in parentheses
0.093015
841546
Intercept
Countries
Authors
References
Preprint 10/18
|
1706.07140 | 1 | 1706 | 2017-06-21T23:48:02 | Dynamic patterns of knowledge flows across technological domains: empirical results and link prediction | [
"cs.SI",
"cs.CY",
"cs.DL",
"physics.soc-ph"
] | The purpose of this study is to investigate the structure and evolution of knowledge spillovers across technological domains. Specifically, dynamic patterns of knowledge flow among 29 technological domains, measured by patent citations for eight distinct periods, are identified and link prediction is tested for capability for forecasting the evolution in these cross-domain patent networks. The overall success of the predictions using the Katz metric implies that there is a tendency to generate increased knowledge flows mostly within the set of previously linked technological domains. This study contributes to innovation studies by characterizing the structural change and evolutionary behaviors in dynamic technology networks and by offering the basis for predicting the emergence of future technological knowledge flows. | cs.SI | cs | Dynamic patterns of knowledge flows across technological
domains: empirical results and link prediction
Jieun Kim1*and Christopher L. Magee1,2
1Institute for Data, Systems and Society, Massachusetts Institute of Technology, 77
Massachusetts Avenue, Cambridge, MA 02139, USA
2International Design Center, Massachusetts Institute of Technology 77 Massachusetts
Avenue, Cambridge, MA 02139, USA
Email: Jieun Kim ([email protected]) and Christopher L. Magee ([email protected])
*Corresponding author: Jieun Kim
Abstract
The purpose of this study is to investigate the structure and evolution of knowledge spillovers
across technological domains. Specifically, dynamic patterns of knowledge flow among 29
technological domains, measured by patent citations for eight distinct periods, are identified
and link prediction is tested for capability for forecasting the evolution in these cross-domain
patent networks. The overall success of the predictions using the Katz metric implies that
there is a tendency to generate increased knowledge flows mostly within the set of previously
linked technological domains. This study contributes to innovation studies by characterizing
the structural change and evolutionary behaviors in dynamic technology networks and by
offering the basis for predicting the emergence of future technological knowledge flows.
Keywords: technological domain; technology network; technological change; patent analysis;
link prediction
JEL codes: O30, O32, O33
1
1. Introduction
Technological evolution is typically shaped by problem solving activity which integrates
knowledge from the same and/or different technology areas, leveraging the cumulative
character of knowledge. While there is a tendency to generate knowledge flows within a
given technology, there are also important knowledge spillovers1 across technologies and
these have the potential to increase technological variety (Schoenmakers and Duysters, 2010).
This study focus on the latter case, the interactions across technological domains. Novelty of
individual inventions (Kim et al., 2016), importance of individual inventions (Schoenmakers
and Duysters, 2010) and possibly convergence of technologies (Caviggioli, 2016) are all
important topics that are related to knowledge flow across domains.
Previous studies have attempted to analyze technological knowledge flows in patent
networks based on patent citation information (Acemoglu, Akcigit, and Kerr, 2016; Ko, Yoon,
and Seo, 2014; É rdi et al., 2013; Lee and Kim, 2010; Chang, Lai, and Chang, 2009; Han and
Park, 2006; Jaffe, Trajtenberg, and Henderson, 1993). Their typical unit of analysis has been
not only individual patents (É rdi et al., 2013; Chang et al., 2009), but the class of the patent
office data such as IPC (International Patent Classification) (Acemoglu et al., 2016), USPC
(US Patent Classification) (Ko et al., 2014), Derwent Class Code indexed by technology
experts of Thomson Reuters (Luan, Liu, and Wang, 2013). However, ambiguity can arise as
the concept of ''a technology'' and ''an industry'' are often if not usually conflated whereas
technologies as technically understood cut across industries (Benson and Magee, 2015). This
research is aimed at understanding non-economic knowledge flows among technologies, thus
a carefully defined unit of analysis is utilized.
Although significant effort has been made to understand the evolution of technology
1 We differentiate economic spillovers between sectors from (technological) knowledge spillovers
between technological domains.
2
networks (Funk and Owen-Smith, 2016; Kim, Cho, and Kim, 2014; No and Park, 2010; Shin
and Park, 2010), studies typically construct networks based on posteriori or historical patterns
of evolution. In the analysis of dynamic trends of knowledge flows, there is a lack of work
attempting to predict a priori patent network structures. As a remedy, in an attempt to
understand and predict dynamic evolution of technological knowledge networks, this study
uses link prediction methodology, which estimates the likelihood of the existence of a link
between two nodes in the future based on observed links and the attributes of nodes (Lü and
Zhou, 2011; Liben-Nowell and Kleinberg, 2007).
The key questions in this study are as follows: how strong are the technological
knowledge flows for specific technology domains with other specific domains? and how do
those cross-domain links change over time? Can we predict the future cross-domain links in a
backcasting experiment? To address these questions, this paper documents dynamic patterns
of technological knowledge flow networks, based on measuring patent citations in 29
technological domains (TDs) defined by Magee et al. (2016). Dynamic patterns are identified
and predicted in the network of knowledge flows between TDs. The paper explores the
empirical knowledge flow pattern in the period 1976-2013, as derived from the United States
Patent and Trademark Office (USPTO) patent citation data.
The remainder of this paper is organized as follows: Section 2 discusses essential
prior work on technological knowledge flow networks and link prediction methodology.
Section 3 presents the process for and results of constructing cross-TD networks and
identifying dynamic patterns of changes in cross-TD links. Section 4 implements experiments
using link prediction methods to test their effectiveness as predictors of cross-TD network
evolution. Section 5 integrates the results from previous sections and discusses implications.
The final section draws conclusions, highlights limitations and makes suggestions for future
research.
3
2. Background
2.1. Technological knowledge networks
The notion that technological innovation is the result of the recombination of existing
components is deeply rooted in the literature on the history of technological change (Ruttan,
1959; Usher, 1954). Thus, one can often describe inventions as a combination of prior
technologies. The inherent combinatorial characteristic of innovation has led scholars to
focus on the question of how new technologies build on prior art and on how inventors
combine and transfer knowledge across technological domains. Specifically, the mechanism
of analogical transfer (Basnet and Magee, 2016; Weisberg, 2006; Gentner and Markman,
1997) has been shown to apply quite broadly and is the most important cognitive mechanism
used by inventors. Such recombination of ideas underlies ongoing technological change and
is one aspect of generating economic spillover or benefits to a given sector not due to that
sectors efforts alone. In particular, the analogical transfer of ideas to new domains means that
part of an inventor's original idea necessarily spills over to other firms and other sectors
generating positive externalities (the so-called 'knowledge spillovers') for the economy.
Previous work on knowledge spillovers has exploited the comprehensive information
provided by patent data to examine how knowledge flows from one invention to the other.
Specifically, a patent citation is a reference to prior art for legal purposes and as such
represents a proportion of knowledge used in the citing patent that originated from or was
already disclosed by the cited patent. Jaffe et al. (2000) reported the analysis of R&D
manager surveys suggesting that although patent citations carry a fair amount of noise, they a
provide a reasonably good indication of a 'learning trail', representing the knowledge transfer
process. As a result, the aggregate citation flows within and between technology fields,
sectors, geographic areas, etc. can be used as proxies for knowledge flow intensity
(Schoenmakers and Duysters, 2010; Verspagen and De Loo, 1999; Karki, 1997; Jaffe et al.,
4
1993; Trajtenberg, 1990). Furthermore, Clough et al. (2015) have shown that the level of
redundancy-measured by transitive reduction-in the edges of patent citation network is
much smaller than in that of academic paper citation network. This suggests that patent
citations are better representations of technological knowledge flow than scientific
publication citations are of scientific knowledge flows.
Beyond the seminal contributions to knowledge flows by patent citation analysis by
Trajtenberg (1990) and Jaffe et al. (1993), abundant empirical studies using patent citations to
measure knowledge flows have been carried out at the level of an indiviual (Alcácer and
Gittelman, 2006; Jaffe et al., 2000), at the firm level (Cho, Kim, and Kim, 2015; Duguet and
MacGarvie, 2005), and at an industry level (Park, Lee, and Park, 2009; Han and Park, 2006)
and at the national level (Chen and Guan, 2016; Shih and Chang, 2009). Patent citation
information thus has been widely used to analyze linkages among patents in a given
technology, linkages between technologies, persistence of technological influence and the
impact of new patents, as well as the structure of knowledge networks between industries or
nations. Studies using main path analysis on patent citation networks for specific technology
fields also demonstrate their usefulness for mapping the knowledge and technology trajectory
of the real world (Park and Magee, 2017; Nomaler and Verspagen, 2016; Martinelli and
Nomaler, 2014; Choi and Park, 2009; Mina et al., 2007; Verspagen, 2007). Network science
and social network analysis on the patent citation networks have been widely used to capture
the overall structure of patents and technologies including the complicated interactions in
technological evolution (Lee, Lee, and Sohn, 2016; Cho et al., 2015; Choi and Hwang, 2014;
Kim et al., 2014; É rdi et al., 2013; Cho and Shih, 2011). Other studies focused on the optimal
network structures for knowledge diffusion (Shin and Park, 2010). However, prior attempts
that analyse patent citation networks have focused only on the observed networks and thereby,
they have been limited to an ex post analysis and do not establish potentially predictive
5
models.
An important issue regarding all of the work on paths within or between technologies
concerns the unit of analysis. If one is interested only at the patent level or a individual
inventor level or even at the firm or national level, the unit of analysis is clear. However,
most studies also attempt to study technologies and technological fields but spend little time
showing an objective connection to technologies as they exist. An exception is the work of
Park and Magee (2017) who utilize a tighter definition but also operationally link a gathered
set of patents to technological artifacts whose performance can be measured. Since our focus
is on cross-technological flow of knowledge, it is important that we have a clear unit of
analysis. Thus, we follow the approach of Park and Magee and describe the definition of
technological domains and the methodology for obtaining patent sets to represent such
domains in more detail in section 3.1.
2.2. Link prediction
2.2.1. Fundamentals
Link prediction attempts to predict the emergence of future links in complex networks based
on the available information, such as observed links and nodes' attributes (Lü and Zhou,
2011; Liben-Nowell and Kleinberg, 2007). It not only predicts potential links but also
missing and spurious links (Guimerà and Sales-Pardo, 2009). Link prediction is broadly
applied in various fields such as biological, social, and information systems where nodes
represent biological elements like proteins and genes, individuals, computers, web users, and
so on (Lü and Zhou, 2011). In biological networks, accurate predictors can be applied to seek
the most promising latent links, which is much less costly than blindly checking all possible
interaction connections (Guimerà and Sales-Pardo, 2009; Clauset, Moore, and Newman,
2008). Link prediction has also been used in the analysis of social networks, such as the
6
prediction of the collaborations in co-authorship networks (Liben-Nowell and Kleinberg,
2007), the estimation of collaborative influence (Perez-Cervantes et al., 2013), and the
detection of the relationships between community users (Valverde-Rebaza and de Andrade
Lopes, 2013). In information systems, link prediction can serve as a significant technique in
information retrieval, such as the prediction of words, topics or documents in Wikipedia
(Itakura et al., 2011), and in recommender systems, such as e-commerce recommendations
(Li et al., 2014) and friend recommendation (Esslimani, Brun, and Boyer, 2011). Moreover,
the link prediction approaches can be applied to solve the classification problem in partially
labeled networks, such as the detection of anomalous email (Huang and Zeng, 2006), and
differentiating fraudulent and legitimate users in cell phone networks (Dasgupta, Singh, and
Viswanathan, 2008).
The problem of link prediction and structural definition is as follows. Consider a
network G=(V, E), where V is the set of nodes and E is the set of edges connecting nodes. For
two nodes u, v∈V, e=(u,v)∈E represents an interaction between u and v. Given time periods,
t = 1, …, T, an evolving network is defined as Gt = (Vt, Et), where Et is the set of undirected
edges, whether new or recurring, between nodes in Vt within time stamp t. In this study, V is
the set of technological domains (TDs) and Vt can differ according to their occurrence within
t; Et represents the knowledge flows or spillovers among TDs within time period t. In this
setting, the link prediction problem can be formulated as follows: Estimate the likelihood of a
potential link in Et+1, between two nodes in Vt. Link prediction involves the choice of a
predictor, a function or algorithm that calculates a likelihood score for the existence of a link
between two nodes in the next time period. Network topology-based structural similarity
metrics are generally used as predictors (Zhu and Xia, 2016; Valverde-Rebaza and de
Andrade Lopes, 2013; Liben-Nowell and Kleinberg, 2007). Applying a predictor to the
training network at t yields a number of predictions. In practice, the prediction step results in
7
a list of potential links with an associated likelihood score Sim. By ranking the potential links
in decreasing order of Sim and choosing a threshold, one can obtain a predicted network at
t+1.
2.2.2. Topology-based predictors
In this study, 8 similarity metrics are tested as predictors of future associations among TDs.
According to their characteristics, these predictors can be subdivided into two broad
categories: (1) local or neighborhood-based metrics; and (2) global metrics. In all the
definitions, u, v, z denote nodes in the network and similarities are always evaluated between
two different nodes. Γ(u) denotes the set of nodes which are neighbors of node u in the
network- that is all nodes that are directly linked to u.
Local predictors are solely based on the neighborhoods of the two nodes. Many
networks have a natural tendency towards triadic closure: if two links a-b and b-c exist, there
is a tendency to form the closure a-c (Bianconi et al., 2014; Guns, 2014). This property is
closely related to assortativity and and was empirically confirmed in social networks
(Bianconi et al., 2014; Kleinberg, 2008) and collaboration networks (Ter Wal, 2014; Liben-
Nowell and Kleinberg, 2007). For technological knowledge flow, it assumes that if a given
domain shares useful knowledge with two other domains, then those two domains should be
able to share knowledge with each other. The networks we consider have the relative strength
of knowledge flows as the weights of links and we use weighted similarity scores (Zhu and
Xia, 2016; Murata and Moriyasu, 2007) defined below with w(u,v) denoting the weight of the
link between nodes u and v.
(a) CommonNeighbors (Newman, 2001) is the most widespread, basic and simplest type of
metric that measures the number of nodes with which two adjacent nodes have a direct
association. It is known to perform well when a network is highly clustered (Lü and Zhou,
8
2011). The weighted CommonNeighbors is calculated as:
(1)
(b) Jaccard predictor (Salton and McGill, 1983), which is commonly used in information
retrieval, considers the probability that two nodes have common neighbors. It is
introduced to normalize the effect of neighborhood size (the number of total neighbors of
two nodes) in the CommonNeighbors metric: If both u and v have many neighbors, they
are automatically more likely to have more neighbors in common. The Jaccard
coefficient for weigted networks can be extended as:
(2)
(c) Adamic–Adar predictor (Adamic and Adar, 2003) starts from the hypothesis that a 'rare'
(i.e., low-degree) neighbor is more likely to indicate a future connection than a high-
degree one. In many cases, rare features are more telling; documents that share the phrase
"for example" are probably less similar than documents that share the phrase "clustering
coefficient". In social networks, an unpopular person (someone with not a lot of friends)
may be more likely to introduce a particular pair of his friends to each other. In the case
of predicting technological domain linkages, the conceptual basis is similar making the
assumption that a domain with few connections to other domains is more likely to be
connected to domains that will connect in the future. Thus, this metric considers both the
common neighbors and the common neighbors' neighbors. Two nodes are likely to
connect in the future, if they have more nodes in common and the common nodes have a
smaller number of neighbors. The Adamic-Adar measure for weighted networks is:
(3)
9
()()(,)(,)(,)zuvSimuvwuzwvz()()()()(,)(,)(,)(,)(,)zuvpuqvwuzwvzSimuvwpuwqv()()()(,)(,)(,)log(1(,))zuvrzwuzwvzSimuvwzr(d) ResourceAllocation (Zhou, Lu, and Zhang, 2009) is motivated by the resource allocation
dynamics on complex networks. Consider a pair of nodes, u and v, which are not directly
connected. The node u can send some resource to v, with their common neighbors
playing the role of transmitters. In the simplest case, we assume that each transmitter has
a unit of resource, and will equally distribute it to all its neighbors. The weighted
ResourceAllocation between u and v can be defined as the amount of resource v received
from u, which is:
(4)
It is based on a hypothesis similar to that of Adamic-Adar, but yields a slightly
different ranking: the ResourceAllocation index punishes the high-degree common neighbors
more heavily than Adamic-Adar.
(e) PreferentialAttachment (Barabási et al., 2002; Price, 1976) is based on the idea of 'the
rich gets richer', or 'power-law'; users with many friends tend to create more
connections in the future. It can be shown that the product of the degrees of nodes u and v
is proportional to the probability of a link between u and v. Thus, the weighted
PreferentialAttachment is also known as the degree product and computed as:
(5)
This metric is related to small-world networks, which were illustrated through "six
degress of separation" in social networks by Travers and Milgram (1967). It is broadly known
that many knowledge networks, beyond social networks, exhibit the small-world property of
having short average path lengths between any two nodes, despite being highly clustered
(Watts and Strogatz, 1998). Thus it is known to perform well when a network has small,
disconnected clusters (Lü and Zhou, 2011). Examples include scientific collaborations in
mathematics and neuro-science (Barabási et al., 2002) and the patent citation network in
10
()()()(,)(,)(,)(,)zuvrzwuzwvzSimuvwzr()()(,)(,)(,)puqvSimuvwpuwqvradio frequency identification (Hung and Wang, 2010). Likewise, we conjecture that the
evolution of cross-TD networks might follow PreferentialAttachment because it is consistent
with the oft-used concept of general purpose technologies (Moser, Nicholas, and Nicholas,
2015; Jovanovic and Rousseau, 2005). It may be noted that this index does not require any
node neighbor information; therefore, it has the lowest computational complexity of our
metrics.
Global predictors are the methods based on the ensemble of all paths between two
nodes. These predictors recognize that, even if two nodes do not share any common
neighbors, they still may be related and form a link in a later time period. In the case of
technological knowledge flow, use of these metrics represents an assumption that knowledge
flows occur along identifiable paths through the network and this is consistent with the
concept of trajectories (Dosi, 1982). For each of the three metrics discussed below, the
fundamental assumption of why they might work is that TDs which are on a common
trajectory are more likely to cite each other than those not on such a trajectory. A
straightforward measure of relatedness is path distance. Likewise, random walk based on
transition probabilities from a node to its neighbors can be used to denote the destination
from a current node.
(a) The Katz metric (Katz, 1953) is a variant of the shortest path distance and is also based
on the ensemble of all paths. Let A denote the (full) adjacency matrix of the network. The
element auv is the weight of a link between nodes u and v or 0 if no link is present. Each
element
of
(the k-th power of A) has a value equal to the number of walks, i.e.
the set of all paths, with length k from u and v. Thus, the Katz metric directly sums the
number of all walks that exist. However, as longer walks usually indicate a weaker
association between the start and end node, it introduces a free (damping) parameter β (0
11
()kuvakA< β < 1), representing the 'probability of effectiveness of a single link'. Thus, each walk
with length k has a probability of effectiveness βk, as shown in equation 6. For links
between TDs the underlying hypothesis is that more and shorter walks between two TDs
indicate a stronger relatedness. It is known to perform well when a network has long
average distance (Lü and Zhou, 2011).
(6)
(b) RootedPageRank is a modification of PageRank (Brin et al., 1998), a core algorithm used
by search engines to rank search results. Assume the existence of a random walker, who
starts at a random node, randomly chooses one of its neighbors and navigates to that
neighbor, again randomly chooses a neighbor and so on. Moreover, at every node, there
is a small chance that the walker is 'teleported' to a random other node in the network.
The 'chance of advancing to a neighbor' is α (0 < α < 1) and the chance of teleportation is
1-α. For link prediction purposes, the random walk assumption of the original PageRank
is altered by the not randomized teleportation: the walker is always teleported back to the
same root node. The proximity score between node pairs u and v is calculated in this
method as follows:
(7)
where Hu,v is the hitting time or the expected number of steps required for a random
walk from u to reach v and πv is the stationary distribution weight of v under the following
random walk condition: (a) with probability α that returns to u, or (b) with probability 1- α of
jumping to a random neighbor of the current node.
(c) SimRank (Jeh and Widom, 2002) is a measure of the similarity between two nodes in a
network. The SimRank hypothesis can be summarized as: nodes that link to similar
nodes are similar themselves. It begins with the assumption that any node is maximally
12
()1(,)kkuvkSimuva,(,)uvvSimuvHsimilar to itself: sim(u,u)=1, Then it employs a 'decay factor', γ (0 < γ < 1), to determine
how quickly similarities or weights of the connected nodes decrease as they get farther
away from the original nodes. SimRank can also be interpreted by the random walk
process, that is, it measures how soon two random walkers, respectively starting from
nodes u and v, are expected to meet at a certain node.
(8)
3. Cross-TD networks empirically characterized
3.1. Data and methods
The unit of analysis in this studiy is a technological domain (TD), defined by Magee et al.
(2016) as "the set of artifacts that fulfill a specific generic function utilizing a particular,
recognizable body of knowledge". This definition essentially decomposes generic functions
along the lines of established bodies of knowledge. Thus the domains are connected not only
to the economy, but also to science and other technical knowledge. The generic functional
classification is described in terms of operands (information, energy, and material) being
changed by operations (storage, transportation, and transformation). When each domain
defined in this manner is linked operationally to a set of patents, it is able to be connected to
non-patent information such as the rate of improvement of artifacts that represent the domain
(Triulzi, Alstott, and Magee, 2017; Benson and Magee, 2015). The analysis in the current
paper covers patents for 29 TDs found using the classification overlap method (28 from
Benson and Magee 2013, 2015), one from Basnet (2015) as shown in Table 1. Despite the
fact that these patent sets have been shown to be more complete and relevant than sets usually
studied, there are patents in each set (5-25%) that may not be good representatives of the
domain. Thus, some "random" cross domain citations are likely and in the work below, we
13
()()(,)(,)()()puqvSimuvSimpquvfocus on linkages that are greater than random expectation (we call them strong links) partly
to avoid this noise source but also because we are interested in a significant level of
knowledge flow between domains.
Table 1. The 29 TDs in the generic function format (Magee et al., 2016; Koh and Magee,
2006) with abbreviations used throughout this paper
Operation
Storage
Operand
Information
Semiconductor
information storage
(SIS)
Magnetic information
storage (MIS)
Optical information
storage (OIS)
Material
Energy
Electrochemical
batteries (BAT)
Capacitors (CAP)
Flywheel (FLY)
Permanent magnetic
materials (PMM)
Transportation
Electrical
Electrical power
Aircraft transport
telecommunication (ET)
Optical
transmission (EPT)
Superconductivity
(AIR)
telecommunication (OT)
(SCD)
Wireless
telecommunication
(WT)
Transformation
Integrated circuit
Combustion engines
Milling machines
processors (IC)
(CE)
Electronic computation
Electrical motors
(EC)
(EM)
(MIL)
3D printing (3D)
Photolithography
Camera sensitivity
Solar photovoltaic
(PLG)
(CAM)
Magnetic resonance
imaging (MRI)
Computerized
tomography scan (CT)
Genome sequencing
(GS)
power (SPP)
Wind turbines
(WIND)
Fuel cells (FC)
Incandescent lighting
(IL)
LED lighting (LED)
We started by collecting the number of citations between the patents of the TDs
annually from 1976 to 2013. The overall number of collected patents for the 29 TDs are
502,444; among the total 7,074,439 patent-to-patent citations, the number of specified inter-
domain citations are 290,059 (4%), the number of intra-domain (self) citations are 2,117,399
(30%), and others (~66%) are citations to undefined domains beyond the 29 listed in Table 1.
14
Exploring annual citation patterns, the time window is set as four or five years, which yields
8 periods for 38 years (from 1976 to 2013) as follows: T1 as 1976~1979, T2 as 1980~1983,
T3 as 1984~1988, T4 as 1989~1993, T5 as 1994~1998, T6 as 1999~2003, T7 as 2004~2008,
and T8 as 2009~2013. Second, the citation matrix, which we treat as undirected, is
constructed using the number of citations between the specified TDs. We standardize all cells
in this matrix by calculating citation scores (CS) from equation (9):
(9)
where c is the number of citations, p is the number of patents, t is the periods from T1
to T8, the subscripts i and j indicate TDs, and the absence of a subscript indicates an
aggregation of TDs. The equation expresses the number of citations between a pair of TDs
relative to its expected value, if citations were completely random (Nomaler and Verspagen,
2016) for each time period. Thus, a CS value larger than 1 implies that the citation frequency
between these domains is more than for a random occurrence given the citation and patent
numbers at that time period. Thus, we call the links whose CS is larger than 1 strong links,
and those between 0 and 1 weak links. For each of the 8 periods, a matrix including 406 non-
self citation cells is constructed. As a final step, cross-TD networks2 are constructed using
citation matrices for the 8 periods: the nodes are the 29 TDs and the links are connected with
weight CS from equation 9.
3.2. Distribution of cross-TD links
Among the 406 non-self citation potential linkages, 57 cells turn out to be zero in every time
period. 51 cells are more than one for at least one period whereas 298 cells have values
ranging from >0 to 1 for all time periods. See Table 2 for basic statistics in each period.
2 See Appendix 1.
15
2()ijtitjtijtttcppcscpThe average of CS is always less than 1, i.e., random expectation, consistent with the
maximum values being far greather than 1. As shown in the number of links according to CS
range in Table 2 and in CS boxplots (Figure 1), most cross-domain links are weaker than
expected by random occurrence in every period and the max values are the definite outliers.
Moreover, citations to other patents significantly outnumber the citations involved in even the
strongest inter-domain linkages. For example for CT-MRI with a CS of 13.42 in period 8,
only a little more than 1% of the total citations by the two domains are between these
domains. The intra-domian citations also outnumber the strong inter-domain citations but for
a small domain like MRI, for period 8 only by a factor of 5. In the different time periods, 2%
to 9% out of 406 possible links in the networks are stronger than would be expected by
chance. Thus, their distributions are highly left-skewed over all periods. This indicates that
the cross-TD networks are sparsely connected; knowledge flow between partciular TDs
occurs infrequently despite the fact noted in section 3.1 that intra-domain citations comprise
only ~0.3 of the patent to patent citations.
Table 2. Basic statistics of CS values and links in each period
Average
Average of CS less than 1
Stadard.dev
Max
T1
0.22
0.01
1.97
33.94 13.13 14.87 16.34 15.74 23.18 17.21 13.42
EM-
FLY
T7
0.44
0.10
1.59
BAT-
FC
BAT-
FC
T8
0.38
0.12
1.33
EM-
FLY
BAT-
FC
CT-
MRI
EM-
FLY
BAT-
FC
T2
0.23
0.03
1.18
T3
0.21
0.04
1.18
T4
0.20
0.07
1.01
T5
0.25
0.07
1.22
T6
0.33
0.08
1.63
Number of links whose CS is
larger than 1 (strong)
10
(2%)
between 0 and 1 (weak) 15
Zero
381
15
(4%)
69
322
15
(4%)
118
273
15
(4%)
166
225
20
(5%)
196
190
28
(7%)
245
133
36
(9%)
255
115
29
(7%)
283
94
16
Figure 1. Boxplots of CSs in each period (log scale)
Nonetheless, the networks evolve to become denser over time. There is an increase in
strong links but even more increase in weak links. The average value for weak links are small
ranging from 0.01 to 0.1 but increase gradually over time. The increasing density arises
because backward citations in the patent system have increased over time (Triulzi et al.,
2017) and that is a further reason why strong links (above random expectation) is the proper
focus for empirical analysis and prediction.
3.3. Emergence and stability of cross-TD links
For the 51 strong links, we investigated when they first emerge, how stable they are, and
what functional classes they are associated with (Table 3 and 4 gives these results). In terms
of emergence, the strong links first equally appear gradually from weak status (21 cases) or
abruptly from zero (20 cases). The other 10 strong links are present in the first period and
thus the previous state is unknown.
17
Table 3. Number of new strong links according to emergence, stability, and functional class
Emergence
Total
T8
T5
T6
T1
T2
T3
T4
T7
time
-
in previous
weak
period
zero previously
Stability
stays until last period
fluctuates in and out
Functional class
within same function
between different operand
between different
operation
between different operand
and operation
Total
-
5
5
2
2
4
2
10
0
6
2
4
0
2
3
1
6
2
2
1
3
2
0
0
2
4
3
1
1
3
1
1
0
2
4
5
2
4
3
3
1
2
1
7
5
3
3
5
1
2
3
2
8
6
3
2
7
1
4
2
2
9
0
3
-
-
1
0
1
1
3
21 (41%)
20 (39%)
18 (38%)
30 (63%)
11 (22%)
12 (24%)
15 (29%)
13 (25%)
51
Table 4. List of new strong links according to emergence, stability, and functional class
Spillover within
same function
Spillover between
different operand
Spillover between
different operation
T1
CAM-IC (8)*
MIS-OIS (8)*
IC-LED (7)
IC-SPP (8)*
BAT-FC (8)*
CAM-SIS (3)
EM-FLY (8)*
IC-SIS (5)
EM-PMM (7)⁺*
PMM-SCD (3)⁺
LED-SCD (1)⁺
-
LED-PLG (2)⁺
CAM-PLG (1)⁺
-
CAM-LED (3)⁺
-
MIS-PMM (2)
FLY-SCD (1)⁺
CAP-SCD (2)
Spillover between
different operand
and operation
CAP-ET (1)
IC-SCD (6)
AIR-WIND (7)⁺*
EM-MIS (5)
PMM-MRI (5)⁺
EM-ET (1)
ET-IL (5)*
CAP-IC (4)*
T2
-
T3
T4
T5
T6
LED-SPP (4)
CT-MRI (6)⁺*
EM-WIND (4)
IL-LED (4)⁺*
PLG-3D (4)*
BAT-CAP (4)*
ET-OT (3)*
T7
SPP-WIND (1)
T8 MIL-3D (1)⁺
IL-3D (2)⁺
EM-MIL (3)*
CT-3D (1)
CAM-IL (1)⁺
IC-3D (1)
SPP-3D (1)⁺
-
EC-SIS (2)
PMM-WIND (2)⁺
BAT-SPP (3)*
EM-SCD (1)
CE-FLY (2)*
BAT-ET (2)
FLY-MIL (1)⁺
MRI-SCD (2)*
CAP-3D (1)⁺
FLY-WIND (1)⁺
SCD-3D (1)⁺
⁺Noted links emerge from zero (emergence); numbers in brackets are the counts of the
periods when links stay strong and *noted links stay strong until last period (stability)
18
In terms of stability, the strong links either stay strong until the end or fluctuate as
strong, weak, and zero links. 18 among 51 links (38%) stay strong ever since their emergence
while 30 links fluctuate, with the last 3 links unclassified since the next state is unknown. The
average periods in which links stay strong during the 8 periods is 3.3 periods for all strong
links and 5.2 periods for stable links. Even in the case of fluctuating links, they stay strong
for an average of 2.2 periods. Over all the time periods, there are five links that always stay
strong: EM-FLY, BAT-FC, IC-SPP, MIS-OIS, and CAM-IC. These represent closely
associated or partially merged domain pairs for the entire 38 years rather than merging at
some point and none of the cases are technologically surprising as being linked. There are
four interesting cases where links abruptly emerge and stay stable which will be examined
more closely when we test the link prediction methodology: EM-PMM, AIR-WIND, CT-MRI,
and IL-LED.
We also investigated functional classes by differentiating links appearing within the
same functional class, between different operands, between different operations, or between
different operand and operation. For example, both IL and of 3D have transformation as the
operation, but the operand of IL is energy and that of 3D is material; thus, IL-3D is spillover
between different operands. The portion of the four types that experience strong knowledge
flow are similar, although links between different operation capture slightly more. The
spillover around the superconductor domain (SCD) occurs frequently between different
operations. Integrating with stability, there are many links (7 out of 11) within the same
function that are stable. Overall, these results suggest that putting higher weights on
functional relationships is not a viable way to improve the predictions and that functional
similarity is not useful in predicting knowledge flow.
19
4. Cross-TD network evolution analysis using link prediction
4.1. Experimental procedure
For the constructed snapshots of cross-TD networks3, link prediction metrics are tested to
determine their ability to capture the characteristics of the network dynamic evolution. Patent
citation-based knowledge flows among TDs for 8 periods form undirected networks with CS
weights as documented in the previous section. Link prediction is now conducted in a "back-
casting" mode and results compared to the actual results. In this setting, we define a training
period as T1, T2,..., and T7 and the testing period as the next period after the training period;
if the training network is GT1, the testing network is GT2. Thus, the link prediction
experiments are implemented for 7 periods. Unlike many other studies that predict newly
appearing links only, we consider both new links and recurring links because the snapshot of
cross-TD relationships can fluctuate after first emergence as seen in the previous section.
The overall approach to the experiments are shown in Figure 2. First, the similarity
scores for all pairs of TDs are calculated using each of the eight metrics: weighted
CommonNeighbors, weighted Jaccard, weighted Adamic-Adar, weighted ResourceAllocation,
weighted PreferentialAttachment, Katz, RootedPageRank, and SimRank. The python-based
package, 'linkpred' (Guns, 2014) was used for calculation. For global predictors that need to
determine parameters (α, β, γ), we set several different parameters and examine sensitivity of
model performance by trial-and-error. If there is no more change in performance when the
parameter increases or decreases, we stop varying the parameter. As a result, α of
RootedPageRank and γ of SimRank are set as 0.01, 0.1, 0.5, and 0.9; β of Katz is set as 0.001,
0.1, and 0.5.
Second, the calculated similarity scores are used as weights for a predicted network,
which is the basic and most commonly used unsupervised method in link prediction (Murata
3 See cross-TD networks in appendix 1 (training networks) and 2 (testing networks).
20
and Moriyasu, 2007; Newman, 2001). In general link prediction, the aim is to find
"existence" of links based on the ranks of similarity values (Zhu and Xia, 2016; Lü and Zhou,
2011). But the objective of the link prediction here is to find "whether the links will have
weights larger than 1" that is whether a link greater than randomly expected will exist. A
problem arises on the scale of measures: although the actual links have CS values ranging
from 0 to ∞, the Jaccard measure ranges from 0 to 1, and PreferentialAttachement ranges for
even larger intervals. Thus, the rescaling of similarity scores to be similar to actual CS values
is necessary. The rescaling is achieved by normalizing similarity scores (dividing similarity
scores by their maximum value) and multiplying by the maximum CS value at the training
period. For example, the maximum Adamic-Adar value for GT6 is 14.5 and the actual
maximum CS of GT6 is 23.18; we normalize Adamic-Adar scores for all links by dividing
them by 14.5 and then multiply 23.18 so that the predicted link weights are scaled similarly
as the actual CSs.
Figure 2. Logical structure of our experiments (modified from Murata and Moriyasu (2007))
21
Last, the prediction performances are evaluated for each predictor by comparing
predicted links and actual links at each testing period, e.g., the predicted link weights
calculated from GT6, is compared with CS of GT7. In particular, as our focus is on the links
whose weights are estimated as strong (larger than 1), the confusion matrix (Powers, 2011) is
based on whether the CS value is strong (true condition positive) and the predicted link
weight is strong (predicted condition positive). Thus, true positives (TPs) are the case when
the predicted weight and actual CS of a particular link at a certain testing period are strong
and true negatives (TNs) are the opposite case when both are weak or zero. The false
positivies (FSs) are the case when a prediction of strong positive link is made for a link that is
actually weak or zero whereas the false negatives (FNs) are the case when a prediction that a
link is weak or zero is made for a link that is actually strong.
The accuracy of the predictors/models measures the ratio of true predictions, both
TPs and TNs, over all possible links. The precision (positive prediction value) measures
whether the links, that a model predicts as strong, are observed to be strong: it is the ratio of
the number of TPs divided by predicted condition positive, the total number of links whose
weight are strong in the predicted networks. On the other hands, the recall (sensitivity)
indicates whether a model correctly senses the actual strong links: it is calculated as the
number of true positives divided by the total number of links who are actually strong in the
testing network. The precision and recall present trade-offs, thus, we find the mean of recall
and precision values, which gives us an estimate of how well each predictor represents the
actual strong links. The F-score of each predictor at each testing period is calculated by
taking the harmonic mean of the recall and precision. When TP, TN, FP and FN represent
the number of true positives, true negatives, false positives and false negatives rates,
respectively, the performance measures are formulated as:
22
(10)
(11)
(12)
(13)
4.2. Testing results for predictions
The performance of all of the predictors4 for all periods are illustrated in Figure 3. The
accuracy of the Katz models (figure 3a) are close to 1 with particularly small deviation at
β=0.001 while that of RootedPageRank, PreferentialAttachement, CommonNeighbors, and
Adamic-Adar are also >0.8. The precision of the Katz models (figure 3b) are close to 0.8
while that of RootedPageRank, PreferentialAttachment, CommonNeighbors, and Adamic-
Adar are <0.4. But the recall (sensitivity) (figure 3c) shows somewhat different results: the
recall of RootedPageRank models are >0.8 especially at α = 0.9 and 0.5; that of the SimRank
models at a large γ = 0.9 and 0.5 are also close to 0.8; and that of ResouceAllocation is 0.7
with large deviation whereas that of the Katz at β=0.001 is close to 0.7 with small deviation.
Consequently, for the key overall F-score (figure 3d), the Katz (β=0.001) model is the best
performer at every period, vastly superior to other predictors. The Katz (β=0.01) model has
the same performance at T2, T4, and T6 but lower F-score in other periods.
4 For detailed values, see Appendix 4
23
TPTNAccuracyTPTNFPFN_Pr__TPtruepositiveecisionpredictedconditionpositiveTPFP_Re__TPtruepositivecalltrueconditionpositiveTPFN2PrRePrReecisioncallFscoreecisioncall(a) Accuracy
(b) Precision
(c) Recall
24
Figure 3. Link prediction performance: (a) accuracy; (b) precision; (c) recall; and (d) F-score
(d) F-score
Although recall is not so high, the Katz model turns out as the best performer due to
the high precision it achieves. If the Katz predicts that a link is strong, the prediction is
almost always correct. But the Katz predictions can overlook or not predict some actual
strong links. In contrast, the RootedPageRank model has better recall (~0.8) than Katz (~0.7)
but has substantially poorer precision (~0.4) than Katz (~0.8). Due to good recall, the
RootedPageRank senses or detects the actual strong links well. However, as the poor
precision means that many case of predictions are false alarms, the strong links that the model
predicts are often actually not strong. Similar results of large recall and small precision are
also found in SimRank and ResouceAllocation. The Katz metric predicts only a small number
of both strong and weak links whereas the others predicted large number of both types5
although their contribution to TPs are different.
As the Katz model yields a small number of positive predictions, its TPs are also
5 For detailed number of predicted links, see Appendix 3
25
relatively small. We found that most TPs of the Katz model are also predicted by
RootedPageRank. Going beyond the prediction of strong or not, Figure 46 illustrates the
actual and predicted link weights for four interesting links that abruptly emerge and stay
stable. The CT-MRI (figure 4a) and AIR-WIND (figure 4b) show excellent performance by
the Katz model at all periods, except for a FN at the start of increases in T3. The
RootedPageRank also shows decent performance despite overly large values, but other
metrics are poor. In a case when peak patterns have stability as in the IL-LED (figure 4c),
both predictors also perform well. In summary the RootedPageRank tends to overestimate the
link weights and have bigger increases than the Katz, with the exception of the EM-PMM
case (figure 4d): the RootedPageRank is slightly passive in following the actual patterns,
even though both models are successful at all periods, except for T2.
(a) CT-MRI (b) AIR-WIND
6 Note that the global models in figures 4-6 are the best performing parameters: Katz (β=0.001) and
RootedPageRank (α=0.01)
26
(c) IL-LED (d) EM-PMM
Figure 4. Some cases of links abruptly emerge and stay stable: successful in both Katz and
RootedPageRank
Figure 5 shows other cases of successful predictions of the Katz model only. In the
LED-PLG case (figure 5a), the model successfully predicts being stable at T3 and the
decrease at T5, even though unsuccessful in detecting the decrease in T4 (FP).
RootedPageRank also predicts a decrease but largely misses the degree of change. The CAP-
ET (figure 5b) and CAM-SIS (figure 5c) start as strong links but decrease to weak links in
early periods (T2 and T3, repectively). In these cases, the Katz estimates rapidly decrease and
stay zero in remaining periods: although it misses the first decrease in T3 and T4 (FP), there
are no FNs. But the RootedPageRank model stays strong in every period thus there are many
FPs. When comparing Katz with CommonNeighbors in Figure 5a and 5b, they show
compeletely different predictions. Although the Katz model with a very small β might be
intuitively expected to yield a measurement close to CommonNeighbors (because the long
paths then contribute very little), in fact Katz with small beta emphasizes the direct link
whereas CommonNeighbors does not instead emphasizing the links between neighboring
nodes.
27
(a) LED-PLG (b) CAP-ET
(c) CAM-SIS
Figure 5. Some cases of successful predictions of the Katz model
On the other hand, Figure 6 presents unsuccessful predictions of the Katz model. In
the PMM-MRI case (figure 6a), although both the Katz model and RootedPageRank fail to
predict the decrease at T4, RootedPageRank predicts successfully after that while the Katz
model has a TP at only T7 and T8. In the CE-FLY case (figure 6b), the Katz model continues
to show negative prediction and has a TP only at T8 whereas the RootedPageRank begins to
increase at T5, and shows TPs at T6 to T8 and T7 to T8 respectively. Similarly, in the EC-SIS
case (figure 6c), the TPs of Katz exist only at T7 whereas that of the RootedPageRank is at
T6 and T7. But in two cases of CE-FLY and EC-SIS, RootedPageRank has many FPs.
28
(a) PMM-MRI (b) CE-FLY
(c) EC-SIS
Figure 6. Some cases of unsuccessful predictions of the Katz
Whether successful or not, the Katz model tends to predict the increase or decrease of
link weights in a conservative and cautious manner while the RootedPageRank models
predict in an excessively positive way. The Katz model is highly dependent on the last CS
that is larger than 1; it follows the training data trends with one period of time lag. It is
successful in predicting sustaining, stable links; but weak in predicting new emergence of
strong links, which emerge abruptly (from zero) or incrementally (from weak), because the
model rarely considers weak links.
29
5. Discussion
This paper empirically analyzed the dynamic pattern and evolution of technological
knowledge flows among TDs. A key empirical finding is that the domains we studied interact
with only a small minority of other specific domains (2% in the initial period and 9% at the
highest in period 7). Moreover, the fraction of citations going to any other specific domain is
less than a few percent of the total patent citations by a domain, but on average 70% of the
patent-citations are to patents not in the domain of the patent. Thus, empirically it is clear that
cross-domain knowledge flow is important overall (~70% of knowledge input on average)
even though it is restricted somewhat to specific domain pairs since only 2-9% of possible
links are strong in our results. A further implication is that the average domain must interact
with multiple other domains in order to achieve the 70% inter-domain knowledge flow since
typical strong inter-domain knowledge flows for a specific linkage only account for a few
percent of the total knowledge flow to or from a domain..
In regard to the empirical time dependence of the cross-domain linkages, most that are
above expectation become relatively steady after emerging from either zero or weak
interactions. Some show slow decreases in intensity, some show slow increases and others are
classified as steady (see Table 5). The average of 83% condition positives (strong links of
testing networks at each period) follow decreasing, increasing or steady patterns. Table 5 also
shows that among all condition positives, 68% of the strong links at T were also strong at T-1.
This finding suggests that interaction among domains is not "one-time knowledge flow" but
mostly continual idea transfer. We also find that knowledge flow is heterogenous and is
almost equally likely to occur across operands (from energy technologies to information
technologies) and across operations (from storage to transformation) as is it to occur within a
given functional classification (for example energy storage). Overall, these empricial results
suggest that the limits to transfer of ideas between domains (small numbers of strong
30
interactions) are not functionally dictated.
T2
T3
15
7
0
5
3
80%
Table 5. Interpretation (pattern proportion)
Condition
T4
positives
Total
Decreasing
Increasing
Steady
Peak
Proportion of
decreasing,
increasing, steady
patterns
Links that are also
strong at T-1
15
6
2
7
0
100%
9
(60%)
11
(73%)
15
4
3
8
0
100%
11
(73%)
T5
T6
T7
T8
Total
20
5
5
7
3
85%
28
4
8
10
6
79%
36
5
9
10
12
67%
29
4
9
8
8
72%
158
35
36
55
32
83%
11
(55%)
18
(64%)
23
(64%)
24
(83%)
107
(68%)
An important distinction of the work reported here is that we pursue prediction of
links in the next time period based upon observations in the preceding time period. This has
practical implications that we will discuss further below. At this point, we note that our
testing of various models for such prediction suggests additional implications for
understanding knowledge flow among differing technological domains. An important finding
of this type is that triadic closure is unimportant as a mechanism for forming linkages among
technological domains despite its widespread utility for understanding the dynamic evolution
of many complex networks (Bianconi et al., 2014; Kleinberg, 2008; Liben-Nowell and
Kleinberg, 2007). This
is shown by
the non-existent prediction power of
the
CommonNeighbor and other local topology prediction models. The fact that two technologies
have significant interaction with a specific third domain not at all predicts that these two
technologies will interact in the future. For example, the camera and LED lighting domains
were not linked but had a strong common neighbor integrated circuit (IC) domain at T1 (the
CS of CAM-IC was 13.89 and that of IC-LED was 4.81). Not surprisingly, the CAM-LED
31
link is predicted as strong by most local predictors, but the actual CS at T2 was zero. The
links between semiconductor technology (IC) and both LEDs and Cameral sensitivity are
aligned with technical facts about these domains, but there are no such technical reasons for
knowledge flow directly between LEDs and Camera development. Among many other
similar examples, we note flywheel and wind turbines (FLY-WIND) at T5 where having both
magnetic information storage (MIS) and electric motors (EM) as common neighbors leads to
a predicted link; but since these common neighbors do not signify a knowledge flow between
flywheels and wind turbines, the predicted link does not occur. If we contrast this result with
the very successful Katz prediction at low Beta, we are led to the conclusion that the Katz
predictor reliance on direct links to predict further interaction overcomes the weakness of
triadic closure prediction, mainly by assuring an ability to interact directly before the
prediction of stronger interaction.
Similar to the failure of triadic closure in being an effective predictive mechanism, it
appears that the "rich get richer" mechanism associated with power laws and preferential
attachment (Barabási et al., 2002; Watts and Strogatz, 1998) is not effective in predicting
future links. The F-score and other measures of the effectiveness of the power law metrics is
weak (figures 3) and suggests that preferential attachment is not the mechanism by which
domains are linked to one another. Thus, domains that have a relatively high number of
interactions at one time period are not more likely to form new linkages in the next time
period. Interestingly, this suggests that the conceptually appealing idea of general purpose
technologies as knowedge sources (Moser et al., 2015; Jovanovic and Rousseau, 2005) is not
supported: general purpose technologies would be high degree nodes in a cross-domain
network, and if general purpose technologies are thus a dominant mechanism for the spillover
of ideas, preferential attachment would be expected to show good performance. The results
do not demonstrate such an effect. This result does not suggest that general purpose
32
technologies are economically unimportant but instead that extending the concept to cover
knowledge spillovers is not supported by our results. There is good evidence (Brynjolfsson
and McAfee, 2014) that the integrated circuits domain has been very economically significant
during the last 40 years; nonetheless, the inclusion of IC in the 29 domains we investigated
did not result in importance of highly interactive domains in forging new knowledge-flow
links over time.
The most successful predictors are global metrics (Katz and RootedPageRank) based
upon the overall network that do not assume near neighbor interactions as important. This
finding suggests that paths of strong cumulative development such as first suggested by Dosi
are a viable concept. Moreover, the success of the Katz model is not just relatively strong
because of the failiure of triadic closure and preferential attachment but absolutely strong
enough to be practically useful: The Katz model successfully predicted when a link stably
stays strong (as shown in Figure 4) and predicted better than RootedPageRank when a link
changes to and stays stable at weak or zero (as shown in Figure 5). This absolute strength is
consistent with the steady patterns exhibited by most strong interactions among the domains
and with the fact that strong links continue strong in next period (as shown in Table 5). Thus,
the Katz model gives us a quantitative, predictive interpretation of why the strong linkages
are relatively steady with time. Qualitatively, the success of the model indicates that most of
the inter-domain knowledge flow is continuation of past flows starting from when domains
are first formed, and also suggests that trajectories utilize technologically diverse knowledge.
6. Conclusion
This study investigated the dynamic evolution of knowledge flow across technological
domains. Filling the gaps from the previous research, the study used technological domain
units to capture knowledge flows among technological artifacts, and the link prediction
33
method to help characterize the topological change and evolutionary behaviors in dynamic
technology networks. As an early attempt that applies link prediction to patent citation-based
networks, this study offers the basis for predicting the emergence and continuance of future
technological knowledge flows.
This research particularly has implications for the dynamic capabilities of firms
(Teece, 2007; Teece, Pisano, and Shuen, 1997). Dynamic capabilities allow significant
change to occur within the firm so that it can adapt more effectively than other firms to a
change in the environment (Teece, 2007). Given the importance of cross-domain knowledge
spillovers to creation of technological variety (Schoenmakers and Duysters, 2010), a
potentially important aspect of firm dynamic capabilities is the anticipation and integration of
such spillovers to domains that are critical to the firm. Our findings show that the existence of
such spillovers is predictable to a significant extent through link prediction using the Katz
model. Thus, our results suggest that a key strategic asset of a firm can be at least somewhat
planned for.
A first task for any firm striving to be more mindful of important sources of
knowledge spillovers is to first analyze which technological domains are important in the
products and services they produce. A systematic procedure for identifying more details about
such technologies is available (Benson and Magee, 2015, 2016) and can lead to identification
of patents with all of their attendant information, such as citations by these patents, which is
the key step in identifying the important knowledge spillover sources. Having the capability
to handle such spillovers will require some attention to expertise acquisition (employees or
outsiders) and/or collaboration in the technological domains of importance, but also some
attention to developments in "non-core" areas.
Our results indicate that the sources of the knowledge spillover are relatively stable,
making identification and awareness maintenance more doable for the firms who take it on.
34
Such stability in a key aspect of long-term change was pointed out in an important paper by
Helfat and Winter (2011), which showed that dynamic and operational capabilities had at best
a fuzzy boundary. In the case discussed here, the spillover domains are mostly fixed over
time, with only the formation of new domains unknown.
In addition to further research on the dynamics of the formation of new domains,
other aspects of the research reported here that might be improved in the future are worth
noting. First, while the patent coverage in our dataset is extensive (502,444 patents), it is not
the total US patent set for the years studied (4,666,574 patents) and thus define samples of
domains rather than a total set. This is important since the focus of the work is cross-domain
knowledge flow; however, the set of domains tested here is numerous and broad enough that
our results (network metrics that are good at predicting relatively stable linkages work best)
appear robust. While we tested a wide range of models, first difference time series have
recently been demonstrated for link prediction (for example using ARIMA) and future
research could explore this.
Acknowledgments
The authors acknowledge support from the SUTD-MIT International Design Center (IDC).
We also thank Chris Benson and Subarna Basnet for sharing the patent sets for the 29
technology domains used in this study.
References
Acemoglu D, Akcigit U, Kerr WR. 2016. Innovation network. Proceedings of the National
Academy of Sciences 113(41): 11483–11488.
Adamic LA, Adar E. 2003. Friends and neighbors on the Web. Social Networks 25(3): 211–
230.
Alcácer J, Gittelman M. 2006. Patent Citations as a Measure of Knowledge Flows: The
Influence of Examiner Citations. Review of Economics and Statistics. The MIT Press
88(4): 774–779.
35
Barabási A. et al. 2002. Evolution of the social network of scientific collaborations. Physica
A: Statistical Mechanics and its Applications 311(3): 590–614.
Basnet S. 2015. Modeling Technical Performance Change Using Design Fundamentals.
Massachusetts Institute of Technology.
Basnet S, Magee CL. 2016. Modeling of technological performance trends using design
theory. Design Science 2(e8).
Benson CL, Magee CL. 2013. A hybrid keyword and patent class methodology for selecting
relevant sets of patents for a technological field. Scientometrics 96(1): 69–82.
Benson CL, Magee CL. 2015. Technology structural implications from the extension of a
patent search method. Scientometrics 102(3): 1965–1985.
Benson CL, Magee CL. 2016. Using Enhanced Patent Data for Future-Oriented Technology
Analysis. In Anticipating Future Innovation Pathways Through Large Data Analysis,
Tugrul U. Daim, Denise Chiavetta, Alan L. Porter, Ozcan Saritas (eds). Springer
International Publishing: 119–131.
Bianconi G, Darst R, Iacovacci J, Fortunato S. 2014. Triadic closure as a basic generating
mechanism of communities in complex networks. Physical Review E 90(4): 42806.
Brin S, Page L, Brin S, Page L. 1998. The anatomy of a large-scale hypertextual Web search
engine. Computer Networks and ISDN Systems. Elsevier Science Publishers B. V. 30(1–
7): 107–117.
Brynjolfsson E, McAfee A. 2014. The Second Machine Age: Work, Progress, and Prosperity
in a Time of Brilliant Technologies. W. W. Norton & Company: New York.
Caviggioli F. 2016. Technology fusion: Identification and analysis of the drivers of
technology convergence using patent data. Technovation 55–56: 22–32.
Chang S-B, Lai K-K, Chang S-M. 2009. Exploring technology diffusion and classification of
business methods: Using the patent citation network. Technological Forecasting and
Social Change 76(1): 107–117.
Chen Z, Guan J. 2016. The core-peripheral structure of international knowledge flows:
evidence from patent citation data. R&D Management 46(1): 62–79.
Cho T-S, Shih H-Y. 2011. Patent citation network analysis of core and emerging technologies
in Taiwan: 1997–2008. Scientometrics 89(3): 795–811.
Cho Y, Kim E, Kim W. 2015. Strategy transformation under technological convergence:
evidence from the printed electronics industry. International Journal of Technology
67(2/3/4): 106–131.
Choi C, Park Y. 2009. Monitoring the organic structure of technology based on the patent
development paths. Technological Forecasting and Social Change 76(6): 754–768.
Choi J, Hwang Y-S. 2014. Patent keyword network analysis for improving technology
development efficiency. Technological Forecasting and Social Change 83: 170–182.
Clauset A, Moore C, Newman MEJ. 2008. Hierarchical structure and the prediction of
missing links in networks. Nature 453(7191): 98–101.
Clough JR, Gollings J, Loach T V., Evans TS. 2015. Transitive reduction of citation networks.
Journal of Complex Networks 3(2): 189–203.
Dasgupta K, Singh R, Viswanathan B. 2008. Social ties and their relevance to churn in
mobile telecom networks. In Proceedings of the 11th international conference on
Extending database technology: Advances in database technology. Nantes, France.
Dosi G. 1982. Technological paradigms and technological trajectories. Research Policy
11(3): 147–162.
Duguet E, MacGarvie M. 2005. How well do patent citations measure flows of technology?
Evidence from French innovation surveys. Economics of Innovation and New
Technology. Routledge 14(5): 375–393.
36
É rdi P et al. 2013. Prediction of emerging technologies based on analysis of the US patent
citation network. Scientometrics. Springer Netherlands 95(1): 225–242.
Esslimani I, Brun A, Boyer A. 2011. Densifying a behavioral recommender system by social
networks link prediction methods. Social Network Analysis and Mining. Springer
Vienna 1(3): 159–172.
Funk RJ, Owen-Smith J. 2016. A Dynamic Network Measure of Technological Change.
Management Science (March): mnsc.2015.2366.
Gentner D, Markman A. 1997. Structure mapping in analogy and similarity. American
Psychologist 52(1): 45–56.
Guimerà R, Sales-Pardo M. 2009. Missing and spurious interactions and the reconstruction of
complex networks. Proceedings of the National Academy of Sciences of the United
States of America. National Academy of Sciences 106(52): 22073–8.
Guns R. 2014. Link Prediction. In Measuring Scholarly Impact - Methods and Practice, Ding
Y, Rousseau R, Wolfram D (eds). Springer International Publishing: Cham: 35–56.
Han Y, Park Y. 2006. Patent network analysis of inter-industrial knowledge flows: The case
of Korea between traditional and emerging industries. World Patent Information 28(3):
235–247.
Helfat CE, Winter SG. 2011. Untangling dynamic and operational capabilities: Strategy for
the (N)ever-changing world. Strategic Management Journal 32(11): 1243–1250.
Huang Z, Zeng D. 2006. A link prediction approach to anomalous email detection. In Systems,
Man and Cybernetics, 2006. SMC'06. IEEE International Conference on: 1131–1136.
Hung S-W, Wang A-P. 2010. Examining the small world phenomenon in the patent citation
network: a case study of the radio frequency identification (RFID) network.
Scientometrics. Springer Netherlands 82(1): 121–134.
Itakura KY, Clarke CLA, Geva S, Trotman A, Huang WC. 2011. Topical and Structural
Linkage in Wikipedia. In Advances in Information Retrieval. ECIR 2011. Lecture Notes
in Computer Science, vol 6611, Clough P et al. (eds). Springer: Berlin, Heidelberg: 460–
465.
Jaffe A, Trajtenberg M, Fogarty M. 2000. Knowledge Spillovers and Patent Citations:
Evidence from a Survey of Inventors. American Economic Review 90(2): 215–218.
Jaffe A, Trajtenberg M, Henderson R. 1993. Geographic localization of knowledge spillovers
as evidenced by patent citations. the Quarterly journal of Economics 108(3): 577–598.
Jeh G, Widom J. 2002. SimRank: a measure of structural-context similarity. In Proceedings
of the eighth ACM SIGKDD international conference on Knowledge discovery and data
mining - KDD '02. ACM Press: New York, USA: 538–543.
Jovanovic B, Rousseau PL. 2005. General Purpose Technologies. In Handbook of Economic
Growth, Aghion P, Durlauf SN (eds), 1B: 1181–1224.
Karki M. 1997. Patent citation analysis: A policy analysis tool. World Patent Information.
Katz L. 1953. A new status index derived from sociometric analysis. Psychometrika.
Springer-Verlag 18(1): 39–43.
Kim D, Cerigo DB, Jeong H, Youn H. 2016. Technological novelty profile and invention's
future impact. EPJ Data Science 5(8): 1–15.
Kim E, Cho Y, Kim W. 2014. Dynamic patterns of technological convergence in printed
electronics technologies: Patent citation network. Scientometrics 98(2): 975–998.
Kleinberg J. 2008. The convergence of social and technological networks. Communications
of the ACM 51(11): 66–72.
Ko N, Yoon J, Seo W. 2014. Analyzing interdisciplinarity of technology fusion using
knowledge flows of patents. Expert Systems with Applications 41(4): 1955–1963.
Koh H, Magee CL. 2006. A functional approach for studying technological progress:
37
Application to information technology. Technological Forecasting and Social Change
73(9): 1061–1083.
Lee S, Kim M-S. 2010. Inter-technology networks to support innovation strategy: An
analysis of Korea's new growth engines. Innovation 12(1): 88–104.
Lee WJ, Lee WK, Sohn SY. 2016. Patent Network Analysis and Quadratic Assignment
Procedures to Identify the Convergence of Robot Technologies. Plos One, Gao Z-K (ed).
Public Library of Science 11(10): e0165091.
Li J, Zhang L, Meng F, Li F. 2014. Recommendation Algorithm based on Link Prediction
and Domain Knowledge in Retail Transactions. Procedia Computer Science 31: 875–
881.
Liben-Nowell D, Kleinberg J. 2007. The link-prediction problem for social networks. Journal
of the American Society for Information Science and Technology 58(7): 1019–1031.
Lü L, Zhou T. 2011. Link prediction in complex networks: A survey. Physica A: Statistical
Mechanics and its Applications 390(6): 1150–1170.
Luan C, Liu Z, Wang X. 2013. Divergence and convergence: Technology-relatedness
evolution in solar energy industry. Scientometrics 97(2): 461–475.
Magee CL, Basnet S, Funk JL, Benson CL. 2016. Quantitative empirical trends in technical
performance. Technological Forecasting and Social Change. The Authors 104: 237–246.
Martinelli A, Nomaler Ö . 2014. Measuring knowledge persistence: a genetic approach to
patent citation networks. Journal of Evolutionary Economics. Springer Berlin
Heidelberg 24(3): 623–652.
Mina A, Ramlogan R, Tampubolon G, Metcalfe JS. 2007. Mapping evolutionary trajectories:
Applications to the growth and transformation of medical knowledge. Research Policy
36(5): 789–806.
Moser P, Nicholas T, Nicholas TOM. 2015. Was Electricity a General Purpose Technology?
Patent Citations Evidence from Historical. The American Economic Review, Papers and
Proceedings 94(2): 388–394.
Murata T, Moriyasu S. 2007. Link Prediction of Social Networks Based on Weighted
Proximity Measures. In IEEE/WIC/ACM International Conference on Web Intelligence
(WI'07). IEEE: 85–88.
Newman MEJ. 2001. Clustering and preferential attachment in growing networks. Physical
Review E. American Physical Society 64(2): 25102.
No HJ, Park Y. 2010. Trajectory patterns of technology fusion: Trend analysis and
taxonomical grouping in nanobiotechnology. Technological Forecasting and Social
Change. Elsevier Inc. 77(1): 63–75.
Nomaler Ö , Verspagen B. 2016. River deep, mountain high: Of long‐run knowledge
trajectories within and between innovation clusters. Journal of Economic Geography
16(6): 1259–1278.
Park H, Magee CL. 2017. Tracing Technological Development Trajectories: A Genetic
Knowledge Persistence-Based Main Path Approach. PLoS ONE, Gao Z-K (ed). Harvard
University Press 12(1): e0170895.
Park J, Lee H, Park Y. 2009. Disembodied knowledge flows among industrial clusters: A
patent analysis of the Korean manufacturing sector. Technology in Society. Elsevier Ltd
31(1): 73–84.
Perez-Cervantes E, Mena-Chalco JP, Oliveira MCF De, Cesar R. 2013. Using Link
Prediction to Estimate the Collaborative Influence of Researchers. In 2013 IEEE 9th
International Conference on e-Science. IEEE: 293–300.
Powers DMW. 2011. Evaluation: From Precision, Recall, and F-measure to ROC,
Informedness, Markedness & Correlation. Journal of Machine Learning Technologies
38
2(1): 37–63.
Price D de S. 1976. A general theory of bibliometric and other cumulative advantage
processes. Journal of the American society for Information 27(5): 292–306.
Ruttan VW. 1959. Usher and Schumpeter on Invention, Innovation, and Technological
Change. The Quarterly Journal of Economics 73(4): 596–606.
Salton G, McGill M. 1983. Introduction to modern information retrieval. McGraw-Hill: New
York.
Schoenmakers W, Duysters G. 2010. The technological origins of radical inventions.
Research Policy 39: 1051–1059.
Shih H-Y, Chang T-LS. 2009. International diffusion of embodied and disembodied
technology: A network analysis approach. Technological Forecasting and Social
Change 76(6): 821–834.
Shin J, Park Y. 2010. Evolutionary optimization of a technological knowledge network.
Technovation 30(11–12): 612–626.
Teece D. 2007. Explicating dynamic capabilities: the nature and microfoundations of
(sustainable) enterprise performance. Strategic management journal 28(13): 1319–1350.
Teece DJ, Pisano G, Shuen A. 1997. Dynamic Capabilities and Strategic Management.
Strategic Management Journal. Wiley 18(7): 509–533.
Trajtenberg M. 1990. A Penny for Your Quotes: Patent Citations and the Value of
Innovations. The RAND Journal of Economics 21(1): 172.
Travers J, Milgram S. 1967. The small world problem. Phychology Today 1(1): 61–67.
Triulzi G, Alstott J, Magee CL. 2017, June 15. Predicting Technology Performance
Improvement Rates by Mining Patent Data. SSRN. Available at:
https://ssrn.com/abstract=2987588.
Usher AP. 1954. A history of mechanical inventions. Harvard University Press: Cambridge,
MA.
Valverde-Rebaza J, de Andrade Lopes A. 2013. Exploiting behaviors of communities of
twitter users for link prediction. Social Network Analysis and Mining. Springer Vienna
3(4): 1063–1074.
Verspagen B. 2007. Mapping technological trajectories as patent citation networks: a study
on the history of fuel cell research. Advances in Complex Systems. World Scientific
Publishing Company 10(1): 93–115.
Verspagen B, De Loo I. 1999. Technology Spillovers between Sectors and over Time.
Technological Forecasting and Social Change 60(3): 215–235.
Ter Wal A. 2014. The dynamics of the inventor network in German biotechnology:
geographic proximity versus triadic closure. Journal of Economic Geography 14(3):
589–620.
Watts D, Strogatz S. 1998. Collective dynamics of 'small-world'networks. Nature 393(6684):
440–442.
Weisberg RW. 2006. Creativity: understanding innovation in problem solving, science,
invention, and the arts. John Wiley & Sons.
Zhou T, Lu L, Zhang Y-C. 2009. Predicting Missing Links via Local Information. European
Physical Journal B 71(4): 623–630.
Zhu B, Xia Y. 2016. Link Prediction in Weighted Networks: A Weighted Mutual Information
Model. PLoS ONE, Sendiña-Nadal I (ed). Public Library of Science 11(2): e0148265.
39
Appendix 1. Cross-TD networks (training networks)
(a) Network at period 1
(b) Network at period 2
40
(c) Network at period 3
(d) Network at period 4
41
(e) Network at period 5
(f) Network at period 6
42
(g) Network at period 7
(a) Network at period 8
43
Appendix 2. Cross-TD networks (strong links, testing networks)
(a) Network at period 1 (cutoff =1)
(b) Network at period 2 (cutoff =1)
44
(c) Network at period 3 (cutoff =1)
(d) Network at period 4 (cutoff =1)
45
(e) Network at period 5 (cutoff =1)
(f) Network at period 6 (cutoff =1)
46
(g) Network at period 7 (cutoff =1)
(h) Network at period 8 (cutoff =1)
47
Appendix 3. Link prediction results: Number of predicted and actual links
T2
17
23
19
35
9
10
10
3
3
CommonNeighbors
Jaccard
Adamic-Adar
ResourceAllocation
PreferentialAttachment
Katz (β=0.001)
Katz (β=0.01)
Katz (β =0.1)
Katz (β =0.5)
RootedPageRank (α=0.01) 23
RootedPageRank (α=0.1)
27
RootedPageRank (α=0.5)
55
RootedPageRank (α=0.9)
83
SimRank (γ=0.01)
35
SimRank (γ=0.1)
37
SimRank (γ=0.5)
60
SimRank (γ=0.9)
77
Actual
15
53
CommonNeighbors
47
Jaccard
40
Adamic-Adar
ResourceAllocation
35
141
PreferentialAttachment
Katz (β=0.001)
9
Katz (β=0.01)
9
Katz (β =0.1)
16
Katz (β =0.5)
16
RootedPageRank (α=0.01) 148
RootedPageRank (α=0.1)
144
RootedPageRank (α=0.5)
116
RootedPageRank (α=0.9)
88
SimRank (γ=0.01)
136
SimRank (γ=0.1)
134
SimRank (γ=0.5)
111
SimRank (γ=0.9)
94
Actual
69
Stron
g
links
Weak
links
T4
18
54
27
124
29
15
15
6
4
38
40
63
175
111
116
147
127
15
304
268
255
198
252
29
29
38
40
313
311
288
176
240
235
204
224
166
T5
84
103
99
155
21
15
11
1
1
55
57
77
279
146
148
185
215
20
287
268
251
216
283
29
33
43
43
323
321
301
99
232
230
193
163
196
T6
30
91
65
193
38
20
20
6
5
55
87
87
316
153
167
230
275
28
348
287
307
185
290
87
87
101
102
323
291
291
62
225
211
148
103
245
T7
52
151
104
253
30
28
16
8
7
79
87
146
378
226
234
272
280
36
354
255
301
153
348
95
107
115
116
327
319
260
28
180
172
134
126
255
T8
107
142
136
251
67
36
30
24
16
78
81
137
379
228
239
279
295
29
299
264
267
155
330
231
237
243
251
328
325
269
27
178
167
127
111
283
T3
20
53
24
75
45
15
15
14
10
39
41
56
139
59
63
94
109
15
231
198
171
176
181
33
33
34
38
261
259
244
161
241
237
206
191
118
48
Appendix 4. Link prediction results: Performance evaluation (Bolded entries are the
best performances)
Accuracy
CommonNeighbors
Jaccard
Adamic-Adar
ResourceAllocation
PreferentialAttachment
Katz(β=0.001)
Katz(β=0.01)
Katz(β =0.1)
Katz(β =0.5)
RootedPageRank(α=0.01)
RootedPageRank(α=0.1)
RootedPageRank(α=0.5)
RootedPageRank(α=0.9)
SimRank(γ=0.01)
SimRank(γ=0.1)
SimRank(γ=0.5)
SimRank(γ=0.9)
Precision
CommonNeighbors
Jaccard
Adamic-Adar
ResourceAllocation
PreferentialAttachment
Katz(β=0.001)
Katz(β=0.01)
Katz(β =0.1)
Katz(β =0.5)
RootedPageRank(α=0.01)
RootedPageRank(α=0.1)
RootedPageRank(α=0.5)
RootedPageRank(α=0.9)
SimRank(γ=0.01)
SimRank(γ=0.1)
SimRank(γ=0.5)
SimRank(γ=0.9)
Recall
CommonNeighbors
Jaccard
Adamic-Adar
ResourceAllocation
PreferentialAttachment
Katz(β=0.001)
T2
0.941
0.926
0.936
0.902
0.956
0.983
0.983
0.970
0.970
0.951
0.941
0.882
0.813
0.902
0.897
0.850
0.803
T2
0.235
0.174
0.211
0.143
0.333
0.900
0.900
1.000
1.000
0.391
0.333
0.200
0.133
0.143
0.135
0.117
0.078
T2
0.267
0.267
0.267
0.333
0.200
0.600
T3
0.934
0.852
0.924
0.823
0.882
0.980
0.975
0.958
0.963
0.931
0.926
0.889
0.685
0.857
0.847
0.786
0.749
T3
0.200
0.076
0.167
0.120
0.133
0.733
0.667
0.429
0.500
0.333
0.317
0.232
0.094
0.136
0.127
0.117
0.101
T3
0.267
0.267
0.267
0.600
0.400
0.733
T4
0.938
0.850
0.921
0.717
0.911
0.980
0.980
0.973
0.973
0.934
0.929
0.882
0.606
0.749
0.737
0.660
0.709
T4
0.222
0.074
0.185
0.097
0.138
0.733
0.733
0.833
1.000
0.342
0.325
0.238
0.086
0.108
0.103
0.082
0.095
T4
0.267
0.267
0.333
0.800
0.267
0.733
49
T5
0.793
0.741
0.761
0.633
0.904
0.968
0.968
0.953
0.953
0.904
0.899
0.850
0.362
0.650
0.645
0.559
0.500
T5
0.119
0.087
0.111
0.084
0.048
0.733
0.818
1.000
1.000
0.327
0.316
0.234
0.072
0.082
0.081
0.070
0.074
T5
0.500
0.450
0.550
0.650
0.050
0.550
T6
0.877
0.751
0.810
0.559
0.852
0.970
0.970
0.936
0.938
0.914
0.840
0.840
0.291
0.653
0.618
0.473
0.377
T6
0.133
0.099
0.123
0.109
0.079
0.900
0.900
0.667
0.800
0.436
0.287
0.287
0.089
0.131
0.120
0.096
0.091
T6
0.143
0.321
0.286
0.750
0.107
0.643
T7
0.823
0.638
0.749
0.451
0.857
0.956
0.941
0.916
0.919
0.865
0.845
0.709
0.158
0.507
0.488
0.404
0.389
T7
0.154
0.133
0.183
0.130
0.133
0.821
0.875
0.625
0.714
0.380
0.345
0.219
0.095
0.137
0.133
0.121
0.121
T7
0.222
0.556
0.528
0.917
0.111
0.639
T8
0.744
0.648
0.687
0.434
0.813
0.958
0.953
0.929
0.938
0.860
0.852
0.719
0.138
0.490
0.463
0.370
0.335
T8
0.150
0.099
0.140
0.100
0.149
0.667
0.667
0.500
0.625
0.321
0.309
0.190
0.077
0.110
0.105
0.093
0.092
T8
0.552
0.483
0.655
0.862
0.345
0.828
Ave.
0.864
0.772
0.827
0.645
0.882
0.971
0.967
0.948
0.951
0.908
0.890
0.824
0.436
0.687
0.671
0.586
0.552
Ave.
0.173
0.106
0.160
0.112
0.145
0.784
0.794
0.722
0.806
0.362
0.319
0.229
0.092
0.121
0.115
0.099
0.093
Ave.
0.317
0.373
0.412
0.702
0.211
0.675
Katz(β=0.01)
Katz(β =0.1)
Katz(β =0.5)
RootedPageRank(α=0.01)
RootedPageRank(α=0.1)
RootedPageRank(α=0.5)
RootedPageRank(α=0.9)
SimRank(γ=0.01)
SimRank(γ=0.1)
SimRank(γ=0.5)
SimRank(γ=0.9)
F-score
CommonNeighbors
Jaccard
Adamic-Adar
ResourceAllocation
PreferentialAttachment
Katz(β=0.001)
Katz(β=0.01)
Katz(β =0.1)
Katz(β =0.5)
RootedPageRank(α=0.01)
RootedPageRank(α=0.1)
RootedPageRank(α=0.5)
RootedPageRank(α=0.9)
SimRank(γ=0.01)
SimRank(γ=0.1)
SimRank(γ=0.5)
SimRank(γ=0.9)
0.600
0.200
0.200
0.600
0.600
0.733
0.733
0.333
0.333
0.467
0.400
T2
0.250
0.211
0.235
0.200
0.250
0.720
0.720
0.333
0.333
0.474
0.429
0.314
0.225
0.200
0.192
0.187
0.130
0.667
0.400
0.333
0.867
0.867
0.867
0.867
0.533
0.533
0.733
0.733
T3
0.229
0.118
0.205
0.200
0.200
0.733
0.667
0.414
0.400
0.482
0.464
0.366
0.169
0.216
0.205
0.202
0.177
0.733
0.333
0.267
0.867
0.867
1.000
1.000
0.800
0.800
0.800
0.800
T4
0.242
0.116
0.238
0.173
0.182
0.733
0.733
0.476
0.421
0.491
0.473
0.385
0.158
0.191
0.183
0.148
0.169
0.450
0.050
0.050
0.900
0.900
0.900
1.000
0.600
0.600
0.650
0.800
T5
0.192
0.146
0.185
0.149
0.049
0.629
0.581
0.095
0.095
0.480
0.468
0.371
0.134
0.145
0.143
0.127
0.136
0.643
0.143
0.143
0.857
0.893
0.893
1.000
0.714
0.714
0.786
0.893
T6
0.138
0.151
0.172
0.190
0.091
0.750
0.750
0.235
0.242
0.578
0.435
0.435
0.163
0.221
0.205
0.171
0.165
0.389
0.139
0.139
0.833
0.833
0.889
1.000
0.861
0.861
0.917
0.944
T7
0.182
0.214
0.271
0.228
0.121
0.719
0.539
0.227
0.233
0.522
0.488
0.352
0.174
0.237
0.230
0.214
0.215
0.690
0.414
0.345
0.862
0.862
0.897
1.000
0.862
0.862
0.897
0.931
T8
0.235
0.164
0.230
0.179
0.208
0.739
0.678
0.453
0.444
0.467
0.455
0.313
0.142
0.195
0.187
0.169
0.167
0.596
0.240
0.211
0.827
0.832
0.883
0.943
0.672
0.672
0.750
0.786
Ave.
0.210
0.160
0.220
0.188
0.157
0.718
0.667
0.319
0.310
0.499
0.459
0.362
0.166
0.201
0.192
0.174
0.166
50
|
1510.02215 | 2 | 1510 | 2016-04-04T08:49:33 | Distributed Estimation of Graph 4-Profiles | [
"cs.SI",
"cs.DC",
"cs.DS"
] | We present a novel distributed algorithm for counting all four-node induced subgraphs in a big graph. These counts, called the $4$-profile, describe a graph's connectivity properties and have found several uses ranging from bioinformatics to spam detection. We also study the more complicated problem of estimating the local $4$-profiles centered at each vertex of the graph. The local $4$-profile embeds every vertex in an $11$-dimensional space that characterizes the local geometry of its neighborhood: vertices that connect different clusters will have different local $4$-profiles compared to those that are only part of one dense cluster.
Our algorithm is a local, distributed message-passing scheme on the graph and computes all the local $4$-profiles in parallel. We rely on two novel theoretical contributions: we show that local $4$-profiles can be calculated using compressed two-hop information and also establish novel concentration results that show that graphs can be substantially sparsified and still retain good approximation quality for the global $4$-profile.
We empirically evaluate our algorithm using a distributed GraphLab implementation that we scaled up to $640$ cores. We show that our algorithm can compute global and local $4$-profiles of graphs with millions of edges in a few minutes, significantly improving upon the previous state of the art. | cs.SI | cs |
Distributed Estimation of Graph 4-Profiles∗
Ethan R. Elenberg, Karthikeyan Shanmugam,
Michael Borokhovich, Alexandros G. Dimakis
The University of Texas at Austin
{elenberg,karthiksh,michaelbor}@utexas.edu
[email protected]
April 5, 2016
Abstract
We present a novel distributed algorithm for counting all four-node induced subgraphs in a big graph.
These counts, called the 4-profile, describe a graph's connectivity properties and have found several
uses ranging from bioinformatics to spam detection. We also study the more complicated problem of
estimating the local 4-profiles centered at each vertex of the graph. The local 4-profile embeds every
vertex in an 11-dimensional space that characterizes the local geometry of its neighborhood: vertices
that connect different clusters will have different local 4-profiles compared to those that are only part of
one dense cluster.
Our algorithm is a local, distributed message-passing scheme on the graph and computes all the local
4-profiles in parallel. We rely on two novel theoretical contributions: we show that local 4-profiles can
be calculated using compressed two-hop information and also establish novel concentration results that
show that graphs can be substantially sparsified and still retain good approximation quality for the global
4-profile.
We empirically evaluate our algorithm using a distributed GraphLab implementation that we scaled
up to 640 cores. We show that our algorithm can compute global and local 4-profiles of graphs with
millions of edges in a few minutes, significantly improving upon the previous state of the art.
Introduction
1
Graph k-profiles are local statistics that count the number of small subgraphs in a big graph. k-profiles
are a natural generalization of triangle counting and are increasingly popular for several problems in big
graph analytics. Globally, they form a concise graph description that has found several applications for
the web [1, 2] as well as social and biological networks [3, 4]. Furthermore, as we explain, the local profile
of a vertex is an embedding in a low-dimensional feature space that reveals local structural information.
Mathematically, k-profiles are of significant recent interest since they are connected to the emerging theory
of graph homomorphisms, graph limits and graphons [5, 3, 6].
There are 4 possible graphs on 3 vertices, labeled H0, . . . , H3, as in Figure 1 (left). The (global) 3-profile
of a graph G(V, E) is a vector having one coordinate for each distinct Hi that counts how many times that
Hi appears as an induced subgraph of G. For example, the graph G = K4 (the complete graph on 4 vertices)
has the 3-profile [0, 0, 0, 4] since it contains 4 triangles and no other (induced) subgraphs. The graph C5
(the cycle on 5 vertices, i.e. a pentagon) has the 3-profile [0, 5, 5, 0]. Note that the sum of the k-profile is
(cid:1), the total number of subgraphs. Estimating 3-profiles of big graphs is a topic that has received
always(cid:0)V
k
attention from several communities recently (e.g., see [3, 7, 8, 9] and references therein).
In this paper we are interested in the significantly more challenging problem of estimating 4-profiles.
Figure 1 (right) shows the 11 possible graphs on 4 vertices,1 labeled as Fi, i = 0 . . . 10. Given a big graph
∗This work will be presented in part at WWW'16, and has been supported by NSF Grants CCF 1344179, 1344364, 1407278,
1422549 and ARO YIP W911NF-14-1-0258.
1Actually there are 17 local subgraphs when considering vertex automorphisms. This is discussed in Section 2 in detail. For
the purpose of initial exposition, we will ignore vertex automorphisms.
1
G(V, E) we are interested in estimating the global 4-profile, i.e. count how many times each Fi appears as
an induced subgraph of G. In addition to global graph statistics, we are interested in local 4-profiles: given
a specific vertex v0, the local 4-profile of v0 is an 11-dimensional vector, with each coordinate i counting how
many induced Fi's contain v0. In Figure 2 we show an example of the local 4-profile of a vertex.
F0
F1
F2
F3
F4
F5
H0
H1
H2
H3
Figure 1: Left: The 4 possible non-isomorphic graphs on 3 vertices used to calculate the 3-profile of a graph
G. The 3-profile counts how many times each Hi appears in G. Right: The 11 non-isomorphic graphs on 4
vertices used to calculate the 4-profile of a graph.
F6
F7
F8
F9
F10
v0
v1
v2
v3
v4
Figure 2: An example for local profiles. The global 3-profile is [0, 3, 6, 1]. The global 4-profile is
[0, 0, 0, 0, 2, 0, 0, 1, 2, 0, 0]. The local 4-profile of v0 is [0, 0, 0, 0, 1, 0, 0, 1, 2, 0, 0]. The first 1 in the profile
corresponds to the subgraph F4. Notice that v0 participates in only one F4, jointly with vertices v2, v3, v4.
The local 4-profile of a vertex can be seen as an embedding in an 11-dimensional space that characterizes
the local geometry of its neighborhood: vertices that connect different clusters will have different local 4-
profiles compared to those that are only part of one dense cluster. A very naive estimation of 4-profiles
(cid:1) possible subgraphs. Furthermore, for estimating each local 4-profile independently,
this computation has to be repeated n times, once for each vertex. Note that the local 4-profiles may
be rescaled and added together to obtain the global 4-profile. Since some of the 4-profile subgraphs are
disconnected (like F0, F1, F5), local 4-profiles contain information beyond the local neighborhood of a vertex.
Therefore, in a distributed setting, it seems that global communication is required.
requires examining(cid:0)n
4
1.1 Our contributions
Surprisingly, we show that very limited global information is sufficient to calculate all local 4-profiles and
that it can be re-used to calculate all the local 4-profiles in parallel. Specifically, we introduce a distributed
algorithm to estimate all the local 4-profiles and the global profile of a big graph. This restrictive setting does
not allow communication between nonadjacent vertices, a key component of previous centralized, shared-
memory approaches. Our algorithm relies on two novel theoretical results:
Two-hop histograms are sufficient: Our algorithm operates by having each vertex first perform local
message-passing to its neighbors and then solve a novel system of equations for the local 4-profile. Focusing
on a vertex v0, the first easy step is to calculate its local 3-profile. It can be shown that the local 3-profile
combined with the full two-hop connectivity information is sufficient to estimate the local 4-profile for each
vertex v0. This is not immediately obvious, since naively counting the 3-path (an automorphism of F4) would
require 3-hop connectivity information. However, we show that less information needs to be communicated.
Specifically, we prove that the triangle list combined with what we call the two-hop histogram is sufficient: for
each vertex vi that is 2-hops from v0, we only need the number of distinct paths connecting it to v0, not the
full two hop neighborhood. If the two-hop neighborhood is a tree, this amounts to no compression. However,
for real graphs the two-hop histogram saves a factor of 3x to 5x in communication in our experiments. This
2
enables (Section 4) an even more significant running time speedup of 5 − 10 times on several distributed
experiments using 12 − 20 compute nodes.
Profile Sparsification: One idea that originated from triangle counting [10, 11] is to first perform random
subsampling of edges to create a sparse graph called a triangle sparsifier. Then count the number of triangles
in the sparse graph and re-scale appropriately to estimate the number in the original graph. The main chal-
lenge is proving that the randomly sparsified graph has a number of triangles sufficiently concentrated around
its expectation. Recently this idea was generalized to 3-profile sparsifiers in [9], with concentration results
for estimating the full 3-profile. These papers rely on Kim-Vu polynomial concentration techniques [12] that
scale well in theory, but typically the estimated errors are orders of magnitude larger than the measured
quantities for reasonable graph sizes.
In this paper, we introduce novel concentration bounds for global
k-profile sparsifiers that use a novel information theoretic technique called read-k functions [13]. Our read-k
bounds allow usable concentration inequalities for sparsification factors of approximately 0.4 or higher (Sec-
tion 4.1). Note that removing half the edges of the graph does not accelerate the running time by a factor
of 2, but rather by a factor of nearly 8, as shown in our experiments.
System implementation and evaluation: We implemented our algorithm using GraphLab Power-
Graph [14] and tested it in multicore and distributed systems scaling up to 640 cores. The benefits of
two-hop histogram compression and sparsification allowed us to compute the global and local 4-profiles of
very large graphs. For example, for a graph with 5 million vertices and 40 million edges we estimated the
global 4-profile in less than 10 seconds. For computing all local 4-profiles on this graph, the previous state
of the art [8] required 1200 seconds while our algorithm required less than 100 seconds.
1.2 Related work
The problem of counting triangles in a graph has been addressed in distributed [15] and streaming [1] settings,
and this is a standard analytics task for graph engines [16]. The Doulion algorithm [10] estimates a graph's
triangle count via simple edge subsampling. Other recent work analyzes more complex sampling schemes
[17, 18] and extends to approximately counting certain 4-subgraphs [19, 20]. Mapreduce algorithms for clique
counting were introduced by Finocchi et al.
[21]. Our approach is similar to that of [9], which calculates
all 3-subgraphs and a subset of 4-subgraphs distributedly using edge pivots. In this work we introduce the
2-hop histogram to compute all 4-subgraphs.
Concentration inequalities for the number of triangles in a random graph have been studied extensively.
The standard method of martingale bounded differences (McDiarmid's inequality) is known to yield weak
concentrations around the mean for this problem. The breakthrough work of Kim and Vu [12] provides
superior asymptotic bounds by analyzing the concentration of multivariate polynomials. This was later
improved and generalized in [22], and applied to subsampled triangle counting in [11]. Our analysis uses
a different technique called read-k functions [13] that produces sharper concentration results for practical
problem sizes.2
Previous systems of equations relating clique counts to other 4-subgraphs appear in [23], [7], [8], and [24].
However, these are applied in a centralized setting and depend on information collected from nonadjacent
vertices. In this work, we use additional equations to solve the same system by sharing only local information
over adjacent vertices. The connected 4-subgraphs, or graphlets [4], have found applications in fields such
as bioinformatics [25] and computational neuroscience [26]. In [27], authors use all global 4-subgraphs to
analyze neuronal networks. We evaluate our algorithm against Orca [8], a centralized 4-graphlet counting
algorithm, as well as its GPU implementation [28]. Notice that while Orca calculates only connected
4-subgraphs, our algorithm calculates all the connected and the disconnected 4-subgraphs for each vertex.
Concurrent with the writing of this paper, a parallel algorithm for 4-subgraph counting was introduced
in [24]. Our algorithm differs by working within GraphLab PowerGraph's Gather-Apply-Scatter framework
instead of the native, multithreaded C++ implementation of [24]. In terms of empirical performance, both
our work and [24] show similar running time improvements of one order of magnitude over Orca. A more
detailed comparison would depend on the hardware and datasets used. More importantly, our work focuses
on a distributed (as opposed to multicore parallel) framework, and for our setting minimizing communication
is critical.
2Even though concentrations using Kim-Vu become tighter asymptotically, this happens for graphs with well over 1013 edges
(see also Figure 6a).
3
F3(v)
F4(v) F6(v) F8(v) F9(v)
F
(cid:48)
F
(cid:48)(cid:48)
F
(b)
H0(v) H e
1 (v) H d
1 (v) H c
2(v) H e
2 (v) H3(v)
(a)
Figure 3: Unique (a) 3-subgraphs and (b) 4-subgraphs from the perspective of the white vertex is v. F8 is
(cid:48)(cid:48)
the only subgraph with a third vertex automorphism F
8 because no other subgraph contains vertices with
3 different degrees.
Our theoretical results are significantly different from [24] and may be useful in improving that system
also. Specifically, [24] explicitly counts the number of 4-cycles (F7 in Figure 1, Right) whereas our results
show that it is possible to use only two-hop histograms instead. This results in less communication overhead,
but this benefit is perhaps not as significant for shared-memory multicore platforms. Our second theoretical
result, the novel sparsification concentration bounds, can be used for any subgraph estimation algorithm and
quantify a provable tradeoff between speed and accuracy.
2 Distributed Algorithm
In this section, we describe 4-Prof-Dist, our algorithm for computing the exact 4-profiles in a distributed
manner. To the best of our knowledge, this is the first distributed algorithm for calculating 4-profiles. The
key insight is to cast existing and novel equations into the GraphLab PowerGraph framework [14] to get
implicit connectivity information about vertices outside the 1-hop neighborhood. Specifically, we construct
the local 4-profile from local 3-profile, local 4-clique count, and additional histogram information which
describes the number of paths to all 2-hop neighbors.
Theorem 1. There is a distributed algorithm that computes the exact local 4-profile of a graph given each
vertex has stored its local 3-profile, triangle list, and 2-hop histogram.
Note that the local 4-profiles at each vertex can be added and appropriately rescaled (using the symmetries
of each subgraph, also called automorphism orbits [4]) to obtain the global 4-profile.
4-Prof-Dist is implemented in the Gather-Apply-Scatter (GAS) framework [14]. A distributed algo-
rithm in this framework has 3 main phases: Gather, Apply and Scatter. Every vertex and edge has stored
data which is acted upon. During the Gather phase, a vertex can access all its adjacent edges and neigh-
bors and gather data they possess, e.g., neighbor ID, using a custom reduce operation ⊕ (e.g., addition,
concatenation). The accumulated information is available for a vertex at the next phase, Apply, in which it
can change its own data. In the final Scatter phase, every edge sees the data of its (incident) vertices and
operates on it to modify the edge data. All nodes start each phase simultaneously, and if needed, the whole
GAS cycle is repeated until the algorithm's completion.
4-Prof-Dist solves a slightly larger problem of keeping track of counts of 17 unique subgraphs up to
vertex automorphism (see Figure 3). We will describe a full rank system of equations which is sufficient
to calculate the local 4-profile at every v ∈ V . The following subsections each explain a component of
4-Prof-Dist. These separate routines are combined efficiently in Algorithm 1 to calculate the local 4-
profile in a small number of GAS cycles.
4
(cid:80)
v
a
=
+
a∈Γ(v) nc
2,vane
2,va
(cid:48)
4(v)
F
2F7(v)
Figure 4: Edge pivot equation for vertex v counting triangles as edges va pivot about their common vertex
v. The subgraphs F
(cid:48)
4(v) and F7(v) differ by one edge.
2.1 Edge pivot equations
The majority of our equations relate the local 4-profile to neighboring local 3-profiles with edge pivots [9].
At each vertex v, each combinatorial equation relates a linear combination of the local 4-subgraph counts
to the count of a pair of 3-subgraphs sharing an edge va. Some of these equations appear in a centralized
setting in previous literature ([23], [7], [8], [24]). In our algorithm, the 3-subgraph pair count accumulates at
v as all incident edges va pivot over it. The edges fixed by a specific 3-subgraph pair correspond to common
edges among a subset of 4-subgraphs. Before that, in an initial GAS round, each vertex v must gather the
ID of each vertex in its neighborhood, i.e. a ∈ Γ(v), and the following quantities must be stored at each
edge va during Scatter phase:
ne
1,va = Γ(v) ∪ Γ(a) = V − (Γ(v) + Γ(a) − Γ(v) ∩ Γ(a)),
nc
2,va = Γ(v)\{Γ(a) ∪ a} = Γ(v) − Γ(v) ∩ Γ(a) − 1,
ne
2,va = nc
n3,va = Γ(v) ∩ Γ(a).
2,av,
(1)
(cid:80)
Gather: The above quantities are summed at each vertex v to calculate the local 3-profile at v. For example,
a n3,va. In addition, we gather the sum of functions of pairs of these quantities forming 13 edge
n3,v = 1
2
pivot equations.
= F1(v) + F2(v),
= 3F
(cid:48)
6(v) + F
(cid:48)
8(v),
= F
(cid:48)
9(v) + 3F10(v),
1,va
2
(cid:18)ne
(cid:18)nc
(cid:18)n3,va
2,va
2
(cid:19)
(cid:19)
(cid:19)
a∈Γ(v)
a∈Γ(v)
a∈Γ(v)
2
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
a∈Γ(v)
a∈Γ(v)
a∈Γ(v)
a∈Γ(v)
ne
1,vanc
2,va = 2F
(cid:48)
3(v) + F
(cid:48)
4(v),
ne
1,van3,va = 2F5(v) + F
(cid:48)(cid:48)
8 (v),
nc
2,vane
2,va = F
(cid:48)
4(v) + 2F7(v),
(2)
nc
2,van3,va = 2F
(cid:48)
8(v) + 2F
(cid:48)
9(v),
nd
1,vΓ(v) = F2(v) + F4(v) + F8(v).
The primed notation differentiates between subgraphs of different automorphism orbits, as in Figure 3. By
accumulating pairs of 3-profile structures as in (2), we receive aggregate connectivity information about
vertices more than 1 hop away. Consider the sixth equation as an example. The product between n2,va and
2,va subgraphs along edge va forms 4-node graphs with the following structural constraints: three vertex
ne
5
(cid:48)
pairs are connected, two vertex pairs are disjoint, and one pair may be either connected or disjoint. F
4(v)
and F7(v) satisfy these constraints and differ on the unconstrained edge. Thus, as shown in Figure 4, they
both contribute to the sum of nc
The following edge pivot equations are linearly independent when solving for the local 4-profile only.
2,vane
2,va.
Note the last 2 equations require calculating the local 3-profile:
(cid:18)ne
(cid:19)
2,va
2
= F6(v) + F8(v),
ne
1,vane
2,va = F3(v) + F4(v),
ne
2,van3,va = F
(cid:48)(cid:48)
8 (v) + 2F9(v),
(3)
n3,a − n3,va = F8(v) + 2F9(v) + 3F10(v),
ne
2,a − nc
2,va = F4(v) + 2F7(v) + F
(cid:48)(cid:48)
8 (v) + 2F
(cid:48)
9(v).
a∈Γ(v)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
a∈Γ(v)
a∈Γ(v)
a∈Γ(v)
a∈Γ(v)
(cid:88)
(cid:88)
a∈Γ(v)
a∈Γ(v)
Apply: The left hand sides of all such equations are stored at v.
2.2 Clique counting
The aim of this subtask is to count 4-cliques that contain the vertex v. For this, we accumulate a list of
triangles at each vertex v. Then, at the Scatter stage for every va, it is possible to check if neighbors common
to v and a have an edge between them. This implies a 4-clique.
Scatter: In addition to the intersection size Γ(v) ∩ Γ(a) at each edge va as before, we now require the
intersection list {b : b ∈ Γ(v), b ∈ Γ(a)} as a starting point.
Gather, Apply: The intersection list is gathered at each vertex v. This produces all pairs of neighbors in
Γ(v) which are adjacent, i.e. all triangles containing v. It is stored as ∆(v) during the Apply stage at v.
Gather, Apply: Each edge va computes the number of 4-cliques by counting how many pairs in ∆(a)
contain exactly two neighbors of v. We use a similar equation to calculate F8(v) concurrently:
(b, c) ∈ ∆(a) : b ∈ Γ(v), c ∈ Γ(v) = 3F10(v),
(b, c) ∈ ∆(a) : b /∈ Γ(v), c /∈ Γ(v) = F8(v).
(4)
At the Apply stage, store the left hand sides as vertex data.
2.3 Histogram 2-hop information
Instead of calculating the number of cycles F7(v) directly, we can simply construct another linearly indepen-
dent equation and add it to our system. Let each vertex a have a vector of (vertex ID, count) pairs (p, ca[p])
for each of its adjacent vertices p. Initially, ca[p] = 1 and this histogram contains the same information as
Γ(a). For any a ∈ Γ(v) and p /∈ Γ(v), ca[p] = 1 ⇔ vap forms a 2-path. Thus, v can collect these vectors
to determine the total number of 2-paths from v to p. This lets us calculate a linear combination involving
cycle subgraph counts with an equation that is linearly independent from the others in our system.
Gather: At each v, take a union of histograms from each neighbor a, resolving duplicate entries with the
reduce operation (p, ca1) ⊕ (p, ca2) = (p, ca1 + ca2).
Apply: Given the gathered histogram vector {⊕a∈Γ(v) ca[p]}p /∈Γ(v), calculate the number of non-induced
4-cycles involving p and two neighbors:(cid:88)
(cid:18)
(cid:19)
(5)
⊕a∈Γ(v) ca[p]
2
p /∈Γ(v)
= F7(v) + F9(v).
6
tion is at most(cid:80)
Next, we upper bound savings from our 2-hop histogram by analyzing the improvement when the only
information transmitted across the network to a vertex v is each non-neighboring vertex and its final count
⊕a∈Γ(v)c[p]. Let hv = Γ(Γ(v)) \ {Γ(v)∪ v}. For each v, the difference between full and histogram informa-
a∈Γ(v)(Γ(a) − 1) − 2hv. The exact benefit of (5) depends on the internal implementation
of the reduce operation ⊕ as pairs of neighbors are gathered.
2 (c[p]2 − c[p]), requires
counting the second moment of c taken over hv terms. Due to a result by Alon ([29], Proposition 3.7), the
memory required to count this value exactly (moreover, to approximate it deterministically) is Ω(hv). Thus,
up to implementation details, our memory use is optimal.
Counting the number of distinct pairs of 2-paths to each 2-hop neighbor, i.e. 1
2.4 Normalization and symmetry
Our final local equation comes from summing the local 4-profile across all 17 automorphisms:
17(cid:88)
(cid:18)
(cid:19)
V − 1
.
To calculate the global 4-profile, we utilize global symmetry and scaling equations. Let Fi =(cid:80)
v∈V Fi(v).
Globally, each subgraph count is in exact proportion with the same subgraph counted from a different vertex
automorphism. The ratio depends on the subgraph's degree distribution:
Fi(v) =
3
i
(6)
(cid:48)
F3 = 2F
3, F4 = F
(cid:48)
8, F
(cid:48)
(cid:48)
6,
4, F6 = 3F
(cid:48)
(cid:48)(cid:48)
8 = 2F8, F9 = F
9.
F8 = F
(7)
Global symmetry makes the equation for F8 and the system (3) linearly dependent. We sum across ver-
10] by scaling appropriately:
tices, inverting a single 11× 11 system to yield the final global 4-profile [N0, . . . N T
N0 =
N4 =
F0
4
(cid:48)
F
4
2
, N1 =
, N5 =
N8 = F8, N9 =
F1
2
F5
3
F9
2
, N2 =
, N3 = F
(cid:48)
3,
F2
4
(cid:48)
6, N7 =
F10
4
.
, N6 = F
, N10 =
F7
4
,
(8)
Algorithm 1 4-Prof-Dist
1: Input: Graph G(V, E) with V vertices, E edges.
2: Gather: For each vertex v union over edges of the 'other' vertex in the edge, ∪a∈Γ(v)a = Γ(v).
3: Apply: Store the gather as vertex data v.nb, size automatically stored.
4: Scatter: For each edge eva, compute and store scalars in (1).
5: Gather: For each edge eva, sum edge scalar data of neighbors in (2) - (3) and combine two-hop his-
tograms.
6: Apply: For each vertex v, sum over p /∈ Γ(v) in (5), store other data in array v.u. No Scatter.
7: Gather: For each vertex v collect pairs of connected neighbors in ∆(v).
8: Apply: Store connected neighbor (triangle) list as vertex data v.conn. No Scatter.
9: Gather: For each vertex v sum (4).
10: Apply: Append data to array v.u. Multiply v.u by a matrix to solve system of equations.
11: return [v:
v.N0 v.N1 v.N2 ... v.N10]
3 Sparsification and Concentration
In this section, we describe the process for approximating the exact number of subgraphs in a graph G.
Denote the exact counts by [N0 . . . N10]T and the estimates by [X0 . . . X10]T .
7
We are sparsifying the original graph G by keeping each edge independently with probability p. Denote
the random subsampled graph by G and its global 4-profile by [Y0 . . . Y10]T . Clearly each triangle survives
with probability p3 and each 4-clique survives with p6. Therefore, in expectation, E[Y10] = p6N10 and
X10 = 1
p6 Y10 is unbiased.
This simple correspondence does not hold for other subgraphs: each triangle in G can only be a triangle
in G that survived edge removals, but other subgraphs of G could be originating from multiple subgraphs
of G depending on the random sparsification process. We can, however, relate the original 4-profile vector
to the expected subsampled 4-profile vector by a matrix multiplication. Let F (abcd) and F (abcd) represent
the induced 4-subgraph on the vertices abcd before and after subsampling, respectively. Then define H by
Hij = P( F (abcd) = Fi F (abcd) = Fj). Thus, we form an unbiased estimator, i.e. E[Xi] = Ni, i = 1, . . . , 10,
by inverting the edge sampling matrix.
For 3-profiles, this process is described by the following system of equations:
=
E[Y0]
E[Y1]
E[Y2]
E[Y3]
1
0
0
0
1 − p
p
0
0
(1 − p)2
2p(1 − p)
p2
0
(1 − p)3
3p(1 − p)2
3p2(1 − p)
p3
.
n0
n1
n2
n3
(9)
For 4-profiles, the vectors are 11 dimensional and a similar linear system can be explicitly computed – we
include the equations in the Appendix. This matrix turns out to be invertible and we can therefore calculate
the 4-profile exactly if we have access to the expected values of the sparsified 4-profile. Of course, we can
only obtain one sample random graph and calculate that 4-profile, which will be an accurate estimate if the
4-profile quantities are sufficiently concentrated around their expectation.
3.1 Graph k-profile concentration
Previous work used this idea of graph sparsification for triangle counting [11] and 3-profiles [9]. The main
concentration tool used was the Kim and Vu polynomial concentration [12, 11] which unfortunately gives
very loose bounds for practical graph sizes. Figure 6a compares the accuracy bound derived in this section
to the bound predicted by [12]. Clearly the Kim-Vu concentration does not provide meaningful bounds for
the experiments in Section 4.1. However, our results match observed sparsifier accuracy much more closely.
Our novel concentration results that exploit the fact that partial derivatives of the desired quantities are
sparse in the number of edge variables. This allows us to use a novel information theoretic concentration
technique called read-k functions [13]. For simplicity, we only explain the concentration of 4-cliques (F10
subgraphs) here. We establish the general result for all 11 4-profile variables in the Appendix. Our main
concentration result is as follows:
Theorem 2. Let G be a graph with N10 4-cliques, and let k10 be the maximum number of 4-cliques sharing
a common edge. Let X10 be the 4-clique estimate obtained from subsampling each edge with probability
0 < p ≤ 1, choose 0 < δ < 1, and choose RK > 0. If
(cid:18) log(2/δ)k10
(cid:19)1/12
,
p ≥
RKN10
then N10 − X10 ≤ RKN10 with probability at least 1 − δ.
Proof. Our proof relies on read-k function families [13], a recent characterization of dependencies among
functions of random variables. See the Appendix for full details.
22
Next, we state conditions under which our method outperforms the Kim and Vu concentration results [12].
Proof can be found in the Appendix:
Corollary 1. Let G be a graph with m edges. If p = Ω(1/ log m) and δ = Ω(1/m), then read-k provides
better triangle sparsifier accuracy than Kim-Vu.
10 , then read-k provides better
4-clique sparsifier accuracy than Kim-Vu.
If additionally k10 ≤ N 5/6
8
We note that the asymptotic condition on p in Corollary 1 includes a constant term much less than 1.
This implies our concentration result is superior over all p values of practical interest. While these bounds
contain the quantities we wish to estimate, they provide guidelines for the performance of sampling heuristics.
We also investigate this in Section 4.1 for some realistic graphs.
4 Experiments
Let us now describe the implementation and experimental results of our algorithm. We implement 4-
Prof-Dist on GraphLab v2.2 (PowerGraph) [14] and measure its running time and accuracy on large input
graphs.3 First, we show that edge sampling yields very good approximation results for global 4-profile counts
and achieves substantial execution speedups and network traffic savings when multiple machines are in use.
Due to its distributed nature, we can show 4-Prof-Dist runs substantially faster when using multiple CPU
cores and/or machines. Notice that multicore and multiple machines can not speed up some centralized
algorithms, e.g., Orca [8], which we use as a baseline for our results. Note also that Orca produces only
a partial 4-subgraph count, i.e., it calculates only connected 4-subgraphs, while 4-Prof-Dist calculates all
17 per vertex.
The systems: We perform the experiments on two systems. The first system is a single powerful server,
further referred to as Asterix. The server is equipped with 256 GB of RAM and two Intel Xeon E5-2699 v3
CPUs, 18 cores each. Since each core has two hardware threads, up to 72 logical cores are available to the
GraphLab engine. The second system is an EC2 cluster on AWS4. The cluster is comprised of 20 c3.8xlarge
machines, each having 60 GB RAM and 32 virtual CPUs.
In our experiments we use two real graphs representing different datasets: social networks
The data:
(LiveJournal: 4,846,609 vertices, 42,851,237 edges) and a WWW graph of Notre Dame (WEB-NOTRE:
325,729 vertices, 1,090,108 edges) [30]. Notice that the above graphs are originally directed, but since our
work deals with undirected graphs, all duplicate edges (i.e., bi-directional) were removed and directionality
is ignored.
(a)
(b)
Figure 5: LiveJournal graph, Asterix system. All the results are averaged over 10 iterations. (a) – Running
time as a function of sampling probability. (b) – Accuracy of the F7 − F10 global counts, measured as ratio
of the exact count and the estimated count.
4.1 Results
Accuracy: The first result is that our edge sampling approach greatly improves running time while main-
taining a very good approximation of the global 4-profile. In Figure 5a we can see that the running time
3Available at http://github.com/eelenberg/4-profiles
4Amazon Web Services - http://aws.amazon.com
9
p=1p=0.9p=0.8p=0.7p=0.6p=0.5p=0.4p=0.3p=0.2p=0.10100200300400500600Runningtime[sec]LiveJournal,Asterixp=0.9p=0.7p=0.4p=0.3p=0.10.900.951.001.051.10Accuracy:exact/approxLiveJournal,Accuracy,4-profilesF10F9F8F7(a)
(b)
Figure 6: LiveJournal graph, Asterix system. All the results are averaged over 10 iterations. (a) – Comparison
of 4-clique sparsifier concentration bounds with accuracy measured in edge sampling experiments.
(b)
– Comparison of running times of Orca and our exact 4-Prof-Dist algorithm. Clearly, 4-Prof-Dist
benefits from the use of multiple cores.
decreases drastically when the sampling probability decreases. At the same time, Figure 5b shows that the
mean ratio of true to estimated global 4-profiles is within ±2.5%. Similar to [20], which uses a more complex
sampling scheme to count connected 4-subgraphs, this ratio is usually much less than 1%. We show here only
profiles F7 − F10 since their counts are the smallest and were observed to have the lowest accuracy. In Figure
6a we compare theoretical concentration bounds on a logarithmic scale and show the benefit of Theorem
2. While the guarantees provided by Kim-Vu [12] bounds are very loose (the additive error is bounded by
numbers which are orders of magnitude larger than the true value), the read-k approach is much closer to
the measured values. We can see that for large sampling probabilities (p ≥ 0.5), the measured error at most
2 orders of magnitude smaller than the value prediced by Theorem 2.
2-hop histogram: Now we compare two methods of calculating the left hand side of (5) from Section 2.3.
We show that a simple implementation in which a vertex gathers its full 2-hop neighborhood (i.e., IDs of its
neighbors' neighbors) is much less efficient than the two-hop histogram approach used in 4-Prof-Dist (see
Section 2.3). In Figures 7a and 7b we can see that the histogram approach is an order of magnitude faster
for various numbers of machines, and that its network requirements are up to 5x less than that of the simple
implementation. Moreover, our algorithm could handle much larger graphs while the simple implementation
ran out of memory.
Running time: Finally, we show that 4-Prof-Dist can run much faster than the current state of the
art graphlet counting implementations. The algorithm and the GraphLab platform on which it runs are
both distributed in nature. The latter allows 4-Prof-Dist to exploit multiple cores on a single machine as
well as a cluster of machines. Figure 6b shows running time as a function of CPU cores. We compare this
result to the running time of a single core, C++ implementation of Orca [8]. Our 4-Prof-Dist algorithm
becomes faster after only 25 cores and is 2x faster using 60 cores. Moreover, 4-Prof-Dist allows scaling
to a large number of machines. In Figure 7c we can see how the running time for the LiveJournal graph
decreases when the number of machines increases. Since Orca cannot benefit from multiple machines, we
see that 4-Prof-Dist runs up to 12x faster than Orca. This gap widens as the cluster grows larger. In
[28], the authors implemented a GPU version of Orca using CUDA. However, the reported speedup is about
2x which is much less than we show here on the AWS cluster (see Figure 7c for p = 1). We also note a
substantial running time benefit of the sampling approach for global 4-profiles. In Figures 7c and 7d, we see
that with p = 0.1 we can achieve order of magnitude improvements in both speed and network traffic. This
sampling probability maintains very good accuracy, as shown in Figure 5b.
10
0.00.20.40.60.81.0Edgesamplingprobability1001031061091012101510181021102410271030Accuracy:exact-approxLiveJournal,SparsifierAccuracyKim-VuRead-k4-cliquesMeasured10cores20cores30cores40cores50cores60cores05001000150020002500Runningtime[sec]Orca:1288secLiveJournal,Asterix(a)
(c)
(b)
(d)
Figure 7: AWS cluster of up to 20 machines (nodes). (a,b) – Running time and network usage comparing
naive 2-hop implementation and 2-hop histogram approach on the Notre Dame web graph. (c,d) – Running
time and network usage of 4-Prof-Dist for various number of compute nodes and sampling probability p,
on the LiveJournal graph. All results are averaged over 10 iterations.
5 Conclusions
We introduced a novel distributed algorithm for estimating 4-profiles of large graphs. We relied on two
theoretical results that can be of independent interest: that 4-profiles can be estimated with limited 2-hop
information and that randomly erasing edges gives sharper approximation compared to previous analysis.
We showed that our scheme outperforms the previous state of the art and can exploit cloud infrastructure
to scale.
References
[1] L. Becchetti, P. Boldi, C. Castillo, and A. Gionis, "Efficient Semi-Streaming Algorithms for Local
Triangle Counting in Massive Graphs," in KDD, 2008.
[2] D. O'Callaghan, M. Harrigan, J. Carthy, and P. Cunningham, "Identifying Discriminating Network
Motifs in YouTube Spam," Feb. 2012.
11
12nodes14nodes16nodes18nodes20nodes01020304050Runningtime[sec]WEB-NOTRE,AWS2-hop2-hophistogram12nodes14nodes16nodes18nodes20nodes0.00.51.01.52.0Networksent[bytes]×1010WEB-NOTRE,AWS2-hop2-hophistogram8nodes12nodes16nodes20nodes050100150200Runningtime[sec]LiveJournal,AWSp=1p=0.7p=0.4p=0.18nodes12nodes16nodes20nodes0.00.51.01.52.02.53.03.5Networksent[bytes]×1011LiveJournal,AWSp=1p=0.7p=0.4p=0.1[3] J. Ugander, L. Backstrom, and J. Kleinberg, "Subgraph Frequencies: Mapping the Empirical and
Extremal Geography of Large Graph Collections," in WWW, 2013.
[4] N. Przulj, "Biological Network Comparison Using Graphlet Degree Distribution," Bioinformatics,
vol. 23, no. 2, pp. 177–183, 2007.
[5] C. Borgs, J. Chayes, and K. Vesztergombi, "Counting Graph Homomorphisms," Topics in Discrete
Mathematics, pp. 315–371, 2006.
[6] L. Lovász, Large Networks and Graph Limits. American Mathematical Soc., 2012, vol. 60.
[7] V. V. Williams, J. Wang, R. Williams, and H. Yu, "Finding Four-Node Subgraphs in Triangle Time,"
SODA, pp. 1671–1680, 2014.
[8] T. Hočevar and J. Demšar, "A Combinatorial Approach to Graphlet Counting." Bioinformatics, vol. 30,
no. 4, pp. 559–65, Feb. 2014.
[9] E. R. Elenberg, K. Shanmugam, M. Borokhovich, and A. G. Dimakis, "Beyond Triangles: A Distributed
Framework for Estimating 3-profiles of Large Graphs," in KDD, 2015, pp. 229–238.
[10] C. E. Tsourakakis, U. Kang, G. L. Miller, and C. Faloutsos, "DOULION: Counting Triangles in Massive
Graphs with a Coin," in SIGKDD, 2009.
[11] C. E. Tsourakakis, M. Kolountzakis, and G. L. Miller, "Triangle Sparsifiers," Journal of Graph Theory
and Applications, vol. 15, no. 6, pp. 703–726, 2011.
[12] J. H. Kim and V. H. Vu, "Concentration of Multivariate Polynomials and Its Applications," Combina-
torica, vol. 20, no. 3, pp. 417–434, 2000.
[13] D. Gavinsky, S. Lovett, M. Saks, and S. Srinivasan, "A Tail Bound for Read-k Families of Functions,"
Random Structures & Algorithms, vol. 47, no. 1, pp. 99–108, 2015.
[14] J. E. Gonzalez, Y. Low, H. Gu, D. Bickson, and C. Guestrin, "PowerGraph: Distributed Graph-Parallel
Computation on Natural Graphs," in 10th USENIX Symposium on Operating Systems Design and
Implementation (OSDI), 2012, pp. 17–30.
[15] T. Schank, "Algorithmic Aspects of Triangle-Based Network Analysis," Ph.D. dissertation, 2007.
[16] N. Satish, N. Sundaram, M. A. Patwary, J. Seo, J. Park, M. A. Hassaan, S. Sengupta, Z. Yin, and
P. Dubey, "Navigating the Maze of Graph Analytics Frameworks using Massive Graph Datasets," in
SIGMOD, 2014, pp. 979–990.
[17] C. Seshadhri, A. Pinar, and T. G. Kolda, "Triadic Measures on Graphs: The Power of Wedge Sampling,"
in Proceedings of the SIAM Conference on Data Mining, 2013, pp. 10–18.
[18] T. Eden, A. Levi, D. Ron, and C. Seshadhri, "Approximately Counting Triangles in Sublinear Time,"
in FOCS, 2015, pp. 614–633.
[19] N. K. Ahmed, N. Duffield, J. Neville, and R. Kompella, "Graph Sample and Hold: A Framework for
Big-Graph Analytics," in KDD, 2014.
[20] M. Jha, C. Seshadhri, and A. Pinar, "Path Sampling: A Fast and Provable Method for Estimating
4-Vertex Subgraph Counts," in WWW, 2015, pp. 495–505.
[21] I. Finocchi, M. Finocchi, and E. G. Fusco, "Clique Counting in MapReduce: Algorithms and Experi-
ments," ACM Journal of Experimental Algorithmics, vol. 20, no. 1, 2015.
[22] S. Janson, K. Oleszkiewicz, and A. Ruciński, "Upper Tails for Subgraph Counts in Random Graphs,"
Israel Journal of Mathematics, vol. 142, no. 1, pp. 61–92, 2004.
[23] M. Kowaluk, A. Lingas, and E.-M. Lundell, "Counting and Detecting Small Subgraphs via Equations,"
SIAM Journal of Discrete Mathematics, vol. 27, no. 2, pp. 892–909, 2013.
12
[24] N. K. Ahmed, J. Neville, R. A. Rossi, and N. Duffield, "Efficient Graphlet Counting for Large Networks,"
in IEEE International Conference on Data Mining, 2015.
[25] N. Shervashidze, K. Mehlhorn, and T. H. Petri, "Efficient Graphlet Kernels for Large Graph Compari-
son," in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 2009,
pp. 488–495.
[26] F. Fei, B. Jie, and D. Zhang, "Frequent and Discriminative Subnetwork Mining for Mild Cognitive
Impairment Classification," Brain Connectivity, vol. 4, no. 5, pp. 347–360, Jun. 2014.
[27] L. R. Varshney, B. L. Chen, E. Paniagua, D. H. Hall, and D. B. Chklovskii, "Structural Properties of
the Caenorhabditis elegans Neuronal Network," PLoS Computational Biology, vol. 7, no. 2, 2011.
[28] A. Milinković, S. Milinković, and L. Lazicć, "A Contribution to Acceleration of Graphlet Counting," in
Infoteh Jahorina Symposium, vol. 14, no. March, 2015, pp. 741–745.
[29] N. Alon, Y. Matias, and M. Szegedy, "The Space Complexity of Approximating the Frequency Moments,"
in STOC, 1996, pp. 20–29.
[30] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection," http://snap.
stanford.edu/data, Jun. 2014.
13
A Appendix
A.1 Proof of Theorem 2
Proof. Rather than Lipschitz bounding the value of each partial derivative, as in [12, 11, 9], our main
technical tool [13] benefits from the fact that each first partial derivative is sparse in the number of edge
variables:
Definition 1 (Read-k Families). Let X1, . . . , Xm be independent random variables. For j ∈ [r], let Pj ⊆ [m]
and let fj be a Boolean function of {Xi}i∈Pj . Assume that {ji ∈ Pj} ≤ k for every i ∈ [m]. Then the
random variables Zj = fj({Xi}i∈Pj ) are called a read-k family.
Each variable only affects k of the r Boolean functions. Let G be a graph with N10 4-cliques and a
maximum of k10 4-cliques sharing a common edge. The corresponding 4-clique estimator X10 follows this
exact structure. Each edge sampling variable appears in at most k10 of the N10 terms. We now state the
main result required for our analysis. Note that when applied to estimating the number of 4-cliques, the
bound is a function of k10 and N10 independent of the number of edges. Therefore, it is much stronger than
arguments involving Lipschitz bounded functions such as McDiarmid's inequality.
Proposition 1 (Concentration of Read-k Sums [13]). Let Z1, . . . , Zr be a family of read-k indicator variables
with P(Zi = 1) = pi, and let p be the average of p1, . . . , pr. Then for any > 0,
(cid:16)
(cid:16)
P
P
i=1
(cid:33)
(cid:33)
(cid:16) 1−x
Zi ≤ (p − )r
Zi ≥ (p + )r
(cid:32) r(cid:88)
(cid:32) r(cid:88)
(cid:17)
(cid:16) x
Let Y10 =(cid:80)(cid:2)(a,b,c,d)∈H10
P(cid:0)
⇒ P (X10 − N10 ≥ RKN10) = P(cid:0)
Y10 − p6N10 ≥ RKN10
≤ 2 exp
(cid:1)
i=1
y
where D(x (cid:107) y) = x log
(cid:17)
(cid:18)
+ (1 − x) log
tabtbctcdtdatactbd. Then
1−y
(cid:19)
22
RKN10
k10
−
≤ 2 exp
The claim follows by setting the right hand side less than δ and solving for p.
Y10 − p6N10 ≥ p6RKN10
(cid:17)
(cid:17)
r
k
r
k
(cid:16)
(cid:16)
(cid:17)
−22 r
(cid:17)
−22 r
k
k
,
≤ exp
−D(p + (cid:107) p)
≤ exp
≤ exp
−D(p − (cid:107) p)
≤ exp
is the Kullback-Leibler divergence of x and y.
(cid:1)
(cid:18)
−
2p122
RKN10
k10
(cid:19)
.
A.2 Proof of Corollary 1
Proof. We prove this result for the case of 4-cliques only because the case for triangles is similar. First we
must derive a similar 4-clique concentration bound using the techniques in [12, 11].
Lemma 1. Let G be a graph with m edges and N10 cliques, and k10 be the maximum number of 4-cliques
sharing a common edge. Let a6 = 86√6!, 0 < p ≤ 1, and KV > 0. Let X10 be the 4-clique estimate obtained
from subsampling each edge with probability p. If
(cid:110) 6(cid:112)1/N10, 3(cid:112)k10/N10
p
(cid:111) ≥
max
6 log12(m5+γ)
a2
2
KV
,
(10)
mγ .
then N10 − X10 ≤ KV N10 with probability at least 1 − 1
14
Proof. This proof is a straightforward application of the main result in [12], repeated below for completeness.
Let α = (α1, α2, . . . , αm) ∈ Zm
+ and define E≥1[X] = maxα:(cid:107)α(cid:107)1≥1 E(∂αX), where
(cid:21)
(cid:20)
E(∂αX) = E
(
∂
∂t1
)α1 . . . (
∂
∂tm
)αm [X(t1, . . . , tm)]
.
(11)
Further, we call a polynomial totally positive if the coefficients of all the monomials involved are non-negative.
Proposition 2 (Kim-Vu concentration of multivariate polynomials [12]). Let Y be a random totally positive
Boolean polynomial in m Boolean random variables with degree at most k. If E[Y ] ≥ E≥1[Y ], then
(cid:18)
Y − E[Y ] > ak
P
(cid:113)E[Y ]E≥1[Y ]λk
(cid:19)
= O (exp (−λ + (k − 1) log m))
(12)
for any λ > 1, where ak = 8kk!1/2.
Let Y10 =(cid:80)(cid:2)(a,b,c,d)∈H10
tabtbctcdtdatactbd. Clearly Y10 is totally positive. Let k10,ab, σabc, and νabc be
the maximum number of 4-cliques sharing a common edge tab, wedge Λabc, and triangle ∆abc, respectively.
Taking repeated partial derivatives,
(cid:20) ∂Y10
(cid:20) ∂Y10
∂tab
E
∂tabtbc
∂Y10
(cid:21)
(cid:21)
(cid:21)
(cid:21)
(cid:21)
E
(cid:20)
E
(cid:20)
E
(cid:20)
E
∂tabtbctac
∂Y10
∂tabtbctactda
∂Y10
∂tabtbctcdtdatac
= p4,
(cid:21)
= p3,
= p5k10,ab,
= p4σabc, E
= p3νabc, E
(cid:20)
(cid:21)
(cid:20) ∂Y10
(cid:20)
(cid:21)
∂tabtcd
∂Y10
∂tabtbctcd
= p2,
= E
∂Y10
(cid:20)
∂tabtbctcdtda
= p, E
∂Y10
∂tabtbctcdtdatactbd
(cid:21)
= 1.
max{1, p3k10}. E≥1 [Y10] ≤ E[Y10] = p6N10 implies
Noting that σabc ≤ min{k10,ab, k10,bc} ≤ k10, similarly νabc ≤ k10, and p5 ≤ p4 . . . ≤ 1, we have E≥1 [Y1] ≤
(cid:112)E[Y10]E≥1[Y10]λ6. Applying Proposition 2 to Y10 given (10)
p ≥ max{ 6(cid:112)1/N10, 3(cid:112)k10/N10}.
Choose KV ≥ 0 and let KV E[Y10] = a6
and (13), the right hand side of (12) is O(exp(−γ log m)) = O(1/mγ). Therefore, the error of the 4-clique
estimator X10 is
(13)
δX10 =
1
p6 δY10 =
1
p6 (KV p6N10) = N10
mγ .
with probability greater than 1 − 1
Now we are ready to prove the corollary by comparing Theorem 2 and Lemma 1. Fix p, δ, > 0 and γ > 1
such that p = Ω(1/ log m) and δ = m−γ = Ω(1/m). Now we analyze the bounds KV and RK. For any
graph and a6 defined in Lemma 1,
We further require k10 ≤ N 5/6
10 . Then the condition on p with (14) implies
log(21/γm) ≤ 2 log m,
(cid:110)
min
k10/N 5/6
N10
(cid:19)2/3
(cid:18) k10
10 , (k10/N10)2/3(cid:111)
≤ 1.
(14)
.
1
6 ≤ 1,
a2
γ
(5 + γ)12 ≤ 1,
p11 ≥ 1/ log11(m) ≥
γ log(21/γm)
2a2
6(5 + γ)12 log12(m)
15
Rearranging terms,
6 log12(m5+γ) max
a2
(cid:110) 6(cid:112)1/N10, 3(cid:112)k10/N10
(cid:111)
p
log(2mγ)k10/N10
2p12
≥
⇒ 2
KV ≥ 2
RK.
We note that the asymptotic condition p = Ω(1/ log m), includes a constant much smaller than 1. This
is due to the looseness of inequalities in (14) and implies that Theorem 2 is superior to Lemma 1 over all p
values of practical interest.
Implementation details
A.3
To improve the practical performance of 4-Prof-Dist (see Algorithm 1 for pseudocode), we handle low
and high degree vertices differently. As in GraphLab PowerGraph's standard triangle counting, cuckoo hash
tables are used if the vertex degree is above a threshold. Now, we also threshold vertices to determine
whether the 2-hop histogram in Section 2.3 will be either a vector or an unordered map. This is because
sorting and merging operations on a vector scale poorly with increasing degree size, while an unordered map
has constant lookup time. We found that this approach successfully trades off processing time and memory
consumption.
A.4 Extension to global 4-profile sparsifier
Another advantage to read-k function families is that they are simpler to extend to more complex subgraphs.
We now state concentration results for the full 4-profile sparsifier evaluated experimentally in Section 4
Using the notation in Section 3, the edge sampling matrix H is defined by the relations
= H
E[Y0]
...
E[Y10]
⇒
N0
...
N10
= H−1
X0
...
X10
,
Y0
...
Y10
where
H =
1 1 − p (1 − p)2
0
0
0
0
0
0
0
0
0
0
p2
0
0
0
0
0
0
0
0
p
0
0
0
0
0
0
0
0
0
(1 − p)5
2p(1 − p) 2p(1 − p) 3p(1 − p)2 3p(1 − p)2 3p(1 − p)2 4p(1 − p)3 4p(1 − p)3 5p(1 − p)4
(1 − p)3
(1 − p)2
(1 − p)4
(1 − p)3
(1 − p)4
(1 − p)3
(1 − p)6
6p(1 − p)5
p2(1 − p)
2p2(1 − p)2 p2(1 − p)2 2p2(1 − p)3 3p2(1 − p)4
2p2(1 − p) 3p2(1 − p) 3p2(1 − p) 4p2(1 − p)2 5p2(1 − p)2 8p2(1 − p)3 12p2(1 − p)4
4p3(1 − p) 2p3(1 − p) 6p3(1 − p)2 12p3(1 − p)3
p3(1 − p) 2p3(1 − p)2 4p3(1 − p)3
p3(1 − p) 2p3(1 − p)2 4p3(1 − p)3
p4(1 − p)
3p4(1 − p)2
4p4(1 − p) 12p4(1 − p)2
6p5(1 − p)
0
0
0
p2
0
0
0
0
0
0
0
p3
0
0
0
0
0
0
0
0
p3
0
0
0
0
0
p3
0
0
0
0
0
0
0
p4
0
0
0
0
p4
0
0
p5
0
p6
.
16
Let t = p−1
p . Then the inverse sampling matrix is given by
1
0
0
0
0
0
0
0
0
0
0
H−1 =
t
1
p
0
0
0
0
0
0
0
0
0
t2
2t
p
1
p2
0
0
0
0
0
0
0
0
t2
2t
p
0
1
p2
0
0
0
0
0
0
0
t3
3t2
p
t
p2
2t
p2
1
p3
0
0
0
0
0
0
t3
3t2
p
0
3t
p2
0
1
p3
0
0
0
0
0
t3
3t2
p
0
3t
p2
0
0
1
p3
0
0
0
0
t4
4t3
p
2t2
p2
4t2
p2
4t
p3
0
0
1
p4
0
0
0
t4
4t3
p
t2
p2
5t2
p2
2t
p3
t
p3
t
p3
0
1
p4
0
0
t5
5t4
p
2t3
p2
8t3
p2
6t2
p3
2t2
p3
2t2
p3
t
p4
4t
p4
1
p5
0
.
t6
6t5
p
3t4
p2
12t4
p2
12t3
p3
4t3
p3
4t3
p3
3t2
p4
12t2
p4
6t
p5
1
p6
(15)
The binomial coefficients in these matrices influence our concentration bounds, which we now state:
2N10
,
p ≥
2(N9 + 6N10)
Theorem 3 (4-profile sparsifier estimators). Consider the sampling process described above and in Section
3. Let Xi, 0 ≤ i ≤ 10 (and X be a vector of these estimates), be the actual estimates of 4-profiles. Let ki be
the maximum number of subgraphs Fi sharing a common edge. Let Yi, 0 ≤ i ≤ 10, be the 4 profile counts
of the sparsified graph. Then let Ni, 0 ≤ i ≤ 10, be the actual counts. Choose 0 < δ < 1 and > 0. Let
(cid:19)1/8
C = (192)2/2. If
(cid:19)1/12
(cid:19)1/10
(cid:18) C log(2/δ)(k8 + 4k9 + 12k10)
(cid:19)1/6
2(N8 + 4N9 + 12N10)
(cid:18) C log(2/δ)(k6 + k8 + 2k9 + 4k10)
(cid:18) C log(2/δ)k10
(cid:18) C log(2/δ)(k9 + 6k10)
(cid:19)1/8
(cid:18) C log(2/δ)(k7 + k9 + 3k10)
(cid:18) C log(2/δ)(k5 + k8 + 2k9 + 4k10)
(cid:18) C log(2/δ)(k3 + 2k4 + 3k5 + 3k6 + 4k7 + 5k8 + 8k9 + 12k10)
(cid:18) C log(2/δ)(k2 + k4 + 2k7 + k8 + 2k9 + 3k10)
(cid:18) C log(2/δ)(k1 + 2k2 + 2k3 + 3k4 + 3k5 + 3k6 + 4k7 + 4k8 + 5k9 + 6k10)
(cid:18)
2(N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10)
2(N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10)
2(N6 + N8 + 2N9 + 4N10)
(cid:18) C log(2/δ)(k4 + 4k7 + 2k8 + 6k9 + 12k10)
(cid:19)1/4
2(N4 + 4N7 + 2N8 + 6N9 + 12N10)
2(N2 + N4 + 2N7 + N8 + 2N9 + 3N10)
p ≥
p ≥
p ≥
p ≥
p ≥
2(N5 + N8 + 2N9 + 4N10)
2(N7 + N9 + 3N10)
p ≥
(cid:19)1/6
(cid:19)1/2
(cid:19)1/6
(cid:19)1/4
,
p ≥
,
p ≥
(cid:19)
,
p ≥
n0 ≤ V 2
C log(2/δ)
V 2 −
then (cid:107)δX(cid:107)∞ ≤ (cid:0)V
4
,
2
(cid:1) with probability at least 1 − δ.
Proof. We apply Proposition 1 a total of 11 times to the sampling-estimator system defined above by H
and H−1. In our context, each sampled subgraph count Yi is a sum of functions in a read-kYi family, where
kYi ≤ min{V − 2, Ni}. Let ki,e be the maximum number of subgraphs Fi sharing a common edge e, and
17
let ki = maxe ki,e, for i = 0, . . . , 10. The Yi's have the following parameters:
(cid:18)
(cid:19)
V
4
rY0 =
,
kY0 = V
rY1 = N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10
kY1 = k1 + 2k2 + 2k3 + 3k4 + 3k5 + 3k6 + 4k7 + 4k8 + 5k9 + 6k10
rY2 = N2 + N4 + 2N7 + N8 + 2N9 + 3N10
kY2 = k2 + k4 + 2k7 + k8 + 2k9 + 3k10
rY3 = N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10
kY3 = k3 + 2k4 + 3k5 + 3k6 + 4k7 + 5k8 + 8k9 + 12k10
rY4 = N4 + 4N7 + 2N8 + 6N9 + 12N10,
rY5 = N5 + N8 + 2N9 + 4N10,
rY6 = N6 + N8 + 2N9 + 4N10,
rY7 = N7 + N9 + 3N10,
rY8 = N8 + 4N9 + 12N10,
rY9 = N9 + 6N10,
rY10 = N10,
kY5 = k5 + k8 + 2k9 + 4k10
kY6 = k6 + k8 + 2k9 + 4k10
kY8 = k8 + 4k9 + 12k10
kY7 = k7 + k9 + 3k10
kY9 = k9 + 6k10
kY10 = k10
kY4 = k4 + 4k7 + 2k8 + 6k9 + 12k10
(16)
We show the application of Proposition 1 for Y7 through Y9 because Y10 was shown in the proof of
(cid:18)
(cid:18)
(cid:18)
(cid:18)
(cid:18)
(cid:18)
−
−
−
P(cid:0)
Theorem 2 and the other cases are similar:
P(cid:0)
Y7 − (p4N7 + p4(1 − p)N9 + 3p4(1 − p)2N10) ≥ p4(N7 + N9 + 3N10)(cid:1)
Y8 − (p4N8 + 4p4(1 − p)N9 + 12p4(1 − p)2N10) ≥ p4(N8 + 4N9 + 12N10)(cid:1)
P(cid:0)
Y9 − (p5N9 + 6p5(1 − p)N10) ≥ (N9 + 6N10)(cid:1)
(cid:19)
(cid:18)
⇒ P
(cid:1)
(cid:1)
p ≥
Rearranging to solve for p, we have
(cid:18) log(2/δ)k10
(cid:18) log(2/δ)(k5 + k7 + 2k9 + 4k10)
22N10
p ≥
p ≥
,
22(N5 + N8 + 2N9 + 4N10)
p ≥
2p122N10
k10
22N10
k10
−
−
≤ 2 exp
≤ 2 exp
≤ 2 exp
1
P(cid:0)
p5 Y9 − (N9 + 6(1 − p)N10) ≥ (N9 + 6N10)
⇒ P (X10 − N10 ≥ N10) = P(cid:0)
Y10 − p6N10 ≥ N10
Y3 − p6N10 ≥ p6N10
(cid:18) log(2/δ)(k8 + 4k9 + 12k10)
(cid:18) log(2/δ)(k9 + 6k10)
(cid:19)1/10
(cid:19)1/12
(cid:18) log(2/δ)(k6 + k7 + 2k9 + 4k10)
(cid:18) log(2/δ)(k7 + k9 + 3k10)
(cid:19)1/8
(cid:18) log(2/δ)(k4 + 4k7 + 2k8 + 6k9 + 12k10)
(cid:19)1/6
(cid:18) log(2/δ)(k3 + 2k4 + 3k5 + 3k6 + 4k7 + 5k8 + 8k9 + 12k10)
(cid:18) log(2/δ)(k2 + k4 + 2k7 + k8 + 2k9 + 3k10)
(cid:18) log(2/δ)(k1 + 2k2 + 2k3 + 3k4 + 3k5 + 3k6 + 4k7 + 4k8 + 5k9 + 6k10)
22(N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10)
22(N2 + N4 + 2N7 + N8 + 2N9 + 3N10)
22(N4 + 4N7 + 2N8 + 6N9 + 12N10)
22(N6 + N8 + 2N9 + 4N10)
22(N8 + 4N9 + 12N10)
22(N7 + N9 + 3N10)
22(N9 + 6N10)
p ≥
p ≥
p ≥
p ≥
p ≥
,
,
,
(cid:19)
(cid:19)
(cid:19)1/8
(cid:19)1/6
(cid:19)1/6
(cid:19)1/4
(cid:19)1/4
(cid:19)1/2
(17)
(cid:19)
(cid:19)
≤ 2 exp
≤ 2 exp
≤ 2 exp
2p82(N7 + N9 + 3N10)
k7 + k9 + 3k10
−
2p82(N8 + 4N9 + 12N10)
(cid:19)
k8 + 4k9 + 12k10
22(N9 + 6N10)
k9 + 6k10
2p102(N9 + 6N10)
(cid:19)
k9 + 6k10
p ≥
22(N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10)
18
The final condition comes from the result for Y0:
log(2/δ)V 2
n0 ≤
V
4
−
22
(cid:18)
≤ V 2
V 2 −
log(2/δ)
22
(cid:19)
(18)
Plugging into our estimators (given by H−1), we get the following error bounds:
δX0 ≤ (n1 + n2 + n3) + (n1 + 2n2 + 3n3 + n2 + 3n3 + n3)
≤ (2n1 + 4n2 + 8n3) ≤ 8
V
3
δX1 ≤ (N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10) + 2(N2 + N4 + 2N7 + N8 + 2N9 + 3N10)
+ 2(N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10) + 3(N4 + 4N7 + 2N8 + 6N9 + 12N10)
+ 3(N5 + N8 + 2N9 + 4N10) + 3(N6 + N8 + 2N9 + 4N10) + 4(N7 + N9 + 3N10)
+ 4(N8 + 4N9 + 12N10) + 5(N9 + 6N10) + 6(N10)
δX2 ≤ (N2 + N4 + 2N7 + N8 + 2N9 + 3N10) + (N4 + 4N7 + 2N8 + 6N9 + 12N10) + 2(N7 + N9 + 3N10)
+ (N8 + 4N9 + 12N10) + 2(N9 + 6N10) + 3(N10)
≤ (N1 + . . . + 192N10) ≤ 192
≤ (N2 + . . . + 48N10) ≤ 48
δX3 ≤ (N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10) + 2(N4 + 4N7 + 2N8 + 6N9 + 12N10)
+ 3(N5 + N8 + 2N9 + 4N10) + 3(N6 + N8 + 2N9 + 4N10) + 4(N7 + N9 + 3N10) + 5(N8 + 4N9 + 12N10)
+ 8(N9 + 6N10) + 12(N10)
≤ (N3 + 4N4 + 6N5 + . . . + 192N10) ≤ 192
(cid:18)
(cid:19)
V
4
δX4 ≤ (N4 + 4N7 + 2N8 + 6N9 + 12N10) + 4(N7 + N9 + 3N10) + 2(N8 + 4N9 + 12N10) + 6(N9 + 6N10) + 12(N10)
δX5 ≤ (N5 + N8 + 2N9 + 4N10) + (N8 + 4N9 + 12N10) + 2(N9 + 6N10) + 4(N10)
≤ (N4 + . . . + 96N10) ≤ 96
≤ (N5 + . . . + 32N10) ≤ 32
δX6 ≤ (N6 + N8 + 2N9 + 4N10) + (N8 + 4N9 + 12N10) + 2(N9 + 6N10) + 4(N10)
≤ (N6 + . . . + 32N10) ≤ 32
δX7 ≤ (N7 + N9 + 3N10) + (N9 + 6N10) + 3(N10)
≤ (N7 + 2N9 + 12N10) ≤ 12
δX8 ≤ (N8 + 4N9 + 12N10) + 4(N9 + 6N10) + 12(N10)
≤ (N8 + 8N9 + 48N10) ≤ 48
δX9 ≤ (N9 + 6N10) + 6(N10)
V
4
≤ (N9 + 12N10) ≤ 12
(cid:18)
(cid:19)
(cid:18)
(cid:18)
(cid:19)
(cid:19)
(cid:18)
(cid:19)
V
4
(cid:19)
(cid:18)
V
4
V
4
V
4
V
4
(cid:18)
(cid:18)
(cid:18)
(cid:18)
(cid:18)
(cid:19)
(cid:19)
(cid:19)
(cid:19)
(cid:19)
V
4
V
4
δX10 ≤ N10.
Thus the maximum deviation in any estimator is less than 192(cid:0)V
(cid:1). Substituting 2 = 2/(192)2 = 2/2C
4
completes the proof.
19
|
1904.11930 | 1 | 1904 | 2019-04-26T16:57:52 | Spectral partitioning of time-varying networks with unobserved edges | [
"cs.SI",
"eess.SY",
"physics.soc-ph",
"stat.ML"
] | We discuss a variant of `blind' community detection, in which we aim to partition an unobserved network from the observation of a (dynamical) graph signal defined on the network. We consider a scenario where our observed graph signals are obtained by filtering white noise input, and the underlying network is different for every observation. In this fashion, the filtered graph signals can be interpreted as defined on a time-varying network. We model each of the underlying network realizations as generated by an independent draw from a latent stochastic blockmodel (SBM). To infer the partition of the latent SBM, we propose a simple spectral algorithm for which we provide a theoretical analysis and establish consistency guarantees for the recovery. We illustrate our results using numerical experiments on synthetic and real data, highlighting the efficacy of our approach. | cs.SI | cs | SPECTRAL PARTITIONING OF TIME-VARYING NETWORKS WITH UNOBSERVED EDGES
Michael T. Schauba, Santiago Segarrab, Hoi-To Waic
aInst. for Data, Systems and Society, MIT & Department of Engineering Science, University of Oxford
bDepartment of Electrical and Computer Engineering, Rice University
cDepartment of SEEM, The Chinese University of Hong Kong, NT, Hong Kong.
9
1
0
2
r
p
A
6
2
]
I
S
.
s
c
[
1
v
0
3
9
1
1
.
4
0
9
1
:
v
i
X
r
a
ABSTRACT
We discuss a variant of 'blind' community detection, in which we
aim to partition an unobserved network from the observation of a
(dynamical) graph signal defined on the network. We consider a
scenario where our observed graph signals are obtained by filtering
white noise input, and the underlying network is different for every
observation. In this fashion, the filtered graph signals can be inter-
preted as defined on a time-varying network. We model each of the
underlying network realizations as generated by an independent draw
from a latent stochastic blockmodel (SBM). To infer the partition of
the latent SBM, we propose a simple spectral algorithm for which we
provide a theoretical analysis and establish consistency guarantees for
the recovery. We illustrate our results using numerical experiments
on synthetic and real data, highlighting the efficacy of our approach.
Index Terms -- graph signal processing, topology inference,
stochastic blockmodel, community detection, spectral methods
1. INTRODUCTION
Graph-based tools have become prevalent for the analysis of a range
of different systems across the sciences [1 -- 3]. However, while in
many applications we abstract the system under investigation as
a network of coupled entities, the underlying couplings are often
not known. Network inference, the problem of determining the
interaction topology of a networked system based on a set of nodal
observables, has thus gained significant interest over the last years [4 --
6]. A number of notions for network inference have featured in
the literature, ranging from estimating 'functional' couplings based
on statistical association measures such as correlation or mutual
information [7], all the way to causal inference [8]. The notion of
inference most pertinent to our discussion is what may be called
'topological' inference: given a system of dynamical units, we want
to infer their direct physical interactions. For example, we would
like to infer the adjacency matrix of the network that a distributed
system is defined on. This problem has received wide interest in
the literature recently, using techniques from optimization, spectral
analysis, and statistics [9 -- 18]. However, in many situations the goal
of inferring the exact network of couplings may be unfeasible for
various reasons. First, we may not have access to a sufficiently large
number of samples to fully identify the network. Second, the network
structure itself may be subject to fluctuations over time. Finally, we
may be able to observe only some relevant parts of the system.
Authors listed in alphabetical order. MTS received funding from the
European Unions Horizon 2020 research and innovation programme under
the Marie Sklodowska-Curie grant agreement No 702410. HTW received
funding from NSF CCF-BSF 1714672. The funders had no role in the de-
sign of this study; the results presented here reflect solely the authors views.
Emails: [email protected], [email protected], [email protected]
The described challenges need not be fundamental roadblocks
since in a number of cases our ultimate target is not to obtain the exact
network structure. Rather, our goal is to extract certain mesoscopic
features of the network such as important nodes, motifs, or levels
of assortativity. A typical scenario in these lines is the inference of
modular structure within the network, i.e., the partitioning of the net-
work into a few blocks, or communities of 'similar' nodes according
to certain criteria (see [19 -- 21] for a review on a variety of different
approaches). In this context, the so-called stochastic blockmodel and
its related variants [21] have become a major tool for solving this
problem from a statistical perspective. By assuming that the observed
network data has been created according to a prescribed generative
model, the problem of detecting modular structure is transformed into
an estimation problem in which we aim to infer the latent parameters
of the model, based on the observed network.
Inspired by our recent work on blind community detection [22 --
24], in this paper we ask the following question [24]:
Can we infer the latent partition of a stochastic blockmodel based
solely on the observation of a set of nodal signals on the graph
without ever observing the underlying graph itself?
Contributions and outline We present a fresh look on the network
inference problem by advocating an inference approach based on a
latent generative model of the network, rather than trying to infer the
exact network in terms of its adjacency matrix. As we show, this
model-based inference procedure that requires only the knowledge
of a set of sampled nodal observations can yield surprisingly good
results, that are competitive with spectral clustering in which the full
network is observed. We complement the presentation of our blind
identification algorithm with a theoretical analysis, in which we we
show the statistical consistency of our approach using concentration
inequalities and recent results from random matrix theory.
In the remainder of this article, we first discuss our problem
setup and associated preliminaries in Section 2. Section 3 describes
our main theoretical results, which underpin our partition inference
scheme. Section 4 provides numerical illustrations of our results
both using synthetic and real-world data. We conclude with a brief
discussion and an outlook on future directions in Section 5.
2. PROBLEM FORMULATION
Graphs, graph signals, and graph filters. An undirected graph G
consists of a set N of n := N nodes, and a set E of ne := E edges,
corresponding to unordered pairs of elements in N . By identifying
the node set N with the natural numbers 1, . . . , n, such a graph can
be compactly encoded by the symmetric adjacency matrix A, such
that Aij = Aji = 1 for all (i, j) ∈ E, and Aij = 0 otherwise.
Given a graph with adjacency matrix A, the (combinatorial) graph
Laplacian is defined as L := D − A, where D = diag(A1) is the
diagonal matrix containing the degrees of each node. We denote the
spectral decomposition of the Laplacian by L = V ΛV (cid:62). It is well
known that the Laplacian matrix is positive semi-definite [25].
In this paper, we consider filtered signals defined on the graph as
described next. A graph signal is a vector y ∈ Rn that associates to
each node in the graph a scalar-valued observable. A graph filter H
of order T is a linear map between graph signals that can be expressed
as a matrix polynomial in L of degree T
T(cid:88)
k=0
H(L) =
hkLk.
(1)
polynomial h(λ) = (cid:80)T
Associated with each graph filter, we define the (scalar) generating
k=0 hkλk. In this work we are concerned
with filtered graph signals that can be expressed as
y = H(L)w,
(2)
where w is an excitation signal corresponding to the 'initial condi-
tion'. We assume that it is zero-mean and white, i.e., E[ww(cid:62)] = I,
and its entries are bounded almost surely.
Combined with a set of appropriately chosen filter-coefficients,
the above signal model can account for a range of interesting sig-
nal transformations and dynamics. This includes consensus dynam-
ics [26], random walks and diffusion [27], as well as more compli-
cated dynamics that can be mediated via interactions commensurate
with the graph topology described by the Laplacian [28].
Stochastic blockmodel. The stochastic blockmodel (SBM) is a la-
tent variable model that defines a probability measure over the set
of unweighted networks of fixed size n. In an SBM, the network is
assumed to be divided into k groups of nodes. Each node i in the
network is endowed with one latent group label gi ∈ {1, . . . , k}.
Conditioned on these latent class labels, each link Aij of the adja-
cency matrix A ∈ {0, 1}n×n is a Bernoulli random variable that
takes value 1 with probability Ωgi,gj and value 0 otherwise:
Aijgi, gj ∼ Ber(Ωgi,gj ).
(3)
To compactly describe the model, we collect all the link proba-
bilities between the different groups in the symmetric affinity matrix
Ω = [Ωij] ∈ [0, 1]k×k. Furthermore we define the partition indicator
matrix G ∈ {0, 1}n×k with entries Gij = 1 if node i belongs to
group j and Gij = 0 otherwise. Based on these definitions, we can
write the expected adjacency matrix under the SBM as
E[AG] = GΩG
(cid:62)
.
(4)
Algorithm 1 Spectral partitioning of time-varying networks.
1: Input: filtered graph signals {y((cid:96))}m
2: Compute the sampled covariance matrix as
(cid:96)=1; number of groups k.
y := (1/m)(cid:80)m
(cid:98)Cm
y as (cid:98)Cm
(cid:96)=1(y((cid:96)))(y((cid:96)))(cid:62)
3: Evaluate the EVD of (cid:98)Cm
y = (cid:98)V (cid:98)Λ(cid:98)V (cid:62).
4: Apply k-means on the row vectors of the matrix (cid:98)Vk ∈ Rn×k,
whose columns are the top-k eigenvectors in (cid:98)Cm
5: Output: a partition N = C1 ∪ ...∪Ck with Ci ∩Cj = ∅ if i (cid:54)= j.
y .
(6)
To motivate this setup, consider the example of observing fMRI
signals of m different patients in resting state [29]. While for sim-
ilar patients the overall large-scale structure of each patient's brain
network will be similar (the same SBM parameters), the individual
details of these networks will be different (each network is a particular
realization of the SBM). Moreover, we do not observe the network
itself but only node-measurements (y((cid:96))), which will generally corre-
spond to different, unknown independent initial conditions (w((cid:96))). As
a second example, we may think of measuring some node activities
such as the expression of opinions at m different, sufficiently sepa-
rated instances of time in some form of social network. Assuming a
reasonable stable social fabric, the large scale features of the latent
(unobserved) network should be relatively stable, while the individual
active links in each observation instance may be different.
3. ALGORITHM AND THEORETICAL ANALYSIS
sample covariance (cid:98)Cm
on the leading eigenvectors of (cid:98)Cm
Algorithm 1 describes a simple spectral method to solve Problem 1.
In a nutshell, given the observations {y((cid:96))}m
(cid:96)=1, we compute their
y as in (6) and then apply k-means clustering
y . For simplicity, we assume here
that the number of groups k of the SBM is known. However, k could
be estimated as well from the spectral properties of the covariance
matrix, e.g., by estimating its effective rank.
To theoretically assess the performance of the proposed method,
we present an analysis in three steps. First, we characterize the
rate of convergence of the sample covariance to the true covariance
Cy (cf. Proposition 1). Second, we determine the structure of the
limiting matrix Cy (cf. Proposition 2). Finally, we show that the
eigenstructure of Cy contains all the information needed to solve
Problem 1 (cf. Proposition 3).
Recall the definition of the covariance matrix
Cy := E[y((cid:96))(y((cid:96)))
(cid:62)
],
(7)
Observation model and network model inference. We observe a
nodal signal y((cid:96)) on a network at m instances. For each instance, we
obtain a sample of the form
where the expected value is taken over both sources of randomness,
i.e., the excitation signal w((cid:96)) as well as the Laplacian L((cid:96)) of the
realized graph. Based on this, the following result can be shown.
y((cid:96)) = H(L((cid:96)))w((cid:96)),
(cid:96) = 1, . . . , m.
(5)
Proposition 1 Assume that the following conditions hold:
For every (cid:96), we assume that the Laplacian L((cid:96)) is computed from the
adjacency matrix of an independently drawn SBM network with a
constant parameter matrix Ω. Moreover, the initial conditions w((cid:96))
are i.i.d. with zero mean and E[w((cid:96))(w((cid:96)))(cid:62)] = I.
Our goal is now to solve the following problem.
Problem 1 Consider the observation model described by Equa-
tion (5). Based solely on the m observations (y(1), . . . , y(m)),
infer the group structure of the latent SBM generating L((cid:96)).
(a) The spectral norm of the graph filter is uniformly bounded, i.e.,
(cid:107)H(L((cid:96)))(cid:107)2 ≤ ¯h for all (cid:96).
√
(b) The excitation signal satisfies (cid:107)w((cid:96))(cid:107)2 ≤ c
and (E[(cid:107)w((cid:96))(cid:107)q
2])1/q ≤ W0 < ∞ for some q ≥ 4.
n almost surely,
Then, for any m ≥ n ≥ 4, with probability at least 1 − δ, one has
(cid:13)(cid:13)(cid:98)Cm
y − Cy
(cid:13)(cid:13)2
≤ c0 (log log n)2(cid:16) n
(cid:17) 1
2 − 2
q ,
(8)
m
where the constant c0 depends on q, ¯h, δ, and W0.
Proof. Observe that the following bound
(cid:107)y((cid:96))(cid:107)2 = (cid:107)H(L((cid:96)))w((cid:96))(cid:107)2 ≤ (cid:107)H(L((cid:96)))(cid:107)2(cid:107)w((cid:96))(cid:107)2,
combined with condition (a) implies that
(cid:107)y((cid:96))(cid:107)2 ≤ ¯h(cid:107)w((cid:96))(cid:107)2 .
(9)
To show that (cid:98)Cm
from (9) that
y converges to its expected value, first we observe
(cid:107)y((cid:96))(cid:107)2 ≤ c¯h
(10)
n for some c almost surely. Second, consider any u
√
n a.s. ,
√
if (cid:107)w((cid:96))(cid:107)2 ≤ c
such that (cid:107)u(cid:107)2 = 1, we have
(cid:104)y((cid:96)), u(cid:105) ≤ (cid:107)y((cid:96))(cid:107)2(cid:107)u(cid:107)2 ≤ ¯h(cid:107)w((cid:96))(cid:107)2 .
Applying (11), for any q ≥ 1, one has
(cid:0)E[(cid:104)y((cid:96)), u(cid:105)q](cid:1)1/q ≤ ¯h(E[(cid:107)w((cid:96))(cid:107)q
2])1/q ≤ ¯hW0 .
(11)
(12)
where G ∈ {0, 1}n×2 is the partition indicator matrix as defined
2 − 2)p4 + 2p5 +
before (4), and the constants ci are given by c1 = ( n
2 − 1)p2 + n
2 − 1)p8 + 2p7, and c3 = p1 + ( n
2 p6, c2 = 2( n
2 p3.
n
(cid:17)2(cid:105)
Proof. Consider first the diagonal entries of Cy, we have that
(cid:105)
(cid:62)
[Cy]ii = E[h
i ww
Hijwj
(cid:62)
j
H 2
ijw2
HijwjHikwi
hi] = E(cid:104)(cid:16)(cid:88)
(cid:88)
(cid:88)
j +
j,k
= E(cid:104)(cid:88)
(cid:88)
j
=
E[H 2
ij]E[w2
j ] +
E[HijHik]E[wj]E[wi]
j
j,k
Using the fact that E[w2
j ] = 1 and E[wj] = 0, it follows that
[Cy]ii = E[H 2
E[H 2
ij] +
E[H 2
ij]
(14)
(cid:88)
j∼i
− 1
(cid:17)
ii] +
(cid:16) n
2
(cid:88)
j(cid:54)∼i
p2 +
n
2
p3 = c3.
From (10) and (12), the two conditions in [30, Eq. (2.2)] hold. Invok-
(cid:4)
ing [30, Theorem 6.1] shows the desired result in (8).
= p1 +
i
1
The conditions required by the proposition are mild. For instance,
condition (a) holds for graph filters that are low-pass [22]. Indeed,
in such a case we have that (cid:107)H(L((cid:96)))(cid:107)2 ≤ h(0), where h(·) is
the generating polynomial of the filter H(·). Condition (b) holds
with for q ≥ 4 when the excitation signal is bounded, e.g., w((cid:96))
is
i.i.d. and distributed with U[−b, b], b < ∞. The proposition shows
that the sampled covariance converges to the true covariance at a
rate O(1/m
in the case of bounded excitation signals, where q can be made
arbitrarily large.
q ). In particular, the convergence rate is O((cid:112)1/m)
2 − 2
Notice that Proposition 1 concerns general covariance matrices
and does not use the fact that L((cid:96)) is the Laplacian of a graph drawn
from an SBM. In order to derive results about the recovery of the
latent communities, we will have to put this assumption into place.
For simplicity, we consider in the theoretical considerations that
follow a simple planted partition model of size n, in which only two
equally sized communities of size n/2 exist [21]. Nonetheless, the
arguments that follow can be extended to general SBMs.
In our planted partition model, the probability of an edge between
two nodes within the same community is governed by the parameter
a whereas the probability of a link between two nodes of different
communities is described by parameter b. Given two nodes i and
j, the expression i ∼ j denotes that both nodes lie in the same
block of the SBM, whereas i (cid:54)∼ j indicates the contrary. Moreover,
for simplicity we denote by H = H(L((cid:96))) the (random) matrix
representing the filter of interest. We use the following parameters to
denote the expected entries of H:
p1 := E[H 2
p3 := E[H 2
p5 := E[HiiHji] for i ∼ j,
p7 := E[HiiHji] for i (cid:54)∼ j,
Based on the introduced notation, we characterize the covariance
p2 := E[H 2
p4 := E[HilHjl] for i ∼ j ∼ l,
p6 := E[HilHjl] for i ∼ j (cid:54)∼ l,
p8 := E[HilHjl] for i (cid:54)∼ j.
ii] for all i,
ij] for i (cid:54)∼ j,
ij] for i ∼ j,
structure of our observed output signals.
Proposition 2 The covariance Cy defined in (7) is given by
Cy = (c3 − c1)I + G
(cid:62)
,
G
(13)
(cid:18)c1
c2
(cid:19)
c2
c1
Next, we consider an off-diagonal entry in Cy within a block of the
SBM, i.e., for i ∼ j but i (cid:54)= j we have that
[Cy]ij = E[h
(cid:62)
i ww
(cid:62)
= E(cid:104)(cid:88)
(a)
(cid:105)
HilwlHjkwk
hj] = E(cid:104)(cid:88)
(cid:105) (b)
(cid:88)
l,k
HilHjlw2
l
=
E[HilHjl],
l
l
where (a) follows from E[wlwk] = 0 whenever l (cid:54)= k, and (b) used
that E[w2
l ] = 1. From the above it then follows that
[Cy]ij = 2E[HiiHji] +
E[HilHjl] +
E[HilHjl]
(cid:88)
ll(cid:54)∼i
(cid:88)
(cid:16) n
2
(cid:17)
ll∼i,j(cid:54)=l(cid:54)=i
n
2
p4 +
− 2
= 2p5 +
p6 = c1.
(15)
Finally, considering i and j in different blocks, we can similarly
show that [Cy]ij = c2. By combining this result with (14) and (15),
(cid:4)
expression (13) readily follows.
An important consequence of Proposition 2 is the resulting spec-
tral decomposition of Cy and how this eigenstructure relates to the
planted (true) communities in the underlying SBM. The following
proposition combines the results from Propositions 1 and 2 and justi-
fies (asymptotically) the performance of Algorithm 1 in recovering
the true communities.
Proposition 3 Assume that the conditions in Proposition 1 hold, and
that c1 > c2, as defined in Proposition 2. Then, for a large enough
number of observations m, Algorithm 1 is guaranteed to recover the
two communities of the equisized planted partition model.
Proof. Direct computation from expression (13) reveals that the
vector of all ones 1 is an eigenvector of Cy with associated eigen-
2 (c1 + c2) + (c3 − c1). Similarly, the signed bi-
value µ1 := n
nary vector ±1 := G[1,−1](cid:62) whose sign indicates membership to
each community is also an eigenvector of Cy but with eigenvalue
2 (c1 − c2) + (c3 − c1). Every other eigenvector is associated
µ2 := n
with the eigenvalue µ := c3 − c1. Given that Algorithm 1 keeps the
y , it follows from the concentration result in
Proposition 1 that whenever µ1 > µ and µ2 > µ, the eigenvectors
selected by our algorithm will be arbitrarily close to 1 and ±1 for
top-2 eigenvectors of (cid:98)Cm
e
t
a
R
r
o
r
r
E
10−1
10−2
10−3
10−4
γ = 0.1
γ = 0.3
γ = 0.5
γ = 0.7
γ = 0.9
SC (γ = 0.1)
101
102
103
104
105
Sample size m
Fig. 1: Error rate of partition recovery using Algorithm 1 against
sample size for synthetic time varying graphs with various structural
parameters γ (see text).
large enough m, thus leading to perfect recovery. Hence, we need
c1 + c2 > 0 and c1 − c2 > 0, from where c1 > c2 follows.
(cid:4)
The constants c1 and c2 depend on the parameters p4 through
p8, which in turn depend on the filter specification h(·) and the
probabilities a and b in the considered SBM. Whenever a = b, it can
be shown that c1 = c2, thus preventing the recovery of the planted
true communities, as expected. Given a generic filter for which
c1 > c2 if a (cid:54)= b, however, even a minimal difference between
a and b will result asymptotically in a perfect recovery. This is in
contrast with the detectability limit that holds for the SBM recovery
problem with an observed network, where the partitions cannot be
recovered if a is too close to b [21]. The reason behind the improved
resolution here is that in our problem each sample y((cid:96)) corresponds
to an (indirect) observations of a different graph drawn from the same
SBM, allowing us to detect communities for large enough samples
m even in the most adverse scenarios. When inferring an SBM from
a single network observation, one cannot (indirectly) leverage such
additional graph samples, resulting in a detectability limit [21].
4. NUMERICAL EXPERIMENTS
Synthetic data. We first examine the claims made in the paper
using synthetic data. We draw graphs from an SBM with n = 100
nodes and k = 2 communities, with Ωgi,gj = 4 log n/n if gi = gj,
and Ωgi,gj = 4γ log n/n otherwise, parametrized by γ ∈ (0, 1).
Note that the smaller γ is, the easier it is to detect the communities.
Throughout the section, the input signal is i.i.d. and set as w((cid:96)) ∼
U[−1, 1]n. The graph filter considered is H(L) = (I − αL((cid:96)))5
where α = 1/(4 + 4γ) log n ensures that (cid:107)H(L((cid:96)))(cid:107) < 1 for all (cid:96).
In Fig. 1 we simulate the error rate of the partition inference over
different settings of γ, against the sample size m using our proposed
method. We found that the error rate decays to zero asymptotically
as m → ∞ regardless of the connectivity probability parameter γ.
Moreover, the error rate is markedly better compared to the applica-
tion of standard spectral clustering (SC) on a single instance of the
graph Laplacian. Note that this holds even if the graph considered for
SC is taken from an SBM with γ = 0.1, in line with our discussion
at the end of Section 3.
United States Senate data. We apply the proposed method to roll-
call data (available at https://voteview.com) taken from the
110th to 114th congress of the US Senate (corresponding to years
2007 to 2017) consisting of m = 2998 rollcalls. Using this data we
focus on inferring partitions of a network in which the nodes repre-
sent the n = 50 states of USA. To convert the data into real-valued
(a) k = 2. Data from 2007-2017. (b) k = 4. Data from 2007-2017.
(c) k = 2. Data from 2015-2017. (d) k = 4. Data from 2015-2017.
Fig. 2: Partitioning of the US Senate's states network for different
number of communities k and observation periods (see text).
graph signals that agree with our time varying topology model, the
(cid:96)th rollcall data is mapped into a sample graph signal y(cid:96) ∈ R50 as
i ∈ [−1, 1]
follows. For each state i ∈ {1, ..., 50}, we compute y(cid:96)
as the average vote value from the two senators of each state, where
the vote value counts a 'Yay' as 1, an absentee or an abstain as 0,
and a 'Nay' as −1. Note that with the framework of our model, we
assume that the community a state belongs to remains invariant since
the economic/political situation of the state varies slowly in general,
even though senators maybe elected in/out during different periods.
Fig. 2 shows the partitions of the states at different resolution
(k = 2, 4) based on the rollcall data from the combined periods
of 2007-2017 (Fig. 2a,b) and from the latest period 2015-2017
(Fig. 2c,d), respectively. At a resolution of k = 2, the partition
result corroborates the common belief about the division between
'Republican' (red, e.g., Texas & Arizona) and 'Democrat' (blue,
e.g., California & Massachusetts) states, with the 2015-2017 data
reflecting recent changes in the elected senators for states such as
Maine and New Hampshire. We also remark that for k = 4, the
partitioning result using 2015-2017 data is less conclusive as it
changes substantially when we sample a small batch of rollcall data.
Such instability is not observed in the 2007-2017 data at the same
resolution, where the partition identifies some of the 'swing' states
such as Michigan and Louisiana.
5. DISCUSSION
Network inference is often a critical step to perform any kind of
network analysis. In certain cases, however, we are only interested in
extracting some coarser features of the network, e.g., in the form of
communities [22 -- 24, 31]. As we have shown in this manuscript, if
we have access to a set of independent samples from a filtered signal
defined on the nodes of the network, this task can be achieved even in
the absence of any information about the edges. As we have discussed
for the system studied here, if the underlying network is time-varying
but its latent structure remains stationary, we may even obtain a better
partition recovery performance when compared to observing a single
full snapshot of the actual network. Characterizing this trade-off and
the sample complexity of the corresponding problems in more detail,
as well as enlarging the class of latent models and considered graph
filters are interesting avenues for future work.
[18] Georgios B Giannakis, Yanning Shen, and Georgios Vasileios
Karanikolas, "Topology identification and learning over graphs:
Accounting for nonlinearities and dynamics," Proceedings of
the IEEE, vol. 106, no. 5, pp. 787 -- 807, 2018.
[19] Santo Fortunato and Darko Hric, "Community detection in
networks: A user guide," Physics Reports, vol. 659, pp. 1 -- 44,
2016.
[20] Michael T Schaub, Jean-Charles Delvenne, Martin Rosvall, and
Renaud Lambiotte, "The many facets of community detection
in complex networks," Applied Network Science, vol. 2, no. 1,
pp. 4, 2017.
[21] Emmanuel Abbe, "Community detection and stochastic block
models: Recent developments," Journal of Machine Learning
Research, vol. 18, no. 177, pp. 1 -- 86, 2018.
[22] Hoi-To Wai, Santiago Segarra, Asuman E Ozdaglar, Anna
Scaglione, and Ali Jadbabaie, "Community detection from
low-rank excitations of a graph filter," in 2018 IEEE Interna-
tional Conference on Acoustics, Speech and Signal Processing
(ICASSP). IEEE, 2018, pp. 4044 -- 4048.
[23] Hoi-To Wai, Santiago Segarra, Asuman E Ozdaglar, Anna
Scaglione, and Ali Jadbabaie, "Blind community detection
from low-rank excitations of a graph filter," arXiv preprint
arXiv:1809.01485, 2018.
[24] Michael T. Schaub, Santiago Segarra, and John Tsitsiklis,
"Blind identification of stochastic block models from dynamical
observations," in preparation, 2018.
[25] Russell Merris, "Laplacian matrices of graphs: a survey," Linear
algebra and its applications, vol. 197, pp. 143 -- 176, 1994.
[26] Reza Olfati-Saber, J Alex Fax, and Richard M Murray, "Con-
sensus and cooperation in networked multi-agent systems," Pro-
ceedings of the IEEE, vol. 95, no. 1, pp. 215 -- 233, 2007.
[27] Naoki Masuda, Mason A Porter, and Renaud Lambiotte, "Ran-
dom walks and diffusion on networks," Physics Reports, 2017.
[28] Santiago Segarra, Antonio G Marques, and Alejandro Ribeiro,
"Optimal graph-filter design and applications to distributed lin-
ear network operators," IEEE Transactions on Signal Process-
ing, vol. 65, no. 15, pp. 4117 -- 4131, Aug 2017.
[29] Jessica S Damoiseaux, Serge A Rombouts, Frederik Barkhof,
Philip Scheltens, Cornelis J Stam, Stephen M Smith, and Chris-
tian F Beckmann, "Consistent resting-state networks across
healthy subjects," Proceedings of the national academy of
sciences, vol. 103, no. 37, pp. 13848 -- 13853, 2006.
[30] Roman Vershynin, "How close is the sample covariance ma-
trix to the actual covariance matrix?," Journal of Theoretical
Probability, vol. 25, no. 3, pp. 655 -- 686, 2012.
[31] Till Hoffmann, Leto Peel, Renaud Lambiotte, and Nick S Jones,
"Community detection in networks with unobserved edges,"
arXiv preprint arXiv:1808.06079, 2018.
6. REFERENCES
[1] Steven H. Strogatz, "Exploring complex networks," Nature,
vol. 410, no. 6825, pp. 268 -- 276, Mar. 2001.
[2] Mark E. J. Newman, Networks: An Introduction, Oxford
University Press, USA, Mar. 2010.
[3] Matthew O Jackson, Social and economic networks, Princeton
university press, 2010.
[4] Marc Timme and Jose Casadiego, "Revealing networks from dy-
namics: an introduction," Journal of Physics A: Mathematical
and Theoretical, vol. 47, no. 34, pp. 343001, 2014.
[5] Patrik D'haeseleer, Shoudan Liang, and Roland Somogyi, "Ge-
netic network inference: from co-expression clustering to re-
verse engineering," Bioinformatics, vol. 16, no. 8, pp. 707 -- 726,
2000.
[6] Ivan Brugere, Brian Gallagher, and Tanya Y Berger-Wolf, "Net-
work structure inference, a survey: Motivations, methods, and
applications," ACM Computing Surveys (CSUR), vol. 51, no. 2,
pp. 24, 2018.
[7] Jonathan Friedman and Eric J Alm, "Inferring correlation net-
works from genomic survey data," PLoS computational biology,
vol. 8, no. 9, pp. e1002687, 2012.
[8] Judea Pearl, "Causal inference in statistics: An overview,"
Statistics surveys, vol. 3, pp. 96 -- 146, 2009.
[9] Agung Julius, Michael Zavlanos, Stephen Boyd, and George J
Pappas, "Genetic network identification using convex program-
ming," IET systems biology, vol. 3, no. 3, pp. 155 -- 166, 2009.
[10] Emmanuel J Candes, Michael B Wakin, and Stephen P Boyd,
"Enhancing sparsity by reweighted l1 minimization," Journal of
Fourier analysis and applications, vol. 14, no. 5-6, pp. 877 -- 905,
2008.
[11] Shahin Shahrampour and Victor M Preciado, "Topology iden-
tification of directed dynamical networks via power spectral
analysis," IEEE Transactions on Automatic Control, vol. 60, no.
8, pp. 2261, 2015.
[12] Donatello Materassi and Murti V Salapaka, "On the problem
of reconstructing an unknown topology via locality properties
of the wiener filter," IEEE transactions on automatic control,
vol. 57, no. 7, pp. 1765 -- 1777, 2012.
[13] David Hayden, Young Hwan Chang, Jorge Goncalves, and
Claire J Tomlin, "Sparse network identifiability via compressed
sensing," Automatica, vol. 68, pp. 9 -- 17, 2016.
[14] Ye Yuan, Guy-Bart Stan, Sean Warnick, and Jorge Goncalves,
"Robust dynamical network structure reconstruction," Automat-
ica, vol. 47, no. 6, pp. 1230 -- 1235, 2011.
[15] Hoi-To Wai, Anna Scaglione, and Amir Leshem, "Active sens-
ing of social networks," IEEE Transactions on Signal and In-
formation Processing over Networks, vol. 2, no. 3, pp. 406 -- 419,
2016.
[16] Alexandre Mauroy and Julien Hendrickx, "Spectral identifica-
tion of networks using sparse measurements," SIAM Journal on
Applied Dynamical Systems, vol. 16, no. 1, pp. 479 -- 513, 2017.
[17] Santiago Segarra, Antonio G Marques, Gonzalo Mateos, and
Alejandro Ribeiro, "Network topology inference from spec-
tral templates," IEEE Transactions on Signal and Information
Processing over Networks, vol. 3, no. 3, pp. 467 -- 483, 2017.
|
1911.05485 | 5 | 1911 | 2019-12-29T22:33:56 | Diffusion Improves Graph Learning | [
"cs.SI",
"cs.AI",
"cs.LG",
"stat.ML"
] | Graph convolution is the core of most Graph Neural Networks (GNNs) and usually approximated by message passing between direct (one-hop) neighbors. In this work, we remove the restriction of using only the direct neighbors by introducing a powerful, yet spatially localized graph convolution: Graph diffusion convolution (GDC). GDC leverages generalized graph diffusion, examples of which are the heat kernel and personalized PageRank. It alleviates the problem of noisy and often arbitrarily defined edges in real graphs. We show that GDC is closely related to spectral-based models and thus combines the strengths of both spatial (message passing) and spectral methods. We demonstrate that replacing message passing with graph diffusion convolution consistently leads to significant performance improvements across a wide range of models on both supervised and unsupervised tasks and a variety of datasets. Furthermore, GDC is not limited to GNNs but can trivially be combined with any graph-based model or algorithm (e.g. spectral clustering) without requiring any changes to the latter or affecting its computational complexity. Our implementation is available online. | cs.SI | cs | Diffusion Improves Graph Learning
Johannes Klicpera, Stefan Weissenberger, Stephan Günnemann
Technical University of Munich
{klicpera,stefan.weissenberger,guennemann}@in.tum.de
9
1
0
2
c
e
D
9
2
]
I
S
.
s
c
[
5
v
5
8
4
5
0
.
1
1
9
1
:
v
i
X
r
a
Abstract
Graph convolution is the core of most Graph Neural Networks (GNNs) and usually
approximated by message passing between direct (one-hop) neighbors. In this
work, we remove the restriction of using only the direct neighbors by introducing a
powerful, yet spatially localized graph convolution: Graph diffusion convolution
(GDC). GDC leverages generalized graph diffusion, examples of which are the
heat kernel and personalized PageRank. It alleviates the problem of noisy and often
arbitrarily defined edges in real graphs. We show that GDC is closely related to
spectral-based models and thus combines the strengths of both spatial (message
passing) and spectral methods. We demonstrate that replacing message passing
with graph diffusion convolution consistently leads to significant performance
improvements across a wide range of models on both supervised and unsupervised
tasks and a variety of datasets. Furthermore, GDC is not limited to GNNs but
can trivially be combined with any graph-based model or algorithm (e.g. spectral
clustering) without requiring any changes to the latter or affecting its computational
complexity. Our implementation is available online. 1
1
Introduction
When people started using graphs for evaluating chess tournaments in the middle of the 19th
century they only considered each player's direct opponents, i.e. their first-hop neighbors. Only
later was the analysis extended to recursively consider higher-order relationships via A2, A3, etc.
and finally generalized to consider all exponents at once, using the adjacency matrix's dominant
eigenvector [38, 75]. The field of Graph Neural Networks (GNNs) is currently in a similar state. Graph
Convolutional Networks (GCNs) [32], also referred to as Message Passing Neural Networks (MPNNs)
[23] are the prevalent approach in this field but they only pass messages between neighboring nodes
in each layer. These messages are then aggregated at each node to form the embedding for the next
layer. While MPNNs do leverage higher-order neighborhoods in deeper layers, limiting each layer's
messages to one-hop neighbors seems arbitrary. Edges in real graphs are often noisy or defined using
an arbitrary threshold [70], so we can clearly improve upon this approach.
Since MPNNs only use the immediate neigborhod information, they are often referred to as spatial
methods. On the other hand, spectral-based models do not just rely on first-hop neighbors and capture
more complex graph properties [16]. However, while being theoretically more elegant, these methods
are routinely outperformed by MPNNs on graph-related tasks [32, 74, 81] and do not generalize
to previously unseen graphs. This shows that message passing is a powerful framework worth
extending upon. To reconcile these two separate approaches and combine their strengths we propose
a novel technique of performing message passing inspired by spectral methods: Graph diffusion
convolution (GDC). Instead of aggregating information only from the first-hop neighbors, GDC
aggregates information from a larger neighborhood. This neighborhood is constructed via a new
graph generated by sparsifying a generalized form of graph diffusion. We show how graph diffusion
1https://www.daml.in.tum.de/gdc
33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, Canada.
is expressed as an equivalent polynomial filter and how GDC is closely related to spectral-based
models while addressing their shortcomings. GDC is spatially localized, scalable, can be combined
with message passing, and generalizes to unseen graphs. Furthermore, since GDC generates a new
sparse graph it is not limited to MPNNs and can trivially be combined with any existing graph-based
model or algorithm in a plug-and-play manner, i.e. without requiring changing the model or affecting
its computational complexity. We show that GDC consistently improves performance across a wide
range of models on both supervised and unsupervised tasks and various homophilic datasets. In
summary, this paper's core contributions are:
1. Proposing graph diffusion convolution (GDC), a more powerful and general, yet spatially localized
alternative to message passing that uses a sparsified generalized form of graph diffusion. GDC is
not limited to GNNs and can be combined with any graph-based model or algorithm.
2. Analyzing the spectral properties of GDC and graph diffusion. We show how graph diffusion is
expressed as an equivalent polynomial filter and analyze GDC's effect on the graph spectrum.
3. Comparing and evaluating several specific variants of GDC and demonstrating its wide applicabil-
ity to supervised and unsupervised learning on graphs.
2 Generalized graph diffusion
We consider an undirected graph G = (V,E) with node set V and edge set E. We denote with
N = V the number of nodes and A ∈ RN×N the adjacency matrix. We define generalized graph
diffusion via the diffusion matrix
∞(cid:88)
k=0
S =
θkT k,
(1)
and require that(cid:80)∞
D is the diagonal matrix of node degrees, i.e. Dii =(cid:80)N
with the weighting coefficients θk, and the generalized transition matrix T . The choice of θk and T k
must at least ensure that Eq. 1 converges. In this work we will consider somewhat stricter conditions
k=0 θk = 1, θk ∈ [0, 1], and that the eigenvalues of T are bounded by λi ∈ [0, 1],
which together are sufficient to guarantee convergence. Note that regular graph diffusion commonly
requires T to be column- or row-stochastic.
Transition matrix. Examples for T in an undirected graph include the random walk transition matrix
Trw = AD−1 and the symmetric transition matrix Tsym = D−1/2AD−1/2, where the degree matrix
j=1 Aij. Note that in our definition Trw is
column-stochastic. We furthermore adjust the random walk by adding (weighted) self-loops to the
original adjacency matrix, i.e. use Tsym = (wloopIN + D)−1/2(wloopIN + A)(wloopIN + D)−1/2,
with the self-loop weight wloop ∈ R+. This is equivalent to performing a lazy random walk with a
probability of staying at node i of pstay,i = wloop/Di.
Special cases. Two popular examples of graph diffusion are personalized PageRank (PPR) [57] and
k = α(1 − α)k, with teleport
the heat kernel [36]. PPR corresponds to choosing T = Trw and θPPR
probability α ∈ (0, 1) [14]. The heat kernel uses T = Trw and θHK
k! , with the diffusion time
t [14]. Another special case of generalized graph diffusion is the approximated graph convolution
introduced by Kipf & Welling [32], which translates to θ1 = 1 and θk = 0 for k (cid:54)= 1 and uses
T = Tsym with wloop = 1.
Weighting coefficients. We compute the series defined by Eq. 1 either in closed-form, if possible, or
by restricting the sum to a finite number K. Both the coefficients defined by PPR and the heat kernel
give a closed-form solution for this series that we found to perform well for the tasks considered.
Note that we are not restricted to using Trw and can use any generalized transition matrix along
with the coefficients θPPR
and the series still converges. We can furthermore choose θk by
repurposing the graph-specific coefficients obtained by methods that optimize coefficients analogous
to θk as part of their training process. We investigated this approach using label propagation [8, 13]
and node embedding models [1]. However, we found that the simple coefficients defined by PPR or
the heat kernel perform better than those learned by these models (see Fig. 7 in Sec. 6).
k = e−t tk
or θHK
k
k
2
.
.
.
.
.
.
.
.
.
Graph diffusion
Density defines edges
Sparsify edges
New graph
Figure 1: Illustration of graph diffusion convolution (GDC). We transform a graph A via graph
diffusion and sparsification into a new graph S and run the given model on this graph instead.
3 Graph diffusion convolution
Essentially, graph diffusion convolution (GDC) exchanges the normal adjacency matrix A with a
sparsified version S of the generalized graph diffusion matrix S, as illustrated by Fig. 1. This matrix
defines a weighted and directed graph, and the model we aim to augment is applied to this graph
instead. We found that the calculated edge weights are beneficial for the tasks considered. However,
we even found that GDC works when ignoring the weights after sparsification. This enables us to use
GDC with models that only support unweighted edges such as the degree-corrected stochastic block
model (DCSBM). If required, we make the graph undirected by using ( S + ST )/2, e.g. for spectral
clustering. With these adjustments GDC is applicable to any graph-based model or algorithm.
Intuition. The general intuition behind GDC is that graph diffusion smooths out the neighborhood
over the graph, acting as a kind of denoising filter similar to Gaussian filters on images. This helps
with graph learning since both features and edges in real graphs are often noisy. Previous works also
highlighted the effectiveness of graph denoising. Berberidis & Giannakis [7] showed that PPR is
able to reconstruct the underlying probability matrix of a sampled stochastic block model (SBM)
graph. Kloumann et al. [35] and Ragain [64] showed that PPR is optimal in recovering the SBM
and DCSBM clusters in the space of landing probabilities under the mean field assumption. Li et al.
[40] generalized this result by analyzing the convergence of landing probabilities to their mean field
values. These results confirm the intuition that graph diffusion-based smoothing indeed recovers
meaningful neighborhoods from noisy graphs.
Sparsification. Most graph diffusions result in a dense matrix S. This happens even if we do not
sum to k = ∞ in Eq. 1 due to the "four/six degrees of separation" in real-world graphs [5]. However,
the values in S represent the influence between all pairs of nodes, which typically are highly localized
[54]. This is a major advantage over spectral-based models since the spectral domain does not provide
any notion of locality. Spatial localization allows us to simply truncate small values of S and recover
sparsity, resulting in the matrix S. In this work we consider two options for sparsification: 1. top-k:
Use the k entries with the highest mass per column, 2. Threshold : Set entries below to zero.
Sparsification would still require calculating a dense matrix S during preprocessing. However, many
popular graph diffusions can be approximated efficiently and accurately in linear time and space.
Most importantly, there are fast approximations for both PPR [3, 77] and the heat kernel [34], with
which GDC achieves a linear runtime O(N ). Furthermore, top-k truncation generates a regular graph,
which is amenable to batching methods and solves problems related to widely varying node degrees
[15]. Empirically, we even found that sparsification slightly improves prediction accuracy (see Fig. 5
in Sec. 6). After sparsification we calculate the (symmetric or random walk) transition matrix on the
resulting graph via T S
Limitations. GDC is based on the assumption of homophily, i.e. "birds of a feather flock together"
[49]. Many methods share this assumption and most common datasets adhere to this principle.
However, this is an often overlooked limitation and it seems non-straightforward to overcome. One
way of extending GDC to heterophily, i.e. "opposites attract", might be negative edge weights
−1/2
SD
S
.
sym = D
−1/2
S
3
[17, 44]. Furthermore, we suspect that GDC does not perform well in settings with more complex
edges (e.g. knowledge graphs) or graph reconstruction tasks such as link prediction. Preliminary
experiments showed that GDC indeed does not improve link prediction performance.
4 Spectral analysis of GDC
Even though GDC is a spatial-based method it can also be interpreted as a graph convolution and
analyzed in the graph spectral domain. In this section we show how generalized graph diffusion
is expressed as an equivalent polynomial filter and vice versa. Additionally, we perform a spectral
analysis of GDC, which highlights the tight connection between GDC and spectral-based models.
Spectral graph theory. To employ the tools of spectral theory to graphs we exchange the regular
Laplace operator with either the unnormalized Laplacian Lun = D− A, the random-walk normalized
Lrw = IN − Trw, or the symmetric normalized graph Laplacian Lsym = IN − Tsym [76]. The
Laplacian's eigendecomposition is L = U ΛU T , where both U and Λ are real-valued. The graph
Fourier transform of a vector x is then defined via x = U T x and its inverse as x = U x. Using
this we define a graph convolution on G as x ∗G y = U ((U T x) (cid:12) (U T y)), where (cid:12) denotes the
Hadamard product. Hence, a filter gξ with parameters ξ acts on x as gξ(L)x = U Gξ(Λ)U T x, where
Gξ(Λ) = diag(gξ,1(Λ), . . . , gξ,N (Λ)). A common choice for gξ in the literature is a polynomial
filter of order J, since it is localized and has a limited number of parameters [16, 27]:
J(cid:88)
U T .
gξ(L) =
ξjLj = U
ξjΛj
j=0
j=0
(2)
J(cid:88)
J(cid:88)
j=0
(−t)j
j!
Graph diffusion as a polynomial filter. Comparing Eq. 1 with Eq. 2 shows the close relationship
between polynomial filters and generalized graph diffusion since we only need to exchange L by T
to go from one to the other. To make this relationship more specific and find a direct correspondence
between GDC with θk and a polynomial filter with parameters ξj we need to find parameters that
solve
ξjLj !=
θkT k.
(3)
K(cid:88)
k=0
(cid:18)j
(cid:19)
J(cid:88)
k
j=k
(cid:19)j
(cid:18)
1 − 1
α
To find these parameters we choose the Laplacian corresponding to L = In − T , resulting in (see
App. A)
ξj =
(−1)jθk,
θk =
(−1)kξj,
(4)
(cid:18)k
(cid:19)
K(cid:88)
j
k=j
which shows the direct correspondence between graph diffusion and spectral methods. Note that we
need to set J = K. Solving Eq. 4 for the coefficients corresponding to the heat kernel θHK
and PPR
k
θPPR
k
leads to
ξHK
j =
,
ξPPR
j =
,
(5)
j
showing how the heat kernel and PPR are expressed as polynomial filters. Note that PPR's cor-
responding polynomial filter converges only if α > 0.5. This is caused by changing the order of
summation when deriving ξPPR
, which results in an alternating series. However, if the series does
converge it gives the exact same transformation as the equivalent graph diffusion.
Spectral properties of GDC. We will now extend the discussion to all parts of GDC and analyze
how they transform the graph Laplacian's eigenvalues. GDC consists of four steps: 1. Calculate
the transition matrix T , 2. take the sum in Eq. 1 to obtain S, 3. sparsify the resulting matrix by
truncating small values, resulting in S, and 4. calculate the transition matrix T S.
1. Transition matrix. Calculating the transition matrix T only changes which Laplacian matrix we
use for analyzing the graph's spectrum, i.e. we use Lsym or Lrw instead of Lun. Adding self-loops to
obtain T does not preserve the eigenvectors and its effect therefore cannot be calculated precisely.
Wu et al. [78] empirically found that adding self-loops shrinks the graph's eigenvalues.
4
PPR (α)
0.05
0.15
Heat (t)
3
5
1.0
λ
0.5
20
15
10
5
A
λ
/
S
λ
0
0.0
0.5
1.5
2.0
1.0
λA
0.0
0
λ
λ; = 10−3
∆λ; = 10−3
∆λ; = 10−4
S
λ
/
S
T
λ
1.00
0.75
0.50
0.25
0.00
= 10−3
= 10−4
1000
Index
2000
0.0
0.5
λS
1.0
(a) Graph diffusion as a filter, PPR
with α and heat kernel with t. Both
act as low-pass filters.
(b) Sparsification with threshold of
PPR (α = 0.1) on CORA. Eigenval-
ues are almost unchanged.
(c) Transition matrix on CORA's
sparsified graph S. This acts as a
weak high-pass filter.
Figure 2: Influence of different parts of GDC on the Laplacian's eigenvalues λ.
∞(cid:88)
k=0
2. Sum over T k. Summation does not affect the eigenvectors of the original matrix, since T kvi =
λiT k−1vi = λk
i vi, for the eigenvector vi of T with associated eigenvalue λi. This also shows that
the eigenvalues are transformed as
λi =
θkλk
i .
(6)
expression for PPR, i.e. λi = α(cid:80)∞
exponential series, resulting in λi = e−t(cid:80)∞
Since the eigenvalues of T are bounded by 1 we can use the geometric series to derive a closed-form
k=0(1 − α)kλk
. For the heat kernel we use the
i =
i = et(λi−1). How this transformation affects
tk
k! λk
the corresponding Laplacian's eigenvalues is illustrated in Fig. 2a. Both PPR and the heat kernel act
as low-pass filters. Low eigenvalues corresponding to large-scale structure in the graph (e.g. clusters
[55]) are amplified, while high eigenvalues corresponding to fine details but also noise are suppressed.
3. Sparsification. Sparsification changes both the eigenvalues and the eigenvectors, which means
that there is no direct correspondence between the eigenvalues of S and S and we cannot analyze
its effect analytically. However, we can use eigenvalue perturbation theory (Stewart & Sun [69],
Corollary 4.13) to derive the upper bound
k=0
α
1−(1−α)λi
(cid:118)(cid:117)(cid:117)(cid:116) N(cid:88)
(λi − λi)2 ≤ EF ≤ NEmax ≤ N ,
(7)
i=1
√
with the perturbation matrix E = S − S and the threshold . This bound significantly overestimates
the perturbation since PPR and the heat kernel both exhibit strong localization on real-world graphs
and hence the change in eigenvalues empirically does not scale with N (or, rather,
N). By ordering
the eigenvalues we see that, empirically, the typical thresholds for sparsification have almost no effect
on the eigenvalues, as shown in Fig. 2b and in the close-up in Fig. 11 in App. B.2. We find that the
small changes caused by sparsification mostly affect the highest and lowest eigenvalues. The former
correspond to very large clusters and long-range interactions, which are undesired for local graph
smoothing. The latter correspond to spurious oscillations, which are not helpful for graph learning
either and most likely affected because of the abrupt cutoff at .
4. Transition matrix on S. As a final step we calculate the transition matrix on the resulting graph
S. This step does not just change which Laplacian we consider since we have already switched to
using the transition matrix in step 1. It furthermore does not preserve the eigenvectors and is thus
again best investigated empirically by ordering the eigenvalues. Fig. 2c shows that, empirically,
this step slightly dampens low eigenvalues. This may seem counterproductive. However, the main
purpose of using the transition matrix is ensuring that sparsification does not cause nodes to be treated
differently by losing a different number of adjacent edges. The filtering is only a side-effect.
Limitations of spectral-based models. While there are tight connections between GDC and spectral-
based models, GDC is actually spatial-based and therefore does not share their limitations. Similar to
polynomial filters, GDC does not compute an expensive eigenvalue decomposition, preserves locality
on the graph and is not limited to a single graph after training, i.e. typically the same coefficients θk
5
can be used across graphs. The choice of coefficients θk depends on the type of graph at hand and
does not change significantly between similar graphs. Moreover, the hyperparameters α of PPR and t
of the heat kernel usually fall within a narrow range that is rather insensitive to both the graph and
model (see Fig. 8 in Sec. 6).
5 Related work
Graph diffusion and random walks have been extensively studied in classical graph learning [13, 14,
36, 37], especially for clustering [34], semi-supervised classification [12, 22], and recommendation
systems [44]. For an overview of existing methods see Masuda et al. [46] and Fouss et al. [22].
The first models similar in structure to current Graph Neural Networks (GNNs) were proposed by
Sperduti & Starita [68] and Baskin et al. [6], and the name GNN first appeared in [24, 65]. However,
they only became widely adopted in recent years, when they started to outperform classical models in
many graph-related tasks [19, 33, 42, 82]. In general, GNNs are classified into spectral-based models
[11, 16, 28, 32, 41], which are based on the eigendecomposition of the graph Laplacian, and spatial-
based methods [23, 26, 43, 52, 56, 62, 74], which use the graph directly and form new representations
by aggregating the representations of a node and its neighbors. However, this distinction is often rather
blurry and many models can not be clearly attributed to one type or the other. Deep learning also
inspired a variety of unsupervised node embedding methods. Most models use random walks to learn
node embeddings in a similar fashion as word2vec [51] [25, 61] and have been shown to implicitly
perform a matrix factorization [63]. Other unsupervised models learn Gaussian distributions instead
of vectors [10], use an auto-encoder [31], or train an encoder by maximizing the mutual information
between local and global embeddings [73].
There have been some isolated efforts of using extended neighborhoods for aggregation in GNNs
and graph diffusion for node embeddings. PPNP [33] propagates the node predictions generated by
a neural network using personalized PageRank, DCNN [4] extends node features by concatenating
features aggregated using the transition matrices of k-hop random walks, GraphHeat [79] uses the
heat kernel and PAN [45] the transition matrix of maximal entropy random walks to aggregate over
nodes in each layer, PinSage [82] uses random walks for neighborhood aggregation, and MixHop [2]
concatenates embeddings aggregated using the transition matrices of k-hop random walks before
each layer. VERSE [71] learns node embeddings by minimizing KL-divergence from the PPR matrix
to a low-rank approximation. Attention walk [1] uses a similar loss to jointly optimize the node
embeddings and diffusion coefficients θk. None of these works considered sparsification, generalized
graph diffusion, spectral properties, or using preprocessing to generalize across models.
6 Experimental results
Experimental setup. We take extensive measures to prevent any kind of bias in our results. We
optimize the hyperparameters of all models on all datasets with both the unmodified graph and all
GDC variants separately using a combination of grid and random search on the validation set. Each
result is averaged across 100 data splits and random initializations for supervised tasks and 20 random
initializations for unsupervised tasks, as suggested by Klicpera et al. [33] and Shchur et al. [67]. We
report performance on a test set that was used exactly once. We report all results as averages with
95 % confidence intervals calculated via bootstrapping.
We use the symmetric transition matrix with self-loops Tsym = (IN +D)−1/2(IN +A)(IN +D)−1/2
for GDC and the column-stochastic transition matrix T S
on S. We present two simple
and effective choices for the coefficients θk: The heat kernel and PPR. The diffusion matrix S is
sparsified using either an -threshold or top-k.
Datasets and models. We evaluate GDC on six datasets: The citation graphs CITESEER [66],
CORA [48], and PUBMED [53], the co-author graph COAUTHOR CS [67], and the co-purchase
graphs AMAZON COMPUTERS and AMAZON PHOTO [47, 67]. We only use their largest connected
components. We show how GDC impacts the performance of 9 models: Graph Convolutional
Network (GCN) [32], Graph Attention Network (GAT) [74], jumping knowledge network (JK)
[80], Graph Isomorphism Network (GIN) [81], and ARMA [9] are supervised models. The degree-
corrected stochastic block model (DCSBM) [30], spectral clustering (using Lsym) [55], DeepWalk
rw = SD−1
S
6
CORA
None
Heat
PPR
75
72
69
66
63
60
CITESEER
PUBMED
80
76
72
GCN
JK
GAT
GIN
COAUTHOR CS
ARMA
GCN
JK
GAT
GIN
AMZ COMP
ARMA
GCN
JK
GAT
GIN
AMZ PHOTO
ARMA
80
60
90
75
60
)
%
(
y
c
a
r
u
c
c
A
84
81
78
75
72
)
%
(
y
c
a
r
u
c
c
A
92
90
oom
GIN
JK
40
GCN
GAT
ARMA
Figure 3: Node classification accuracy of GNNs with and without GDC. GDC consistently improves
accuracy across models and datasets. It is able to fix models whose accuracy otherwise breaks down.
ARMA
ARMA
GCN
GCN
GAT
GIN
GAT
JK
GIN
JK
CORA
CITESEER
)
%
(
y
c
a
r
u
c
c
A
60
45
30
)
%
(
y
c
a
r
u
c
c
A
60
45
30
DCSBM Spectral DeepWalk
COAUTHOR CS
None
Heat
PPR
DGI
60
45
30
60
45
30
DCSBM Spectral DeepWalk
AMZ COMP
DGI
PUBMED
DCSBM Spectral DeepWalk
AMZ PHOTO
DGI
70
60
50
40
75
60
45
30
DCSBM Spectral DeepWalk
DGI
DCSBM Spectral DeepWalk
DGI
DCSBM Spectral DeepWalk
DGI
Figure 4: Clustering accuracy with and without GDC. GDC consistently improves the accuracy
across a diverse set of models and datasets.
[61], and Deep Graph Infomax (DGI) [73] are unsupervised models. Note that DGI uses node features
while other unsupervised models do not. We use k-means clustering to generate clusters from node
embeddings. Dataset statistics and hyperparameters are reported in App. B.
Semi-supervised node classification. In this task the goal is to label nodes based on the graph, node
features X ∈ RN×F and a subset of labeled nodes y. The main goal of GDC is improving the
performance of MPNN models. Fig. 3 shows that GDC consistently and significantly improves the
accuracy of a wide variety of state-of-the-art models across multiple diverse datasets. Note how GDC
is able to fix the performance of GNNs that otherwise break down on some datasets (e.g. GAT). We
also surpass or match the previous state of the art on all datasets investigated (see App. B.2).
Clustering. We highlight GDC's ability to be combined with any graph-based model by reporting
the performance of a diverse set of models that use a wide range of paradigms. Fig. 4 shows the
unsupervised accuracy obtained by matching clusters to ground-truth classes using the Hungarian
algorithm. Accuracy consistently and significantly improves for all models and datasets. Note that
spectral clustering uses the graph's eigenvectors, which are not affected by the diffusion step itself.
Still, its performance improves by up to 30 percentage points. Results in tabular form are presented
in App. B.2.
7
)
%
(
y
c
a
r
u
c
c
A
∆
0
−1
−2
)
%
(
y
c
a
r
u
c
c
A
80
70
100
CORA
CITESEER
AMZ COMP
101
102
Average degree
103
Figure 5: GCN+GDC accuracy
(using PPR and top-k). Lines in-
dicate original accuracy and de-
gree. GDC surpasses original ac-
curacy at around the same degree
independent of dataset. Sparsifi-
cation often improves accuracy.
0
1
2
3
Self-loop weight
6:
Difference
Figure
in
GCN+GDC accuracy (using
PPR and top-k,
percentage
points) compared to the symmet-
ric Tsym without self-loops. Trw
performs worse and self-loops
have no significant effect.
CORA
CITESEER
AMZ COMP
Tsym
Trw
PPR
CORA
AdaDIF
CITESEER
AMZ
COMP
K
J
N
C
G
A
M
R
A
K
J
N
C
G
A
M
R
A
K
J
N
C
G
A
M
R
A
)
%
(
y
c
a
r
u
c
c
A
80
70
4
Figure 7: Accuracy of GDC with
coefficients θk defined by PPR
and learned by AdaDIF. Simple
PPR coefficients consistently per-
form better than those obtained
by AdaDIF, even with optimized
regularization.
) CORA
%
85
(
y
c
a
r
u
c
c
A
GCN
JK
ARMA
80
0.01 0.05
α
PPR
CITESEER
76
85
AMZ COMP
85
80
74
0.4
0.01 0.05
α
82
0.4
0.01 0.05
α
75
0.4
0.5 1 2 5 20
t
CORA
Heat
CITESEER
AMZ COMP
75
72
80
70
0.5 1 2 5 20
t
0.5 1 2 5 20
t
Figure 8: Accuracy achieved by using GDC with varying hyperparameters of PPR (α) and the heat
kernel (t). Optimal values fall within a narrow range that is consistent across datasets and models.
In this work we concentrate on node-level prediction tasks in a transductive setting. However, GDC
can just as easily be applied to inductive problems or different tasks like graph classification. In
our experiments we found promising, yet not as consistent results for graph classification (e.g. 2.5
percentage points with GCN on the DD dataset [18]). We found no improvement for the inductive
setting on PPI [50], which is rather unsurprising since the underlying data used for graph construction
already includes graph diffusion-like mechanisms (e.g. regulatory interactions, protein complexes,
and metabolic enzyme-coupled interactions). We furthermore conducted experiments to answer five
important questions:
Does GDC increase graph density? When sparsifying the generalized graph diffusion matrix S we
are free to choose the resulting level of sparsity in S. Fig. 5 indicates that, surprisingly, GDC requires
roughly the same average degree to surpass the performance of the original graph independent of the
dataset and its average degree (-threshold in App. B.2, Fig. 12). This suggests that the sparsification
hyperparameter can be obtained from a fixed average degree. Note that CORA and CITESEER are
both small graphs with low average degree. Graphs become denser with size [39] and in practice we
expect GDC to typically reduce the average degree at constant accuracy. Fig. 5 furthermore shows
that there is an optimal degree of sparsity above which the accuracy decreases. This indicates that
sparsification is not only computationally beneficial but also improves prediction performance.
How to choose the transition matrix T ? We found Tsym to perform best across datasets. More
specifically, Fig. 6 shows that the symmetric version on average outperforms the random walk
transition matrix Trw. This figure also shows that GCN accuracy is largely insensitive to self-loops
when using Tsym -- all changes lie within the estimated uncertainty. However, we did find that other
models, e.g. GAT, perform better with self-loops (not shown).
How to choose the coefficients θk? We found the coefficients defined by PPR and the heat kernel
to be effective choices for θk. Fig. 8 shows that their optimal hyperparameters typically fall within
a narrow range of α ∈ [0.05, 0.2] and t ∈ [1, 10]. We also tried obtaining θk from models that
learn analogous coefficients [1, 8, 13]. However, we found that θk obtained by these models tend to
converge to a minimal neighborhood, i.e. they converge to θ0 ≈ 1 or θ1 ≈ 1 and all other θk ≈ 0.
8
)
%
(
y
c
a
r
u
c
c
A
∆
4
2
0
2
1
0
CORA
Heat
PPR
1 2 3 4 ≥5
4
5
2
=
¯n
0
1
6
=
¯n
3
3
3
=
¯n
5
1
1
=
¯n
8
.
7
4
=
¯n
Hops
CITESEER
PUBMED
1
0
1 2 3 4 5 ≥6
2
3
2
=
¯n
5
7
4
=
¯n
5
4
3
=
¯n
4
7
1
=
¯n
8
.
2
8
=
¯n
3
.
2
7
=
¯n
Hops
1 2 3 4 5 ≥6
6
.
7
1
=
¯n
7
8
1
=
¯n
0
0
5
=
¯n
9
2
5
=
¯n
2
5
1
=
¯n
7
.
4
5
=
¯n
Hops
COAUTHOR CS
1
0
1 2 3 4 ≥5
7
5
5
=
¯n
9
4
3
=
¯n
2
.
1
7
=
¯n
1
2
1
2
=
¯n
2
0
6
1
=
¯n
Hops
AMZ COMP
2
1
0
1 2 ≥3
1
2
3
=
¯n
7
7
8
=
¯n
2
0
1
=
¯n
Hops
AMZ PHOTO
2
1
0
1 2 3 ≥4
8
8
4
=
¯n
9
6
7
=
¯n
6
.
1
7
=
¯n
1
.
1
1
=
¯n
Hops
Figure 10: Improvement (percentage points) in GCN accuracy by adding GDC depending on distance
(number of hops) from the training set. Nodes further away tend to benefit more from GDC.
85
80
75
5
)
%
(
y
c
a
r
u
c
c
A
None
Heat
PPR
60
GCN
JK
ARMA
20
30
This is caused by their training losses almost always decreasing
when the considered neighborhood shrinks. We were able to
control this overfitting to some degree using strong regularization
(specifically, we found L2 regularization on the difference of
neighboring coefficients θk+1−θk to perform best). However, this
requires hand-tuning the regularization for every dataset, which
defeats the purpose of learning the coefficients from the graph.
Moreover, we found that even with hand-tuned regularization the
coefficients defined by PPR and the heat kernel perform better
than trained θk, as shown in Fig. 7.
How does the label rate affect GDC? When varying the label
rate from 5 up to 60 labels per class we found that the improvement
achieved by GDC increases the sparser the labels are. Still, GDC
improves performance even for 60 labels per class, i.e. 17 %
label rate (see Fig. 9). This trend is most likely due to larger
neighborhood leveraged by GDC.
Which nodes benefit from GDC? Our experiments showed no correlation of improvement with
most common node properties, except for the distance from the training set. Nodes further away
from the training set tend to benefit more from GDC, as demonstrated by Fig. 10. Besides smoothing
out the neighborhood, GDC also has the effect of increasing the model's range, since it is no longer
restricted to only using first-hop neighbors. Hence, nodes further away from the training set influence
the training and later benefit from the improved model weights.
Figure 9: Accuracy on Cora with
different label rates.
Improve-
ment from GDC increases for
sparser label rates.
10
40
Labels per class
7 Conclusion
We propose graph diffusion convolution (GDC), a method based on sparsified generalized graph
diffusion. GDC is a more powerful, yet spatially localized extension of message passing in GNNs,
but able to enhance any graph-based model. We show the tight connection between GDC and
spectral-based models and analyzed GDC's spectral properties. GDC shares many of the strengths of
spectral methods and none of their weaknesses. We conduct extensive and rigorous experiments that
show that GDC consistently improves the accuracy of a wide range of models on both supervised
and unsupervised tasks across various homophilic datasets and requires very little hyperparameter
tuning. There are many extensions and applications of GDC that remain to be explored. We expect
many graph-based models and tasks to benefit from GDC, e.g. graph classification and regression.
Promising extensions include other diffusion coefficients θk such as those given by the methods
presented in Fouss et al. [22] and more advanced random walks and operators that are not defined by
powers of a transition matrix.
Acknowledgments
This research was supported by the German Federal Ministry of Education and Research (BMBF),
grant no. 01IS18036B, and by the Deutsche Forschungsgemeinschaft (DFG) through the Emmy
Noether grant GU 1409/2-1 and the TUM International Graduate School of Science and Engineering
(IGSSE), GSC 81. The authors of this work take full responsibilities for its content.
9
References
[1] Sami Abu-El-Haija, Bryan Perozzi, Rami Al-Rfou, and Alex Alemi. Watch Your Step: Learning Node
Embeddings via Graph Attention. In NeurIPS, 2018.
[2] Sami Abu-El-Haija, Bryan Perozzi, Amol Kapoor, Nazanin Alipourfard, Kristina Lerman, Hrayr Harutyun-
yan, Greg Ver Steeg, and Aram Galstyan. MixHop: Higher-Order Graph Convolutional Architectures via
Sparsified Neighborhood Mixing. In ICML, 2019.
[3] R. Andersen, F. Chung, and K. Lang. Local Graph Partitioning using PageRank Vectors. In FOCS, 2006.
[4] James Atwood and Don Towsley. Diffusion-Convolutional Neural Networks. In NIPS, 2016.
[5] Lars Backstrom, Paolo Boldi, Marco Rosa, Johan Ugander, and Sebastiano Vigna. Four degrees of
separation. In ACM Web Science Conference, 2012.
[6] Igor I. Baskin, Vladimir A. Palyulin, and Nikolai S. Zefirov. A Neural Device for Searching Direct
Correlations between Structures and Properties of Chemical Compounds. Journal of Chemical Information
and Computer Sciences, 37(4):715 -- 721, 1997.
[7] Dimitris Berberidis and Georgios B. Giannakis. Node Embedding with Adaptive Similarities for Scalable
Learning over Graphs. CoRR, 1811.10797, 2018.
[8] Dimitris Berberidis, Athanasios N. Nikolakopoulos, and Georgios B. Giannakis. Adaptive diffusions for
scalable learning over graphs. IEEE Transactions on Signal Processing, 67(5):1307 -- 1321, 2019.
[9] Filippo Maria Bianchi, Daniele Grattarola, Lorenzo Livi, and Cesare Alippi. Graph Neural Networks with
convolutional ARMA filters. CoRR, 1901.01343, 2019.
[10] Aleksandar Bojchevski and Stephan Günnemann. Deep Gaussian Embedding of Graphs: Unsupervised
Inductive Learning via Ranking. ICLR, 2018.
[11] Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. Spectral Networks and Deep Locally
Connected Networks on Graphs. In ICLR, 2014.
[12] Eliav Buchnik and Edith Cohen. Bootstrapped Graph Diffusions: Exposing the Power of Nonlinearity.
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), 2(1):1 -- 19,
2018.
[13] Siheng Chen, Aliaksei Sandryhaila, Jose M. F. Moura, and Jelena Kovacevic. Adaptive graph filtering:
Multiresolution classification on graphs. In IEEE Global Conference on Signal and Information Processing
(GlobalSIP), 2013.
[14] F. Chung. The heat kernel as the pagerank of a graph. Proceedings of the National Academy of Sciences,
104(50):19735 -- 19740, 2007.
[15] Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborová.
Inference and phase
transitions in the detection of modules in sparse networks. Physical Review Letters, 107(6):065701, 2011.
[16] Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. Convolutional Neural Networks on Graphs
with Fast Localized Spectral Filtering. In NIPS, 2016.
[17] Tyler Derr, Yao Ma, and Jiliang Tang. Signed Graph Convolutional Networks. In ICDM, 2018.
[18] Paul D. Dobson and Andrew J. Doig. Distinguishing enzyme structures from non-enzymes without
alignments. Journal of Molecular Biology, 330(4):771 -- 783, 2003.
[19] David K. Duvenaud, Dougal Maclaurin, Jorge Aguilera-Iparraguirre, Rafael Gómez-Bombarelli, Timothy
Hirzel, Alán Aspuru-Guzik, and Ryan P. Adams. Convolutional Networks on Graphs for Learning
Molecular Fingerprints. In NIPS, 2015.
[20] Radim Rehurek and Petr Sojka. Software Framework for Topic Modelling with Large Corpora. In LREC
2010 Workshop on New Challenges for NLP Frameworks, 2010.
[21] Matthias Fey and Jan E. Lenssen. Fast Graph Representation Learning with PyTorch Geometric. In ICLR
workshop, 2019.
[22] François Fouss, Kevin Francoisse, Luh Yen, Alain Pirotte, and Marco Saerens. An experimental investi-
gation of kernels on graphs for collaborative recommendation and semisupervised classification. Neural
Networks, 31:53 -- 72, 2012.
10
[23] Justin Gilmer, Samuel S. Schoenholz, Patrick F. Riley, Oriol Vinyals, and George E. Dahl. Neural Message
Passing for Quantum Chemistry. In ICML, 2017.
[24] M. Gori, G. Monfardini, and F. Scarselli. A new model for learning in graph domains. In IEEE International
Joint Conference on Neural Networks, 2005.
[25] Aditya Grover and Jure Leskovec. node2vec: Scalable Feature Learning for Networks. In KDD, 2016.
[26] William L. Hamilton, Zhitao Ying, and Jure Leskovec. Inductive Representation Learning on Large Graphs.
In NIPS, 2017.
[27] David K. Hammond, Pierre Vandergheynst, and Rémi Gribonval. Wavelets on graphs via spectral graph
theory. Applied and Computational Harmonic Analysis, 30(2):129 -- 150, 2011.
[28] Mikael Henaff, Joan Bruna, and Yann LeCun. Deep Convolutional Networks on Graph-Structured Data.
CoRR, 1506.05163, 2015.
[29] Eric Jones, Travis Oliphant, Pearu Peterson, and others. SciPy: Open source scientific tools for Python.
2001.
[30] Brian Karrer and Mark EJ Newman. Stochastic blockmodels and community structure in networks.
Physical review E, 83(1):016107, 2011.
[31] Thomas N. Kipf and Max Welling. Variational Graph Auto-Encoders. In NIPS workshop, 2016.
[32] Thomas N. Kipf and Max Welling. Semi-Supervised Classification with Graph Convolutional Networks.
In ICLR, 2017.
[33] Johannes Klicpera, Aleksandar Bojchevski, and Stephan Günnemann. Predict then Propagate: Graph
Neural Networks Meet Personalized PageRank. In ICLR, 2019.
[34] Kyle Kloster and David F Gleich. Heat kernel based community detection. In KDD, 2014.
[35] Isabel M. Kloumann, Johan Ugander, and Jon Kleinberg. Block models and personalized PageRank.
Proceedings of the National Academy of Sciences, 114(1):33 -- 38, 2017.
[36] Risi Imre Kondor and John Lafferty. Diffusion kernels on graphs and other discrete structures. In ICML,
2002.
[37] Stéphane Lafon and Ann B. Lee. Diffusion Maps and Coarse-Graining: A Unified Framework for
Dimensionality Reduction, Graph Partitioning, and Data Set Parameterization. IEEE Trans. Pattern Anal.
Mach. Intell., 28(9):1393 -- 1403, 2006.
[38] Edmund Landau. Zur relativen Wertbemessung der Turnierresultate. Deutsches Wochenschach, 11:
366 -- 369, 1895.
[39] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graphs over Time: Densification Laws, Shrinking
Diameters and Possible Explanations. In KDD, 2005.
[40] Pan Li, Eli Chien, and Olgica Milenkovic. Optimizing generalized pagerank methods for seed-expansion
community detection. In NeurIPS, 2019.
[41] Ruoyu Li, Sheng Wang, Feiyun Zhu, and Junzhou Huang. Adaptive Graph Convolutional Neural Networks.
In AAAI, 2018.
[42] Yaguang Li, Rose Yu, Cyrus Shahabi, and Yan Liu. Diffusion Convolutional Recurrent Neural Network:
Data-Driven Traffic Forecasting. In ICLR, 2018.
[43] Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard S. Zemel. Gated Graph Sequence Neural
Networks. In ICLR, 2016.
[44] Jeremy Ma, Weiyu Huang, Santiago Segarra, and Alejandro Ribeiro. Diffusion filtering of graph signals
and its use in recommendation systems. In ICASSP, 2016.
[45] Zheng Ma, Ming Li, and Yuguang Wang. PAN: Path Integral Based Convolution for Deep Graph Neural
Networks. In ICML workshop, 2019.
[46] Naoki Masuda, Mason A Porter, and Renaud Lambiotte. Random walks and diffusion on networks. Physics
reports, 716:1 -- 58, 2017.
11
[47] Julian J. McAuley, Christopher Targett, Qinfeng Shi, and Anton van den Hengel. Image-Based Recom-
mendations on Styles and Substitutes. In SIGIR, 2015.
[48] Andrew Kachites McCallum, Kamal Nigam, Jason Rennie, and Kristie Seymore. Automating the construc-
tion of internet portals with machine learning. Information Retrieval, 3(2):127 -- 163, 2000.
[49] Miller McPherson, Lynn Smith-Lovin, and James M Cook. Birds of a feather: Homophily in social
networks. Annual review of sociology, 27(1):415 -- 444, 2001.
[50] Jörg Menche, Amitabh Sharma, Maksim Kitsak, Susan Ghiassian, Marc Vidal, Joseph Loscalzo, and Albert-
László Barabási. Uncovering disease-disease relationships through the incomplete human interactome.
Science, 347(6224):1257601, 2015.
[51] Tomas Mikolov, Ilya Sutskever, Kai Chen, Gregory S. Corrado, and Jeffrey Dean. Distributed Representa-
tions of Words and Phrases and their Compositionality. In NIPS, 2013.
[52] Federico Monti, Davide Boscaini, Jonathan Masci, Emanuele Rodola, Jan Svoboda, and Michael M.
Bronstein. Geometric Deep Learning on Graphs and Manifolds Using Mixture Model CNNs. In CVPR,
2017.
[53] Galileo Namata, Ben London, Lise Getoor, and Bert Huang. Query-driven Active Surveying for Collective
Classification. In International Workshop on Mining and Learning with Graphs (MLG), KDD, 2012.
[54] Huda Nassar, Kyle Kloster, and David F. Gleich. Strong Localization in Personalized PageRank Vectors.
In International Workshop on Algorithms and Models for the Web Graph (WAW), 2015.
[55] Andrew Y Ng, Michael I Jordan, and Yair Weiss. On Spectral Clustering: Analysis and an algorithm. In
NIPS, 2002.
[56] Mathias Niepert, Mohamed Ahmed, and Konstantin Kutzkov. Learning Convolutional Neural Networks
for Graphs. In ICML, 2016.
[57] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The pagerank citation ranking:
Bringing order to the web. Report, Stanford InfoLab, 1998.
[58] Adam Paszke, Sam Gross, Soumith Chintala, Gregory Chanan, Edward Yang, Zachary DeVito, Zeming
Lin, Alban Desmaison, Luca Antiga, and Adam Lerer. Automatic differentiation in PyTorch. In NIPS
workshop, 2017.
[59] Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel,
Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos,
David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Édouard Duchesnay. Scikit-learn: Machine
Learning in Python. Journal of Machine Learning Research, 12:2825 -- 2830, 2011.
[60] Tiago P. Peixoto. The graph-tool python library. figshare, 2014.
[61] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. DeepWalk: online learning of social representations. In
KDD, 2014.
[62] Trang Pham, Truyen Tran, Dinh Q. Phung, and Svetha Venkatesh. Column Networks for Collective
Classification. In AAAI, 2017.
[63] Jiezhong Qiu, Yuxiao Dong, Hao Ma, Jian Li, Kuansan Wang, and Jie Tang. Network Embedding as
Matrix Factorization: Unifying DeepWalk, LINE, PTE, and node2vec. In WSDM, 2018.
[64] Stephen Ragain. Community Detection via Discriminant functions for Random Walks in the degree-
corrected Stochastic Block Model. Report, Stanford University, 2017.
[65] F. Scarselli, M. Gori, Ah Chung Tsoi, M. Hagenbuchner, and G. Monfardini. The Graph Neural Network
Model. IEEE Transactions on Neural Networks, 20(1):61 -- 80, 2009.
[66] Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Gallagher, and Tina Eliassi-Rad.
Collective Classification in Network Data. AI Magazine, 29(3):93 -- 106, 2008.
[67] Oleksandr Shchur, Maximilian Mumme, Aleksandar Bojchevski, and Stephan Günnemann. Pitfalls of
Graph Neural Network Evaluation. In NIPS workshop, 2018.
[68] A. Sperduti and A. Starita. Supervised neural networks for the classification of structures. IEEE Transac-
tions on Neural Networks, 8(3):714 -- 735, 1997.
12
[69] Gilbert Wright Stewart and Ji-guang Sun. Matrix Perturbation Theory. Computer Science and Scientific
Computing. 1990.
[70] Yu-Hang Tang, Dongkun Zhang, and George Em Karniadakis. An atomistic fingerprint algorithm for
learning ab initio molecular force fields. The Journal of Chemical Physics, 148(3):034101, 2018.
[71] Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller. VERSE: Versatile Graph
Embeddings from Similarity Measures. In WWW, 2018.
[72] Stefan Van Der Walt, S Chris Colbert, and Gael Varoquaux. The NumPy array: a structure for efficient
numerical computation. Computing in Science & Engineering, 13(2):22, 2011.
[73] Petar Velickovic, William Fedus, William L. Hamilton, Pietro Liò, Yoshua Bengio, and R. Devon Hjelm.
Deep Graph Infomax. In ICLR, 2019.
[74] Petar Velickovi´c, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Liò, and Yoshua Bengio.
Graph Attention Networks. In ICLR, 2018.
[75] Sebastiano Vigna. Spectral ranking. Network Science, CoRR (updated, 0912.0238v15), 4(4):433 -- 445,
2016.
[76] Ulrike von Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17(4):395 -- 416, 2007.
[77] Zhewei Wei, Xiaodong He, Xiaokui Xiao, Sibo Wang, Shuo Shang, and Ji-Rong Wen. TopPPR: Top-k
Personalized PageRank Queries with Precision Guarantees on Large Graphs. In SIGMOD, 2018.
[78] Felix Wu, Tianyi Zhang, Amauri Holanda de Souza Jr., Christopher Fifty, Tao Yu, and Kilian Q. Weinberger.
Simplifying Graph Convolutional Networks. In ICML, 2019.
[79] Bingbing Xu, Huawei Shen, Qi Cao, Keting Cen, and Xueqi Cheng. Graph Convolutional Networks using
Heat Kernel for Semi-supervised Learning. In IJCAI, 2019.
[80] Keyulu Xu, Chengtao Li, Yonglong Tian, Tomohiro Sonobe, Ken-ichi Kawarabayashi, and Stefanie Jegelka.
Representation Learning on Graphs with Jumping Knowledge Networks. In ICML, 2018.
[81] Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. How Powerful are Graph Neural Networks?
In ICLR, 2019.
[82] Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L. Hamilton, and Jure Leskovec.
Graph Convolutional Neural Networks for Web-Scale Recommender Systems. KDD, 2018.
13
A Graph diffusion as a polynomial filter
We want to find a direct correspondence between graph diffusion with θk and a polynomial filter with
parameters ξj, i.e.
To do so, we first expand T = IN − L and use the binomial equation, i.e.
θkT k.
K(cid:88)
k=0
θkT k =
θk(IN − L)k =
(cid:19)
K(cid:88)
k=0
j=0
θk
k=0
ξjLj !=
J(cid:88)
K(cid:88)
(cid:18)k
K(cid:88)
k(cid:88)
(cid:18)k
(cid:19)
K(cid:88)
k(cid:88)
(cid:18)k
(cid:19)
(cid:88)
(cid:19)
(cid:18)k
K(cid:88)
K(cid:88)
(cid:123)(cid:122)
(cid:124)
j,k∈[0,K]
j≤k
k=0
k=0
k=j
j=0
j=0
j=0
j
j
j
j
ξj
=
=
=
=
(−1)jI k−j
N Lj =
θk(−1)jLj =
θk(−1)jLj =
θk(−1)j
Lj,
(cid:125)
(8)
(9)
where we recognize the coefficients ξj and see that we need to set J = K. Note that we reordered the
summation indices by recognizing the triangular sum, i.e. the sum over index pairs (j, k) with j ≤ k.
The equation for conversion in the opposite direction is obtained in the same way since L = IN − T .
To obtain a more convenient form for K → ∞ we shift the summation index using m = k − j, i.e.
(cid:18)k
(cid:19)
K(cid:88)
j
k=j
K−j(cid:88)
(cid:18)m + j
(cid:19)
m=0
j
ξj =
(−1)jθk =
(−1)jθm+j.
(10)
To find corresponding coefficients for the heat kernel, we let K → ∞, set θk = e−t tk
exponential series to obtain
k! , and use the
ξHK
j =
(−1)je−t
tm+j
(m + j)!
(m + j)!
(−1)je−t
m!j!
tm+j
(m + j)!
∞(cid:88)
tm
m!
=
(−t)j
j!
e−tet =
(−t)j
j!
.
=
=
(11)
To obtain the coefficients for PPR, we let K → ∞, set θk = α(1 − α)k, and recognize the series
expansion
(1−x)j+1 =(cid:80)∞
1
m=0
ξPPR
j =
m=0
(−1)jα(1 − α)m+j =
= α(−1)j(1 − α)j
(1 − α)m =
(12)
(cid:18)m + j
(cid:19)
j
=
m=0
m=0
∞(cid:88)
∞(cid:88)
= e−t (−t)j
(cid:0)m+j
∞(cid:88)
j!
m
m=0
(cid:19)
(cid:1)xm, resulting in
(cid:18)m + j
∞(cid:88)
(cid:18)
m=0
j
= α(α − 1)j 1
αj+1 =
14
(cid:18)m + j
(cid:19)
(cid:19)j
m
1 − 1
α
.
B Experiments
For optimizing the hyperparameters for node classification the data is split into a development and a
test set. The development set contains 1500 nodes for all datasets but for COAUTHOR CS, where it
contains 5000 nodes. All remaining nodes are part of the test set and only used once for testing. The
development set is split into a training set containing 20 nodes per class and a validation set with
the remaining nodes. For every run the accuracy is determined using 100 different random splits of
the development set using fixed seeds. Different seeds are used for validation and test splits. Early
stopping patience is set to 100 epochs with a maximum limit of 10000 epochs, which is never reached.
The patience is reset after an increase in accuracy on the validation set. For the test runs we select the
hyperparameter configurations that showed the highest average accuracy on the validation splits.
We use the same development set for optimizing the hyperparameters for clustering. The test set is
only once for generating test results. Clustering results are averaged over 20 randomly initialized
runs.
Confidence intervals are calculated by bootstrapping the accuracy results from 100 or 20 runs,
respectively, with 1000 samples. All implementations for node classification as well as DGI are
based on PyTorch [58] and PyTorch Geometric [21]. The remaining experiments are based on
NumPy [72], SciPy [29], graph-tool [60], and gensim [20]. For k-means clustering we use the
implementation by scikit-learn [59]. All datasets are included in PyTorch Geometric, available at
https://github.com/rusty1s/pytorch_geometric. Experiments using PyTorch are run on
Nvidia GPUs using CUDA and the remaining experiments are run on Intel CPUs.
For all experiments the largest connected component of the graph is selected. Dropout probability is
set to p = 0.5 for all experiments and performed after every application of the activation function.
PPR preprocessing is done with α ∈ [0.05, 0.30], heat kernel preprocessing with t ∈ [1, 10]. For
top-k matrix sparsification k is set to either 64 or 128 and for -thresholding is chosen from
[0.00001, 0.01]. We do not choose directly but rather calculate which corresponds to a chosen
average degree. For node classification we use the Adam optimizer with a learning rate of 0.01. The
hidden dimension of GNNs is kept fixed at 64 with the exception of ARMA, where the dimensionality
of a single stack is chosen from 16 or 32. For ARMA, up to three stacks and two layers are tested.
GCN and GAT are run with up to 4 layers, JK and GIN with up to six layers. L2-regularization is
performed on the parameters of the first layer of every model with λL1 ∈ [0.001, 10]. Unsupervised
models use a node embedding dimension of 128. DGI uses the Adam optimizer with a learning rate
of 0.001. For a full list of final hyperparameters per model, diffusion, and dataset see Sec. B.3.
B.1 Datasets
Type
Citation
Citation
Citation
Dataset
CORA
CITESEER
PUBMED
COAUTHOR CS Co-author
AMZ COMP
AMZ PHOTOS
Co-purchase
Co-purchase
Classes
7
6
3
15
10
8
Table 1: Dataset statistics.
Features Nodes
2485
2120
19 717
18 333
13 381
7487
1433
3703
500
6805
767
745
Edges Label rate
0.056
5069
3679
0.057
0.003
44 324
0.016
81 894
0.015
245 778
119 043
0.021
B.2 Results
To support our claim of achieving state-of-the-art node classification performance we also include
results (and hyperparameters) of APPNP, which has been shown to be the current state of the art for
semi-supervised node classification and uses graph diffusion internally [21, 33].
15
Table 2: Average accuracy (%) on CORA with bootstrap-estimated 95% confidence levels.
Model
GCN
GAT
JK
GIN
ARMA
APPNP
DCSBM
Spectral
DeepWalk
DGI
No diffusion
81.71 ± 0.26
80.10 ± 0.34
82.14 ± 0.24
73.96 ± 0.46
81.62 ± 0.24
83.83 ± 0.23
59.75 ± 1.59
29.29 ± 1.03
68.67 ± 1.01
54.29 ± 1.21
Heat
83.48 ± 0.22
81.54 ± 0.25
83.69 ± 0.29
76.54 ± 0.63
83.32 ± 0.22
64.63 ± 2.60
35.16 ± 2.96
68.76 ± 0.67
67.71 ± 1.69
-
PPR
83.58 ± 0.23
81.60 ± 0.25
83.78 ± 0.22
78.74 ± 0.44
83.81 ± 0.21
-
68.52 ± 1.47
34.03 ± 2.01
69.42 ± 0.07
69.61 ± 1.73
AdaDIF
82.93 ± 0.23
81.32 ± 0.22
83.43 ± 0.21
75.94 ± 0.45
83.24 ± 0.22
Table 3: Average accuracy (%) on CITESEER with bootstrap-estimated 95% confidence levels.
Table 4: Average accuracy (%) on PUBMED with bootstrap-estimated 95% confidence levels.
Table 5: Average accuracy (%) on COAUTHOR CS with bootstrap-estimated 95% confidence levels.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Model
GCN
GAT
JK
GIN
ARMA
APPNP
DCSBM
Spectral
DeepWalk
DGI
Model
GCN
GAT
JK
GIN
ARMA
APPNP
DCSBM
Spectral
DeepWalk
DGI
Model
GCN
GAT
JK
ARMA
APPNP
DCSBM
Spectral
DeepWalk
DGI
No diffusion
72.02 ± 0.31
69.52 ± 0.32
70.34 ± 0.38
61.09 ± 0.58
70.84 ± 0.32
72.76 ± 0.25
46.70 ± 2.18
27.02 ± 0.57
55.33 ± 1.05
54.62 ± 2.28
Heat
73.22 ± 0.27
70.25 ± 0.34
72.38 ± 0.27
62.82 ± 0.50
71.90 ± 0.33
56.81 ± 1.21
29.61 ± 1.29
66.05 ± 0.56
71.58 ± 0.94
-
PPR
73.35 ± 0.27
68.50 ± 0.21
72.24 ± 0.31
64.07 ± 0.48
72.28 ± 0.29
57.14 ± 1.40
29.26 ± 1.46
65.81 ± 0.16
72.42 ± 0.39
-
AdaDIF
71.58 ± 0.31
68.68 ± 0.22
71.11 ± 0.33
61.46 ± 0.51
71.45 ± 0.31
No diffusion
78.23 ± 0.40
76.32 ± 0.47
78.47 ± 0.36
72.38 ± 0.63
77.14 ± 0.36
79.78 ± 0.33
46.64 ± 1.85
37.97 ± 0.02
70.77 ± 0.14
49.96 ± 2.21
Heat
79.62 ± 0.36
77.78 ± 0.34
79.95 ± 0.28
74.16 ± 0.62
79.64 ± 0.35
67.38 ± 1.45
49.28 ± 3.08
71.36 ± 0.14
65.94 ± 0.23
-
PPR
78.72 ± 0.37
76.66 ± 0.32
79.22 ± 0.32
73.62 ± 0.63
78.85 ± 0.36
64.51 ± 1.75
48.05 ± 2.69
69.96 ± 0.12
66.52 ± 0.35
-
AdaDIF
77.46 ± 0.36
75.98 ± 0.33
78.01 ± 0.41
68.14 ± 0.80
77.32 ± 0.37
No diffusion
91.83 ± 0.08
90.89 ± 0.13
91.11 ± 0.09
91.32 ± 0.08
92.08 ± 0.07
57.70 ± 1.52
24.74 ± 2.28
61.26 ± 0.91
57.52 ± 2.63
Heat
92.79 ± 0.07
89.82 ± 0.10
92.40 ± 0.08
92.32 ± 0.09
63.70 ± 0.93
50.47 ± 3.20
63.77 ± 1.28
62.84 ± 1.84
-
PPR
93.01 ± 0.07
91.33 ± 0.07
92.41 ± 0.07
92.63 ± 0.08
61.71 ± 1.15
55.27 ± 3.00
65.29 ± 1.40
63.79 ± 1.89
-
AdaDIF
92.28 ± 0.06
88.29 ± 0.06
91.68 ± 0.08
91.03 ± 0.09
16
Table 6: Average accuracy (%) on AMZ COMP with bootstrap-estimated 95% confidence levels.
Model
GCN
GAT
JK
GIN
ARMA
APPNP
DCSBM
Spectral
DeepWalk
DGI
No diffusion
84.75 ± 0.23
45.37 ± 4.20
83.33 ± 0.27
55.44 ± 0.83
84.36 ± 0.26
81.72 ± 0.25
44.61 ± 0.77
40.39 ± 1.11
55.61 ± 0.25
30.84 ± 1.96
Heat
86.77 ± 0.21
86.68 ± 0.26
86.51 ± 0.26
81.11 ± 0.62
86.09 ± 0.27
-
55.80 ± 1.29
50.89 ± 3.05
56.29 ± 0.50
37.27 ± 1.21
PPR
86.04 ± 0.24
85.37 ± 0.33
85.66 ± 0.30
75.08 ± 1.20
84.92 ± 0.26
57.92 ± 2.25
52.62 ± 2.14
55.05 ± 0.98
36.81 ± 1.12
-
AdaDIF
85.73 ± 0.23
86.55 ± 0.26
84.40 ± 0.32
56.52 ± 1.65
84.92 ± 0.29
-
-
-
-
-
-
-
-
-
-
Table 7: Average accuracy (%) on AMZ PHOTO with bootstrap-estimated 95% confidence levels.
Model
GCN
GAT
JK
GIN
ARMA
APPNP
DCSBM
Spectral
DeepWalk
DGI
No diffusion
92.08 ± 0.20
53.40 ± 5.49
91.07 ± 0.26
68.34 ± 1.16
91.41 ± 0.22
91.42 ± 0.26
66.30 ± 1.70
28.15 ± 0.81
78.82 ± 0.85
40.09 ± 2.14
Heat
92.82 ± 0.23
91.86 ± 0.20
92.93 ± 0.21
87.24 ± 0.65
92.05 ± 0.24
67.13 ± 2.49
49.86 ± 2.06
79.26 ± 0.09
49.02 ± 1.78
-
PPR
92.20 ± 0.22
90.89 ± 0.27
92.37 ± 0.22
83.41 ± 0.82
91.09 ± 0.24
64.28 ± 1.81
53.65 ± 3.22
78.73 ± 0.10
51.34 ± 1.96
-
AdaDIF
92.37 ± 0.22
91.65 ± 0.20
92.34 ± 0.22
75.37 ± 0.86
90.38 ± 0.28
= 10−3
= 10−4
λ
∆
0.06
0.04
0.02
0.00
0
1000
Index
2000
Figure 11: Close-up of difference caused by sparsification (Fig. 2b). Primarily the lowest and highest
eigenvalues of the Laplacian are affected.
)
%
(
y
c
a
r
u
c
c
A
80
70
100
CORA
CITESEER
AMZ COMP
101
Average degree
102
103
Figure 12: GCN+GDC accuracy (using PPR and sparsification by threshold ). Lines indicate original
accuracy and degree. GDC surpasses the original accuracy at around the same degree independent of
dataset. Sparsification can improve accuracy.
17
λL2
0.06
10.0
0.03
0.06
0.03
0.03
0.09
10.0
0.04
0.08
0.07
0.08
0.10
10.0
0.06
0.03
0.04
0.03
0.08
0.08
0.01
0.03
0.02
0.02
0.01
0.5
64
0.01
0.5
64
0.01
0.5
64
0.01
0.5
64
Hidden
depth
1
1
1
1
1
1
2
1
1
1
2
1
1
1
B.3 Hyperparameters
Table 8: Hyperparameters for GCN obtained by grid and random search.
Hidden
Learning
Diffusion Dataset name
rate
Dropout
dimension
α
t
k
-
Heat
PPR
AdaDIF
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
-
5
4
3
1
5
3
-
-
-
0.05
0.10
0.10
0.10
0.10
0.15
-
-
-
-
-
-
-
64
-
-
128
64
64
64
64
128
128
128
64
64
64
0.0001
0.0009
0.0001
-
0.0010
0.0001
0.0009
-
-
18
Table 9: Hyperparameters for GAT obtained by grid and random search.
Learning
rate
Dropout
Hidden
dimension
Diffusion Dataset name
α
-
Heat
PPR
AdaDIF
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
t
-
1
k
-
-
-
-
-
128
64
64
64
-
0.0010
0.0010
0.0005
0.0005
0.0005
0.0005
0.0050
0.0005
0.0005
0.0005
0.0005
0.0005
0.0010
0.0005
-
-
-
-
λL2
0.06
0.06
0.03
0.00
0.09
0.08
0.04
0.08
0.02
0.03
0.01
0.01
0.08
0.10
0.00
0.00
0.03
0.07
0.04
0.04
0.01
0.02
0.02
0.02
0.10
-
-
-
0.01
0.5
64
0.01
0.5
64
0.01
0.5
64
0.01
0.5
64
-
-
t
-
5
4
3
1
5
3
-
Table 10: Hyperparameters for JK obtained by grid and random search.
Learning
rate
Dropout
Aggregation
Hidden
dimension
Diffusion Dataset name
α
-
Heat
PPR
AdaDIF
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
-
-
0.05
0.2
0.10
0.10
0.10
0.15
-
-
-
0.0001
0.0009
0.0001
-
0.0010
0.0005
0.0009
-
-
k
-
-
-
-
64
-
-
128
64
64
64
64
128
128
128
64
64
64
λL2
0.04
1.00
0.05
0.02
0.03
0.03
0.09
1.00
0.09
0.03
0.07
0.07
0.10
1.00
0.02
0.03
0.04
0.03
0.05
0.08
0.01
0.02
0.03
0.02
19
0.01
0.5
Concatenation
64
0.01
0.5
Concatenation
64
0.01
0.5
Concatenation
64
0.01
0.5
Concatenation
64
Hidden
depth
1
1
2
2
1
1
1
1
2
1
1
1
1
1
2
1
1
2
1
1
2
1
1
1
Hidden
depth
3
4
2
2
2
2
2
2
2
2
3
2
2
2
Table 11: Hyperparameters for GIN obtained by grid and random search.
Learning
rate
Dropout Aggregation
Hidden
dimension
Diffusion Dataset name
α
-
Heat
PPR
AdaDIF
CORA
CITESEER
PUBMED
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
AMZ COMP
AMZ PHOTO
t
-
3
8
3
3
3
-
-
-
0.05
0.05
0.10
0.10
0.10
-
-
k
-
-
-
-
64
64
128
64
64
64
128
128
64
64
64
-
0.0001
0.0009
0.0010
-
-
0.0009
-
-
λL2
0.09
0.10
0.08
0.01
0.01
0.07
0.01
0.02
0.00
0.00
0.01
0.01
0.01
0.04
0.04
0.02
0.05
0.03
0.02
0.02
0.01
0.5
Sum
0.01
0.5
Sum
0.01
0.5
Sum
0.01
0.5
Sum
64
64
64
64
Table 12: Hyperparameters for ARMA obtained by grid and random search.
Hidden
Learning
ARMA
layers
ARMA
stacks
dimension
Diffusion Dataset name
α
t
k
rate
Dropout
-
Heat
PPR
AdaDIF
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
-
5
5
3
1
5
3
-
-
-
0.10
0.15
0.10
0.10
0.10
0.15
-
-
-
-
0.0001
-
-
-
-
-
-
-
64
64
-
64
64
64
128
128
64
64
128
128
128
128
64
64
64
64
λL2
0.04
0.08
0.00
0.02
0.01
0.01
0.08
0.08
0.00
0.01
0.04
0.04
0.05
0.08
0.01
0.01
0.06
0.06
0.05
0.09
0.01
0.03
0.01
0.01
0.01
0.5
0.01
0.5
0.01
0.5
0.01
0.5
1
1
1
1
3
3
2
2
3
3
2
3
2
3
3
2
3
3
3
2
2
2
2
3
2
2
3
2
16
16
16
16
16
16
32
32
16
Hidden
depth
4
4
4
5
4
5
4
5
4
4
4
4
5
4
4
3
4
5
4
4
Hidden
depth
1
1
1
1
Table 13: Hyperparameters for APPNP obtained by grid and random search.
Learning
rate
Dropout
Hidden
dimension
Hidden
depth
Dataset name
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
α
0.10
0.10
0.10
0.15
0.10
0.10
k
10
λL2
0.09
1.00
0.02
0.01
0.06
0.05
0.01
0.5
64
1
20
Table 14: Hyperparameters for DCSBM obtained by grid and random search.
Diffusion Dataset name
Number of blocks
α
k
t
-
Heat
PPR
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
-
5
1
3
5
3
3
-
-
-
0.05
0.05
0.10
0.05
0.05
0.10
-
64
64
-
-
-
-
64
-
64
-
64
-
-
0.0010
-
-
-
-
-
0.0010
0.0010
0.0010
0.0010
0.0010
0.0010
7
6
3
15
10
8
7
6
3
15
10
8
7
6
3
15
10
8
Table 15: Hyperparameters for spectral clustering obtained by grid and random search.
Embedding
dimension
128
128
128
-
-
-
-
0.0010
0.0010
0.0010
0.0010
0.0010
0.0010
-
-
-
t
-
5
5
5
5
1
5
-
k
-
-
-
64
-
64
64
-
-
-
64
64
64
Diffusion Dataset name
α
-
Heat
PPR
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
-
-
0.10
0.05
0.15
0.05
0.05
0.15
21
Table 16: Hyperparameters for DeepWalk obtained by grid and random search.
Embedding
dimension
Walks per node
Diffusion Dataset name
α
t
k
Walk
length
-
Heat
PPR
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
-
5
1
1
5
3
3
-
-
-
0.05
0.05
0.15
0.10
0.05
0.15
-
-
-
64
-
-
-
-
-
-
64
64
-
-
0.0010
0.0010
0.0010
0.0010
0.0010
0.0010
0.0010
-
-
-
0.0010
0.0010
10
10
10
128
64
128
64
128
64
Table 17: Hyperparameters for DGI obtained by grid and random search.
Embedding
dimension
Learning
rate
Encoder
0.001
GCN
128
0.001
GCN
128
0.001
GCN
128
-
-
-
0.0001
0.0001
0.0001
0.0001
0.0001
0.0001
0.0010
0.0010
0.0010
0.0010
Diffusion Dataset name
α
-
Heat
PPR
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
CORA
CITESEER
PUBMED
COAUTHOR CS
AMZ COMP
AMZ PHOTO
-
-
0.15
0.10
0.15
0.15
0.30
0.30
t
-
1
5
5
5
1
1
-
k
-
-
-
64
64
-
-
-
22
|
1811.03573 | 5 | 1811 | 2019-08-28T02:50:16 | Scale-variant topological information for characterizing the structure of complex networks | [
"cs.SI",
"math.AT",
"physics.soc-ph"
] | The structure of real-world networks is usually difficult to characterize owing to the variation of topological scales, the nondyadic complex interactions, and the fluctuations in the network. We aim to address these problems by introducing a general framework using a method based on topological data analysis. By considering the diffusion process at a single specified timescale in a network, we map the network nodes to a finite set of points that contains the topological information of the network at a single scale. Subsequently, we study the shape of these point sets over variable timescales that provide scale-variant topological information, to understand the varying topological scales and the complex interactions in the network. We conduct experiments on synthetic and real-world data to demonstrate the effectiveness of the proposed framework in identifying network models, classifying real-world networks, and detecting transition points in time-evolving networks. Overall, our study presents a unified analysis that can be applied to more complex network structures, as in the case of multilayer and multiplex networks. | cs.SI | cs |
Scale-variant topological information for characterizing the structure of complex
networks
Quoc Hoan Tran,∗ Van Tuan Vo,† and Yoshihiko Hasegawa‡
Department of Information and Communication Engineering,
Graduate School of Information Science and Technology,
The University of Tokyo, Tokyo 113-8656, Japan
(Dated: August 29, 2019)
The structure of real-world networks is usually difficult to characterize owing to the variation of
topological scales, the nondyadic complex interactions, and the fluctuations in the network. We aim
to address these problems by introducing a general framework using a method based on topological
data analysis. By considering the diffusion process at a single specified timescale in a network,
we map the network nodes to a finite set of points that contains the topological information of
the network at a single scale. Subsequently, we study the shape of these point sets over variable
timescales that provide scale-variant topological information, to understand the varying topological
scales and the complex interactions in the network. We conduct experiments on synthetic and real-
world data to demonstrate the effectiveness of the proposed framework in identifying network models,
classifying real-world networks, and detecting transition points in time-evolving networks. Overall,
our study presents a unified analysis that can be applied to more complex network structures, as in
the case of multilayer and multiplex networks.
I.
INTRODUCTION
Characterizing the structure of complex networks is
the most fundamental challenge in deciphering network
dynamics. The anatomy of a network is quite rele-
vant to phenomena occurring in networks, such as the
spread of information, epidemic disease, or robustness
under attack. Moreover, it has attracted considerable
research interest given the numerous applications includ-
ing controlling and predicting patterns of dynamics in
networks [1 -- 3], evaluating the structural and functional
similarities of biological networks [4 -- 6], and detecting
transition points in time-evolving networks [7 -- 9].
In a
technical sense, the structure of real-world networks is
inherently difficult to characterize, firstly, because these
networks have complex patterns that can reflect vari-
ous topological scales ranging from microscale (individual
nodes) to mesocale (community, cores, and peripheries),
to macroscale (the whole network) [10 -- 12] [Fig. 1(a)].
For demonstrating these patterns, the conventional sta-
tistical measures [13, 14] and methods [10, 15 -- 18] are
limited when representing the varying topological scales.
Secondly, real-world networks represent complex sys-
tems that have dyadic and nondyadic interactions [19 --
21] [Fig. 1(b)]. Majority of the current methods used for
characterizing complex networks focus only on the dyadic
interactions, such as detecting the existence of pairwise
edges or paths connected by successive edges. Thirdly,
real-world networks often suffer from fluctuations caused
by external factors [22]. Consequently, the quest for uni-
fying the principles underlying the topology of networks
emerges only in simple, idealized models [23, 24].
∗ [email protected]
† [email protected]
‡ [email protected]
Herein, we propose a general framework for character-
izing the structure of complex networks, mainly based on
the topological data analysis of a diffusion process viewed
at variable timescales. We consider a diffusion process in
which a random walker moves randomly between nodes in
continuous time at the transition rate proportional to the
edge weights. The interaction between the nodes via the
diffusion process can reflect the structure of the network
at different topological scales. For example, a microscale
structure is revealed with a small diffusion timescale τ .
Increasing τ will increase the ranges of interactions to
reflect the mesoscale decomposition of the network, until
the macroscale structure is finally captured. By consid-
ering the diffusion process at a single specified timescale
τ , we can map the network nodes to a finite set of points
known as a point cloud in a high dimensional space. In
the point cloud, a group of close points represents the
unit of interacted nodes in the diffusion process. The
shape of this point cloud contains the topological infor-
mation of the network at a single topological scale.
Based on a topological data analysis method that pro-
vides insight into the "shape" of data [25], we build a
geometrical model that is primarily a collection of ge-
ometrical shapes to reveal the underlying structure of
the point cloud. In this geometrical model, two points
in the point cloud are connected if their distance is less
than or equal to a given threshold.
If the threshold is
considerably small, only points appear in the geomet-
rical model, and no connections are created between
points. As the threshold is gradually increased, more
pairwise connections are created, and geometrical shapes
as line segments, triangles, tetrahedrons, and so on, are
added to the geometrical model. In the case where the
threshold becomes considerably large, all pairs of points
in the point cloud will be connected, and only a giant
overlapped geometrical shape remains in the space. To
obtain information regarding the "shape" of the point
cloud, we focus on the changes of topological structures,
such as the merging of connected components, and the
emergence and disappearance of loops in the geometrical
model as the threshold is increased. Therefore, at each
timescale τ , we construct the topological features to mon-
itor the emergence and disappearance of the topological
structures. We can consider such features as a repre-
sentation for the network at a single topological scale
(τ -scale). Further, we extend these features by consider-
ing the timescale τ as a variable parameter instead of a
single fixed value. The extended features, referred to as
scale-variant topological features, can reflect the varying
topological scales in the complex network.
The scale-variant topological features are proven to be
robust under perturbation applied to the network, and
thus, can serve as discriminative features for character-
izing the networks. We input these features in the ker-
nel technique in machine learning algorithms to apply
to statistical-learning tasks, such as classification and
transition points detection. We show that the proposed
framework can characterize the parameters that are used
to generate the networks through an analysis of several
network models. Furthermore, we can classify both syn-
thetic and real-world networks with more effective results
when compared with other conventional approaches. We
further apply the proposed framework to detect the tran-
sition points with respect to the topological structure in
the time-evolving gene regulatory networks of Drosophila
melanogaster. Interestingly, these transition points agree
well with the transition points relative to the dynamics
obtained from the experimental results on the profiling.
II. METHOD
A. Scale-variant topological features
Let G be an undirected weighted network with N
nodes, v1, . . . , vN , and assume that there is a single ran-
dom walker moving randomly between the nodes in con-
tinuous time. When the walker is located at vi, we as-
sume the walker to move to the neighboring node vj at
a transition rate wij/Wi, where wij ≥ 0 represents the
weight of the edge from vi to vj (i, j ∈ {1, 2, . . . , N})
j=1 wij. Herein, if there is no edge be-
tween vi and vj, then wij = 0. Now, let pG,k(τi) de-
note the probability of a random walker on vk at time τ
that starts from vi. The probability distribution vector,
pG(τi) = [pG,1(τi), . . . , pG,N (τi)], is given based on the
solution of the Kolmogorov forward equation [26]:
and Wi = (cid:80)N
dpG(τi)
dτ
= −pG(τi)LrwG .
(1)
2
FIG. 1. Various topological scales and interactions between
multiple elements in a complex network. (a) Complex net-
works can be analyzed at various topological scales rang-
ing from individual nodes (microscale) to the whole network
(macroscale). In between the two scales, there is a mesoscale,
where we can observe patterns of collectives, cores, and pe-
ripheries. (b) Complex network is a representation of a com-
plex system having dyadic and nondyadic interactions be-
tween its elements. The interactions can be represented as
simplices such as segments (for dyadic interactions), filled tri-
angles, or filled tetrahedrons (for nondyadic interactions in-
volving three or four elements), and so on.
Here, LrwG is the random walk Laplacian whose compo-
nents lij (i, j ∈ {1, 2, . . . , N}) are given by,
1
lij =
−wij/Wi
0
if i = j and Wi (cid:54)= 0
if i (cid:54)= j and vi is adjacent to vj
otherwise.
(2)
The solution for Eq. (1) is pG(τi) = ui exp(−τ LrwG ),
where ui = [0, . . . , 0, 1, 0, . . . , 0] with its i-th element
the others are equal to 0 (i ∈
being equal to 1;
{1, 2, . . . , N}).
At each timescale τ , we consider mapping χτ from the
set VG = {v1, v2, . . . , vN} of nodes in G to the Euclidean
space RN such that,
χτ :
VG −→ RN
vi (cid:55)−→ pG(τi)
(i = 1, 2, . . . , N ).
(3)
The mapped point pG(τi) of nodes vi represents the
probability on all nodes at time τ of a random walker
that starts from vi. Therefore, pG(τi) can reflect the
interaction between vi and other nodes at τ -scale, and
characterize the structural role of node vi with multi-
resolutions when τ varies. The shape of the point cloud
PG(τ ) = {pG(τ1), . . . , pG(τN )} provides valuable in-
sights into the dyadic and nondyadic interactions be-
tween nodes, and into the structural property of G at
τ -scale. Moreover, the distance between two mapped
points in PG(τ ) is relatively small if there are many paths
3
FIG. 2. An exemplary of Vietoris -- Rips filtration constructed from a point cloud. A union of balls of radius ε/2 centered at
each point is considered. Topological structure changes are tracked, such as the merging of connected components or clusters,
and the emergence and disappearance of loops or circular holes present in the space with increasing ε from {0.0, 0.1, 0.2, 0.3,
0.4, 0.6}. For instance, the blue loop Ω1 appears at ε = 0.2 then disappears at ε = 0.4, whereas the red loop Ω2 appears
at ε = 0.3 then disappears at ε = 0.6. For each ε, the number of connected components and the number of loops are listed
underneath.
connecting two original nodes in G. The nodes that be-
long to the same community or cluster in the network
tend to form a group of close points in PG(τ ).
Information on the shape of the point cloud can be
obtained quantitatively using the method of persistent
homology from computational topology [25, 27 -- 29]. The
idea is to construct from PG(τ ) the ε-scale Vietoris -- Rips
complex model VR(PG(τ ), ε), which is a set of simplices
built with a nonnegative threshold ε [30]. Here, every
collection of n + 1 affinely independent points in PG(τ )
forms an n-simplex in VR(PG(τ ), ε) if the pairwise dis-
tance between the points is less than or equal to ε. To
build the Vietoris -- Rips complex model, we consider a
union of balls of radius ε/2 centered at each point in
PG(τ ) (Fig. 2). Each simplex is built over a subset of
points if the balls intersect between every pair of points.
These simplices can represent the nondyadic interac-
tions of nodes at τ -scale. In turn, the constructed com-
plex VR(PG(τ ), ε) provides information on the topological
structure of PG(τ ) associated with ε. Now, starting with
ε = 0, the complex contains only the 0-simplices, i.e., the
discrete points. As ε increases, connections exist between
the points, enabling us to obtain a sequence of embedded
complexes called filtration with edges (1-simplices), and
triangular faces (2-simplices) are included into the com-
plexes. Moreover, if ε becomes considerably large, all the
points gets connected with each other, whereby no useful
information can be conveyed.
Persistent homology tracks the variation of topological
structures over the filtration. We refer to the topologi-
cal structures, i.e., "holes" in high-dimensional data, as
connected components, tunnels or loops (e.g., a circle
of torus), cavities or voids (e.g., the space enclosed by a
sphere), and so on. In persistent homology, a hole is iden-
tified via the cycle that surrounds it. In a given manifold,
a cycle is a closed submanifold, and a boundary is a cycle
that is also the boundary of a submanifold. Holes corre-
spond to cycles that are not themselves boundaries. For
instance, a disk is a two-dimensional surface with a one-
dimensional boundary (i.e., a circle). If we puncture the
disk, we obtain a one-dimensional hole that is enclosed by
FIG. 3. (a) -- (f) Sample manifolds with the number of zero-,
one-, and two-dimensional holes listed underneath. (a) The
connected component is a zero-dimensional hole.
(b)(c) A
one-dimensional hole is obtained by puncturing a disk. (d)(e)
A two-dimensional hole is obtained by emptying the inside of
a ball. (f) Two one-dimensional holes are illustrated as two
circles in a torus. (g) Example of a simplicial complex con-
taining 19 points (0-simplices), 24 edges (1-simplices), eight
triangular faces (2-simplices), and one filled tetrahedron (3-
simplices). There are two one-dimensional holes Ω1 and Ω2
in the complex. In this example, all loops B → C → D → B,
A → B → C → D → A, B → E → C → D → B, and
A → B → E → C → D → A are 1-cycles because they
are closed 1-chains, that is, the closed collection of edges
(1-simplices). Each cycle is not a boundary of any 2-chain
(collection of triangular faces); thus, it characterizes a one-
dimensional hole. Note that these cycles characterize the
same hole, Ω1, because the difference between the two of cy-
cles is the boundary of a 2-chain.
4
FIG. 4.
(a) An undirected network comprising four clusters with more connections within intra-clusters than between inter-
clusters. (b) For each τ , the nodes are mapped onto a point cloud such that the distances of the mapped points of the nodes
in the same clusters are smaller than those between the nodes belonging to different clusters. These distances decrease as τ
increases with τ1 < τ2 < τ3. (c) The topological features at each τ characterize the shape of the point cloud. These features
are displayed as a two-dimensional persistence diagram at each τ . (d) The scale-variant topological features, i.e., the three-
dimensional persistence diagram, are obtained by integrating two-dimensional diagrams at varying τ . The birth-scale and
death-scale axes of the diagrams are represented at the logarithmic scale.
the circle, which is no longer a boundary [Fig. 3(b)(c)].
Similarly, a filled ball is a three-dimensional object with a
two-dimensional boundary (i.e., a surface sphere). If we
empty the inside of the ball, we obtain a two-dimensional
hole that is enclosed by the surface sphere, which is
no longer a boundary [Fig. 3(d)(e)]. Based on these
observations, we can describe and classify holes in the
simplicial complex according to the cycles that enclose
holes. Given a simplicial complex, we define an n-chain
as a collection of n-simplices in the complex. There-
fore, in a simplicial complex, we can define an n-cycle
as a closed n-chain and an n-boundary as an n-cycle,
which is also the boundary of an (n + 1)-chain. Here, a
0-cycle is a connected component, a 1-cycle is a closed
loop, and a 2-cycle is a shell. For instance, in Fig. 3(g),
all loops A → B → D → A, B → C → D → B,
and A → B → C → D → A are 1-cycles because
they are the closed collection of edges (1-simplices). Fur-
thermore, the loop A → B → D → A is a 1-boundary
because it bounds a triangular face (2-simplex). An n-
dimensional hole corresponds to an n-cycle that is not
a boundary of any (n + 1)-chain in the simplicial com-
plex. For instance, as illustrated in Fig. 3(g), the loops
B → C → D → B and A → B → C → D → A char-
acterize one-dimensional holes because these loops are
1-cycles but are themselves not 1-boundaries. Moreover,
two n-cycles characterize the same hole when together
they bound an (n + 1)-chain (i.e., their difference is an
n-boundary). Intuitively, the connected components can
be considered as zero-dimensional holes, the loops and
tunnels as one-dimensional holes, and the cavities and
voids as two-dimensional holes.
We consider the emergence and disappearance of holes
in the Vietoris -- Rips filtration of PG(τ ) as topological fea-
tures for the complex network G at τ -scale. Such fea-
tures can be observed using multi-set points in a two-
(l),τ (G), which is cal-
dimensional persistence diagram, D(2)
culated for l-dimensional holes.
In this diagram, each
point (b, d) denotes a hole that appears at the birth-scale,
ε = b, and disappears at the death-scale, ε = d (see
Appendix A). Observing the above-defined features, i.e.,
the two-dimensional persistence diagrams with varying
τ can provide insights into the variation of topological
structures, thereby reflecting the variation of topologi-
cal scales in the network. For instance, the persistence
diagrams of zero-dimensional and one-dimensional holes
contain information on clusters, connected components,
or loops in the point cloud PG(τ ), and thus lead to an
understanding of the formation of communities and loops
in the network at the τ -scale. We construct scale-variant
topological features by regarding τ as a variable param-
eter rather than as a single fixed value.
In Fig. 4(a), we consider an undirected network that
comprises four clusters with more intra-cluster connec-
tions than inter-cluster ones. Pairwise distances of the
mapped points of the nodes belonging to the same clus-
ters are smaller than the distances between the nodes
belonging to different clusters. These distances decrease
as values of τ increase [Fig. 4(b)].
In the point cloud,
the hole patterns appear with different sizes in different
groups of points as τ varies. We obtain the scale-variant
topological features that reflect the variation of topo-
logical scales by considering the two-dimensional per-
sistence diagrams with the varying τ . Consider τ in a
set T = {τ1, τ2, ..., τK}, where 0 < τ1 < τ2 < ··· <
τK are predefined or sampled values from the contin-
uous domain of timescales. The scale-variant topolog-
ical features, i.e., the three-dimensional persistence di-
agram of l-dimensional holes for network G, are de-
(l),τ (G), τ ∈
fined by D(3)
T } [Fig. 4(d)].
(l) (G) = {(b, d, τ ) (b, d) ∈ D(2)
B. Robustness of scale-variant topological features
We show that the scale-variant topological features are
robust with respect to some perturbations of the network.
To describe this robustness, we use the bottleneck dis-
tance, d(3)
B,ξ, a metric structure introduced in Ref. [31] for
comparing three-dimensional persistence diagrams (see
Appendix B). Herein, ξ is a positive rescaling coeffi-
cient introduced to adjust the scale difference between
the pointwise distance and time. We consider two undi-
rected networks G and H with the same number of nodes.
Based on Refs. [32, 33], we can prove that the upper limit
(l) (H)
of the bottleneck distance between D(3)
is governed by the matrix 2-norm of the difference be-
tween LrwG and LrwH (see Appendix B):
(l) (G) and D(3)
d(3)
B,ξ(D(3)
(l) (G), D(3)
(l) (H)) ≤ 2τK(cid:107)LrwG − LrwH (cid:107)2.
(4)
Herein, (cid:107)A(cid:107)2 denotes the matrix 2-norm of matrix A.
The inequality of Eq. (4) indicates that our scale-variant
topological features are robust with respect to the per-
turbations applied to the random walk Laplacian matrix.
Therefore, these features can be used as discriminative
features for characterizing networks.
C. Kernel method for scale-variant topological
features
In the statistical-learning tasks, many learning algo-
rithms require an inner product between the data in the
vector form. Because the space of three-dimensional per-
sistence diagrams is not a vector space, we deem it not
straightforward to use the scale-variant topological fea-
tures in the statistical-learning tasks. This problem can
be mitigated through the use of a feature map Φ from
the positive-definite kernel, which maps the scale-variant
topological features to a space called kernel-mapped fea-
ture space Hb where we can define the inner product [31].
In general, choosing the explicit form of mapping a per-
sistence diagram E to ΦE in the kernel-mapped feature
space is not discernible. Nonetheless, we can use a ker-
nel function to compute the inner product in the kernel-
mapped feature space, leaving the mapping function and
the kernel-mapped feature space completely implicit.
Given a positive bandwidth σ and a positive rescaling
coefficient ξ introduced to adjust the scale difference be-
tween the point-wise distance and time (see Appendix C),
5
based on Refs. [31, 34], we define the kernel Kσ,ξ between
two three-dimensional persistence diagrams, E and F , as
(cid:33)
,
(cid:32)
(cid:88)
q(1)∈E
q(2)∈F
Kσ,ξ(E, F ) =
√
1
2π
σ
− d2
ξ (q(1),q(2))
2σ2
e
− d2
− e
ξ (q(1), ¯q(2))
2σ2
(5)
ξ(q(1), q(2)) = b1 − b22 +d1 − d22 + ξ2τ1 − τ22,
where d2
ξ(q(1), ¯q(2)) = b1 − d22 + d1 − b22 + ξ2τ1 − τ22,
d2
with q(1) = (b1, d1, τ1) and q(2) = (b2, d2, τ2) , ¯q(2) =
(d2, b2, τ2).
In our experiments, we use the normalized
version of the kernel, which is calculated as
Kσ,ξ(E, F ) ← Kσ,ξ(E, F )/
(cid:113)Kσ,ξ(E, E)Kσ,ξ(F, F ). (6)
Because Eq. (5) and Eq. (6) define the positive-definite
kernels in the set of three-dimensional persistence di-
agrams [31], according to Moore -- Aronszajn's theo-
rem [35], there exists a mapping function Φ such that
the inner product (cid:104)ΦE, ΦF(cid:105)Hb between ΦE and ΦF in the
kernel-mapped feature space Hb is Kσ,ξ(E, F ). There-
inner product
fore, we can use the explicit form of
(cid:104)ΦE, ΦF(cid:105)Hb in the statistical-learning tasks.
(l),i
(l),1, D(3)
(l),M}, where D(3)
Furthermore, we can use the above-defined ker-
nel to estimate the transition points with respect to
the topological structure in the series of networks
G1,G2, . . . ,GM .
Consider a collection of diagrams
D(l) = {D(3)
(l),2, . . . , D(3)
is the
three-dimensional persistence diagram of l-dimensional
holes for network Gi (i = 1, 2, . . . , M ). Here, we
define the transition with respect to the topological
structure in G1,G2, . . . ,GM as they abruptly change
at given unknown instants (change-points) in D(l).
We use the kernel change-point detection method [36]
to solve the change-point
regression problem with
. Given an index s (1 < s ≤
ΦD(3)
M ), we calculate the kernel Fisher discriminant ratio
κM,s(D(l)), which is a statistical quantity to measure
the dissimilarity between two classes assumptively de-
fined by two sets of diagrams having index before and
from s (see Appendix D). Here, the index s achieving
the maximum of κM,s(D(l)) corresponds to the estimated
transition point.
, . . . , ΦD(3)
, ΦD(3)
(l),2
(l),M
(l),1
III. RESULTS
A. Understanding variations of the parameters of
network models
We now investigate how the scale-variant topologi-
cal features can reflect variations of the parameters of
network models. We generate networks using Girvan --
Newman (GN) [37], Lancichinetti -- Fortunato -- Radicchi
(LFR) [38, 39], Watts -- Strogatz (WS) [40], Erdos -- R´enyi
(ER) [41], Lancichinetti -- Fortunato -- Radicchi with hi-
erarchical structure (LFR -- H) [17], and Sales -- Pardo
(SP) [16] models. We focus on the model parameters
that represent the topological scale of these networks,
such as the ratio r between the probability of inter-
(pout) and intra-community links (pin) (GN), mixing rate
µ (LFR), rewiring probability β (WS), pair-link proba-
bility plink (ER), mixing rate µmacro for macrocommuni-
ties (LFR -- H), and ρ, which estimates the separations be-
tween topological scales in the SP model. The model pa-
rameters are varied as r = pout/pin = 0.01, 0.02, . . . , 1.0;
µ = 0.01, 0.02, . . . , 1.0; β = 0.00, 0.01, . . . , 1.0; plink =
0.020, 0.021, . . . , 0.1; µmacro = 0.01, 0.02, . . . , 0.2 and;
ρ = 0.05, 0.10, . . . , 2.0. We generate 10 network realiza-
tions for each of the models GN, LFR, WS, ER, and SP,
and 20 network realizations for the LFR -- H model at each
value of the corresponding model parameter. There are
128 nodes in the GN, LFR, WS, and ER networks, 300
nodes in each LFR -- H network, and 640 nodes in each SP
network.
We compute three-dimensional persistence diagrams
for one-dimensional holes with τ1 = 1, τ2 = 2, . . . , τ100 =
100, and then calculate the kernel defined in Eq. (5) for
the collection of generated networks in each model. Fig-
ure 5 shows the principal components projections from
the kernel-mapped feature space of each model, at which
the points with different colors represent the networks
generated from different values of the model parameters.
In WS, ER, LFR -- H, and SP models, the scale-variant
topological features reflect a variation of the parameters
associated with the topological scales mainly that the
points located at different positions have different colors
[Fig. 5(c) -- (f)]. In GN and LFR models, there are varia-
tions in the topological scales of the network as r and µ
vary from 0 (four separate groups) to 1 (a purely random
graph). Using the kernel Fisher discriminant ratio cal-
culated for the series of persistence diagrams, we obtain
the transition with respect to the topological structure at
r = 0.12 and µ = 0.26 for the series of networks obtained
at increasing r and µ (Fig. 6). These values correspond
to the boundaries between the identifiable phases, where
parameters can be identified from the kernel-mapped fea-
ture space and the non-identifiable phases [Fig. 5(a) -- (b)].
B.
Identification of network models
Here we show that the scale-variant topological fea-
tures can classify the networks generated from different
models, even if they have similar global statistical mea-
sures. We study the configuration model in Ref. [42],
which generates random networks (known as configura-
tion networks) having the same sequences of node de-
grees as a given network. The labels of the networks
generated from GN, LFR, and WS models are denoted
by GN-org, LFR-org, and WS-org, respectively, while
their corresponding configuration networks labels are de-
noted by GN-conf, LFR-conf, and WS-conf. We com-
6
FIG. 5. Principal components projection from the kernel-
mapped feature space of the scale-variant topological features
in each network model. Points with different colors represent
networks generated from different values of the model parame-
ters. Networks are generated from (a) Girvan -- Newman (GN),
(b) Lancichinetti -- Fortunato -- Radicchi (LFR), (c) Watts --
Strogatz (WS), (d) Erdos -- R´enyi (ER), (e) Lancichinetti --
Fortunato -- Radicchi hiearchical (LFR -- H), and (f) Sales --
Pardo (SP) models. Parameters for these models vary as
follows:
r = pout/pin = 0.01, 0.02, . . . , 1.0 (GN); µ =
0.01, 0.02, . . . , 1.0 (LFR); β = 0.00, 0.01, . . . , 1.0 (WS); plink =
0.020, 0.021, . . . , 0.1 (ER); µmacro = 0.01, 0.02, . . . , 0.2 (LFR --
H) and; ρ = 0.05, 0.10, . . . , 2.0 (SP).
FIG. 6. Kernel Fisher discriminant ratio κ estimated for the
series of (a) Girvan -- Newman networks and (b) Lancichinetti --
Fortunato -- Radicchi networks. The transition point is de-
tected with respect to the topological structure of networks
from the series of persistence diagrams for one-dimensional
holes obtained when r = pout/pin is increased as r1 =
0.01, r2 = 0.02, . . . , r100 = 1.0 (for Girvan -- Newman net-
works), and µ is increased as µ1 = 0.01, µ2 = 0.02, . . . , µ100 =
1.0 (for Lancichinetti -- Fortunato -- Radicchi networks). The
maximum value of κ is marked with the orange point of the
dashed line. The transition point is the value of the parameter
that achieves the maximum value of κ. The transition points
are obtained as rc = 0.12 (for Girvan -- Newman networks) and
µc = 0.26 (for Lancichinetti -- Fortunato -- Radicchi networks).
7
FIG. 7. Networks from Girvan -- Newman, Lancichinetti -- Fortunato -- Radicchi, and Watts -- Strogatz models are generated with
labels denoted by GN-org, LFR-org, and WS-org, respectively; their corresponding configuration networks labels are denoted
by GN-conf, LFR-conf, and WS-conf. (a) The kernel principal components projection of the scale-variant topological features
for these networks. (b)(c) Variation of high-order features, i.e., degree assortativity coefficient, maximum modularity, and
average clustering coefficient for (b) all generated networks, and (c) configuration networks. The different colors represent the
networks generated from different models.
pute the three-dimensional persistence diagrams for one-
dimensional holes of these networks with timescale values
τ1 = 1, τ2 = 2, . . . , τ100 = 100. Accordingly, we cal-
culate the kernel for these diagrams, then perform three-
dimensional projections of the principal components from
the kernel-mapped feature space [Fig. 7(a)]. Here, points
with different colors represent networks generated from
different models. In Fig. 7(a), the points appear to be
distinguishable by their colors, thus, we can conclude
that the scale-variant topological features can character-
ize the differences with respect to the topological struc-
ture between networks, and even between configuration
networks generated from different models.
While the node degree distribution in a configuration
network is the same as the given network, the topological
correlations between the nodes are destroyed. Therefore,
we investigate conventional higher-order features of the
network, such as the degree assortativity coefficient, the
average clustering coefficient, and the maximum modu-
larity obtained via Louvain heuristic [37, 43]. Figure 7(b)
highlights the variation of these features in our generated
networks. Specifically in Fig. 7(b), the points with cor-
responding labels GN-org, LFR-org, and WS-org appear
to be distinguishable with others, thus, it becomes easy
to distinguish between networks generated from differ-
ent models and between a given network with its corre-
sponding configuration network. However, if we look at
the variation of these features for configuration networks
[Fig. 7(c)], we note that the conventional higher-order
features of the network cannot capture the apparent dif-
ferences in topological structure between the configura-
tion networks, even when their corresponding original
networks are generated from different mechanics models.
In contrast with this observation and as highlighted in
Fig. 7(a), the scale-variant topological features can pro-
vide a better representation of the topological structure
of networks.
Accordingly, we quantify to what extent the scale-
variant topological features identify the networks gener-
ated from different models. We employ the scale-variant
method, which uses the scale-variant topological features
to classify networks into six labels, namely, GN-org, LFR-
org, WS-org, GN-conf, LFR-conf, and WS-conf. We ran-
domly split 10 networks generated at each value of the
model parameters into two, i.e., five networks for training
and five for testing, and apply the support vector ma-
chine [44] for classification in the kernel-mapped feature
space. Figure 8(a) depicts the average normalized con-
fusion matrix over 100 random splits, where the row and
column labels are the predicted and true labels, respec-
tively. Figure 8(a) shows a reasonably high accuracy for
identifying the networks generated from different mod-
els with the following labels: GN-org (99.2%), LFR-org
(99.2%), WS-org (99.4%), GN-conf (94.8%), LFR-conf
(99.4%), and WS-conf (96.6%). This result demonstrates
that the scale-variant topological features can reflect well
on the behaviors of these network models.
To highlight the benefits of the scale-variant method,
we compare it with the other conventional methods
using common network measures [13, 45 -- 48], well-
recognized graph kernels [49], and topological
fea-
tures calculated at an average fixed topological scale.
We describe the common network measures in Ap-
pendix E as well as the graph kernels that are based
on random walks (KStepRW, GeometricRW, Exponen-
tialRW) [50, 51], paths (ShortestPath) [52],
limited-
sized subgraphs (Graphlet) [53], and subtree patterns
(Weisfeiler -- Lehman [54]) in Appendix F. Moreover, we
consider two variations of topological features evaluated
at an average fixed topological scale to show the advan-
8
C. Classification of the real-world network data
Next, we apply the scale-variant topological features to
the classification of chemoinformatics network datasets
(MUTAG, BZR, COX2, DHFR, FRANKENSTEIN,
NCI1, NCI109), bioinformatics dataset (PROTEIN),
and large real-world social network datasets, such as
movie collaboration networks (IMDB -- BINARY, IMDB --
MULTI), scientific collaboration networks (COLLAB),
and networks obtained from online discussion threads on
Reddit (REDDIT -- BINARY, REDDIT -- MULTI -- 5K) [56 --
63]. The aggregate statistics for these datasets is pro-
vided in Table I. We compute three-dimensional per-
sistence diagrams with τ1 = 1, . . . , τ50 = 50, and use
the multiple kernel learning method [64] to learn the
linear combination of the normalized kernels for zero-
dimensional and one-dimensional holes. Subsequently,
we compare our scale-variant method with methods em-
ploying the common network measures and the scale-
average and scale-norm-average methods. Likewise, we
compare the scale-variant method with many state-of-
the-art algorithms in classifying graphs and networks
as follows:
(i) random walk kernels based on match-
ing walks in two graphs (KStepRW, GeometricRW,
ExponentialRW) [50, 51], (ii) the shortest path ker-
nel (ShortestPath) [52], (iii) the graphlet count kernel
(Graphlet) [53], (iv) the Weisfeiler -- Lehman subtree ker-
nel (Weisfeiler -- Lehman) [54], (v) the deep graph kernel
(DGK) [62], (vi) the PATCHY-SAN convolutional neural
network (PSCN) [65], and (vii) the graph kernel based on
return probabilities of random walks (RetGK) [66]. Here,
in order to make a fair comparison with these meth-
ods, as presented in the literature Ref. [66], we apply
the support vector machine [44] as the classifier in the
kernel-mapped feature space. Moreover, we perform 10-
fold cross-validations, where a single 10-fold is created by
randomly shuffling the dataset, and then splitting it into
10 different parts (folds) of equal size.
In every single
10-fold, we use nine folds for training and one for testing
and averaging of the classification accuracy of the test set
obtained throughout the folds. To reduce the variance of
the accuracy due to the splitting of data, we repeat the
whole process of cross-validation for 10 times, and then
report the average and standard deviation of the classi-
fication accuracies.
The social network datasets contain networks that
do not have information, such as labels and attributes
of nodes. For movie collaboration datasets (IMDB --
BINARY, IMDB -- MULTI), collaboration ego-networks
are generated for each actor (actress). In each network,
two nodes representing the actors or actresses are con-
nected when they appear in the same movie. The task
is to identify whether a given ego-network of an actor
(actress) belongs to one of the predefined movie gen-
res. For scientific collaboration dataset (COLLAB), col-
laboration ego-networks are generated for different re-
searchers, with the objective of determining whether
the collaboration network of a researcher belongs to
FIG. 8. Classification of networks generated from Girvan --
Newman, Lancichinetti -- Fortunato -- Radicchi, and Watts --
Strogatz models, with labels denoted by GN-org, LFR-org,
and WS-org, respectively; their corresponding configuration
networks labels are denoted by GN-conf, LFR-conf, and WS-
conf. (a) Average normalized confusion matrix of the scale-
variant method over 100 random train-test splits of the data.
The 10 networks generated at each value of the model param-
eters are split into two, with five networks for training and the
other five for testing. (b) Average accuracies (%) of the clas-
sification methods over 100 random train-test splits at each
proportion of the training data (bold lines). The shaded ar-
eas indicate the confidence intervals of one standard deviation
calculated using the same ensemble of runs.
i=1
matrix ∆avg = (1/K)(cid:80)K
∆avg = (1/K)(cid:80)K
tages of using variable timescales. Also, instead of us-
ing a particular timescale, we use the scale-average and
the scale-norm-average methods to preserve the geomet-
rical persistence of the point cloud. The former uses the
topological features extracted from the average distance
i=1 ∆τi, whereas the latter uses
the features from the average normalized distance matrix
∆τi [26]. Herein, ∆τi denotes the
distance matrix of pairwise Euclidean distances between
points in PG(τi), whereas ∆τi
is obtained by dividing
∆τi by its maximum element. We randomly split the
10 networks generated at each value of the model pa-
rameters into proportions for training and for testing,
and employ the support vector machine as the classifier
to both the common network measures and the kernel-
mapped feature space. We compute the average clas-
sification accuracy over 100 random splits at different
proportions of the training data. Figure 8(b) depicts the
performance of the methods with accuracies greater than
70%, mainly illustrating that the scale-variant method
outperforms the other methods in terms of classification
accuracy. Moreover, the scale-variant method is shown
to achieve approximately 97% of accuracy, even with a
small size of the training dataset, e.g., only 10% of all
the data, whereas the other methods yielded accuracies
of at most 84%. These results validate the effectiveness
and the reliability of our scale-variant method in cap-
turing the differences between network structures. The
source code used in our experiments is publicly available
on GitHub [55].
9
Dataset
MUTAG
BZR
COX2
DHFR
FRANKENSTEIN
NCI1
NCI109
PROTEINS
IMDB -- BINARY
IMDB -- MULTI
COLLAB
REDDIT -- BINARY
REDDIT -- MULTI -- 5K
TABLE I. Summary statistics of the real-world network datasets.
Type of
networks
Number of
networks
Number of
classes
Number of networks
in each class
Avg. number
Avg. number
of nodes
of edges
Chemoinformatics
Chemoinformatics
Chemoinformatics
Chemoinformatics
Chemoinformatics
Chemoinformatics
Chemoinformatics
Bioinformatics
Social
Social
Social
Social
Social
188
405
467
756
4337
4110
4127
1113
1000
1500
5000
2000
4999
2
2
2
2
2
2
2
2
2
3
3
2
5
(63,125)
(319, 86)
(365, 102)
(295, 461)
(2401, 1936)
(2053, 2057)
(2048, 2079)
(663, 450)
(500, 500)
(500, 500, 500)
(2600, 775, 1625)
(1000, 1000)
(1000, 1000, 1000, 1000, 999)
17.93
35.75
41.22
42.43
16.90
29.87
29.68
39.06
19.77
13.00
74.49
429.63
508.52
19.79
38.36
43.45
44.54
17.88
32.30
32.13
72.82
96.53
65.94
2457.78
497.75
594.87
TABLE II. Average and standard deviation (mean±sd) of the classification accuracy (%) for social network datasets IMDB --
BINARY, IMDB -- MULTI, COLLAB, REDDIT -- BINARY, and REDDIT -- MULTI -- 5K. These social network datasets contain
networks that do not have information such as labels and attributes of nodes. In each dataset, the best and the second-best
scores are colored in dark pink and light pink, respectively. The notation (∗) indicates that the kernel computation with the
implementation in [49] is not completed after 72h.
Method
Scale-variant
Scale-average
Scale-norm-average
CommonMeasures
KStepRW
GeometricRW
ExponentialRW
ShortestPath
Graphlet
Weisfeiler -- Lehman
DGK
PSCN
RetGK
IMDB -- BINARY
74.2 ± 0.9
67.7 ± 0.8
70.2 ± 0.7
72.0 ± 0.2
60.0 ± 0.8
67.0 ± 0.8
65.2 ± 1.1
58.2 ± 1.0
65.9 ± 1.0
70.8 ± 0.5
67.0 ± 0.6
71.0 ± 2.3
71.9 ± 1.0
IMDB -- MULTI
49.9 ± 0.3
44.9 ± 0.4
44.9 ± 0.4
44.9 ± 0.3
43.8 ± 0.7
45.2 ± 0.4
43.1 ± 0.4
42.0 ± 0.6
43.9 ± 0.4
49.8 ± 0.5
44.6 ± 0.5
45.2 ± 2.8
47.7 ± 0.3
COLLAB
79.6 ± 0.3
71.4 ± 0.1
62.6 ± 0.1
75.2 ± 0.1
(∗)
(∗)
(∗)
58.5 ± 0.2
72.8 ± 0.3
74.8 ± 0.2
73.1 ± 0.3
72.6 ± 2.2
81.0 ± 0.3
REDDIT --
BINARY
87.8 ± 0.3
79.8 ± 0.3
73.9 ± 0.2
85.7 ± 0.3
(∗)
(∗)
(∗)
81.9 ± 0.1
77.3 ± 0.2
68.2 ± 0.2
78.0 ± 0.4
86.3 ± 1.6
92.6 ± 0.3
REDDIT --
MULTI -- 5K
53.1 ± 0.2
51.5 ± 0.2
48.7 ± 0.3
56.6 ± 0.2
(∗)
(∗)
(∗)
49.0 ± 0.1
41.0 ± 0.2
51.2 ± 0.3
41.3 ± 0.2
49.1 ± 0.7
56.1 ± 0.5
TABLE III. Average and standard deviation (mean±sd) of the classification accuracy (%) for chemoinformatics and bioin-
formatics datasets MUTAG, BZR, COX2, DHFR, FRANKENSTEIN, PROTEINS, NCI1, and NCI109. Presented is only a
comparison of the methods using the connectivity between nodes. In each dataset, the best and the second-best scores are
colored in dark pink and light pink, respectively.
Method
Scale-variant
Scale-average
Scale-norm-average
CommonMeasures
KStepRW
GeometricRW
ExponentialRW
ShortestPath
Graphlet
Weisfeiler -- Lehman
MUTAG
88.2±1.0
83.0±1.3
84.6±0.9
84.9±0.3
81.8±1.3
82.9±0.5
83.0±0.5
81.8±0.9
83.0±0.3
83.8±0.8
BZR
85.9±0.9
78.9±0.4
81.7±0.2
82.8±0.3
86.5±0.5
79.2±0.4
79.5±0.5
85.6±0.6
78.8±0.0
84.0±1.2
COX2
78.4±0.4
78.2±0.0
78.2±0.0
78.2±0.0
78.0±0.1
78.2±0.0
78.2±0.0
78.1±0.1
78.2±0.0
78.3±0.2
DHFR
78.8±0.7
66.9±0.5
61.0±0.0
71.1±0.6
73.3±0.4
71.4±1.9
74.6±0.3
73.2±0.5
61.0±0.0
77.2±0.6
FRANKEN
STEIN
69.0±0.2
61.3±0.2
60.2±0.1
62.0±0.2
65.4±0.2
55.4±0.1
55.4±0.1
63.8±0.1
55.4±0.0
62.3±1.2
PROTEINS
72.6±0.4
70.8±0.2
71.7±0.4
75.3±0.3
71.8±0.1
72.2±0.1
72.2±0.1
72.0±0.3
70.6±0.1
71.3±0.5
NCI1
71.3±0.4
66.5±0.2
65.2±0.1
67.8±0.3
51.7±0.7
62.6±0.0
62.7±0.1
64.2±0.1
62.4±0.2
63.2±0.1
NCI109
69.8±0.2
65.8±0.2
65.7±0.1
65.4±0.1
50.4±0.0
63.2±0.0
63.2±0.1
61.1±2.0
62.1±0.1
63.6±0.1
one of the research fields as High Energy Physics, Con-
densed Matter Physics, or Astro Physics. For Reddit
datasets, each network is generated from an online dis-
cussion thread where nodes correspond to users, and
edges correspond to the responses between users. Here,
the task is to identify whether a given network belongs
to a question/answer -based community or a discussion-
based community (REDDIT -- BINARY), or one of five
predefined subreddits (REDDIT -- MULTI -- 5K). Table II
presents the average accuracies along with their standard
deviations over ten 10-folds. The results for Weisfeiler --
Lehman kernel, DGK kernel, PSCN, and RetGK kernel
are taken from Ref. [66]. Specifically in Table II, the best
and the second-best average accuracy scores for each so-
cial network dataset are colored dark pink and light pink,
respectively. For the social network datasets, the scale-
variant method either is comparable or outperforms the
state-of-the-art classification methods.
For the chemoinformatics network datasets, we predict
the function classes of chemical compounds in chemoin-
formatics. Here, molecules are represented as small
networks with nodes as atoms and edges as covalent
bonds. For the bioinformatics dataset (PROTEINS),
proteins are represented as networks, where the nodes
are secondary structure elements and the edges repre-
sent the neighborhood within the 3-D structure or along
the amino acid chain. We aim to classify the function
class membership of the protein sequences into enzymes
and non-enzymes. Note that these chemoinformatics and
bioinformatics network datasets contain information on
the labels and attributes of the nodes, which is leveraged
in DGK, PSCN, and RetGK methods. For a fair com-
parison of characterizing the structure of networks, we
present in Table III the average accuracies and standard
deviations of the methods that only use the connectivity
between nodes. In the table, the best and the second-best
average accuracy scores for each dataset are colored dark
pink and light pink, respectively. Here, on average, the
scale-variant method outperforms all the other methods,
and offers the best results for six of the eight datasets and
the second-best result for two more. Further, the clas-
sification accuracies of the scale-variant method on MU-
TAG, FRANKENSTEIN, NICI1, and NCI109 datasets
are at least two percentage points higher than those of
the best baseline algorithms. These results suggest that
the scale-variant method can be considered as an effective
approach in classifying real-world network data.
D. Detection of transition points in the
time-evolving gene regulatory network
We apply the scale-variant topological features to de-
tect transition points between the developmental stages
of Drosophila melanogaster in the time-evolving gene reg-
ulatory networks. Particularly, we use a genome-wide mi-
croarray profiling, which shows the expression patterns of
4028 genes simultaneously measured during the develop-
10
FIG. 9. Three-dimensional persistence diagrams of one-
dimensional holes for the Drosophila melanogaster gene reg-
ulatory networks spanning from (a) t = 29 to t = 32, (b)
t = 39 to t = 42, and (c) t = 58 to t = 61. The birth-scale
and the death-scale axes of the diagrams are represented at
the logarithmic scale.
mental stages of Drosophila melanogaster [67]. Herein, 66
time points are chosen from the full developmental cycle:
embryonic stage (1 -- 30), larval stage (31 -- 40), pupal stage
(41 -- 58), and adulthood stage (59 -- 66) [68]. We use ker-
nel reweighted logistic regression method [69] to recon-
struct the time-evolving networks for 588 genes, which
are known to be related to the developmental process
based on their gene ontologies. Therefore, the networks
are reconstructed via logistic regression using only binary
information, i.e., activation or non-activation of gene ex-
pression data. For the likelihood being maximized for
network inference, a kernel weight function is employed
to obtain the dynamic networks structures with smooth
transition at adjacent time points [69].
We use the scale-variant topological features to de-
tect the transition points with respect to the topologi-
cal structure of the constructed time-evolving networks.
Consequently, the detected transition points agree with
the transition points in the dynamics of Drosophila
melanogaster. Here, the change points between the de-
velopmental stages of Drosophila melanogaster chosen in
the experiment are referred to as the transition points in
11
and tc = 31, relatively close to the experimentally known
transition time point t1 = 31. Furthermore, from the lar-
val stage to the pupal stage, and from the pupal stage to
the adulthood stage, we obtain the transition time points
in the topological structure as tc = 41 and tc = 59, re-
spectively. These points agree with the experimentally
known transition time points t2 = 41 and t3 = 59.
E. Considerations on the maximum value of the
diffusion timescale
We investigate the maximum timescale τmax to exam-
ine the length of the diffusion process must be explored.
Note that the timescale functions as a resolution parame-
ter to unravel the multi-scale and hierarchical structure of
a network. A small timescale restricts random walkers in
local interactions, which produces many communities in
the network. In contrast, a large timescale leads to a sub-
stantial contribution of long walks and therefore yields
a small number of communities because random walkers
tend to remain in these communities for a long time. This
resolution problem has been addressed in Refs. [70, 71], in
which the relevance of partitions as community structures
is characterized over timescales. Instead of characteriz-
ing the network structure at a fixed resolution, the scale-
variant topological features obtained with a sufficiently
large τmax can contain information about the network at
multiple resolutions.
Here, we study the method for determining τmax
through the spectral decomposition of the normalized
Laplacian of the network. Denoting the eigenvalues of
LrwG by λi in increasing order 0 = λ1 ≤ λ2 ≤ . . . ≤ λn,
the spectral decomposition of LrwG is expressed as follows:
LrwG =
λiθ(cid:62)
i θi,
(7)
n(cid:88)
i=1
n(cid:88)
where θi is the eigenvector associated with λi. Therefore,
the solution for Eq. (1) can be written as follows:
pG(τi) =
exp (−λiτ )uiθ(cid:62)
i θi.
(8)
i=1
From Eq. (8), each eigenvalue λi of LrwG is associated with
a decaying mode in the diffusion process with the charac-
teristic timescale τ = 1/λi. Therefore, if there are large
gaps between eigenvalues, for example if the k0 small-
est eigenvalues {λ1 = 0, . . . , λk0} are greatly separated
from the remaining eigenvalues (λk0 (cid:28) λk0+1 = λsep),
we can ignore the terms associated with {λk0+1, . . . , λn}
in Eq. (8) at τ satisfying τ λsep (cid:29) 1. Thus, there is no
significant change in the formation of clusters or loops
in the mapped point cloud PG(τ ), nor in the formation
of communities in the network at the τ -scale. There-
fore, as a heuristic method, if we consider τmax such that
τmaxλsep (cid:29) 1, the structure of the network is well char-
acterized via the scale-variant topological features.
for
Kernel Fisher discriminant
FIG. 10.
ratio κ calcu-
lated from the three-dimensional persistence diagrams of
one-dimensional holes
the time-evolving Drosophila
melanogaster gene regulatory networks. Transition time
points are detected in the sliding windows spanning between
two different developmental stages. In each window, the tran-
sition time point tc is the time index of the maximum κ value
marked with the orange point of the dashed line. (a) Win-
dows from the embryonic stage to the larval stage with time
points 26 → 36 (tc = 28), 27 → 37 (tc = 28), and 28 → 38
(tc = 31). (b) Windows from the larval stage to the pupal
stage with time points 36 → 46 (tc = 41), 37 → 47 (tc = 41)
and 38 → 48 (tc = 41). (c) Windows from the pupal stage
to the adulthood stage with time points 54 → 64 (tc = 59),
55 → 65 (tc = 59) and 56 → 66 (tc = 59).
the dynamics: t1 = 31 between the embryonic stage and
the larval stage, t2 = 41 between the larval stage and the
pupal stage, and t3 = 59 between the pupal stage and
the adulthood stage. For the network of each time point,
three-dimensional persistence diagrams are computed for
one-dimensional holes with τ1 = 1, . . . , τ100 = 100. Fig-
ure 9 shows the examples of the diagrams for networks
spanning from (a) t = 29 to t = 32, (b) t = 39 to
t = 42, and (c) t = 58 to t = 61. Here, note the
transformation of the patterns in scale-variant topologi-
cal features along with time points. Such patterns trans-
formation corresponds with the transformation in the
topological structure of time-evolving reconstructed net-
works. Moreover, we quantify the transition points with
respect to the topological structure by observing the slid-
ing windows spanning two different developmental stages
of Drosophila melanogaster. In each sliding window, we
compute the kernel Fisher discriminant ratio [36] for each
time point from the three-dimensional persistence dia-
grams of the networks (see Appendix D). The time point
of the maximum ratio can be identified as the transi-
tion time point tc in each window (Fig. 10). From the
embryonic stage to the larval stage, we obtain the tran-
sition time points in the topological structure as tc = 28
=28 =28 =31 =41 =41 =41 =59 =59 =59 272829303132333435362829303132333435363737385556575859606162635464565758596061626364655657585960616263646566553738394041424344453646373839404142434445463839404142434445464747482728293031323334352636Here, we verify the above consideration by distinguish-
ing the network of the Barab´asi -- Albert (BA) growth
model [72] with its configuration network. The network
is initialized with m0 nodes and no edges. At each time
step, each new node is added with no more than m0
links to the existing nodes in the network. The proba-
bility that a new node is connected to an existing node
is proportional to the degree of the existing node. Note
that both the BA networks and their configuration net-
works have a scale-free property with degree exponent
3. We set the number of nodes to 128, vary the num-
ber of initial nodes m0 = 1, 2, . . . , 50, and generate 10
networks via this process for each value of m0. The 10
networks generated at each m0 are split into two parts,
with five networks for training and the remaining five
for testing. Figure 11 depicts eigenvalues λk such that
0.0 ≤ λk ≤ 0.5 for (a) BA networks and (b) scale-free
configuration networks. The colors of the points corre-
spond to values of m0 = 1, 2, 3, 4, 5, 6. From Fig. 11,
we can identify the value of λsep to separate the eigen-
values for each network. The smallest λsep values for
sep ≈ 0.18
BA networks and configuration networks are λBA
sep ≈ 0.16, respectively. Therefore, τmax should
and λconf
sep (cid:29) 1, for instance,
be set to τmaxλBA
τmaxλBA
For each τmax in {5, 10, 15, . . . , 95, 100}, we com-
pute three-dimensional persistence diagrams of one-
dimensional holes with τ1 = 1, τ2 = 2, τ3 = 3, . . . , τK =
τmax. The line in Fig. 12 depicts the average test accuracy
over 100 random train-test splits at each value of τmax.
The shaded area indicates the confidence intervals of one
standard deviation calculated using the ensemble of runs.
In general, increasing τmax serves to increase classifica-
tion accuracy because the diffusion process gathers more
information about the network structure. There is a
transition in classification accuracy with large deviations
when τmax increases from 30 to 40. To demonstrate this
transition in more detail, we plot τmax = 20, 21, . . . , 49, 50
in the inset of Fig. 12. For τmax < 30, only microscale
structures are considered in the features, which has a
small effect on the differences between networks. The
transition occurs when the mesoscale structures are con-
sidered. For τmax > 40, the deviation is reduced as the
mesoscale structures are revealed. For sufficiently large
τmax (τmax ≥ 65), the method achieves high accuracy in
the range of 94% to 94.5%. This observation agrees with
the above-mentioned heuristic for determining τmax.
sep > 10, or τmax ≥ 65.
sep (cid:29) 1 and τmaxλconf
sep > 10 and τmaxλconf
IV. CONCLUDING REMARKS AND
DISCUSSION
Our study mainly aimed to represent the variation of
topological scales, capture the nondyadic interactions,
and provide robustness against noise in characterizing
the structure of complex networks. Here, we proposed
a general framework for constructing the scale-variant
topological features from the diffusion process exhibited
12
FIG. 11. Eigenvalues λk such that 0 ≤ λk ≤ 0.5 for (a)
Barab´asi -- Albert (BA) networks and (b) scale-free configura-
tion networks. The colors of the points correspond to values of
m0 = 1, 2, 3, 4, 5, 6 (number of initial nodes in the BA growth
model). The value of λsep to effectively separate eigenvalues
is identified for each network. The smallest λsep values for
sep ≈ 0.18
the BA networks and configuration networks are λBA
and λconf
sep ≈ 0.16, respectively, as marked.
FIG. 12. Classification of networks generated from Barab´asi --
Albert models with their configuration networks using scale-
variant topological features. The line depicts the average test
accuracy over 100 random train-test splits at each value of
τmax. The shaded area indicates the confidence intervals of
one standard deviation calculated using the same ensemble
of runs. The inset highlights the transition in accuracy over
τmax = 20 -- 50.
in networks. The scale-variant topological features do
not directly correspond to the common statistical mea-
sures that are constructed from the dyadic interactions
between nodes at a single fixed topological scale. Rather,
our features encode the information of both dyadic and
nondyadic interactions in networks at variant topological
scales.
In the networks classification, our features acted as
strong factors to identify the networks. Theoretically, we
derived a strong mathematical guarantee for the robust-
ness of these features with respect to the perturbations
applied to the networks. Through several experiments,
we provided an empirical evidence for the effectiveness
of these features in applications, such as classification
of real-world networks and detection of transition points,
with respect to the topological structure in time-evolving
networks. The results suggested that the observation of
the topological features induced from the network dy-
namics over variant scales can characterize the struc-
ture and provide important insights for understanding
the functionality of networks.
In our experiments, the scale-variant topological fea-
tures were constructed from zero-dimensional and one-
dimensional holes.
In principle, we can compute the
features from higher-dimensional holes that represent
nondyadic interactions,
involving a larger number of
nodes in each interaction. However, to investigate the
features from high-dimensional holes, the Vietoris -- Rips
filtration used in our study can consist of a large number
of simplices. More precisely, to consider l-dimensional
holes, the Vietoris -- Rips filtration has size O(N l+2) of the
number of simplices. Herein, N is the number of nodes
in the network. This observation shows the difficulty of
using the features from l-dimensional holes (l ≥ 2) for
networks with a large number of nodes. On the contrary
and as demonstrated in this paper, we found it sufficient
to use l-dimensional holes with l = 0, 1 in practical appli-
cations. Furthermore, one can replace the Vietoris -- Rips
filtration with the Witness filtration [73] or the approx-
imation of the Vietoris -- Rips filtration [74] for more ef-
ficient computations. We employed recent algorithmic
improvements to efficiently compute the persistent di-
agrams with the core implementation referenced from
Ripser libary [75].
Another point to discuss is the selection of the maxi-
mum diffusion timescale. In our experiments, our method
was only tested for small and medium-sized networks
with less than 5,000 nodes per network. For larger net-
works, a longer diffusion timescale must be explored.
This consideration will increase the computational cost
of computing persistence diagrams and the kernel. How-
ever, this limitation can be mitigated by increasing the
sampling interval to take discrete values of the timescale
while keeping the maximum timescale sufficiently large.
It is also possible to study the process of taking values
of timescales based on the spectral decomposition of the
normalized Laplacian of the network.
Our study is motivated by Ref. [26], in which the dif-
fusion geometry from the diffusion process is used to re-
veal functional clusters in a network. Based on random
walk dynamics, the diffusion distance between a pair of
nodes in a network is defined and averaged in a range of
timescales to model the underlying geometry of the net-
work. However, the variation in network structure over
the diffusion timescale is not discussed. In Ref. [71], a
random walk process corresponding to the natural dy-
namics of a system focuses on recovering dynamically
meaningful communities in the network. Our approach
involves a diffusion process similar to that mentioned in
Refs. [26, 71]; however, it mainly focuses on the system-
atic representation of networks via topological data anal-
ysis by tracking the variation of the topological structures
along timescales of the diffusion process.
In general, our study presented a unified analysis of
complex networks. This study paves several opportuni-
ties for designing effective algorithms in network science,
such as an investigation of more complicated network
13
structures. For instance, we can employ our framework
to study different aspects of multiplex networks, or to
study the structural reducibility of a multilayer network
while preserving its dynamics and function.
V. ACKNOWLEDGMENTS
This work was supported by Ministry of Education,
Culture, Sports, Science and Technology (MEXT) KAK-
ENHI Grants No. JP16K00325 and No. JP19K12153.
Appendix A: Construction of Vietoris -- Rips
filtration of a network
We define and describe in Fig. 13 the process of ex-
tracting topological features of a complex network at each
specific timescale τ . At each τ , we calculate the diffu-
sion distance matrix ∆τ of size N × N , whose element
∆ij is the Euclidean distance between points pG(τi) and
pG(τj) [Fig. 13(a)]. If ε = 0, the nodes of the network
can be considered discrete points. As we increase ε, new
pairwise connections and simplices may appear when ε
meets each value of ∆ij. We obtain a filtration as a se-
quence of embedded simplicial complexes. Hole patterns
such as connected components (zero-dimensional holes)
or loops (one-dimensional holes) can appear or disappear
over this filtration. For instance, in Fig. 13(b), at ε = 0,
we have six separated nodes considered as six separated
connected components, but at ε = 0.407, three nodes are
connected with each other; thus, two connected compo-
nents disappear at this scale. We can describe these pat-
terns as two blue bars started at scale 0 and ended at scale
0.407. The same explanation with the red bar started at
scale 0.428 and ended at scale 0.430, which represents the
emergence of loop pattern (v1 → v2 → v3 → v5 → v1)
at ε = 0.428 and the disappearance at ε = 0.430. Fig-
ure 13(c) illustrates the corresponding persistence dia-
grams for zero-dimensional holes and one-dimensional
holes, where the birth-scale and the death-scale are rep-
resented for the values of ε at the emergence and the
disappearance of the holes.
Appendix B: Proof of the stability of the
scale-variant topological features
We prove the result in Eq. (4). First, we introduce
the concept of the bottleneck distance between two two-
dimensional diagrams. Let X and Y be finite sets of
points embedded in the Euclidean space Rn. Denote their
two-dimensional persistence diagrams for l-dimensional
holes as S (2)
(l) (Y ), respectively. We consider
all matchings, γ, such that a point on one diagram is
matched to a point on the other diagram or to its pro-
jection on the line b = d in two-dimensional space. The
(l) (X) and S (2)
14
FIG. 13. An exemplary of Vietoris -- Rips filtration constructed from a complex network G at a specific timescale τ (τ = 1
in this example). We map nodes v1, . . . , vN of the network G to a point cloud of N points pG(τ1), . . . , pG(τN ) through a
diffusion dynamics described by the random walk Laplacian LrwG . (a) Diffusion distance matrix ∆τ of size N ×N , whose element
∆ij is the Euclidean distance between points pG(τi) and pG(τj). (b) A complex is built over a set of points if the pairwise
distances between them are less than or equal to a threshold parameter ε. If ε = 0, we have the discrete points. As ε takes the
increasing sequence values of diffusion distance ∆ij, the hole patterns such as connected components (zero-dimensional hole)
or loops (one-dimensional hole) can appear or disappear over this filtration. The lifetime of these hole patterns are described
as blue bars (for zero-dimensional holes) and red bars (for one-dimensional holes). These bars begin at the values of ε when the
holes appear, then end at values when the holes disappear. (c) The corresponding persistence diagrams for zero-dimensional
and one-dimensional holes. The birth-scale and the death-scale are represented for the values of ε at the emergence and the
disappearance of the holes.
B between S (2)
(l) (X) and S (2)
bottleneck distance d(2)
(l) (Y ) is
defined as the infimum of the longest matched infinity-
norm distance over all matchings, γ:
B (S (2)
d(2)
(cid:107)q(1) − q(2)(cid:107)∞.
(B1)
Here, (cid:107)q(1)−q(2)(cid:107)∞ = max (b1 − b2,d1 − d2) for which
q(1) = (b1, d1) and q(2) = (b2, d2).
(l) (X),S (2)
(l) (Y )) = inf
γ
(q(1),q(2))∈γ
max
The bottleneck distance between the two-dimensional
persistence diagrams satisfies the following inequal-
ity [33]:
where dH(X, Y ) is the Hausdorff distance given as
(l) (Y )) ≤ 2dH(X, Y ),
B (S (2)
(l) (X),S (2)
d(2)
(cid:26)
(B2)
(cid:27)
dH(X, Y ) = max
max
x∈X
min
y∈Y
d(x, y), max
y∈Y
min
x∈X
d(x, y)
.
(B3)
Here, d(x, y) is the Euclidean distance between two
points x, y in Rn.
Given two three-dimensional persistence diagrams as
E and F , consider all matchings ψ such that a point
on one diagram is matched to a point on the other di-
agram or to its projection on the plane b = d. For
each pair (q(1), q(2)) ∈ ψ for which q(1) = (b1, d1, τ1)
and q(2) = (b2, d2, τ2), we define the relative infinity-
norm distance between q(1) and q(2) as d(∞)
(q(1), q(2)) =
max (b1 − b2,d1 − d2, ξτ1 − τ2), where ξ is a positive
rescaling coefficient introduced to adjust the scale differ-
ence between the point-wise distance and time. The bot-
tleneck distance, d(3)
B,ξ(E, F ), is defined as the infimum of
the longest matched relative infinity-norm distance over
all matchings ψ:
ξ
d(3)
B,ξ(E, F ) = inf
ψ
max
(q(1),q(2))∈ψ
d(∞)
ξ
(q(1), q(2)).
(B4)
For each τ ∈ T and two networks G,H with the same
number N of nodes, we first prove the following inequal-
ity:
d(2)
B (D(2)
(l),τ (G), D(2)
(l),τ (H)) ≤ 2τ(cid:107)LrwG − LrwH (cid:107)2.
(B5)
l,τ (G)
l,τ (H) are calculated for l-dimensional holes from
Here, two two-dimensional persistence diagrams D(2)
and D(2)
2 10∞0.4280.43000.4070.4100.4250.4280.4070.4070.4100.4250.4280.4070.4280.43000.4070.4100.4250.4280.4070.4280.43000.4070.4100.4250.4280.4070.4280.43000.4070.4100.4250.4280.40700.4070.4100.4250.4280.40700.4070.4100.4250.40700.4070.4100.40700.4070.4070.0000.4070.0000.5650.5400.4250.4100.4450.0000.5650.4450.4250.0000.4070.4330.4280.5400.0000.0000.4300.428 3 4 5 6 =0 =0.407 =0.410 =0.425 =0.428 =0.430 =0.433 =0.445 =0.540 =0.5650.4280.430two point clouds PG(τ ) = {pG(τ1), . . . , pG(τN )} and
PH(τ ) = {pH(τ1), . . . , pH(τN )}, respectively.
S(l)(PH(τ )), we apply Eq. (B2) to have
15
d(2)
B (D(2)
(l),τ (G), D(2)
(l),τ (H)) = d(2)
B (S(l)(PG(τ )),S(l)(PH(τ )))
(B6)
≤ 2dH(PG(τ ), PH(τ )).
Since D(2)
(l),τ (G) = S(l)(PG(τ )) and D(2)
(l),τ (H) =
From the definition of the Hausdorff distance, we have
(cid:26)
(cid:26)
dH(PG(τ ), PH(τ )) = max
≤ max
max
i
min
j
d(pG(τi), pH(τj)), max
j
min
i
d(pG(τi), pH(τj)))
d(pG(τi), pH(τi)), max
j
max
i
d(pG(τj), pH(τj))
d(pG(τi), pH(τi)).
= max
i
(cid:27)
(cid:27)
(B7)
(B8)
Since pG(τi) = ui exp(−τ LrwG ) and pH(τi) =
ui exp(−τ LrwH ), we have
d(pG(τi), pH(τi)) = (cid:107)ui(e−τ LrwG − e−τ LrwH )(cid:107)2
≤ (cid:107)ui(cid:107)2(cid:107)e−τ LrwG − e−τ LrwH (cid:107)2
= (cid:107)e−τ LrwG − e−τ LrwH (cid:107)2.
(B9)
(B10)
(B11)
We write the difference of the matrix exponential in terms
of an integral [32],
γ , q(2)
γ ) ∈ γ, where q(1)
(q(1), q(2)) ∈ ψ, then q(1) = (b1, d1, τ ), q(2) = (b2, d2, τ ),
and (q(1)
γ = (b2, d2)
and γ ∈ Λ ∩ Γτ . Let Γ be a set of all matchings ψ con-
structed this way. From the definition of the bottleneck
distance, we have the following inequality:
γ = (b1, d1), q(2)
d(3)
B,ξ(D(3)
(l) (G), D(3)
(l) (H)) ≤ inf
ψ∈Γ
For (q(1), q(2)) ∈ ψ, we have
d(∞)
ξ
(cid:13)(cid:13)(cid:13)(cid:13)2
(B12)
max
(q(1),q(2))∈ψ
d(∞)
ξ
(q(1), q(2)).
(B17)
(cid:107)e−τ LrwG − e−τ LrwH (cid:107)2 =
≤
(cid:13)(cid:13)(cid:13)(cid:13)(cid:90) τ
(cid:90) τ
0
0
≤ (cid:107)E(cid:107)2
(cid:90) τ
0
e−LrwG (τ−t)Ee−LrwH tdt
(cid:107)e−LrwG (τ−t)Ee−LrwH t(cid:107)2dt
(B13)
(cid:107)e−LrwG (τ−t)(cid:107)2(cid:107)e−LrwH t(cid:107)2dt,
(cid:90) τ
(B14)
where E = LrwG − LrwH . We know that −LrwG is a negative
semi-definite matrix with the largest eigenvalue equal to
0. It implies that the largest eigenvalue of e−LrwG (τ−t) is
equal to 1, and hence (cid:107)e−LrwG (τ−t)(cid:107)2 = 1. We obtain the
same result with −LrwH , i.e., (cid:107)e−LrwH t(cid:107)2 = 1. Then, from
Eq. (B11) and Eq. (B14), we have
d(pG(τi), pH(τi)) ≤ (cid:107)E(cid:107)2
(B15)
= τ(cid:107)E(cid:107)2 = τ(cid:107)LrwG − LrwH (cid:107)2. (B16)
From Eq. (B6), Eq. (B8) and Eq. (B16), we have the
result in Eq. (B5).
1dt
0
Let Γτ be the set of matchings defined in Eq. (B1)
between two two-dimensional persistence diagrams
(l),τ (G) and D(2)
D(2)
For each collection Λ =
{γ1, γ2, . . . , γK γi ∈ Γτi, i = 1, 2, . . . , K}, we construct
the matching ψ between two three-dimensional persis-
(l) (H), such that, for each
tence diagrams D(3)
(l) (G) and D(3)
(l),τ (H).
(q(1), q(2)) = max{b1 − b2,d1 − d2, ξτ − τ}
= max{b1 − b2,d1 − d2}
= (cid:107)q(1)
γ − q(2)
γ (cid:107)∞,
(B18)
(B19)
(B20)
and Eq. (B17) becomes
d(3)
B,ξ(D(3)
(l) (G), D(3)
(l) (H)) ≤ max
τ∈T inf
γ∈Γτ
max
γ ,q(2)
γ )∈γ
(q(1)
γ (cid:107)∞
(cid:107)q(1)
γ − q(2)
(B21)
= max
τ∈T d(2)
B (D(2)
(l),τ (G), D(2)
(l),τ (H)).
From Eq. (B5) and Eq. (B22), we obtain Eq. (4) in the
main text, which is the stability property of our scale-
variant features.
(B22)
Appendix C: Selecting parameters for the kernel
In the kernel Kσ,ξ defined in Eq. (5), we set the
rescale coefficient to ξ = σ and present here a heuris-
tic method to select the bandwidth σ. Given the ker-
nel values calculated from the three-dimensional persis-
(l),2, . . . , D(3)
(l),1, D(3)
tence diagrams D(3)
(l),M of l-dimensional
s = median{(bi − bj)2 + (di − dj)2
holes, we denote σ2
(l),s} with s = 1, 2, . . . , M . We
(bi, di, τi), (bj, dj, τj) ∈ D(3)
s s = 1, . . . , M} such that 2σ2
set σ as σ2 =
takes values close to many (bi − bj)2 + (di − dj)2 values.
median{σ2
1
2
Appendix D: Kernel Fisher discriminant ratio
(l),1, D(3)
Consider a collection of three-dimensional diagrams
(l),2, . . . , D(3)
D(l) = {D(3)
(l),M} of l-dimensional holes.
Since Kσ,ξ is a positive-definite kernel on D(l) [31], there
exists a Hilbert space Hb and a mapping Φ : D(l) −→ Hb
such that for E ∈ D(l), Φ maps E to a function ΦE ∈ Hb
that satisfies
∀E, F ∈ D(l),Kσ,ξ(E, F ) = (cid:104)ΦE, ΦF(cid:105)Hb .
(D1)
Here, Hb is a real inner product space of function f :
D(l) −→ R, and thus, is a complete metric space with
respect to the distance induced by the inner product
(cid:104)·,·(cid:105)Hb .
Given an index s > 1, the kernel Fisher discriminant
ratio κM,s(D(l)) is a statistical quantity to measure the
dissimilarity between two classes assumptively defined by
two sets of diagrams having index before and from s [36].
The corresponding empirical mean and covariance func-
tions in Hb associated with the data in D(l) having index
before and from s are defined as
s−1(cid:88)
s−1(cid:88)
i=1
i=1
µ1 =
Σ1 =
1
s − 1
1
s − 1
µ2 =
Σ2 =
1
1
M − s + 1
M − s + 1
,
(l),i
ΦD(3)
(l),i
ΦD(3)
(cid:26)
M(cid:88)
M(cid:88)
i=s
i=s
(cid:26)
(cid:27)
⊗
− µ1
− µ1
ΦD(3)
(l),i
(cid:27)
(D2)
, (D3)
ΦD(3)
(l),i
,
(cid:26)
− µ2
ΦD(3)
(l),i
(cid:27)
(cid:26)
⊗
− µ2
ΦD(3)
(l),i
(D4)
(cid:27)
16
We set η = 10−1, 10−1, 10−5 in the experiments
of the Girvan -- Newman (GN) network, Lancichinetti --
Fortunato -- Radicchi
(LFR) network and Drosophila
melanogaster network, respectively.
Appendix E: Common measures for a network
For each network, we calculate the following 18 com-
mon measures: the density (the ratio of the existing to
the possible edges), the transitivity [13] (the proportion
of triangles), the diameter (the maximum eccentricity),
the radius (the minimum eccentricity), the degree as-
sortativity coefficient [47], the global efficiency [46], the
number of connected parts, the average clustering coeffi-
cient, the average number of triangles that include a node
as a vertex, the average local efficiency [46], the average
edge betweenness centrality [48], the average node be-
tweenness centrality [45], the average node closeness cen-
trality [45], the average eccentricity, the average short-
est paths, the average degree centrality [45], the maxi-
mum modularity which is obtained by Louvain heuris-
tic [37, 43], and the average of global mean first-passage
times of random walks on the network [76]. We normal-
ize the measures in the range of [0, 1] using the min-max
normalization (i.e. f∗ = (f∗ − fmin)/(fmax − fmin), where
fmin, fmax are the minimum and the maximum values of
a measure in the data).
Appendix F: Graph kernel methods
We describe the graph kernel methods used in the main
text. The implementations of these graph kernels can be
found in Ref. [49].
1. Random walk kernels
.
(D5)
Here, f ⊗ g for two functions f, g ∈ Hb is defined for all
functions h ∈ Hb as (f ⊗ g)h = (cid:104)g, h(cid:105)Hb
The kernel Fisher discriminant ratio κM,s(D(l)) is de-
f .
fined as
κM,s(D(l))
(s − 1)(M − s + 1)
=
M
(cid:68)
µ2 − µ1, ( Σ + ηI)−1(µ2 − µ1)
(cid:69)
,
Hb
(D6)
where η is a regularization parameter and Σ =
M − s + 1
Σ2. Here, the index s achieving the maxi-
mum of κM,s(D(l)) corresponds to the estimated transi-
tion point.
Σ1 +
M
s − 1
M
The random walk graph kernels measure the simi-
larity between a pair of graphs based on the number
of equal-length walks in two graphs. Given two unla-
beled graphs G and G(cid:48) with their vertex and edge sets
as (V,E) and (V(cid:48),E(cid:48)), respectively, the direct product
graph G× = (V×,E×) of G and G(cid:48) is a graph with the
node set V× = {(v, v(cid:48)) v ∈ V, v(cid:48) ∈ V(cid:48)} and the edge set
E× = {((va, v(cid:48)
Kk× defined as
The KStepRW kernel is the k-step random walk kernel
b) ∈ E(cid:48)}.
a), (vb, v(cid:48)
a, v(cid:48)
b)) (va, vb) ∈ E, (v(cid:48)
V×(cid:88)
(cid:2)λmW m×(cid:3)
k(cid:88)
Kk×(G,G(cid:48)) =
ij ,
(F1)
i,j=1
m=0
where W× is a weight matrix of G× and λ0, . . . , λk is a
sequence of positive, real-valued weights. In our experi-
ments, we set k = 2 and λ0 = λ1 = λ2 = 1.0.
GeometricRW kernel is a specific case of the k-step ran-
dom walk kernel, when k goes to infinity and the weights
are the geometric series, i.e., λm = λm (λ = 0.05 in our
experiments). The GeometricRW kernel is defined as
V×(cid:88)
∞(cid:88)
(cid:2)λmW m×(cid:3)
ij =
V×(cid:88)
(cid:2)(I − λW×)−1(cid:3) ,
KGR(G,G(cid:48)) =
i,j=1
m=0
i,j=1
(F2)
where I is an identity matrix of size V× × V×.
ExponentialRW kernel is a specific case of the k-step
random walk kernel, when k goes to infinity and the
weights are the exponential series, i.e., λm = βm
m! (β = 0.1
in our experiments). The ExponentialRW kernel is de-
fined as
V×(cid:88)
∞(cid:88)
(cid:20) (βW×)m
(cid:21)
i,j=1
m=0
m!
V×(cid:88)
(cid:2)eβW×(cid:3)
ij .
=
ij
i,j=1
KEX(G,G(cid:48)) =
17
size-k graphlets, where Nk denotes the number of unique
graphlets of size k. For an unlabeled graph G (the graph
does not contain attributes for nodes), we define a vec-
tor fG of length Nk such that the ith component of fG
denotes the frequency of graphlet Gi appearing as a sub-
graph of G. Given two unlabeled graphs G and G(cid:48), the
graphlet kernel is defined as
KGK(G,G(cid:48)) = (cid:104)fG, fG(cid:48)(cid:105),
(F5)
where (cid:104)·,·(cid:105) represents the Euclidean dot product. We set
k = 4 for MUTAG, BZR, DHFR and FRANKENSTEIN
datasets and k = 3 for the other datasets.
(F3)
4. Weisfeiler -- Lehman kernel
2. ShortestPath kernel
ShortestPath kernel compares all pairs of the shortest
path lengths from G and G(cid:48) defined as
KSP(G,G(cid:48)) =
(cid:88)
(cid:88)
δ(d(vi, vj), d(v(cid:48)
k, v(cid:48)
l)), (F4)
l∈G(cid:48)
vi,vj∈G
v(cid:48)
k,v(cid:48)
k, v(cid:48)
where d(vi, vj) and d(v(cid:48)
l) are the lengths of the short-
est path between nodes vi and vj in G, and the shortest
l in G(cid:48), respectively. Here,
k and v(cid:48)
path between nodes v(cid:48)
δ(x, y) = 1 if x = y, and 0 if x (cid:54)= y.
Weisfeiler -- Lehman kernel decomposes a graph into its
subtree patterns and compares these patterns in two
graphs. For an unlabeled graph G, all vertexes v of G
are initialized with label ϕ(v) = 0. We iterate over each
vertex v and its neighbour to create a multiset label as
ϕ(i)(v) such that ϕ(1)(v) = ϕ(v), and ϕ(i) with i > 1 is
defined as ϕ(i)(v) = (ϕ(i)(v), Q(i−1)
is the
sorted labels of v's neighbours. To measure the similarity
between graphs, we count the co-occurrences of the labels
in both graphs for h iterations with the kernel defined as
), where Q(i−1)
v
v
KWL(G,G(cid:48)) = (cid:104)1G, 1G(cid:48)(cid:105).
(F6)
3. Graphlet kernel
A size-k graphlet is an induced and non-isomorphic
sub-graph of size k. Let Sk = {G1, . . . , GNk} be a set of
Here, 1G is the vector concatenation of h vertex label
histograms 1(1)G , . . . , 1(h)G
in h iterations. We set h = 5 in
our experiments.
[1] D. Taylor, F. Klimm, H. A. Harrington, M. Kram´ar,
K. Mischaikow, M. A. Porter, and P. J. Mucha, Nat.
Commun. 6, 7723 (2015).
[8] I. Barnett and J.-P. Onnela, Sci. Rep. 6, 18893 (2016).
[9] W. Bao and G. Michailidis, Sci. Rep. 8, 12938 (2018).
[10] Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann, Nature 466,
[2] J. G. T. Zanudo, G. Yang, and R. Albert, Proc. Natl.
761 (2010).
Acad. Sci. USA 114, 7234 (2017).
[11] R. F. Betzel and D. S. Bassett, Neuroimage 160, 73
[3] M. Santolini and A.-L. Barab´asi, Proc. Natl. Acad. Sci.
(2017).
USA 115, E6375 (2018).
[12] R. E. Boulos, N. Tremblay, A. Arneodo, P. Borgnat, and
[4] K. Sun, J. P. Gon¸calves, C. Larminie, and N. Przulj,
B. Audit, BMC Bioinformatics 18, 209 (2017).
BMC Bioinformatics 15, 304 (2014).
[13] L. d. F. Costa, F. A. Rodrigues, G. Travieso, and P. R.
[5] A. Calderone, M. Formenti, F. Aprea, M. Papa, L. Al-
berghina, A. M. Colangelo, and P. Bertolazzi, BMC Syst.
Biol. 10, 25 (2016).
[6] T. A. Schieber, L. Carpi, A. D´ıaz-Guilera, P. M. Parda-
los, C. Masoller, and M. G. Ravetti, Nat. Commun. 8,
13928 (2017).
[7] L. Carpi, P. Saco, O. Rosso, and M. Ravetti, Eur. Phys.
Villas Boas, Adv. Phys. 56, 167 (2007).
[14] M. E. J. Newman, Networks: An Introduction (Oxford
Univ. Press, New York, NY, USA, 2010).
[15] A. Arenas, A. D´ıaz-Guilera, and C. J. P´erez-Vicente,
Phys. Rev. Lett. 96, 114102 (2006).
[16] M. Sales-Pardo, R. Guimera, A. A. Moreira, and L. A. N.
Amaral, Proc. Natl. Acad. Sci. USA 104, 15224 (2007).
J. B 85, 389 (2012).
18
[17] A. Lancichinetti, S. Fortunato, and J. Kert´esz, New J.
[49] M. Sugiyama, M. E. Ghisu, F. Llinares-L´opez,
and
Phys. 11, 033015 (2009).
[18] N. Tremblay and P. Borgnat, IEEE Trans. Signal Pro-
cess. 62, 5227 (2014).
[19] S. A. Marvel, J. Kleinberg, R. D. Kleinberg, and S. H.
Strogatz, Proc. Natl. Acad. Sci. USA 108, 1771 (2011).
[20] A. van der Schaft, S. Rao, and B. Jayawardhana, SIAM
J. Appl. Math. 73, 953 (2013).
[21] M. W. Reimann, M. Nolte, M. Scolamiero, K. Turner,
R. Perin, G. Chindemi, P. D(cid:32)lotko, R. Levi, K. Hess, and
H. Markram, Front. Comput. Neurosci. 11, 48 (2017).
[22] M. A. de Menezes and A.-L. Barab´asi, Phys. Rev. Lett.
92, 028701 (2004).
[23] A.-L. Barab´asi et al., Network science (Cambridge Univ.
Press, Cambridge, 2016).
[24] A. D. Broido and A. Clauset, Nat. Commun. 10, 1017
(2019).
[25] G. Carlsson, Bull. Amer. Math. Soc. 46, 255 (2009).
[26] M. De Domenico, Phys. Rev. Lett. 118, 168301 (2017).
[27] H. Edelsbrunner, D. Letscher, and A. Zomorodian, Dis-
crete Comput. Geom. 28, 511 (2002).
[28] A. Zomorodian and G. Carlsson, Discrete Comput.
Geom. 33, 249 (2005).
[29] H. Edelsbrunner and J. Harer, Computational Topology.
An Introduction (American Mathematical Society, Prov-
idence, RI, 2010).
[30] T. Kaczynski, K. Mischaikow, and M. Mrozek, Compu-
tational homology, Vol. 157 (Springer, 2006).
[31] Q. H. Tran and Y. Hasegawa, Phys. Rev. E 99, 032209
(2019).
K. Borgwardt, Bioinformatics 34, 530 (2017).
[50] H. Kashima, K. Tsuda, and A. Inokuchi, in Proceedings
of the 20th International Conference on Machine Learn-
ing, edited by T. Fawcett and N. Mishra (AAAI Press,
Washington, DC, USA, 2003) pp. 321 -- 328.
[51] T. Gartner, P. Flach, and S. Wrobel, in Learning The-
ory and Kernel Machines, edited by B. Scholkopf and
M. K. Warmuth (Springer Berlin Heidelberg, Berlin, Hei-
delberg, 2003) pp. 129 -- 143.
[52] K. M. Borgwardt and H.-P. Kriegel, in Proceedings of
the 5th IEEE International Conference on Data Mining
(IEEE Computer Society, Washington, DC, USA, 2005)
pp. 74 -- 81.
[53] K. M. Borgwardt, T. Petri, S. Vishwanathan, and H.-P.
Kriegel, in Proceedings of the 3rd International Workshop
on Mining and Learning with Graphs, edited by P. Fras-
coni, K. Kersting, and K. Tsuda (MLG, Firence, Italy,
2007).
[54] N. Shervashidze, P. Schweitzer, E. J. v. Leeuwen,
K. Mehlhorn, and K. M. Borgwardt, J. Mach. Learn.
Res. 12, 2539 (2011).
[55] Q. H. Tran, V. T. Vo,
and Y. Hasegawa, "Scale-
variant topological information," https://github.com/
OminiaVincit/scale-variant-topo, GitHub Reposi-
tory.
[56] A. K. Debnath, R. L. Lopez de Compadre, G. Debnath,
A. J. Shusterman, and C. Hansch, J. Med. Chem. 34,
786 (1991).
[57] J. J. Sutherland, L. A. O'brien, and D. F. Weaver, J.
[32] G. H. Golub and C. F. Van Loan, Matrix computations,
Chem. Inf. Comput. Sci. 43, 1906 (2003).
4th ed. (JHU Press, Baltimore, MD, USA, 2012).
[58] J. Kazius, R. McGuire, and R. Bursi, J. Med. Chem. 48,
[33] F. Chazal, V. de Silva, and S. Oudot, Geometriae Ded-
312 (2005).
icata 173, 193 (2014).
[34] J. Reininghaus, S. Huber, U. Bauer, and R. Kwitt, in
Proceedings of the 28th IEEE Conference on Computer
Vision and Pattern Recognition (IEEE, Boston, MA,
USA, 2015) pp. 4741 -- 4748.
[35] N. Aronszajn, Trans. Am. Math. Soc. 68, 337 (1950).
[36] Z. Harchaoui, E. Moulines, and F. R. Bach, in Advances
in Neural Information Processing Systems 21 , edited by
D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou
(Curran Associates, Inc., Red Hook, NY, 2009) pp. 609 --
616.
[37] M. E. J. Newman and M. Girvan, Phys. Rev. E 69,
026113 (2004).
[38] A. Lancichinetti, S. Fortunato, and F. Radicchi, Phys.
Rev. E 78, 046110 (2008).
[39] A. Lancichinetti and S. Fortunato, Phys. Rev. E 80,
016118 (2009).
[40] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998).
[41] P. Erdos and A. R´enyi, Publ. Math. 6, 290 (1959).
[42] M. E. J. Newman, S. H. Strogatz, and D. J. Watts, Phys.
Rev. E 64, 026118 (2001).
[43] V. D. Blondel, J.-L. Guillaume, R. Lambiotte,
and
E. Lefebvre, J. Stat. Mech.: Theory Exp. 2008, P10008
(2008).
[44] C. M. Bishop, Pattern Recognition and Machine Learn-
ing (Springer-Verlag, Berlin, Heidelberg, 2006).
[45] L. C. Freeman, Soc. Networks 1, 215 (1978).
[46] V. Latora and M. Marchiori, Phys. Rev. Lett. 87, 198701
(2001).
[47] M. E. J. Newman, Phys. Rev. Lett. 89, 208701 (2002).
[48] U. Brandes, Soc. Networks 30, 136 (2008).
[59] K. M. Borgwardt, C. S. Ong, S. Schonauer, S. Vish-
wanathan, A. J. Smola, and H.-P. Kriegel, Bioinformat-
ics 21, i47 (2005).
[60] N. Wale, I. A. Watson, and G. Karypis, Knowl. Inf. Syst.
14, 347 (2008).
[61] F. Orsini, P. Frasconi, and L. De Raedt, in Proceedings of
the 24th International Joint Conference on Artificial In-
telligence, edited by Q. Yang and M. Wooldridge (AAAI
Press, Buenos Aires, Argentina, 2015) pp. 3756 -- 3762.
[62] P. Yanardag and S. Vishwanathan, in Proceedings of the
21th ACM SIGKDD International Conference on Knowl-
edge Discovery and Data Mining, edited by L. Cao,
C. Zhang, T. Joachims, G. I. Webb, D. D. Margineantu,
and G. Williams (ACM, New York, NY, USA, 2015) pp.
1365 -- 1374.
[63] K. Kersting, N. M. Kriege, C. Morris, P. Mutzel, and
M. Neumann, "Benchmark data sets for graph kernels,"
(2016), http://graphkernels.cs.tu-dortmund.de.
[64] C. Cortes, M. Mohri, and A. Rostamizadeh, J. Mach.
Learn. Res. 13, 795 (2012).
[65] M. Niepert, M. Ahmed, and K. Kutzkov, in Proceedings
of the 33rd International Conference on International
Conference on Machine Learning, Vol. 48 (JMLR.org,
2016) pp. 2014 -- 2023.
[66] Z. Zhang, M. Wang, Y. Xiang, Y. Huang, and A. Neho-
rai, in Advances in Neural Information Processing Sys-
tems 31 , edited by S. Bengio, H. Wallach, H. Larochelle,
K. Grauman, N. Cesa-Bianchi, and R. Garnett (Curran
Associates, Inc., Red Hook, NY, 2018) pp. 3964 -- 3974.
[67] M. N. Arbeitman, E. E. Furlong, F. Imam, E. Johnson,
B. H. Null, B. S. Baker, M. A. Krasnow, M. P. Scott,
R. W. Davis, and K. P. White, Science 297, 2270 (2002).
[68] J. Zhang and J. Cao, J. Am. Stat. Assoc. 112, 994 (2017).
[69] L. Song, M. Kolar, and E. P. Xing, Bioinformatics 25,
i128 (2009).
[70] J.-C. Delvenne, S. N. Yaliraki, and M. Barahona, Proc.
Natl. Acad. Sci. USA 107, 12755 (2010).
[71] R. Lambiotte, J. Delvenne,
and M. Barahona, IEEE
Trans. Netw. Sci. Eng. 1, 76 (2014).
[72] A.-L. Barab´asi and R. Albert, Science 286, 509 (1999).
[73] V. De Silva and G. Carlsson, in Proceedings of the 1st Eu-
rographics Conference on Point-Based Graphics (Euro-
graphics Association, Aire-la-Ville, Switzerland, Switzer-
land, 2004) pp. 157 -- 166.
[74] D. R. Sheehy, in Proceedings of the 28th Annual Sym-
posium on Computational Geometry (ACM, New York,
NY, USA, 2012) pp. 239 -- 248.
[75] U. Bauer, "Ripser: a lean C++ code for the computation
of Vietoris -- Rips persistence barcodes," (2017), https:
//github.com/Ripser/ripser.
[76] V. Tejedor, O. B´enichou, and R. Voituriez, Phys. Rev.
E 80, 065104(R) (2009).
19
|
1110.4925 | 2 | 1110 | 2011-10-26T18:20:50 | The Similarity between Stochastic Kronecker and Chung-Lu Graph Models | [
"cs.SI"
] | The analysis of massive graphs is now becoming a very important part of science and industrial research. This has led to the construction of a large variety of graph models, each with their own advantages. The Stochastic Kronecker Graph (SKG) model has been chosen by the Graph500 steering committee to create supercomputer benchmarks for graph algorithms. The major reasons for this are its easy parallelization and ability to mirror real data. Although SKG is easy to implement, there is little understanding of the properties and behavior of this model.
We show that the parallel variant of the edge-configuration model given by Chung and Lu (referred to as CL) is notably similar to the SKG model. The graph properties of an SKG are extremely close to those of a CL graph generated with the appropriate parameters. Indeed, the final probability matrix used by SKG is almost identical to that of a CL model. This implies that the graph distribution represented by SKG is almost the same as that given by a CL model. We also show that when it comes to fitting real data, CL performs as well as SKG based on empirical studies of graph properties. CL has the added benefit of a trivially simple fitting procedure and exactly matching the degree distribution. Our results suggest that users of the SKG model should consider the CL model because of its similar properties, simpler structure, and ability to fit a wider range of degree distributions. At the very least, CL is a good control model to compare against. | cs.SI | cs | The Similarity between Stochastic Kronecker
and Chung-Lu Graph Models∗
Ali Pinar†
C. Seshadhri‡
Tamara G. Kolda§
Abstract
1 Introduction
1
1
0
2
t
c
O
6
2
]
I
S
.
s
c
[
2
v
5
2
9
4
.
0
1
1
1
:
v
i
X
r
a
The analysis of massive graphs is now becoming a very
important part of science and industrial research. This
has led to the construction of a large variety of graph
models, each with their own advantages. The Stochastic
Kronecker Graph (SKG) model has been chosen by the
Graph500 steering committee to create supercomputer
benchmarks for graph algorithms. The major reasons
for this are its easy parallelization and ability to mirror
real data. Although SKG is easy to implement, there
is little understanding of the properties and behavior of
this model.
We show that the parallel variant of the edge-
configuration model given by Chung and Lu (referred
to as CL) is notably similar to the SKG model. The
graph properties of an SKG are extremely close to
those of a CL graph generated with the appropriate
parameters. Indeed, the final probability matrix used
by SKG is almost identical to that of a CL model. This
implies that the graph distribution represented by SKG
is almost the same as that given by a CL model. We
also show that when it comes to fitting real data, CL
performs as well as SKG based on empirical studies
of graph properties. CL has the added benefit of a
trivially simple fitting procedure and exactly matching
the degree distribution. Our results suggest that users
of the SKG model should consider the CL model because
of its similar properties, simpler structure, and ability
to fit a wider range of degree distributions. At the very
least, CL is a good control model to compare against.
∗This work was funded by the applied mathematics program
at the United States Department of Energy and performed
at Sandia National Laboratories, a multiprogram laboratory
operated by Sandia Corporation, a wholly owned subsidiary of
Lockheed Martin Corporation, for the United States Department
of Energy's National Nuclear Security Administration under
contract DE-AC04-94AL85000.
†Sandia National Laboratories, CA, [email protected]
‡Sandia National Laboratories, CA, [email protected]
§Sandia National Laboratories, CA, [email protected]
With more and more data being represented as large
graphs, network analysis is becoming a major topic
of scientific research. Data that come from social
networks, the Web, patent citation networks, and power
grid structures are increasingly being viewed as massive
graphs. These graphs usually have peculiar properties
that distinguish them from standard random graphs
(like those generated from the Erdos-R´enyi model).
Although we have a lot of evidence for these properties,
we do not have a thorough understanding of why these
properties occur. Furthermore, it is not at all clear
how to generate synthetic graphs that have a similar
behavior.
Hence, graph modeling is a very important topic
of study. There may be some disagreement as to the
characteristics of a good model, but the survey [1] gives
a fairly comprehensive list of desired properties. As
we deal with larger and larger graphs, the efficiency
and speed as well as implementation details become
deciding factors in the usefulness of a model. The
theoretical benefit of having a good, fast model is quite
clear. However, the benefits of having good models go
beyond an ability to generate large graphs, since such
models provide insight into structural properties and
the processes that generate large graphs.
The Stochastic Kronecker graph (SKG) [2, 3], a gen-
eralization of recursive matrix (R-MAT) model [4], is a
model for large graphs that has received a lot of atten-
tion. It involves few parameters and has an embarrass-
ingly parallel implementation (so each edge of the graph
can be independently generated). The importance of
this model cannot be understated -- it has been cho-
sen to create graphs for the Graph500 supercomputer
benchmark [5]. Moreover, many researchers generate
SKGs for testing their algorithms [6, 7, 8, 9, 10, 11, 12,
13, 14, 15].
Despite the role of this model in graph benchmark-
ing and algorithm testing, precious little is truly known
about its properties. The model description is quite sim-
ple, but varying the parameters of the model can have
quite drastic effects on the properties of the graphs be-
ing generated. Understanding what goes on while gen-
2
erating an SKG is extremely difficult. Indeed, merely
explaining the structure of the degree distribution re-
quires a significant amount of mathematical effort.
Could there be a conceptually simpler model that
has properties similar to SKG? A possible candidate is a
simple variant of the Erdos-R´enyi model first discussed
by Aiello, Chung, and Lu [16] and generalized by Chung
and Lu [17, 18]. The Erdos-R´enyi model is arguably the
earliest and simplest random graph model [19, 20]. The
Chung-Lu model (referred to as CL) can be viewed as
a version of the edge configuration model or a weighted
Erdos-R´enyi graph. Given any degree distribution, it
generates a random graph with the same distribution
on expectation.
(The version by Aiello et al. only
considered power law distributions.) It is very efficient
and conceptually very simple. Amazingly, it has been
overlooked as a model to generate synethetic instances,
and is not even considered as a "control model" to
compare with. (This is probably because of the strong
ties to a standard Erdos-R´enyi graph, which is well
known to be unsuitable for modeling social networks.)
A major benefit of this model is that it can provide
graphs with any desired degree distribution (especially
power law), something that SKG provably cannot do.
Our aim is to provide a detailed comparison of the
SKG and CL models. We first compare the graph prop-
erties of an SKG graph with an associated CL graph.
We then look at how these models fit real data. Our ob-
servations show a great deal of similarity between these
models. To explain this, we look directly at the proba-
bility matrices used by these models. This gives insight
into the structure of the graphs generated. We notice
that the SKG and CL matrices have much in common
and give evidence that the differences between these are
only (slightly) quantitative, not qualitative. We also
show that for some settings of the SKG parameters, the
SKG and associated CL models coincide exactly.
1.1 Notation and Background
1.1.1 Stochastic Kronecker Graph (SKG)
model The model takes as input the number of nodes
n (always a power of 2), number of edges m, and a
2 × 2 generator matrix T . We define (cid:96) = log2 n as the
number of levels. In theory, the SKG generating matrix
can be larger than 2 × 2, but we are unaware of any
such examples in practice. Thus, we assume that the
generating matrix has the form
(cid:20)t1
t3
(cid:21)
t2
t4
T =
with t1 + t2 + t3 + t4 = 1.
Each edge is inserted according to the probabilities1
defined by
P = T ⊗ T ⊗ ··· ⊗ T
.
(cid:125)
(cid:124)
(cid:123)(cid:122)
(cid:96) times
We will refer to PSKG as the SKG matrix associated
with these parameters. Observe that the entries in PSKG
sum up to 1, and hence it gives a probability distribution
over all pairs (i, j). This is the probability that a single
edge insertion results in the edge (i, j). By repeatedly
using this distribution to generate m edges, we obtain
our final graph.
In practice, the matrix PSKG is never formed explic-
itly. Instead, each edge is inserted as follows. Divide the
adjacency matrix into four quadrants, and choose one
of them with the corresponding probability t1, t2, t3, or
t4. Once a quadrant is chosen, repeat this recursively
in that quadrant. Each time we iterate, we end up in a
square submatrix whose dimensions are exactly halved.
After (cid:96) iterations, we reach a single cell of the adjacency
matrix, and an edge is inserted. This is independently
repeated m times to generate the final graph. Note that
all edges can be inserted in parallel. This is one of the
major advantages of the SKG model and why it is appro-
priate for generating large supercomputer benchmarks.
A noisy version of SKG (called NSKG) has been re-
cently designed in [21, 22]. This chooses the probability
matrix
P = T1 ⊗ ··· ⊗ T(cid:96),
where each Ti is a specific random perturbation of the
original generator matrix T . This has been provably
shown to smooth the degree distribution to a lognormal
form.
(cid:80)
i di = (cid:80)
1.2 Chung-Lu (CL) model This model can be
thought of as a variant of the edge configuration model.
Let us deal with directed graphs to describe the CL
model. Suppose we are given sequences of n in-degrees
d1, d2, . . . , dn, and n out-degrees d(cid:48)
n. We have
i = m. Consider the probability matrix
PCL where the (i, j) entry is did(cid:48)
j/m2. (The sum of all
entries in PCL is 1.) We use this probability matrix to
make m edge insertions.
i d(cid:48)
1, d(cid:48)
2, . . . , d(cid:48)
This is slightly different from the standard CL
model, where an independent coin flip is done for every
edge. This is done by using the matrix mPCL (similar
to SKG). In practice, we do not generate PCL explicitly,
but have a simple O(m) implementation analogous
to that for SKG. Independently for every edge, we
1We have taken a slight liberty in requiring the entries of T to sum
to 1. In fact, the SKG model as defined in [3] works with the matrix
mP , which is considered the matrix of probabilities for the existence
of each individual edge (though it might be more accurate to think of
it as an expected value).
choose a source and a sink. Both of these are chosen
independently using the degree sequences as probability
distributions. This is extremely simple to implement
and it is very efficient.
We will focus on undirected graphs for the rest of
this paper. This is done by performing m edge inser-
tions, and considering each of these to be undirected.
For real data that is directed, we symmetrize by remov-
ing the direction.
Given a set of SKG parameters, we can define the
associated CL model. Any set of SKG parameters
immediately defines an expected degree sequence.
In
other words, given the SKG matrix PSKG, we can deduce
the expected in-(and out)-degrees of the vertices. For
this degree sequence, we can define a CL model. We
refer to this as the associated CL model for a given set
of SKG parameters. This CL model will be used to
define a probability matrix PCL. In this paper, we will
study the relations between PSKG and PCL. Whenever
we use the term PCL, this will always be the associated
CL model of some SKG matrix PSKG.
1.3 Our Contributions The main message of this
work can be stated simply. The SKG model is close
enough to its associated CL model that most users of
SKG could just as well use the CL model for generating
graphs. These models have very similar properties both
in terms of ease of use and in terms of the graphs they
generate. Moreover, they both reflect real data to the
same extent. The general CL model has the major
advantage of generating any desired degree distribution.
We stress that we do not claim that the CL model
accurately represents real graphs, or is even the "right"
model to think about. But we feel that it is a good
control model, and it is one that any other model should
be compared against. Fitting CL to a given graph is
quite trivial; simply feed the degree distribution of the
real graph to the CL model. Our results suggest that
users of SKG can satisfy most of their needs with a CL
model.
We provide evidence for this in three different ways.
1. Graph properties of SKG vs CL: We construct an
SKG using known parameter choices from the Graph500
specification. We then generate CL graphs with the
same degree distributions. The comparison of graph
properties is very telling. The degree distribution are
naturally very similar. What is surprising is that the
clustering coefficients, eigenvalues, and core decomposi-
tions match exceedingly well. Note that the CL model
can be thought of as a uniform random samples of
graphs with an input degree distribution.
It appears
that SKG is very similar, where the degree distribution
is given implicitly by the generator matrix T .
3
2. Quantitative comparison of generating matrices
PSKG and PCL: We propose an explanation of these
observations based on comparisons of the probability
matrices of SKG and CL. We plot the entries of these
matrices in various ways, and arrive at the conclusion
that these matrices are extremely similar. More con-
cretely, they represent almost the same distribution on
graphs, and differences are very slight. This strongly
suggests that the CL model is a good and simple ap-
proximation of SKG, and it has the additional benefit
of modeling any degree distribution. We prove that un-
der a simple condition on the matrix T , PSKG is identical
to PCL. Although this condition is often not satisfied by
common SKG parameters, it gives strong mathematical
intuition behind the similarities.
3. Comparing SKG and CL to real data: The pop-
ularity of SKG is significantly due to fitting procedures
that compute SKG parameters corresponding to real
graphs [3]. This is based on an expensive likelihood
optimization procedure. Contrast this with CL, which
has a trivial fitting mechanism. We show that both
these models do a similar job of matching graph param-
eters.
Indeed, CL guarantees to fit the degree distri-
bution (up to expectations). In other graph properties,
neither SKG nor CL is clearly better. This is a very
compelling reason to consider the CL model as a con-
trol model.
In this paper, we focus primarily on SKG instead of
the noisy version NSKG because SKG is extremely well
established and used by a large number of researchers
[6, 7, 8, 9, 10, 15, 11, 12, 13, 14]. Nonetheless, all
our experiments and comparisons are also performed
with NSKG. Other than correcting deficiencies in the
degree distribution, the effect of noise on other graph
properties seems fairly small. Hence, for our matrix
studies and mathematical theorems (§4 and §5), we
focus on similarities between SKG and CL. We however
note that all our empirical evidence holds for NSKG as
well: CL seems to model NSKG graphs reasonably well
(though not as perfectly as SKG), and CL fits real data
as well as NSKG.
1.4 Parameters for empirical study We focus
attention on the Graph500 benchmark [5]. This is
primarily for concreteness and the relative importance
of this parameter setting. Our results hold for all the
settings of parameters that we experimented with. For
NSKG, there is an additional noise parameter required.
We set this to 0.1, the setting studied in [21].
• Graph500: T = [0.57, 0.19; 0.19, 0.05], (cid:96) ∈ {26,
29, 32, 36, 39, 42}, and m = 16· 2(cid:96). We focus on a much
smaller setting, (cid:96) = 18.
4
(a) Degree distribution
(b) Clustering coefficients
(c) Eigenvalues of adjacency matrices
(d) Assortativity
(e) Core decompositions
Figure 1: Comparison of the graph properties of SKG generated with Graph500 parameters and an equivalent
CL.
2 Previous Work
The SKG model was proposed by Leskovec et al. [23],
as a generalization of the R-MAT model, given by
Chakrabarti et al.
[4]. Algorithms to fit SKG to
real data were given by Leskovec and Faloutsos [2]
(extended in [3]). This model has been chosen for
the Graph500 benchmark [5]. Kim and Leskovec [24]
defined a variant of SKG called the Multiplicative
Attribute Graph (MAG) model.
There have been various analyses of the SKG model.
The original paper [3] provides some basic theorems
and empirically shows a variety of properties. Groer
et al. [25], Mahdian and Xu [26], and Seshadhri et al.
[21] study how the model parameters affect the graph
properties.
It has been conclusively shown that SKG
cannot generate power-law distributions [21]. Seshadhri
et al. also proposed noisy SKG (NSKG), which can
provably produce lognormal degree distributions.
Sala et al. [27] perform an extensive empirical study
of properties of graph models, including SKGs. Miller
et al. [28] give algorithms to detect anomalies embedded
in an SKG. Moreno et al. [29] study the distributional
properties of families of SKGs.
A good survey of the edge-configuration model and
its variants is given by Newman [30] (refer to Section
IV.B). The specific model of CL was first given by
Chung and Lu [17, 18]. They proved many properties
of these graphs. Properties of its eigenvalues were given
by Mihail and Papadimitriou [31] and Chung et al. [32].
3 Similarity between SKG and CL
Our first experiment details the similarities between an
SKG and its equivalent CL. We construct an SKG using
the Graph500 parameters with (cid:96) = 18. We take the
degree distribution of this graph, and construct a CL
graph using this. Various properties of these graphs are
given in Fig. 1. We give details below:
1. Degree distribution (Fig. 1a): This is the stan-
dard degree distribution plot in log-log scale. It is no
surprise that the degree distributions are almost identi-
cal. After all, the weighting of CL is done precisely to
match this.
5
(a) Degree distribution
(b) Clustering coefficients
(c) Eigenvalues of adjacency matrices
(d) Assortativity
(e) Core decompositions
Figure 2: The figures compares the graph properties of NSKG generated with Graph500 parameters and an
equivalent CL.
2. Clustering coefficients (Fig. 1b): The clustering
coefficient of a vertex i is the fraction of wedges centered
at i that participate in triangles. We plot d versus
the average clustering coefficient of a degree d vertex
in log-log scale. Observe the close similarity. Indeed,
we measure the difference between clustering coefficient
values at d to be at most 0.04 (a lower order term with
respect to commonly measured values in real graphs
[33]).
3. Eigenvalues (Fig. 1c): Here, we plot the first 25
eigenvalues (in absolute value) of the adjacency matrix
of the graph in log-scale. The proximity of eigenvalues
is very striking. This is a strong suggestion that graph
structure of the SKG and CL graphs are very similar.
4. Assortativity (Fig. 1d): This is non-standard
measure, but we feel that it provides a lot of structural
intuition. Social networks are often seen to be assorta-
tive [34, 35], which means that vertex of similar degree
tend to be connected by edges. For d, define Xd to be
the average degree of an average degree d vertex. We
plot d versus Xd in log-log scale. Note that neither SKG
nor CL are particularly assortative, and the plots match
rather well.
5. Core decompositions (Fig. 1e): The k-cores of a
graph are a very important part of understanding the
community structure of a graph. The size of the k-core
is the largest induced subgraph where each vertex has
a minimum degree of k. This is a subset S of vertices
such that all vertices have k neighbors in S. These
sizes can be quickly determined by performing a core
decomposition. This is obtained by iteratively deleting
the minimum degree vertex of the graph. The core plots
look amazingly close, and the only difference is that
there are slightly larger cores in CL.
All these plots clearly suggest that the Graph500
SKG and its equivalent CL graph are incredibly close
in their graph properties. Indeed, it appears that most
important structural properties (especially from a social
networks perspective) are closely related. We will show
in §6 that CL performs an adequate job of fitting real
data, and is quite comparable to SKG. We feel that
any uses of SKG for benchmarking or test instances
6
generation could probably be done with CL graphs as
well.
For completeness, we plot the same comparisons
between NSKG and CL in Fig. 2. We note again that
the properties are very similar, though NSKG shows
more variance in its values. Clustering coefficient values
differ by at most 0.02 here, and barring small differences
in initial eigenvalues, there is a very close match. The
assortativity plots show more oscillations for NSKG, but
CL gets the overall trajectory.
4 Connection between SKG and CL matrices
Is there a principled explanation for the similarity
observed in Fig. 1? It appears to be much more than
a coincidence, considering the wide variety of graph
properties that match. In this section, we provide an
explanation based on the similarity of the probability
matrices PSKG and PCL. On analyzing these matrices,
we see that they have an extremely close distribution of
values. These matrices are themselves so fundamentally
similar, providing more evidence that SKG itself can be
modeled as CL.
4
3
2
tzj−cz
t(cid:96)−zi−zj +cz
The inspiration for this section comes from Fig. 3.
Our initial aim was to understand the SKG ma-
trix, and see whether the structure of the values
provides insight into the properties of SKG. Since
each entry in this probability matrix is of the form
1 tzi−cz
tcz
, there are many repeated val-
ues in this matrix. For each value in this probability
matrix, we simply plot the number of times (the multi-
plicity) this value appears in the matrix. (For PSKG, this
is given in red) This is done for the associated PCL in
blue. Note the uncanny similarity of the overall shapes
for SKG and CL. Clearly, PSKG has more distinct val-
ues2, but they are distributed fairly similarly to PCL.
Nonetheless, this picture is not very formally convinc-
ing, since it only shows the overall behavior of the dis-
tribution of values.
We begin by giving precise formulae for the entries
of the SKG and CL matrices. This is by no means new
(or even difficult), but it should introduce the reader
to the structure of these matrices. The vertices of the
graph are labeled from [n] (the set of positive integers
up to n). For any i, vi denotes the binary representation
of i as an (cid:96)-bit vector. For two vectors vi and vj, the
number of common zeroes is the number of positions
where both vectors are 0. The following formula for
the SKG entries has already been used in [4, 23, 25].
Observe that these entries (for both SKG and CL) are
quite easy to compute and enumerate.
Claim 4.1. Let i, j ∈ [n]. Let the number of zeroes in
vi and vj be zi and zj respectively. Let the number of
common zeroes be cz. Then
tzj−cz
PSKG(i, j) = tcz
PCL(i, j) = (t1 + t2)zi(t3 + t4)(cid:96)−zi(t1 + t3)zj (t2 + t4)(cid:96)−zj .
Proof. The number of positions where vi is zero but vj
is one is zi − cz. Analogously, the number of positions
where only vj is zero is zj − cz. The number of common
ones is (cid:96) − zi − zj + cz. Hence, the (i, j) entry of the
PSKG is tcz
t(cid:96)−zi−zj +cz
t(cid:96)−zi−zj +cz
tzj−cz
1 tzi−cz
2
1 tzi−cz
2
, and
3
4
3
4
.
Let us now compute the (i, j) entry in the corre-
sponding CL matrix. The probability that a single edge
insertion becomes an out-edge of vertex i in SKG is
(t1 + t2)zi(t3 + t4)(cid:96)−zi. Hence, the expected out-degree
of i is m(t1 + t2)zi(t3 + t4)(cid:96)−zi. Similarly, the expected
in-degree of j is m(t1+t3)zj (t2+t4)(cid:96)−zj . The (i, j) entry
of PCL is (t1 + t2)zi (t3 + t4)(cid:96)−zi(t1 + t3)zj (t2 + t4)(cid:96)−zj .(cid:3)
Figure 3: Distribution of entries of PSKG and PCL.
Fig. 4 makes a more faithful comparison between
the PSKG and PCL matrices. As we note from Fig. 3, PCL
has a much smaller set of distinct entries. Suppose the
distinct values in PCL are v1 > v2 > v3 . . .. Associate a
bin with each distinct entry of PCL. For each entry of
PSKG, place it in the bin corresponding to the entry of
PCL with the closest value. So, if some entry in PSKG
has value v, we determine the index i such that v − vi
is minimized. This entry is placed in the ith bin. We
can now look at the size of each bin for PSKG. The size
of the ith bin for the PCL is simply the multiplicity of
vi in PCL.
Observe how these sizes are practically identical for
large enough entry value. Indeed the former portion of
2This can be proven by inspecting Claim 4.1.
these plots, for value < 10−20, only accounts for a total
of < 10−5 of the probability mass. This means that the
fraction of edges that will correspond to these entries
is at most 10−5. We can also argue that these entries
correspond only to edges joining very low degree vertices
to each other. In other words, the portion where these
curves differ is really immaterial to the structure of the
final graph generated.
7
Figure 5: Probability mass of the bins
the CL model.
Figure 4: Bin sizes for PSKG and PCL
Theorem 5.1. Consider an SKG model where T satis-
fies the following:
This is very strong evidence that SKG behaves like a
CL model. The structure of the matrices are extremely
similar to each other. Fig. 5 is even more convincing.
Now, instead of just looking at the size of each bin, we
look at the total probability mass of each bin. For PSKG
matrix, this is the sum of entries in a particular bin. For
PCL, this is the product of the size of the bin and the
value (which is the again just the sum of entries in that
bin). Again, we note the almost exact coincidence of
these plots in the regime where the probabilities matter.
Not only are the number of entries in each bin (roughly)
the same, so is the total probability mass in the bin.
We now generate a random sample from PSKG and
one from PCL. Fig. 6 shows MATLAB spy plots of the
corresponding graphs (represented by their adjacency
matrices). One of the motivations for the SKG model
was that it had a fractal or self-similar structure. It ap-
pears that the CL graph shares the same self-similarity.
Furthermore, this self-repetition looks identical for the
both SKG and CL graphs.
t1
t2
=
t3
t4
.
Then PSKG = PCL.
Proof. Let α = t1/t2 = t3/t4, and let t3 = βt2. Then,
t1 = α2βt4; t3 = αβt2; and t2 = αt4. Note that since
t1 + t2 + t3 + t4 = 1,
(5.1)
(α2β + α + αβ + 1)t4 = 1
We use the formula given in Claim 4.1 for the (i, j)
entry of the SKG and CL matrices.
By simple substitution, the entry for SKG is
5 Mathematical justifications
We prove that when the entries of the matrix T satisfy
the condition t1/t2 = t3/t4, then SKG is identical to
(5.2)
(t4α2β)cz (t4α)zi−cz (t4αβ)zj−cz t4
4αzi+zj βzj
= t(cid:96)
(cid:96)−zi−zj +cz
8
Figure 6: Spy plots of SKG drawn from PSKG and CL graph drawn from PCL
Analogously, for the CL matrix, the entry has value
(t1 + t2)zi(t3 + t4)(cid:96)−zi(t1 + t3)zj (t2 + t4)(cid:96)−zj
= [t4(α2β + α)]zi[t4(αβ + 1)](cid:96)−zi ×
= t2(cid:96)
= t2(cid:96)
[t4(α2β + αβ)]zj [α(α + 1)](cid:96)−zj
4 (α2β +α)zi(αβ +1)(cid:96)−zi(α2β +αβ)zj (α+1)(cid:96)−zj
4 αzi+zj βzj (αβ + 1)zi(αβ + 1)(cid:96)−zi ×
(α + 1)zj (α + 1)(cid:96)−zj
4 αzi+zj βzj (α2β + α + αβ + 1)(cid:96)
4αzi+zj βzj [t4(α2β + α + αβ + 1)](cid:96)
4αzi+zj βzj
= t2(cid:96)
= t(cid:96)
= t(cid:96)
The last part follows from (5.1). This is exactly the
(cid:3)
same as (5.2).
6 Fitting SKG vs CL
Fitting procedures for SKG model have been given in
[3]. This is often cited as a reason for the popularity of
SKG. These fits are based on algorithms for maximizing
likelihood, but can take a significant amount of time to
run. The CL model is fit by simply taking the degree
distribution of the original graph. Note that the CL
model uses a lot more parameters than SKG, which
only requires 5 independent numbers.
In that sense,
SKG is a very appealing model regardless of any other
deficiencies.
We show comparisons of the CL, SKG, and NSKG
models with respect to three different real graphs. For
directed graphs, we look at the undirected version where
directions are removed from all the edges. The real
graphs are the following:
• soc-Epinions: This is a social network from the
Epinions website, which tracks the "who-trusts-whom"
relationship [36].
It has 75879 vertices and 811480
edges. The SKG parameters for this graph from [3] are:
T = [0.4668 0.2486; 0.2243 0.0603], (cid:96) = 17.
• ca-HepTh: This is a co-authorship network from
high energy physics [36]. It has 9875 vertices and 51946
edges. The SKG parameters for this graph from [3] are:
T = [0.469455 0.127350; 0.127350 0.275846], (cid:96) = 14.
• cit-HepPh: This is a citation network from high
energy physics [36]. It has 34546 vertices and 841754
edges. The SKG parameters from [3] are: T =
[0.429559 0.189715; 0.153414 0.227312], (cid:96) = 15.
The comparisons between the properties are given,
respectively, in Fig. 7, Fig. 8, and Fig. 9. In all of these,
we see that CL (as expected) gives good fits to the
degree distributions. For soc-Epinions, we see in Fig. 7a
that the oscillations of the SKG degree distribution
and how NSKG smoothens it out. Observe that the
clustering coefficients of all the models are completely
off. Indeed, for low degree vertices, the values are off by
orders of magnitude. Clearly, no model is capturing the
abundance of triangles in these graphs. The eigenvalues
of the model graphs are also distant from the real
graph, but CL performs no worse than SKG (or NSKG).
Core decompositions for soc-Epinions (Fig. 7d) show
that CL fits rather well. For ca-HepPh (Fig. 8d) CL
is marginally better than SKG, whereas for cit-HepTh
(Fig. 9d), NSKG seems be a better match.
All in all, there is no conclusive evidence that SKG
or NSKG model these graphs significantly better than
9
(a) Degree distribution
(b) Clustering coefficients
(c) Eigenvalues of adjacency matrices
(d) Core decompositions
Figure 7: The figure compares the fits of various models for the social network soc-Epinions.
CL. We feel that the comparable performance of CL
shows that it should be used as a control model to
compare against.
7 Conclusions
Understanding existing graph models is a very impor-
tant part of graph analysis. We need to clearly see the
benefits and shortcomings of existing models, so that
we can use them more effectively. For these purposes,
it is good to have a simple "baseline" model to compare
against. We feel that the CL model is quite suited for
this because of its efficiency, simplicity, and similarity
to SKG. Especially for benchmarking purposes, it is a
good candidate for generating simple test graphs. One
should not think of this as representing real data, but
as an easy way of creating reasonable looking graphs.
Comparisons with the CL model can give more insight
into current models. The similarities and differences
may help identify how current graph models differ from
each other.
References
[1] D. Chakrabarti and C. Faloutsos, "Graph mining:
Laws, generators, and algorithms," ACM Computing
Surveys, vol. 38, no. 1, 2006.
[2] J. Leskovec and C. Faloutsos, "Scalable modeling of
real graphs using Kronecker multiplication," in ICML
'07. ACM, 2007, pp. 497 -- 504.
[3] J.
Leskovec, D. Chakrabarti,
C. Faloutsos,
and Z. Ghahramani,
J. Kleinberg,
"Kronecker
10
(a) Degree distribution
(b) Clustering coefficients
(c) Eigenvalues of adjacency matrices
(d) Core decompositions
Figure 8: The figures compares the fits of various models for the co-authorship network ca-HepTh.
graphs:
J. Machine Learning Research,
985 -- 1042, Feb. 2010.
//jmlr.csail.mit.edu/papers/v11/leskovec10a.html
An approach to modeling networks,"
pp.
http:
[Online]. Available:
vol.
11,
[4] D. Chakrabarti, Y. Zhan, and C. Faloutsos, "R-
graph mining,"
MAT: A recursive model
in
[Online].
Available: http://siam.org/proceedings/datamining/
2004/dm04 043chakrabartid.pdf
SDM '04,
442 -- 446.
2004,
pp.
for
[5] Graph 500 Steering Committee, "Graph 500 bench-
mark," 2010, available at http://www.graph500.org/
Specifications.html.
[6] V. Vineet, P. Harish, S. Patidar,
"Fast minimum spanning
and P. J.
Narayanan,
for
large
in Proceedings of
the Conference on High Performance Graphics
2009,
ser. HPG '09. New York, NY, USA:
on the
graphs
gpu,"
tree
ACM,
http://doi.acm.org/10.1145/1572769.1572796
167 -- 171.
2009,
pp.
[Online]. Available:
[7] N. Edmonds, T. Hoefler, and A. Lumsdaine, "A space-
efficient parallel algorithm for computing betweenness
centrality in distributed memory," in High Perfor-
mance Computing (HiPC), 2010 International Confer-
ence on, dec. 2010, pp. 1 -- 10.
[8] R. Pearce, M. Gokhale,
and N. M. Amato,
"Multithreaded asynchronous graph traversal
for
in-memory and semi-external memory," in Proceedings
of the 2010 ACM/IEEE International Conference for
High Performance Computing, Networking, Storage
and Analysis, ser. SC '10. Washington, DC, USA:
IEEE Computer Society, 2010, pp. 1 -- 11.
[Online].
Available: http://dx.doi.org/10.1109/SC.2010.34
[9] A. Bulu¸c and J. R. Gilbert,
"Highly parallel
sparse matrix-matrix multiplication," CoRR, vol.
11
(a) Degree distribution
(b) Clustering coefficients
(c) Eigenvalues of adjacency matrices
(d) Core decompositions
Figure 9: The figures compares the fits of various models for the citation network cit-HepPh.
abs/1006.2183, 2010.
article/pii/S0167819111000172
[10] M. Patwary, A. Gebremedhin, and A. Pothen, "New
multithreaded ordering and coloring algorithms for
multicore architectures," in Euro-Par 2011 Parallel
Processing, ser. Lecture Notes in Computer Science,
E. Jeannot, R. Namyst, and J. Roman, Eds. Springer
Berlin / Heidelberg, 2011, vol. 6853, pp. 250 -- 262.
[11] S. Hong, T. Oguntebi, and K. Olukotun, "Efficient par-
allel graph exploration on multi-core cpu and gpu,"
in Proc. Parallel Architectures and Compilation Tech-
niques(PACT), 2011.
for
[12] S. J. Plimpton and K. D. Devine, "MapReduce in
large-scale graph algorithms," Parallel
vol.
--
emerging Programming Paradigms
[Online].
http://www.sciencedirect.com/science/
MPI
Computing,
632,
2011,
for Large-Scale
Available:
Scientific Computing.
pp.
610
37,
no.
9,
[13] D. Bader and K. Madduri, "Snap, small-world net-
work analysis and partitioning: An open-source par-
allel graph framework for the exploration of large-
scale networks," in Parallel and Distributed Processing,
2008. IPDPS 2008. IEEE International Symposium on,
april 2008, pp. 1 -- 12.
[14] B. Hendrickson and J. Berry, "Graph analysis with
high-performance computing," Computing in Science
Engineering, vol. 10, no. 2, pp. 14 -- 19, march-april
2008.
[15] M. C. Schmidt, N. F. Samatova, K. Thomas, and
B.-H. Park, "A scalable, parallel algorithm for
maximal clique enumeration," Journal of Parallel and
Distributed Computing, vol. 69, no. 4, pp. 417 -- 428,
2009.
[Online]. Available: http://www.sciencedirect.
com/science/article/pii/S0743731509000082
12
[16] W. Aiello, F. Chung, and L. Lu, "A random graph
model for power law graphs," Experimental Mathemat-
ics, vol. 10, pp. 53 -- 66, 2001.
[17] F. Chung and L. Lu, "The average distances in random
graphs with given expected degrees," Proceedings of
the National Academy of Sciences USA, vol. 99, pp.
15 879 -- 15 882, 2002.
[33] M. Girvan and M. Newman, "Community structure
in social and biological networks," Proceedings of the
National Academy of Sciences, vol. 99, pp. 7821 -- 7826,
2002.
[34] M. E. J. Newman, "Mixing patterns in networks,"
Phys. Rev. E., vol. 67, p. 026126, Feb. 04 2002. [Online].
Available: http://arxiv.org/abs/cond-mat/0209450
[18] -- -- , "Connected components in random graphs with
given degree sequences," Annals of Combinatorics,
vol. 6, pp. 125 -- 145, 2002.
[35] -- -- , "Assortative mixing in networks," Phys. Rev.
[Online].
Letter, vol. 89, p. 208701, May 20 2002.
Available: http://arxiv.org/abs/cond-mat/0205405
[19] P. Erdos and A. R´enyi, "On random graphs," Publica-
[36] Stanford Network Analysis Project (SNAP), available
tiones Mathematicae, vol. 6, pp. 290 -- 297, 1959.
at http://snap.stanford.edu/.
[20] -- -- , "On the evolution of random graphs," Publica-
tions of the Mathematical Institute of the Hungarian
Academy of Sciences, vol. 5, pp. 17 -- 61, 1960.
[21] C. Seshadhri, A. Pinar, and T. Kolda, "An in-depth
analysis of stochastic kronecker graphs," in Proc.
ICDM 2011, IEEE Int. Conf. Data Mining, 2011, to
appear.
[22] -- -- , "An in-depth analysis of stochastic kronecker
[Online].
graphs," September 2011, arxiv:1102.5046.
Available: http://arxiv.org/abs/1102.5046
[23] J. Leskovec, D. Chakrabarti, J. Kleinberg, and
C. Faloutsos, "Realistic, mathematically tractable
graph generation and evolution, using Kronecker mul-
tiplication," in PKDD 2005. Springer, 2005, pp. 133 --
145.
[24] M. Kim and J. Leskovec, "Multiplicative attribute
graph model of real-world networks," in WAW 2010,
2010, pp. 62 -- 73.
[25] C. Groer, B. D. Sullivan, and S. Poole, "A mathe-
matical analysis of the R-MAT random graph gen-
erator," Jul. 2010, available at http://www.ornl.gov/
∼b7r/Papers/rmat.pdf.
[26] M. Mahdian and Y. Xu, "Stochastic Kronecker
graphs," Random Structures & Algorithms, vol. 38,
no. 4, pp. 453 -- 466, 2011.
[27] A. Sala, L. Cao, C. Wilson, R. Zablit, H. Zheng, and
B. Y. Zhao, "Measurement-calibrated graph models for
social network experiments," in WWW '10. ACM,
2010, pp. 861 -- 870.
[28] B. Miller, N. Bliss, and P. Wolfe, "Subgraph detection
using eigenvector L1 norms," in NIPS 2010, 2010, pp.
1633 -- 1641. [Online]. Available: http://books.nips.cc/
papers/files/nips23/NIPS2010 0954.pdf
[29] S. Moreno, S. Kirshner, J. Neville, and S. V. N. Vish-
wanathan, "Tied Kronecker product graph models to
capture variance in network populations," in Proc. 48th
Annual Allerton Conf. on Communication, Control,
and Computing, Oct. 2010, pp. 1137 -- 1144.
[30] M. E. J. Newman, "The structure and function of
complex networks," SIAM Review, vol. 45, no. 2, pp.
167 -- 256, 2003.
[31] C. Papadimitriou and M. Mihail, "On the eigenvalue
power law," in RANDOM, 2002, pp. 254 -- 262.
[32] F. Chung, L. Lu, and V. Vu, "Eigenvalues of random
power law graphs," Annals of Combinatorics, vol. 7,
pp. 21 -- 33, 2003.
|
1802.08298 | 1 | 1802 | 2018-02-22T21:00:48 | Conflict and Convention in Dynamic Networks | [
"cs.SI",
"cs.GT",
"physics.soc-ph"
] | An important way to resolve games of conflict (snowdrift, hawk-dove, chicken) involves adopting a convention: a correlated equilibrium that avoids any conflict between aggressive strategies. Dynamic networks allow individuals to resolve conflict via their network connections rather than changing their strategy. Exploring how behavioral strategies coevolve with social networks reveals new dynamics that can help explain the origins and robustness of conventions. Here we model the emergence of conventions as correlated equilibria in dynamic networks. Our results show that networks have the tendency to break the symmetry between the two conventional solutions in a strongly biased way. Rather than the correlated equilibrium associated with ownership norms (play aggressive at home, not away), we usually see the opposite host-guest norm (play aggressive away, not at home) evolve on dynamic networks, a phenomenon common to human interaction. We also show that learning to avoid conflict can produce realistic network structures in a way different than preferential attachment models. | cs.SI | cs |
Conflict and Convention in Dynamic Networks
Michael Foley,1∗ Patrick Forber,2 Rory Smead,3 Christoph Riedl456∗
1Network Science Institute, Northeastern University, Boston, Massachusetts, USA
2Department of Philosophy, Tufts University, Medford, Massachusetts, USA
3Department of Philosophy and Religion, Northeastern University, Boston, Massachusetts, USA
4D'Amore-McKim School of Business, Northeastern University, Boston, Massachusetts, USA
5College of Computer and Information Science, Northeastern University, Massachusetts, USA
6Institute for Quantitative Social Science, Harvard University, Cambridge, Massachusetts, USA
∗To whom correspondence should be addressed; E-mail: [email protected]
An important way to resolve games of conflict (snowdrift, hawk-dove, chicken)
involves adopting a convention: a correlated equilibrium that avoids any con-
flict between aggressive strategies. Dynamic networks allow individuals to re-
solve conflict via their network connections rather than changing their strat-
egy. Exploring how behavioral strategies coevolve with social networks reveals
new dynamics that can help explain the origins and robustness of conven-
tions. Here we model the emergence of conventions as correlated equilibria
in dynamic networks. Our results show that networks have the tendency to
break the symmetry between the two conventional solutions in a strongly bi-
ased way. Rather than the correlated equilibrium associated with ownership
norms (play aggressive at home, not away), we usually see the opposite host-
guest norm (play aggressive away, not at home) evolve on dynamic networks,
a phenomenon common to human interaction. We also show that learning to
avoid conflict can produce realistic network structures in a way different than
preferential attachment models.
1
Introduction
An essential feature of cooperation involves resolving conflicts, and an effective way to resolve
conflicts is to adopt a convention that avoids them altogether. Evolutionary game theory pro-
vides a way to represent the conflicts associated with the problem of cooperation (16, 34, 53),
1
and reinforcement learning can produce adaptive solutions to broad classes of strategic inter-
actions (7, 11, 15, 23, 24, 30, 43). In games of conflict (snowdrift, hawk-dove, chicken) (53)
individuals can learn to a play a correlated equilibrium, similar to turn-taking, that does better
than the mixed Nash equilibrium (4, 26, 31, 47). These solutions, often understood as an impor-
tant aspect of conventions, play a central role in evolutionary accounts of coordinated action,
territoriality, and ownership (1, 20, 27, 31 -- 33, 47, 51, 57). However, most studies of convention
examine learning or evolution with random interactions or static network structures. In reality,
learning affects social networks as well as behavior. Individuals may seek out or avoid others
based on past interactions and this can have profound effects on strategy choices, as work on
dynamic networks has shown (2, 17, 19, 25, 35, 36, 38 -- 41, 46, 50, 54, 55), an effect also seen
in empirical work on human behavior (12). For games of conflict, dynamic networks allow
individuals to avoid aggressive neighbors by choosing their interaction partners which tends
to promote cooperation (14), although some static network structures work against coopera-
tion (22).
Here we present novel results regarding the emergence of conventions as correlated equi-
librium solutions for games of conflict. We use a coevolutionary model where both network
ties and behavioral strategies evolve by reinforcement learning. Few previous studies model
co-evolution of network and strategy evolving with reinforcement learning (1, 37, 48) and none
have explored how dynamic networks influence the evolution of correlated equilibria. We em-
ploy computer simulations to search the entire payoff space for games of conflict and to explore
dynamic behavior over a wide range of additional model parameters, including population size.
We find that correlated equilibria often emerge spontaneously as a natural result of reinforce-
ment learning on networks, and that dynamic networks strongly favor the so-called paradoxical
solution where individuals act aggressively away but not at home. This result suggests that
the prevalence of territoriality and ownership behaviors is not primarily a matter of conven-
tion. Our results also have relevance to general mechanisms of network formation. Learning to
avoid conflict by evolving network ties can produce realistic network structures and thus pro-
vides another potential mechanism for social network formation that differs from preferential
attachment (5, 14, 36).
In games of conflict each agent can play one of two strategies: an aggressive, competitive
strategy (hawk) or a more passive, cooperative strategy (dove). For economy of presentation
we will use the hawk-dove terminology but the results apply equally to any game of conflict
meeting the payoffs defined in Fig. 1a (53). The highest payoff results from playing hawk
against dove, the lowest from playing hawk against hawk and all players would prefer their
opponent to play dove. Agents playing these games either coordinate on who gets the large
payoff, compete for a resource, or engage in a standoff. In an unstructured population common
evolutionary dynamics (e.g., replicator dynamics) converge on the mixed Nash equilibrium of
the game: host plays dove with probability x1/(1 − y1 + x1) and the visitor plays dove with
probability x2/(1 − y2 + x2).
Introducing a dynamic network permits individuals to find solutions different than the mixed
Nash (summarized in Fig. 1c). If network ties are updated symmetrically using reinforcement
2
learning (i.e., both players update their network ties based on their interaction payoffs as in (37,
48)), there is a new potential solution to games of conflict: agents can learn pure strategies while
learning to interact with suitable partners. In these cases a hub-and-spoke network structure
tends to emerge. One agent becomes a hub and learns to play a pure dove strategy whereas
other agents in the population learn to play pure hawk and only visit the dove hub. In effect,
agents structure their interaction network to avoid conflict, allowing for a kind of cooperation
in games of conflict, as previous work has shown (14).
Another potential new solution, in the form of efficient correlated equilibria, can emerge
when individuals are able to coordinate their strategies on an external cue or signal. Correlating
behavior on some external cue (say a coin toss) can produce a convention, such as taking turns
playing aggressively (e.g., player one plays hawk when heads, dove otherwise; and player two
plays hawk when tails, dove otherwise) (4, 47). Indeed, correlated equilibria can be learned by
relatively simple learning rules (3, 13, 21), and are also readily learned by humans (10). In the
context of networks, correlated equilibria may arise if individuals learn their host and visitor be-
havior independently. This enables them to play one way when hosting and another way when
visiting, using their role as host versus visitor as the public cue (Fig. 1b). At one such correlated
equilibrium individuals play what is called the bourgeois strategy, where they play hawk when
hosting and dove when visiting. This strategy has been invoked as an explanation for norms of
ownership or territoriality (31, 32). That is, norms of ownership may just be a conventional so-
lution to games of conflict, rather than reflecting the intrinsic value of the resource or territory.
However, there is another equally efficient solution that uses the paradoxical strategy, where
one plays dove when hosting and hawk when visiting. This alternative solution complicates
the evolutionary account of ownership and territoriality. In unstructured populations with sym-
metric payoffs both solutions are strongly stable and evolve with equal frequency (47). This
presents a problem of symmetry-breaking: why does it seem that the bourgeois strategy is so
much more prominent in nature (see, e.g., (28)) when there is another equally viable option?
Previous work has argued that individual learners who are sensitive to relatively small inequal-
ities in value of the territory or fighting ability of the current owner may break the symmetry
and strongly favor the bourgeois solution (47). Here we develop a model to investigate the
emergence and stability of these correlated equilibria for games of conflict.
2 Methods
2.1 The Model
In our dynamic network model agents simultaneously learn how to behave and with whom to
interact via Roth-Erev reinforcement. Roth-Erev reinforcement learning provides a simple yet
psychologically realistic learning dynamic in which an individual's behavior evolves iteratively
in response to the payoffs obtained through interaction (11). This contrasts with other models of
evolutionary game theory, such as the replicator dynamics, where "learning" (evolution) occurs
3
globally across the populations as individuals reproduce at rates proportional to the success of
their behavioral strategies. In reinforcement learning, individuals have weights associated with
each possible behavior and these weights are updated based on the payoffs received during their
interactions (Fig. 1a -- b). Unlike imitation learning, reinforcement learning does not require
individuals to track the behaviors or payoffs of other players in the population, a common
feature in contagion models (9); an agent only tracks the payoffs associated with their own
behavior and update their learning weights accordingly. Initial weights determine the initial
behavior of the system. For instance, when initial weights are equal and relatively small we
see effectively random behavior on a uniform network at the start. At every time step each
agent visits another agent to play a game, receives a payoff, and updates learning weights. This
update can be symmetric -- both host and visitor update their network connection and strategy
weights simultaneously -- or asymmetric -- the hosts only update their strategy choices when
hosting whereas the visitors update both their network connection and strategy choices when
visiting. The rationale for this particular asymmetry is that while individuals can control their
behavioral strategies when hosting or visiting, and who they visit, they cannot control who
decides to visit them. Specifically, we implement this asymmetry by having separate learning
weights for hosting and visiting roles, allowing individuals the potential to learn different host
and visitor strategies. Also, since hosts have no control over who decides to visit, only visitors
update their network connections based on the interactions payoffs.
The asymmetry in network updating allows for correlated equilibria to emerge and evolve
with respect to player roles and therefore provides a way to investigate the conventional origins
of norms of ownership or territoriality. Also, in contrast to many previous dynamic network
models that allow network ties to form or dissolve discretely (14, 17, 36, 41), our model allows
network connections to strengthen or weaken as a function of interaction payoffs. Since ties are
rarely discrete in social networks (6,18,56), modeling network connections with reinforcement
learning adds an important element of realism. Furthermore, modeling network ties through
reinforcement learning avoids the need to fix the number of network ties which can affect the
results (42). Instead, we allow the number (strength) of ties to evolve endogenously in response
to learning.
More precisely, we model a set of N agents engaged in pairwise games of conflict across
a number rounds. Each round, every agent choses one other agent to visit and engages in
an interaction. During each interaction the host and visitor independently choose a behavior,
receive a payoff, and learn via reinforcement. All players have one interaction as a visitor and
up to N − 1 interactions as a host.
Each agent i has two vectors (wH, wD) and (wh, wd) with i's reinforcement weights for
each strategy when hosting or visiting respectively. Each agent i also has a vector representing
their reinforcement weights for choice of which player to visit: (wi1, wi2, ..., win) where wij
represents the weight related to player i visiting player j. Self-visits are not allowed (wii =
0). Initial weights for both strategy choices are set to 1, while network partner weights are
N−1. We adopted the convention of L = 19 so network partner weights for the
uniformly set to L
smallest population size we study (N = 20) would start at 1 (wij = 1 for all i, j with i (cid:54)= j as the
4
Figure 1 -- Coevolution of network ties and strategies. a, Payoff matrix for the hawk-dove
game. b, Reinforcement learning for host and visitor roles. c, Starting from uniform homo-
geneous mixing (fully connected network) and random strategies, populations tend to evolve
into one of four stable outcomes depending on early random events and simulation parameters:
Bourgeois, Paradoxical, Network or Hybrid solutions. Node colors represent strategy weights,
node size is proportional to number of expected visitors and stronger connections are denoted
with darker lines.
baseline). We kept L constant across different population sizes to ensure that the reinforcement
learning has a similar speed relative to total initial weights in larger population sizes. Changing
L effectively varies network learning speed; larger L values slow the responsiveness of an agent
to interaction payoffs. (See Supplemental Information for further details about initial weights
and varying learning speeds.)
The model has two modular dynamical components: discounting (δ) and errors (). Dis-
counting involves reducing past learning weights as more reinforcement occurs, effectively
allowing agents to forget older strategies and network connections (11, 37). Errors represent
5
cvisitor/hostHawkDoveHawk0, 01, x2Dovex1, 1y1, y2𝟏>𝒚𝒊≥𝒙𝒊>𝟎abStrategy played when hostingStrategy played when visitingParadoxical Strategy(dove at home; hawk visitor; homogeneous network)Network Solution(single dove-dove hub; hawk-hawk spokes)Bourgeois Strategy(hawk at home; dove visitor; homogeneous network)Time = 100Time = 10,000Time = 1,000,000Paradoxical/Hub-Spoke Hybrids(multiple hawk-dove hubs; hawk-playing spokes)Time = 0Reinforcement learning:After each interaction, edge weight (dashed arrow) and strategies (dotted arrows) are updated with payoff from payoff matrix a. In symmetric learning model, agents are allowed only one strategy for visiting and hosting.HawkDoveMixedmistakes, mutations, or noise where an agent selects a strategy or node in the network at ran-
dom rather than according to their learning weights. Both of these components are known to
impact the stability and long-run behavior of reinforcement learning (48).
When taking an action, for a given agent in a given context (Host, Visitor, Partner Choice),
the probability of choosing option s is proportional to the current relevant weights:
(1)
ws(cid:80)
where is the error rate, S is the relevant set of available choices (i.e., visiting strategies, hosting
strategies, or choice of player to visit), s ∈ S and s(cid:48) ∈ S.
P r(s) = (1 − )
s(cid:48) ws(cid:48)
+
1
S
After each instance of learning, the relevant weights are discounted by a factor δ and in-
creased by the received payoff (π).
s = (1 − δ)ws + πs
w(cid:48)
(2)
where w(cid:48)
s is the weights after updating and πs is the most recent payoff related to choosing action
s. πs = 0 if action s was not chosen. All visits and strategy choices occur simultaneously within
a round. All weights are updated simultaneously after each round at a rate of one update per
related interaction from that round. Payoffs received for strategy choice when visiting do not
alter the weights for strategy choice when hosting and vice versa. Likewise, payoffs received
for hosting do not affect adjacency weights for choosing which other agents to visit.
3 Results
We explore our model through simulations of reinforcement learning on the asymmetric dy-
namic network. To provide some context for interpreting the simulation results, let us first
describe the sort of solutions we see for games of conflict on dynamic networks. First, there
are correlated equilibrium solutions. Note that a population may reach a correlated equilibrium
by coordinating their strategies on whether they are host or visitor in one of two ways. Agents
may learn to play hawk when hosting and dove when visiting. Hosts always receive the max-
imal payoff and visitors always receive x2 (the bourgeois solution). Alternatively, agents may
learn to play dove when hosting and hawk when visiting. This equilibrium grants the visitors
the maximal payoff while the hosts receive x1 (the paradoxical solution). In these cases the
resulting network is a homogeneous, fully connected graph that approximates a randomly mix-
ing population. Once the correlated equilibrium is established, visiting any agent yields the
same payoff as everyone is deploying the same strategies conditional on the same cues. These
correlated equilibrium solutions effectively avoid any conflict between aggressive hawk strate-
gies, and these solutions are commonly found in asymmetric network runs with discounting and
errors.
Distinct from correlated equilibrium solutions, there are network solutions that mitigate
conflict by utilizing network structure alone: if any agent starts to lean towards dove as host then
6
agents learn to visit that dove-leaning agent more and also learn to play hawk when they visit.
This produces a hub-spoke network structure with one dove-host attracting many hawk-visitors.
In symmetric dynamic network runs we usually see network solutions emerge. Hybrid solutions
involve a combination of the paradoxical correlated convention with the network solution where
a small number of dove hubs learn the correlated equilibrium and visit each other while hawk
spokes learn a pure (aggressive) strategy and maintain connection to the paradoxical dove-as-
host hubs. Hybrid solutions usually emerge for asymmetric network runs with discounting but
no errors (e.g., Fig. 2).
Figure 2 -- Illustrative example. A representative result of coevolution of network and strate-
gies in a larger population (N=500, discount δ = .01, no error, payoff x1 = x2 = 0.2,
y1 = y2 = 0.6). Without errors the network approaches a complicated hybrid solution. Node
size is proportional to number of expected visitors.
Across all simulations we find that agents arrive at solutions to the games of conflict that
fall into one of the four families described above: the two potential conventions (bourgeois and
paradoxical), network solutions, or hybrid solutions (as in Fig. 1c). We find no instances of
7
HawkDoveMixedTime: 25 stepsTime: 1,000 stepsTime: 10,000 stepsTime: 1,000,000 stepsFigure 3 -- Simulation results. a Heatmaps representing the proportion of outcomes approach-
ing the paradoxical convention for the space of all possible games of conflict with symmetric
payoffs (discount δ = .01, error = .01, N=20). b Heatmap representing the proportion of
outcomes approaching paradoxical convention for a slice of the asymmetric payoff space where
y2 + x2 = 1, y1 + x1 = 1. The x axis shows the ratio of dove-dove to dove-hawk payoffs
for visitors, while the y axis shows the same ratio for the hosts' payoffs. This ratio represents
the relative incentive to find a dove parter while playing dove. (δ = .01, = .01, N=20). c
The proportion of paradoxical behavior produced by simulations runs (1,000 seeds) for random
versus uniform initial learning weights both with and without network learning. Payoffs are as
follows: y1 = 0.5, x1 = 0.4, y2 varies from 0.2 to 0.9 (along the x-axis), and x2 = y2− 0.1. The
vertical dashed line represents symmetrical payoffs. When y2 < y1, payoffs are biased towards
the bourgeois strategy, and when y2 > y1, payoffs are biased towards the paradoxical strategy.
d, Convergence to homogeneous network in the Bourgeois and Paradoxical solution across dif-
ferent population sizes. Parameters in this plot are as follows: Payoffs x2 = 0.3, y2 = 0.5,
x1 = 0.6, and y1 = 0.8, δ = 0.01, = 0.01. e, The degree distribution of networks across simu-
lation results shows heterogeneity of network ties across individuals in the population (δ = .01,
no error, N=1,000, payoff x1 = x2 = 0.2, y1 = y2 = 0.6, average of 10 simulations shown).
8
●●●●●●●●●●●●●●●●●●●Random network(Erdos−Renyi)10010−110−210−310−4051015Node Strength sp(s)bdacethe the mixed Nash equilibrium and simulation runs approach one of the four solution families
by one million time steps with only very rare exceptions. The relative frequency of outcomes
approaching each family varies with the presence of errors, the rate of discounting, and the
specific values of the payoffs. Here we present the results with discounting for both network
connections and strategies, as well as with and without errors. These results are qualitatively
representative for a constellation of other factors, including larger population sizes, different rel-
ative learning speeds for strategy and networks connections, and learning with no discounting.
Additional results are discussed in the Supplemental Information.
We conducted an exhaustive search of the entire payoff space for games of conflict (omitting
near boundary cases where yi or xi approach 0 or 1). As shown in Fig. 3a, the paradoxical
solution is by far the most prevalent outcome of simulation runs for symmetric payoffs. We also
investigated the case where hosts and visitors have different payoff functions, effectively valuing
resources differently when host versus visitor. When payoffs are biased in this way, such that it
may be more valuable to play a particular strategy (hawk or dove) at home rather than away (or
vice versa), the paradoxical solution is still prevalent, though less so when payoffs are strongly
biased towards the bourgeois solution (Fig. 3b; SI). It is important to note that biasing the
payoffs in this way makes the bourgeois solution Pareto optimal and, in many contexts, makes
it the preferred or expected equilibrium of evolutionary processes (45, 49). The prevalence of
the paradoxical solution in cases where the payoffs favor the bourgeois solution reveals the
influence dynamic networks on breaking the symmetry of conventions.
Initializing simulations with random rather than uniform starting learning weights on initial
strategies further increases the prevalence of paradoxical results on dynamic networks (Fig. 3c).
As a control case, we examined the model without network learning where agents simply choose
whom to visit at random every round while still including asymmetric strategy updating. This
is equivalent to a randomly mixing population. As one would expect in this case, we see an
even split between bourgeois and paradoxical solutions when payoffs are symmetrical (Fig. 3c).
When payoffs are biased towards one solution or another we see a proportional increase in that
solution evolving, with random learning weights introducing more noise. Perhaps surprisingly,
the dynamical results are insensitive to population size -- we see the same qualitative dynamics
in populations of sizes from 20 to 2,000 (Fig. 3d).
Without errors discounting leads to behavioral trapping; agents may eventually forget strat-
egy choices and network connections, sometimes producing suboptimal results (37). In our
model discounting without errors produces stable complex hybrid solutions with only rare ex-
ceptions. Fig. 2 shows the network evolution and emergence of a hybrid solution for a large
population without errors. These networks have heterogeneous degree distributions that are
different from random (i.e., Erdos-Renyi) networks (Fig. 3e). The difference from random net-
works arises in the tail of the degree distribution, indicating a substantial probability to observe
nodes with far more connections than the typical value. This reflects the formation of hubs
(either pure dove or paradoxical) that attract many visitors, illustrating a phenomenon found in
many real-world networks (5,8,52). Learning to avoid conflict via reinforcement learning with-
out discounting thus produces a result relevant to current network science: we see realistic net-
9
work structures produced by an alternative mechanism of social network formation that differs
from the preferential attachment and fitness models. Those models are based on a mechanism
of growing the network by adding nodes that preferentially attach to already highly-connected
nodes in the network. Our social network formation model is a self-organizing mechanism that
is based on a network with a fixed number of nodes in which tie strengths are modified to avoid
conflict.
Errors promote exploration and allow learning to avoid the trapping states. When including
an error rate ( = 0.001 or 0.01) the system becomes ergodic, but simulations in the medium-
run always show populations close to one of the four solution families. Most often the system
is found near one of the conventional solutions with a near homogeneous network. In contrast
to Fig. 2, the inclusion of errors tends to eliminate the dove hubs found in hybrid solutions.
Through exploration allowed by errors, the dove hubs tend to find each other and quickly learn
the paradoxical solution. Once this starts to catch on, the rest of the population follows, which
produces a more homogeneous network playing a correlated equilibrium (see Fig. 4). This
result is observed across population sizes (Fig. 3d).
Of particular interest in reinforcement models is learning speed. Learning speeds can be
varied in the model by varying the rate at which weights are accumulated. We systematically
investigated the relative speeds of learning for updating network ties and strategies. Previous
studies found that varying learning speeds have a noticeable effect on results. Faster network
learning speeds tends to promote cooperation (14,37,48). In our model we found varying learn-
ing speeds had relatively little effect on resulting behavior. Without errors faster network learn-
ing speed tends to produce hybrid or network solutions, closing off the correlated equilibria.
With the addition of errors the network solutions disappear and we see mostly the paradoxical
convention. When strategy learning is faster agents tend to quickly learn one of the conventional
solutions and the network tends to stay more homogenous throughout their evolution (for more
detailed discussion of these results see Supplemental Information).
4 Discussion
The simulation results support a general conclusion: dynamic networks consistently favor the
paradoxical solution over the bourgeois solution across a wide range of parameters. The results
for probing the possible payoff space for games of conflict show how frequently simulations
produce paradoxical outcomes (Fig. 3a). Notice the relative rarity of the bourgeois solution,
even for cases where host and visitor attach different values to playing hawk as host versus
hawk as visitor (Fig. 3b). Only when payoffs are very strongly biased in favor of playing dove
when visiting, or against dove when hosting, do we find the bourgeois solution more often than
the paradoxical solution (Fig. 3c). If there is no bias or any bias in favor of dove when hosting,
or against dove when visiting, the paradoxical solution is far more prominent. A common view
on the origin of territoriality or norms of ownership takes the evolution and stability of the
bourgeois correlated equilibrium to provide a rationale for aggressively defending territories or
10
Figure 4 -- Temporal evolution. Analysis of the possible evolutionary trajectories that produce
the paradoxical solution. While some populations find the paradoxical solution right away, most
transition to the paradoxical convention by first developing a hub-spoke structure indicative of
network or hybrid solutions. Plots show mean value across all simulations that fall into a specific
evolutionary path. Node size shown proportional to number of expected visitors.
resolving conflicts over resources in favor of hosts (27, 31, 32, 47). In stark contrast, our results
show that a host-guest norm, where the host concedes resources to a visitor, evolves far more
readily than any norm of territoriality.
The prevalence of the paradoxical solution occurs because the network solution breaks the
symmetry between correlated equilibria. In network solutions hubs are strongly reinforced to
play dove as host. If a hub agent finds another dove host to visit then the hub will visit that host
more. Once the network connection is strengthened, while hub agents are reinforced to play
dove as host by their hawk visitors, they can learn to play hawk as visitor against the other dove
host. When this correlated convention is discovered, the rest of the population quickly learns
it. Fig. 3 shows the possible evolutionary routes to the paradoxical solution. It is only when
the bias of the payoffs toward hawk-when-hosting and dove-when-visiting is strong enough
to overwhelm the influence of the dynamic network that we see the regular evolution of the
bourgeois strategy. This is further illustrated by the fact that slower network learning does
not lead to the paradoxical solution as frequently as fast network learning (see Supplemental
Information).
This result has an important implications for evolutionary accounts of when or where cer-
tain conventions may arise. Note that our model represents scarcity of resources indirectly as
variation in payoff biases (Fig. 2d-e), though we do not consider catastrophic scarcity or inter-
action outcomes. So, for instance, in the case of territories individuals either are not evicted
when conceding to an aggressive opponent, or they can find another territory without severe
cost. Also, the model assumes that losses incurred when playing dove against hawks are not
overwhelming; individuals do not die or lose all mating opportunities if they concede too many
resources. Including scarcity of resources introduces new dynamical elements that may produce
different results. If the number of territories is severely limited and a territory is necessary for
11
Transition to paradoxical solution directly.(11% of simulations)Transition via complete hub-spoke with a single hub.(8% of simulations)Transition via some network solution (two or more hubs).(81% of simulations)Invention of correlated convention.survival or reproduction, then there is a zero-sum aspect to holding territories that would im-
pact the evolutionary dynamics beyond the game of conflict. The potential significance of these
factors would mean that ownership of a territory or control of the resource would confer some
intrinsic value and norms of ownership would not play a merely conventional role in avoiding
conflict. Our model reveals that in dynamic networks a prevalence territoriality is not due to
relatively small differences in efficiency between the bourgeois and paradoxical conventions.
These results support the view that territoriality is prevalent because holding a territory has sig-
nificant value beyond providing an efficient convention for resolving potential conflicts. If there
is no scarcity of resources, or no competition over territories, a host-guest convention is much
more likely to emerge even when moderately inefficient. Indeed, this may explain why we tend
to see host-guest conventions emerge in many domains of human interaction.
Regarding the evolution of convention more generally, Peyton Young defines a convention
as a "pattern of behavior that is customary, expected and self-enforcing" (57) and other schol-
ars have identified correlated equilibria as central to conventions (51). Our results demonstrate
that correlated equilibria can readily emerge in dynamic networks. In this setting, which agent
initiates the interaction provides a ready cue for reinforcement learning and sets the stage for
correlated equilibria. Although some accounts of convention involve agents' expectations or
beliefs about the behavior of other agents (29, 51, 57), our model shows that learners with no
such beliefs or expectations can establish convention-like behavior (i.e., strategic behavior uni-
formly adopted from amongst equally viable alternatives that is self-enforcing). Furthermore,
many potential conventions in game-theoretic contexts pose problems of symmetry since many
conventions are equally efficient. The results presented here show that equally efficient conven-
tions will not evolve with equal probabilities in dynamic networks and thus provides a potential
answer to the equilibrium selection problem (44) in these cases.
In conclusion, our results have two important consequences. First, allowing individuals to
avoid aggressive neighbors by choosing their interaction partners through a realistic learning
mechanism (reinforcement learning) reveals a novel way to resolve games of conflict by pro-
moting hub-spoke structures that, in turn, break the symmetry between correlated equilibria in
a strongly biased way. We know that learning in social networks has profound effects on dy-
namics for other classes of games and most often the results show that dynamic networks favor
cooperation in prisoner's dilemma or stag hunt games (14, 37, 41, 48). Our study of dynamic
networks in games of conflict adds further generality to these results -- the network structures
that evolve help resolve conflict -- and also reveals a surprising tendency to undermine the usual
narrative about how the bourgeois convention provides a rationale for norms of ownership or
property. Reinforcement learners in dynamic networks have a strong tendency to find the para-
doxical solution. Agents only tend to find the bourgeois solution when there are obvious and
systematic benefits to territorial behavior: the interaction payoffs for games of conflict need to
be biased in such a way that the host values playing hawk much more than a visitor. This entails
that insofar ownership and territoriality are probably widespread due to the intrinsic importance
of holding resources or the value of owning a territory rather than as a convention for avoiding
conflict. Second, simple reinforcement learning in a dynamic network can produce realistic
12
network structures in a way that does not presume a growing network with preferential attach-
ment. Exploring how learning to resolve conflict may interact with preferential attachment to
influence the structure of human social networks is an exciting prospect for future research.
Data Generation and Analysis
Simulations were written in C++ and run for 106 rounds of play. Data aggregation and network
plots were created using Python and R.
When examining asymmetrical payoffs two approaches were used. First, we consider cases
where xi + yi = 1 but varied the xi/yi ratio between players 1 and 2. Second, we relaxed the
requirement of xi + yi = 1 and considered points varied at regular payoff intervals.
Code Availability
Replication code available on GitHub at
https://github.com/riedlc/ConflictAndConvention.
Acknowledgements
This research was supported in part by Army Research Office grant W911NF-14-1-0478, and
Office of Naval Research grants N00014-16-1-3005 and N00014-17-1-2542.
Author contributions statement
M.F., P.F., R.S., C.R. conceived the experiments, M.F. implemented simulations in C++, M.F.
and C.R. conducted the experiment(s), analyzed results, and prepared the figures, P.F., R.S.,
C.R. wrote the manuscript, M.F., P.F., R.S., C.R. wrote the supplemental information. All
authors contributed to all aspects of the project.
Additional information
Competing financial interests The authors declare no competing financial interests.
References
1. J. M. Alexander. The Structural Evolution of Morality. Cambridge University Press, 2007.
13
2. B. Allen, G. Lippner, Y.-T. Chen, B. Fotouhi, N. Momeni, S.-T. Yau, and M. A. Nowak.
Evolutionary dynamics on any population structure. Nature, 544:227 -- 230, 2017.
3. J. Arifovic, J. F. Boitnott, and J. Duffy. Learning correlated equilibria: An evolutionary
approach. Journal of Econmic Behavior & Organization, 2016.
4. R. J. Aumann. Subjectivity and correlation in randomized strategies. Journal of Mathemat-
ical Economics, 1(1):67 -- 96, 1974.
5. A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks.
Science,
286(5439):509 -- 512, 1999.
6. A. Barrat, M. Barthelemy, R. Pastor-Satorras, and A. Vespignani. The architecture of com-
plex weighted networks. Proceedings of the National Academy of Sciences, 101(11):3747 --
3752, 2004.
7. A. W. Beggs. On the convergence of reinforcement learning. Journal of Economic Theory,
122(1):1 -- 36, 2005.
8. A. Clauset, C. R. Shalizi, and M. E. Newman. Power-law distributions in empirical data.
SIAM Review, 51(4):661 -- 703, 2009.
9. P. S. Dodds and D. J. Watts. A generalized model of social and biological contagion.
Journal of Theoretical Biology, 232(4):587 -- 604, 2005.
10. J. Duffy and N. Feltovich. Correlated equilibria, good and bad: An experimental study.
International Economic Review, 51(3):701 -- 721, 2010.
11. I. Erev and A. E. Roth. Predicting how people play games: Reinforcement learning in
experimental games with unique, mixed strategy equilibria. American Economic Review,
pages 848 -- 881, 1998.
12. K. Fehl, D. J. van der Post, and D. Semmann. Co-evolution of behaviour and social network
structure promotes human cooperation. Ecology Letters, 6(11):546 -- 551, 2011.
13. D. P. Foster and R. V. Vohara. Calibrated learning and correlated equilibrium. Games and
economic behavior, 21(1-2):40 -- 55, 1997.
14. T. L. Francisco C. Santos, Jorge M. Pacheco. Cooperation prevails when individuals adjust
their social ties. PLoS Computational Biology, 2(10):e140, 2006.
15. D. Fudenberg and D. K. Levine. The theory of learning in games, volume 2. MIT press,
1998.
16. D. Fudenberg and J. Tirole. Game theory, 1991. Cambridge, Massachusetts, 393:12, 1991.
14
17. S. Goyal and F. Vega-Redondo. Network formation and social coordination. Games and
Economic Behavior, 50:178 -- 207, 2005.
18. M. S. Granovetter. The strength of weak ties. American Journal of Sociology, 78(6):1360 --
1380, 1973.
19. T. Gross and B. Blasius. Adaptive coevolutionary networks: a review. Journal of the Royal
Society Interface, 5:259 -- 271, 2008.
20. F. Guala and L. Mittone. How history and convention create norms: an experimental study.
Journal of Economic Psychology, 31:749 -- 756, 2010.
21. S. Hart and A. Mas-Colell. a simple adaptive procedure leading to corrlated equilibrium.
Econometrica, 68(5):1127 -- 1150, 2000.
22. C. Hauert and M. Doebeli. Spatial structure often inhibits the evolution of cooperation in
the snowdrift game. Nature, 428(6983):643 -- 646, 2004.
23. R. J. Herrnstein. On the law of effect. Journal of the Experimental Analysis of Behavior,
13(2):243 -- 266, 1970.
24. S. Huttegger, B. Skyrms, P. Tarres, and E. Wagner. Some dynamics of signaling games.
Proceedings of the National Academy of Sciences, 111(suppl. 3):10873 -- 10880, 2014.
25. M. O. Jackson and A. Watts. On the formation of interaction networks in social coordina-
tion games. Games and Economic Behavior, 41(2):265 -- 291, 2002.
26. S. Kakade, M. Kearns, J. Langford, and L. Ortiz. Correlated equilibria in graphical games.
In Proceedings of the 4th ACM Conference on Electronic Commerce, pages 42 -- 47, San
Diego, California, USA, 2003. ACM.
27. H. Kokko, A. L´opez-Spulcre, and L. J. Morrell. From hawks and doves to self-consistent
games of territorial behavior. The American Naturalist, 167:901 -- 912, 2006.
28. J. R. Krebs and N. B. Davies. An Introduction to Behavioral Ecology. Blackwell, London,
1993.
29. D. Lewis. Convention. Harvard University Press, 1969.
30. M. W. Macy and A. Flache. Learning dynamics in social dilemmas. Proceedings of the
National Academy of Sciences, 99:7229 -- 7236, 2002.
31. J. Maynard Smith. Evolution and the Theory of Games. Cambridge university press, 1982.
32. J. Maynard Smith and G. R. Parker. The logic of asymmetric animal contests. Nature,
146:15 -- 18, 1976.
15
33. M. Mesterton-Gibbons, T. Karabiyik, and T. N. Sherratt. The iterated hawk-dove game
revisited: the effect of ownership uncertainty on bourgeois as a pure convention. Dynamic
Games and Applications, 4:407 -- 431, 2014.
34. M. A. Nowak. Five rules for the evolution of cooperation. Science, 314:1560 -- 1563, 2006.
35. H. Ohtsuki, C. Hauert, E. Lieberman, and M. A. Nowak. A simple rule for the evolution of
cooperation on graphs and social networks. Nature, 441(7092):502 -- 505, 2006.
36. J. M. Pacheco, A. Traulsen, and M. A. Nowak. Coevolution of strategy and structure in
complex networks with dynamical linking. Physical Review Letters, 97(25):258103, 2006.
37. R. Pemantle and B. Skyrms. Newtork formation by reinforcement learning: the long and
medium run. Mathematical Social Sciences, 48:315 -- 327, 2004.
38. M. Perc and A. Szolnoki. Coevolutionary games -- a mini review. Biosystems, 99:109 -- 125,
2010.
39. F. L. Pinheiro, J. M. Pacheco, and F. C. Santos. From local to global dilemmas in social
networks. PLoS One, 7:e32114, 2012.
40. F. L. Pinheiro, F. C. Santos, and J. M. Pacheco. Linking individual and collective behavior
in adaptive social networks. Physical Review Letters, 116:128702, 2016.
41. D. G. Rand, S. Arbesman, and N. A. Christakis. Dynamic social networks promote co-
operation in experiments with humans. Proceedings of the National Academy of Sciences,
108(48):19193 -- 19198, 2011.
42. D. G. Rand, M. A. Nowak, J. H. Fowler, and N. A. Christakis. Static network struc-
ture can stabilize human cooperation. Proceedings of the National Academy of Sciences,
111(48):17093 -- 17098, 2014.
43. A. E. Roth and I. Erev. Learning in extensive-form games: Experimental data and simple
dynamic models in the intermediate term. Games and Economic Behavior, 8(1):164 -- 212,
1995.
44. L. Samuelson. Evolutionary Games and Equilibrium Selection. MIT Press, 1997.
45. W. Sandholm. Population games and evolutionary dynamics. MIT Press, 2010.
46. F. C. Santos and J. M. Pacheco. Scale-free networks provide a unifying framework for the
emergence of cooperation. Physical Review Letters, 95(9):098104, 2005.
47. B. Skyrms. Evolution of the Social Contract. Cambridge University Press, 2014.
16
48. B. Skyrms and R. Pemantle. A dynamic model of social network formation. Proceedings
of the National Academy of Sciences, 97(16):9340 -- 9346, 2000.
49. G. Szab´o and I. Borsos. Evolutionary potential games on lattices. Physics Reports, 624:1 --
60, 2016.
50. G. Szab´o and G. F´ath. Evolutionary games on graphs. Physics Reports, 446:97 -- 216, 2007.
51. P. Vanderschraaf. Convention as correlated equilibrium. Erkenntnis, 42:65 -- 87, 1995.
52. D. J. Watts and P. S. Dodds. Influentials, networks, and public opinion formation. Journal
of Consumer Research, 34:441 -- 458, 2007.
53. J. W. Weibull. Evolutionary Game Theory. MIT press, 1997.
54. B. Wu, D. Zhou, F. Fu, Q. Luo, and A. Wang, L.AND Traulsen. Evolution of cooperation
on stochastic dynamical networks. PloS One, 5(6):e11187, 2010.
55. B. Wu, D. Zhou, F. Fu, Q. Luo, L. Wang, and A. Traulsen. Evolution of cooperation on
stochastic dynamical networks. PLoS One, 5:e11187, 2010.
56. S.-H. Yook, H. Jeong, A.-L. Barab´asi, and Y. Tu. Weighted evolving networks. Physical
Review Letters, 86(25):5835, 2001.
57. H. P. Young. The evolution of conventions. Econometrica, 61:57 -- 84, 1993.
17
|
1709.02511 | 1 | 1709 | 2017-09-08T02:41:41 | Predicting the Popularity of Topics based on User Sentiment in Microblogging Websites | [
"cs.SI"
] | Behavioral economics show us that emotions play an important role in individual behavior and decision-making. Does this also affect collective decision making in a community? Here we investigate whether the community sentiment energy of a topic is related to the spreading popularity of the topic. To compute the community sentiment energy of a topic, we first analyze the sentiment of a user on the key phrases of the topic based on the recent tweets of the user. Then we compute the total sentiment energy of all users in the community on the topic based on the Markov Random Field (MRF) model and graph entropy model. Experiments on two communities find the linear correlation between the community sentiment energy and the real spreading popularity of topics. Based on the finding, we proposed two models to predict the popularity of topics. Experimental results show the effectiveness of the two models and the helpful of sentiment in predicting the popularity of topics. Experiments also show that community sentiment affects collective decision making of spreading a topic or not in the community. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Predicting the Popularity of Topics based on User
Sentiment in Microblogging Websites
Xiang Wang · Chen Wang · Zhaoyun
Ding · Min Zhu · Jiumin Huang
7
1
0
2
p
e
S
8
]
I
S
.
s
c
[
1
v
1
1
5
2
0
.
9
0
7
1
:
v
i
X
r
a
Received: Aug. 06, 2016 / Accepted: date
Abstract Behavioral economics show us that emotions play an important role in
individual behavior and decision-making. Does this also affect collective decision
making in a community? Here we investigate whether the community sentiment
energy of a topic is related to the spreading popularity of the topic. To compute
the community sentiment energy of a topic, we first analyze the sentiment of a
user on the key phrases of the topic based on the recent tweets of the user. Then
we compute the total sentiment energy of all users in the community on the topic
based on the Markov Random Field (MRF) model and graph entropy model. Ex-
periments on two communities find the linear correlation between the community
sentiment energy and the real spreading popularity of topics. Based on the finding,
we proposed two models to predict the popularity of topics. Experimental results
show the effectiveness of the two models and the helpful of sentiment in predicting
the popularity of topics. Experiments also show that community sentiment affects
collective decision making of spreading a topic or not in the community.
Keywords Popularity · Community Sentiment Energy · Microblogging
1 Introduction
Predicting is a forever interesting research point in human history. With the rapid
development of Web 2.0 applications, massive online users' personal information
Xiang Wang, Min Zhu
Academy of Ocean Science and Engineering, National University of Defense Technology,
Changsha, 410073, China
Tel.: +86-18975898277
E-mail: [email protected]
Zhaoyun Ding
College of Information System and Management, National University of Defense Technology,
Changsha, 410073, China
Chen Wang, Jiumin Huang
College of Computer, National University of Defense Technology, Changsha, 410073, China
2
Xiang Wang et al.
0.7
0.6
0.5
0.4
0.3
0.2
0.1
i
s
c
p
o
t
l
l
a
f
o
e
g
a
t
n
e
c
r
e
P
0
100
101
Number of days
102
Fig. 1 Life cycle of topics on SINA Weibo. X-axis is on a base-10 log scale
appears in these applications and makes the predicting of online content possi-
ble. We take the Chinese microblogging website SINA Weibo for instance. It is
very similar to Twitter in United States and is one of the most popular sites in
China. There are more than 503 million registered users and about 100 million
messages posting each day on SINA Weibo 1. Given such amazing large number
of information spreading between a large number of users, microblogging website
is a channel of information propagation of the topics in the real world, and it
also influences the development of the related events, activities in the real world.
For example, the hot event of "Guo Meimei" in June 2011 affects the credit of
the Red Cross Society of China deeply, which received much less donation after
the event. Guo Meimei was authenticated as the general manager of Red Cross
Commerce, showed pictures of her lavish lifestyle of driving Mercedes and owning
a big mansion on SINA Weibo. Her lavish lifestyle drew skepticism from people
who questioned if her wealth came from the Red Cross Society of China. So it is
important to predict the popularity of topics.
There have been some efforts building models to predict the popularity of
online contents [34] [21] [20]. They predicted future popularity of a given online
content based on its early popularity and user's early reactions. Szabo and Hu-
berman [29] firstly found the strong linear correlation between the logarithmically
transformed popularity of content at early and later times. Based on the founding,
they proposed Szabo-Huberman (SH) model to predict the popularity of online
content. Some researches [34]
[2] tried to improve the performance of SH
model. There is one problem with existing methods. In Figure 1, we can find that
74.14% topics last for less than 10 days and 81.38% topics last for less than 30
days. Topics change so quickly that it is important to predict the popularity of
topics before they happen to earn enough time to make online advertising plans
for business and so on. Existing methods focus on predicting future popularity
of online contents which have already appeared based on their early popularity
and users' early reactions, but they can not predict the popularity of topics which
appear right now or do not even happen.
[24]
We know little about what drives popularity of topics in social network. Sal-
ganik et al. [26] answered the question experimentally by measuring the impact
of content quality and social influence on the popularity of cultural artifacts like
1 SINA Weibo. Wikipedia. https://en.wikipedia.org/wiki/Sina Weibo
Title Suppressed Due to Excessive Length
3
songs, movies. They found that quality contributes little to their popularity, while
the choices of others (social influence) affect the choice of the user and are re-
sponsibility of the success of cultural artifacts. They answer the question on an
individual's point rather than group perspective. What drives the choices of a com-
munity or a network? In this paper, we try to answer the question on the perspec-
tive of the whole community of network based on user sentiment. Psychological
researches [10] [14] show that emotions (except information) play an significant
role in human decision-making. The decisions of online users to diffuse the tweets
of a topic or not influence the popularity of the topic, so we consider whether
the emotions of users influence topic popularity. Thelwall et al. [30] find the close
relationship between popular evens and the increase of sentiment strength. Bollen
et al. [5] introduced public sentiment to predict stock market. We study if the
sentiment of the users on a topic is related to the popularity of the topic in a
community.
In this paper, we use the number of tweets in a topic to be the popularity of
the topic. We compute the sentiment of online users on key phrases of a topic in a
training dataset of tweets obtained from SINA Weibo API. The sentiment of a user
on the key phrases of a topic can influence the decision of discussing about it or
not. For example, if a user is a big fan of movie actor Arnold Schwarzenegger, then
the user is probably to discuss the topic about Arnold Schwarzenegger. We intro-
duce Markov Random Field (MRF) model [18] and graph entropy model [19] [28]
to compute the total topic sentiment energy in a community based on the users'
sentiment on key phrases of the topic. Pearson correlation coefficient [33] measures
the linear correlation between the community sentiment energies computed from
the training dataset and the real future popularity of testing topics in the test-
ing dataset. Our experimental results show that they are linearly correlated and
indicate the latent ability for predicting the popularity of topics.
Based on the finding, we propose two linear methods to predict the popularity
of un-happened topics. The first one is a one variable linear regression model
named LinearMRF model based on the community sentiment energy. The second
is a multivariate linear regression model named EdgeMRF model, which assume
that the real popularity of topics associates the energy of each edge in the graph
of the community, rather than the community sentiment energy. We find that the
two methods are effective in predicting the popularity of topics and the EdgeMRF
model is significantly better than the LinearMRF model.
The main contributions of this paper can be summarized as follows:
– We find that there is significant linear correlation between the community
sentiment energy and the real popularity of topics in a community. It shows
the effectiveness of sentiment in predicting the popularity of topics and the
sentiment of a community can affect collective decision making of spreading a
topic or not.
– Based on the finding, we propose two methods to predict the popularity of
topics based on community user sentiment. We are the first trying to predict
the popularity of topics that have not happened.
– Extensive experiments on two communities verify our finding and show the
effectiveness of the methods in predicting the popularity of topics that have
not happened.
4
Xiang Wang et al.
The rest of this paper is organized as follows: Section 2 discusses some impor-
tant related works. Section 3 introduces our framework for measuring the linear
correlation between the community sentiment energy and the real popularity of
topics. Based on the results of the Section 3, we introduce two models to pre-
dict the popularity of topics in Section 4. Finally, conclusion and discussion are
provided in Section 5.
2 Related Works
2.1 Popularity Prediction
Some researches try to predict based on user sentiment. Thelwall et al. [30] studied
whether popular events are typically associated with the increase of sentiment
strength. They found that popular events are normally associated with increases
in negative sentiment strength. Bollen et al. [5] compared the changing of Twitter
mood with the Dow Jones Industrial Average (DJIA) over time and found the
association relation between them. They used the relation to predict stock market.
There are a large number of works predicting popularity of online content
like news, videos, and tweets in social networks. Crane and Sornette [8] identified
four main classes of the popularity evolution patterns of YouTube videos. They
explained the reason of the four main classes by the combination of endogenous
and exogenous effects. Szabo and Huberman [29] studied the problem of predicting
the popularity of online content on Digg and Youtube. They found that there were
a strong linear correlation between the logarithmically transformed popularity of
content at early and later times. Because of the founding, they presented a model to
predict future popularity based on the popularity of early times. Pinto et al. [24]
improved Szabo and Huberman's method [29] using the historical information
given by early population measures in Youtube. Figueiredo et al. [15] studied
growth patterns of video popularity and the types of the referrers that most often
attracted users to videos on such patterns. Wu et al. [34] proposed a reservoir
computing based model to predict the near future popularity of a Web object. But
their model does not outperform the Szabo-Huberman model [29], as reported by
the authors. Lee et al. [20] try to predict if a thread in a discussion forum will stat
in popular in the near future using biology-inspired survival analysis method. Yin
et al. [35] tried to rank items in online sharing systems according to their excepted
popularity. Their method was built on a model of user behavior and early votes
of the items. Bao et al. [2] studied the importance of structural characteristics for
the popularity of tweets on SINA Weibo. They find that the prediction accuracy
can be improved by incorporating the factor of structural diversity into some
existing content based methods. Gao et al. [16] tried to find effective features for
tweet popularity prediction. They obtain the temporal features of first 10 retweets
which satisfy prediction performance. Kristina and Tad [21] proposed a stochastic
models of user behavior based method to predict popularity in social news portal
Digg. They use early user reactions to a new submission to to predict how many
votes the story will get a few days later. Hong et al. [17] cast the task of predicting
the popularity of messages into a classification problem by investigating features
like the content of the messages, users' social graph and so on.
Title Suppressed Due to Excessive Length
5
There are some researches predicting hot topics in online forums or information
retrieval systems, but they did not utilize the rich relations between users in social
network. Tong et al. [31] put forward an adaptive autoregressive model to predict
hot topics in the near future based on the web browsing log information. Buckley [7]
tried to improve the performance of information retrieval by predicting which
topics work well with which approaches.
2.2 Sentiment Analysis
Sentiment analysis, which is also named opinion mining, is to study text with
sentiments, opinions, emotions and so on. In social network platforms, users are
free to express their daily sentiments and opinions. Many researches focused on
this research area in social networks. Barbosa et al. [3] proposed a method to
detect user sentiments on Twitter tweets using characteristics of how tweets are
written and meta-information of the words in the tweets. Davidov et al. [12] pro-
posed a supervised sentiment classification framework by utilizing 50 Twitter tags
and 15 emoticons. Jonathon Read [25] used emoticons to reduce dependency in
Machine learning methods for sentiment classification. Diakopoulos et al. [13] char-
acterized the performance of U.S. presidential debate in 2008 by analyzing users
sentiments in twitter. Bollen et al. [6] extract six dimensions of mood (tension,
depression, anger, vigor, fatigue, confusion) and compared the results with fluc-
tuations recorded by stock market. Tumasjan et al. [32] found that Twitter user
sentiment validly mirror offline German federal election. Bifet et al. [4] found that
Twitter messages are short and generated constantly, and well suited the char-
acteristics of data stream. They proposed a stream based method on sentiment
analysis.
Although there are many researches in computing the sentiment of a post in
microblogging websites, the computing time is too long to be used, since there
are 155,941,545 tweets in our "Jackie Chan" dataset and 12,633,641 tweets in our
"Zhi-Hua Zhou" dataset. So we use the simple sentiment computing method of
using emoticons like [12] and then compute the community sentiment energy of
topics.
3 Framework of our methods
3.1 Dataset and methods overview
We obtained public tweets for six months from Jul. 1st to Dec. 31st, 2014 using
SINA Weibo API. We got 6,824,948,570 public tweets of 90,388,540 users. If a user
i retweets from user j or mentions user j (@username), then there is a retweet-
mention-relation between user i and j. The relations between users were extracted
from the 6,824,948,570 public tweets of 90,388,540 users. User's social graph G
was constructed based on the retweet-mention-relations between the users. We
obtained a user community in the graph G of the 90,388,540 users from a specific
6
Xiang Wang et al.
Fig. 2 The framework of our methods. There are mainly 5 phases: (1) Extract test topics and
their top-m key phrases using ANSJ toolkit; (2) Analyze user's sentiment on the top-m key
phrases of topics; (3) Compute the total sentimental energy of the community using Markov
Random Field (MRF) model and graph energy model; (4) Measure the linear correlation
between the total sentimental energy of the community and the real popularity of topics; (5)
Propose two methods to predict the popularity of topics that have not happened yet.
user who is the only one in the initial seed set SeedSet based on the retweet-
mention-relations. The community is made by the neighbors at distance up to
M axDepth. We got a community of 137,613 users from the specific user "Jackie
Chan" 2, who is a famous Hong Kong movie actor 3. Another community is from
user "Zhi-Hua Zhou" 4, who is the ACM/AAAS/AAAI/IEEE Fellow majoring in
machine learning of Nanjing University 5. There are 16,628 users in the "Zhi-Hua
Zhou" community. The maximum depth M axDepth is 4 in the "Jackie Chan"
community and 3 in the "Zhi-Hua Zhou" community, since there are too many
users which will take too long time to finish computing in the "Zhi-Hua Zhou"
community if M axDepth is 4.
We extracted public tweets of the users in the two communities for six months
from Jul. 1st to Dec. 31st, 2014 on SINA Weibo. There are totally 155,941,545
tweets in the "Jackie Chan" dataset and 12,633,641 tweets in the "Zhi-Hua Zhou"
dataset. We split the dataset into two parts: train dataset which contains 110,938,220
tweets in the "Jackie Chan" dataset (8,039,686 tweets in the "Zhi-Hua Zhou"
dataset) in the first four months from Jul. 1th to Oct. 31 and test dataset which
contains 45,003,325 tweets in the "Jackie Chan" dataset (4,593,955 tweets in the
"Zhi-Hua Zhou" dataset) in the last two months from Nov. 1 to Dec. 31.
As shown in Figure 2, our methods proceed in five phases. In the first phase,
we extract testing topics from the test dataset of the last two months and the
details are in Section 3.2. For each testing topic, we gather all tweets in the topic
to one document and extract top-10 key phrases from the document using the key
phrase extraction tool ANSJ 6 which is an open source Chinese word processing
toolkit. In the second phase, we compute the sentiment of every user on the top-10
2 Homepage of Jackie Chan on SINA Weibo. http://weibo.com/jackiechan.
3 Jackie Chan. Wikipedia. http://en.wikipedia.org/wiki/Jackie Chan.
4 Homepage of Zhi-Hua Zhou on SINA Weibo. http://weibo.com/zhouzh2012.
5 Zhi-Hua Zhou's Homepage. https://cs.nju.edu.cn/zhouzh/.
6 ANSJ: https://github.com/NLPchina/ansj seg
Title Suppressed Due to Excessive Length
7
key phrases of each testing topic from the training dataset of the first 4 months.
A 10-dimensional sentiment vector of the top-10 key phrases of a topic is built
for a user. Each dimension in the sentiment vector corresponds to one of the top-
10 key phrases of the topic. The details of this phase are in Section 3.3. In the
third phase, latent energy of the user community on a topic is calculated based on
the sentiment vector built in the second phase using the training dataset. Markov
random field (MRF) model [18] and graph entropy model [19] [28] are employed
to compute the latent community sentiment energy of the user community. The
details of this phase are in Section 3.4 and 3.5. In the fourth phase, we investigate
the hypothesis that the community sentiment energy of a topic as computed based
on user sentiment is predictive of future popularity of the topic. We use Pearson
correlation coefficient 7 to correlate the real testing topic popularity in the testing
dataset to the community sentiment energy computed in the training dataset.
The details of this phase are in Section 3.6. In the fifth phase, we propose two
methods to predict the popularity of the topics and employ the real popularity of
the topics to validate the effectiveness of our methods. The details of this phase
are in Section 4.
3.2 Testing topics and their key phrases
On SINA Weibo, users can annotate tweets with hashtags ("#hashtag#" on
SINA Weibo, "#hashtag" on Twitter) to indicate the ongoing topics. For exam-
ple, "#Rio2016#" ("#Rio2016" on Twitter) is the hashtag indicating the topic
of"Summer Olympics 2016". We use hashtags to represent topics and use the hash-
tags to extract tweets of topics from the test dataset (if a tweet contains a hashtag,
then the tweet is about the topic of the hashtag). It is a convenient way to cate-
gorize tweets into different topics. In this paper, we use the number of tweets in a
topic to be the popularity of the topic. We count the occurrence number of every
hashtag in the tweets of our test datasets to be the popularity of the correspond-
ing topic. If a tweet has multiple hashtags, then the tweet will belong to multiple
topics in our experiments.
To make sure that the topics have fully diffused and the popularity of the
topics is correctly calculated, we only extracted topics (hashtags) which begin in
the first month (November 2014) of the test dataset. Topics which begin in the
second month (December 2014) may have not fully diffused and the number of
tweets in the topics may not be correct. To count the number of tweets in the
topics, the whole tweets in the test dataset of the two months (November and
December, 2014) are used. We remove unpopular topics which are less than 100
tweets and get 5150 topics in the test dataset of the "Jackie Chan" community and
224 topics in the test dataset of the "Zhi-Hua Zhou" community. After removing
topics with same number of tweets, we finally get 298 topics in the "Jackie Chan"
community and 141 topics in the "Zhi-Hua Zhou" community for testing. Figure 3
shows the real popularity (the number of tweets) of the 298 topics and the 141
topics for testing.
7 Pearson
correlation
coefficient:
https://en.wikipedia.org/wiki/Pearson product-
moment correlation coefficient
8
Xiang Wang et al.
i
c
p
o
T
a
n
i
s
t
e
e
w
T
f
o
r
e
b
m
u
N
5
4
3
2
1
0
x 104
i
c
p
o
T
a
n
i
s
t
e
e
w
T
f
o
r
e
b
m
u
N
0
50
100
150
200
250
300
2000
1500
1000
500
0
0
50
100
150
(a) "Jackie Chan" dataset
(b) "Zhi-Hua Zhou" dataset
Fig. 3 Number of tweets in the testing topics of the two communities
ANSJ is an open source Chinese word processing toolkit. It can be used for
keyword extraction, word segmentation and so on. NLPIR (ICTCLAS) 8 is also a
popular Chinese word processing tool that can extract key phrases from a docu-
ment, but NLPIR (ICTCLAS) can not handle large document quickly, so we choose
ANSJ to process key phrases extraction. We add stopwords to ANSJ toolkit to
avoid the appearance of them in the results. We gather all tweets in a topic to one
document and then extract the top-m key phrases from the document using ANSJ.
A topic k is then represented as a bag of key phrases as shown in Equation 1.
T opick = [termk,1, termk,2, · · · , termk,m]
(1)
where termk,n(n = 1, 2, · · · , m) is one of the top-m key phrases extracted from
topic k using ANSJ. We set m to be 10 empirically in all our experiments.
3.3 User sentiment on a topic
Since a topic is represented as a bag of key phrases as shown in Equation 1,
then the sentiment of a user on a topic can be represented by the sentiment on
the top-m key phrases. We compute the user sentiment of the testing topics from
the training dataset. Suppose s(ui)k,n is the sentiment of user ui on key phrase
termk,n(n = 1, 2, · · · , m), then the sentiment sen(ui, k) of user ui on topic k is
represented as Equation 2.
sen(i, k) = [s(ui)k,1, s(ui)k,2, · · · , s(ui)k,m]
(2)
As the length of a tweet on SINA Weibo is very short without exceeding 140
characters, we simply assume that the sentiment of user ui on a key phrase of a
tweet is equal to the sentiment of user ui on the tweet which contains the key
phrase. If the key phrase does not exist in the tweet, the sentiment of ui on the
tweet will be 0. There are a large percent of tweets that do not contain the key
phrases of a topic, but we use months of user tweets in the training dataset and we
compute sentiment energy of a community of users rather than a user. So there are
still many tweets containing the key phrases of a topic for computing community
sentiment energy.
8 NLPIR: http://ictclas.nlpir.org/
Title Suppressed Due to Excessive Length
9
Fig. 4 Typical emoticons on SINA Weibo
In microblogging websites, the words in tweets are usually non-standardized
and personalized. There are always a lot of new words existing and traditional
methods for computing sentiment is hard to be used. There are so many tweets
(110,938,220 tweets in the train dataset) that the amount of calculation is very
huge. Many researches in computing the sentiment of a post in microblogging
websites can not be used due to the computational speed in so many tweets.
Emoticons are convenient ways for users in microblogging website to show their
emotions and sentiment when they are posting tweets. We find that there are
52,602,698 tweets contains emoticons in the 110,938,220 tweets of the "Jackie
Chan" train dataset. It is 47.42% of all tweets in the train dataset. We compute
the user sentiment on a tweet based on 436 emoticons on SINA Weibo as shown
in Figure 4 like [12]. We annotate the 436 emoticons to be positive, negative or
neutral manually. There are three volunteers to annotate the 436 emoticons. If two
or all of the three volunteers think the emoticon is positive (negative or neutral),
then it is. There are no cases that all the three volunteers hold different opinions
in the process of annotation since the emoticons are relatively easy to annotate.
Suppose there are pos positive emoticons and neg negative emoticons on a tweet
j which contains the key phrase termk,n(n = 1, 2, · · · , m), then the sentiment
stweet(ui, j) of the user ui on the tweet j and the sentiment sphrase(ui, j)k,n of
the user ui on the key phrase termk,n(n = 1, 2, · · · , 10) of tweet j can be calculated
as Equation 3.
sphrase(ui, j)k,n = stweet(ui, j) = (pos − neg)/(pos + neg)
(3)
If key phrase termk,n(n = 1, 2, · · · , m) does not appear in tweet j, then
sphrase(ui, j)k,n = 0. If T weet(ui) is the set of all tweets of user ui, then the
sentiment sen(ui)k,n of user ui on key phrase termk,n(n = 1, 2, · · · , m) in Equa-
tion 2 can be calculated as shown in Equation 4.
s(ui)k,n =
1
T weet(ui)
X
sphrase(ui, j)k,n
(4)
j∈T weet(ui)
3.4 Community Sentiment Energy based on Markov Random Field model
Markov Random Field (MRF) [18], which is also known as Markov network or
undirected graphical model, is a set of random variables having a Markov property
in an undirected graph. MRF is commonly used in statistical machine learning to
10
Xiang Wang et al.
model joint distributions, such as modeling image de-noising [22], information
retrieval [23] and so on. A MRF is an undirected graph G = (V, E), where V =
{u1, u2, ..., uN } is the set of users in social network, E is the set of retweet-mention-
relations between users. Each node ui(i = 1, 2, · · · , N ) is associated with a random
variable (RV), which is the sentimental vector sen(ui, k)(i = 1, 2, ..., N ) of user ui
on topic k. To satisfy the Markov property, we assume that information only
diffuses to neighbours. Then MRF satisfies p(sen(ui, k){sen(uj, k)}j=1,2,...,N ) =
p(sen(ui, k){sen(uj, k)}uj ∈Ni
), where Ni is the neighbourhood of node ui, uj ∈
Ni if and only if (ui, uj) ∈ E.
x
According to MRF, suppose Cx is one of the max cliques in the graph and C =
E(Cx, k).
Cx, the total energy of graph G on topic k is E(G, k) = E(C, k) = P
S
x
To simplify handling, we only consider the cliques with two nodes. In other words,
we only consider the cliques where two nodes are connected by an edge. The energy
of a max clique with multi nodes is simply the sum of energy of each sub-clique with
two nodes. We define two kinds of energy function of cliques with two nodes: cosine
measure and average length. We try to compute the community sentiment
energy between ui and uj using the two functions to evaluate the probability of ui
and uj talking about a topic in microblogging websites. We find that if two users
have the same sentiment on a topic, they like to talk about it and the sentimental
energy between them will be large. If they have opposite sentiment on a topic, they
also like to debate on it and the sentimental energy between them will be large
too. So traditional Euclidean Distance does not suit this case, since the sentimental
energy will be zero if two users have exactly the same sentiment on a topic. So
we use the average length of the two sentimental vectors to the zero-vector to
represent the sentimental energy between two users. The absolute value of cosine
similarity (cosine measure) of two vectors also suits this case.
For energy function cosine measure, Equation 5 is the energy of the clique Cij
between two nodes ui and uj. It is the absolute value of cosine similarity between
sentimental vectors sen(ui, k)(i = 1, 2, ..., N ) and sen(uj, k)(j = 1, 2, ..., N ) of
node ui and uj on topic k.
E(Cij, k) = E(sen(ui, k), sen(uj, k)) =
sen(ui, k) • sen(uj, k)
sen(ui, k) • sen(uj, k)
(5)
For energy function average length, Equation 6 is the energy of the clique
Cij between two nodes ui and uj. It is the average length of sentiment vectors
sen(ui, k)(i = 1, 2, ..., N ) and sen(uj, k)(i = 1, 2, ..., N ) of node ui and uj.
E(Cij, k) = E(sen(ui, k), sen(uj, k)) =
sen(ui, k) + sen(uj, k)
2
(6)
The community sentiment energy of graph (community) G on topic k can be
calculated as Equation 7,
E(G, k) = E(U, k) = X
E(Cij, k) = X
E(sen(ui, k), sen(uj, k))
(7)
C
(ui,uj )∈E
where E is the edge set of Graph G.
Title Suppressed Due to Excessive Length
11
3.5 Community Sentiment Energy based on Graph Entropy Model
Shannon [27] proposed entropy to quantify information in information theory.
Shannon's measure of information is the number of bits to represent the amount
of uncertainty (randomness) in a data source. Korner et al.
[19] [28] introduced
graph entropy associated with the graph based on the Shannon entropy. Anand
and Bianconi [1] studied different definition of entropy of network ensembles for
the quantification of the complexity of networks. Cruz et al. [9] proposed a method
to detect community based on the graph entropy. In this paper, we compute the
graph entropy of a community (energy of a community) to show the quantification
of the complexity of the community. Graph entropy, which measures the latent
community sentiment energy of the graph, is computed based on the user sentiment
vector of a topic. Given a graph G, suppose peij is the probability of edge eij of
user ui and uj to communicate about the topic k. Like paper [1] and [9], the graph
entropy (the sentiment energy) of the community can be calculated as Equation 8.
E(G, k) = − X
eij∈E
(peij log(peij) + (1 − peij) log(1 − peij))
= − X
C
(E(Cij, k) log(E(Cij, k)) + (1 − E(Cij, k)) log(1 − E(Cij, k)))
(8)
where E is the edge set of Graph G. The probability peij of edge eij of user ui
and uj to communicate about the topic k can be computed based on the user
sentiment vectors sen(ui, k)(i = 1, 2, ..., N ) and sen(uj, k)(j = 1, 2, ..., N ). The
function cosine measure in Equation 5 and average length in Equation 6 are
used to compute peij. Suppose sen(ui, k) and sen(uj, k) are the sentiment vectors
of user ui and uj for topic k, for function cosine measure, we can calculate peij
as peij = E(Cij, k) =
sen(ui,k)•sen(uj ,k)
sen(ui,k)•sen(uj ,k)
; for function average length, we can
calculate peij as peij = E(Cij, k) =
sen(ui,k)+sen(uj ,k)
2
.
3.6 Linear Correlation Between Community sentiment Energy and the Real
Popularity of Topics
Section 3.4 and 3.5 shows two different models of MRF and graph entropy in
computing community sentiment energy on a topic. Two energy functions cosine
measure in Equation 5 and average length in Equation 6 are used to compute
the energy or the probability peij to communicate between user ui and user uj.
In this section, we study whether the community sentiment energy is predictive of
the real popularity of a topic in the community. We study the linear correlation
between the graph energy of a community and the real popularity. In this paper,
we define the number of tweets in a topic to be the real popularity of the topic.
Pearson correlation coefficient [33] developed by Karl Pearson is widely used to
measure the linear correlation (dependence) between two variables. Correlation co-
efficient r is to measure the strength of the relationship between the two variables.
In general, the higher the correlation coefficient r, the stronger the relationship.
Significance tests are done to test if correlation coefficient is significantly different
12
i
s
c
p
o
t
f
o
r
e
b
m
u
N
300
250
200
150
100
50
0
10 100 200 300 400 500 600 700 800 9001000
The difference of the real popularity
Xiang Wang et al.
i
s
c
p
o
t
f
o
r
e
b
m
u
N
150
100
50
0
1
10
50
100
150
200
The difference of the real popularity
(a) "Jackie Chan" dataset
(b) "Zhi-Hua Zhou" dataset
Fig. 5 The number of topics in the 11 datasets. The gaps of the real popularity between every
two topics in the test datasets are shown on the X axis
from zero. There are often three typical significance level of p-value p: 0.01, 0.05
and 0.1. If p-value p is smaller than a significance level such as 0.05, then corre-
lation coefficient is significantly different from zero in the significance level 0.05.
We compute the r and p to test the linear correlation between the community
sentiment energy and the real popularity.
To test the linear relations between the community sentiment energy and the
real popularity of topics, we constructed 11 test datasets (6 test datasets) ac-
cording to the gap of the number of tweets between every two topics in the
"Jackie Chan" ("Zhi-hua Zhou") dataset. The gap of the real popularity be-
tween every two topics in a test dataset are equal or larger than N um(N um =
10, 100, 200, 300, 400, 500, 600, 700, 800, 900, 1000) in the "Jackie Chan" dataset and
N um(N um = 1, 10, 50, 100, 150, 200) in "Zhi-hua Zhou" dataset. For example, for
dataset N um = 10, The gap of the real popularity between every two topics are
equal or larger than 10. Figure 5 shows the number of topics in the test datasets
of the two communities.
We compute the Pearson correlation coefficients of the community sentiment
energy and the real popularity with the change of the different N um in the test
dataset of the two communities. Table 1 and 2 shows the pearson correlation co-
efficient results of community sentiment energy and real popularity on the 11 test
datasets of "Jackie Chan" community and 5 test datasets of "Zhi-hua Zhou" com-
munity. According to [11], the strength of correlation can be classified to five cat-
egorisations: Zero(0), Weak(0.1-0.3), Moderate(0.4-0.6), Strong(0.7-0.9) and Per-
fect(1.0). So if the p-value is smaller than the significance level and the Pearson
correlation coefficient r-value is larger than 0.4, the linear correlation between the
topic sentiment energy of a community and the real popularity is significant.
In Table 1 and 2, we can find that the community sentiment energy computed
by MRF model with energy function "cosine measure" has a significant linear
correlation with the real topic popularity if the different N um is equal or larger
than 100 in the "Jackie Chan" dataset and 1 in the "Zhi-hua Zhou" dataset. It
means that it's possible to predict the popularity of topics that did not happen
with a small error. Significant test student's t-test 9 is used to indicate statisti-
cally significant improvements of one method over another methods. The p-values
of student's t-test of the method "MRF+CosineMeasure" over the other three
9 Student's t-test. Wikipedia. https://en.wikipedia.org/wiki/Student's t-test
Title Suppressed Due to Excessive Length
13
Table 1 Pearson correlation coefficient results of community sentiment energy and real pop-
ularity in "Jackie Chan" dataset
GraphEntropy
+AverageLength
r
0.1561
0.1572
0.1064
0.2225
0.2611
0.2895
0.2769
0.2207
0.2767
0.4073
0.3966
p
0.0128
0.1971
0.4764
0.1793
0.156
0.1277
0.1709
0.3115
0.2125
0.0668⋆
0.0928
MRF
+ AverageLength
r
p
MRF
+CosineMeasure
r
p
0.2065
0.3329
0.3935
0.4067
0.5079
0.4459
0.5643
0.5485
0.4853
0.3973
0.5509
9.50E-04
0.0046
0.0062
0.0113⋆⋆
0.003⋆ ⋆ ⋆
0.0153⋆⋆
0.0041⋆ ⋆ ⋆
0.0067⋆ ⋆ ⋆
0.022⋆⋆
0.0828
0.0118⋆⋆
0.2832
0.4295
0.5055
0.4157
0.5954
0.5580
0.6384
0.5111
0.5339
0.5792
0.6442
5.10E-06
1.60E-04⋆ ⋆ ⋆
2.40E-04⋆ ⋆ ⋆
0.0094⋆ ⋆ ⋆
4.10E-04⋆ ⋆ ⋆
0.0017⋆ ⋆ ⋆
4.40E-04⋆ ⋆ ⋆
0.0127⋆⋆
0.0105⋆⋆
0.0059⋆ ⋆ ⋆
0.0029⋆ ⋆ ⋆
GraphEntropy
+ CosineMeasure
r
0.1492
0.1929
0.1884
0.2399
0.3201
0.1529
0.256
0.0876
0.3459
0.1128
-0.1993
p
0.0169
0.1122
0.2048
0.1468
0.0792
0.4286
0.2273
0.6911
0.1149
0.6264
0.3995
Datasets
10
100
200
300
400
500
600
700
800
900
1000
( Significance tests p-value<0.01: ⋆ ⋆ ⋆, p-value<0.05: ⋆⋆, p-value<0.1: ⋆)
Table 2 Pearson correlation coefficient results of community sentiment energy and real pop-
ularity in "Zhi-hua Zhou" dataset
GraphEntropy
+AverageLength
r
p
0.2107
0.4201
0.6697
0.6061
0.6875
0.6034
0.0125
0.0033⋆ ⋆ ⋆
0.0045⋆ ⋆ ⋆
0.0481⋆⋆
0.0595⋆
0.1514
MRF
+ AverageLength
r
p
0.1709
0.3928
0.6568
0.5656
0.6201
0.5506
0.0435
0.0063
0.0057⋆ ⋆ ⋆
0.0698⋆
0.1010
0.2003
MRF
+CosineMeasure
r
0.4196
0.6153
0.7275
0.8623
0.8488
0.9008
p
2.4682e-7⋆ ⋆ ⋆
4.1738e-6⋆ ⋆ ⋆
0.0014⋆ ⋆ ⋆
6.3824e-4⋆ ⋆ ⋆
0.0077⋆ ⋆ ⋆
0.0056⋆ ⋆ ⋆
GraphEntropy
+ CosineMeasure
r
p
0.3758
0.4307
0.5636
0.6286
0.7162
0.7539
4.7416e-6
0.0025⋆ ⋆ ⋆
0.0230⋆⋆
0.0383⋆⋆
0.0457⋆⋆
0.0503⋆
Datasets
1
10
50
100
150
200
( Significance tests p-value<0.01: ⋆ ⋆ ⋆, p-value<0.05: ⋆⋆, p-value<0.1: ⋆)
methods "GraphEntropy+AverageLength", "MRF+AverageLength", "GraphEn-
tropy+CosineMeasure" are 7.5e-007, 0.0011 and 1.5e-004 in the "Jackie Chan"
dataset. The p-values of t-test over the three methods in the "Zhi-hua Zhou"
dataset are 0.0022, 0.0017 and 0.0021. They are all smaller than typical signifi-
cant level 0.01. It means that the method "MRF+CosineMeasure" is the best one
of the four methods in computing the community sentiment energy. The method
"MRF+AverageLength" in "Jackie Chan" dataset is also better than "GraphEn-
tropy+AverageLength" and "GraphEntropy+CosineMeasure", since the p-values
of "MRF+AverageLength" over "GraphEntropy+AverageLength" and "GraphEn-
tropy+CosineMeasure" are 1.1e-004 and 8.5e-004, which are smaller than sig-
nificant level 0.01. But in the "Zhi-hua Zhou" dataset, the p-value of method
"MRF+AverageLength" and "GraphEntropy+CosineMeasure" is 0.1215, so no
one is significant better than the other one.
We try different splits of training dataset and testing dataset to show the effect
of the method "MRF+CosineMeasure" which is the best one of the four proposed
methods. In previous experiments, we use 4 months' tweets to be training dataset
for computing community sentiment energy, the other two months' tweets to be
the testing dataset. We try to use early 3 months' (2 months', 1 month) tweets
to be the training dataset and the other tweets to be the testing dataset. Table 3
shows the experimental results of different splits of training dataset and testing
dataset. We can find that all r-values of Pearson correlation coefficient are larger
14
Xiang Wang et al.
Table 3 Pearson correlation coefficient results of community sentiment energy and real pop-
ularity of "MRF+CosineMeasure" method in different splits of "Zhi-hua Zhou" dataset
Datasets
1
10
50
100
150
200
1 months training
2 months training
3 months training
4 months training
r
0.4769
0.4800
0.4722
0.7830
0.7709
0.8789
p
2.5738e-9
6.3906e-4
0.0648
0.0044
0.0251
0.0092
r
0.4690
0.5611
0.5905
0.8607
0.8334
0.8930
p
5.0831e-9
4.0823e-5
0.0160
6.6926e-4
0.0102
0.0068
r
0.4380
0.5936
0.6872
0.8711
0.8457
0.9045
p
6.2311e-8
1.7265e-5
0.0033
4.8043e-4
0.0082
0.0051
r
0.4196
0.6153
0.7275
0.8623
0.8488
0.9008
p
2.4682e-7
4.1738e-6
0.0014
6.3824e-4
0.0077
0.0056
than 0.4. The p-values of student t-test of 4 months' tweets training to 3 months'
(2 months', 1 month) tweets training are 0.5471, 0.3294, 0.1047. The p-values are
all not less than 0.1 and the values show that 4 months training dataset is not
significantly better than the 3 months' (2 months', 1 month) training dataset.
But the p-values are decreasing with the decrease of the number of tweets in the
training dataset. So we can find that the decreasing of the number of tweets in the
training dataset does not significantly degrade the performance. It means we can
use less training tweets to predict the popularity of topics.
4 Prediction Model and Experiments
Section 3.6 studied the linear correlation relation between the community sen-
timent energy and the real popularity in a community. The experiments show
that the community sentiment energy computed based on Markov Random Field
(MRF) model with energy function "cosine measure" is the best one of the pro-
posed methods in predicting the popularity of topics that have not appeared. In
this section, we proposed two linear methods to predict the popularity of topics
based on the method: LinearMRF and EdgeMRF.
LinearMRF. This method is based on the proved hypothesis that the com-
munity sentiment energy based on the MRF model with energy function "cosine
measure" has a significant linear correlation with the real topic popularity. We can
predict the popularity of topic k using Equation 9,
P (G, k) = α • E(G, k) + β
(9)
where α and β are the parameters that need to learn. The definition of E(G,k)
shows in Equation 7.
EdgeMRF. This method assumes that each edge eij in the graph G has
different weight ωeij. The predicted popularity of topic k has a linear correlation
with the energy of each edge in graph G of the community. Equation 10 shows
how to compute the sentiment energy of topic k,
P (G, k) = X
(ui,uj )∈E
ωeij • E(sen(ui, k), sen(uj, k)) + ρ
(10)
where E(sen(ui, k), sen(uj, k)) is defined in Equation 5 and ρ is a parameter which
needs to learn from training.
Loss function based on "mean squared error" estimator is constructed to learn
the best parameters for predicting popularity of topics in Equation 9 and 10. Let
Title Suppressed Due to Excessive Length
15
x 104
6
5
4
3
2
1
0
0.5
1
1.5
2
2.5
3
x 104
1200
1100
1000
900
800
700
600
500
0
500
1000
1500
2000
(a) N um = 800 of "Jackie Chan" dataset
(R2 = 0.3943)
(b) N um = 200 of "Zhi-Hua Zhou" dataset
(R2 = 0.8115)
Fig. 6 Regression Line of the LinearMRF method in the two communities
ST be the set of all topics in the train dataset, then the loss function is shown in
Equation 11,
1
2ST
l =
(P (G, k) − real(G, k))2
(11)
X
k∈ST
where real(G, k) is the real popularity of graph G on topic k.
Stochastic gradient descent method is introduced to minimize the total loss
through training. The steps of stochastic gradient descent can be presented as
follows: (1) Choose the initial values of the parameters and learning rate. (2)
Repeat step (2.1) and (2.2) until an approximate minimum of the loss function is
obtained: (2.1) Compute the gradient of each parameter; (2.2) Update the values
of the arguments toward the descending gradient.
We take parameter ωeij for example to illustrate how we use stochastic gradient
descent to learn parameters in our framework. The gradient of parameter ωeij can
be calculated as Equation 12,
∂l
∂ωeij
=
1
ST
X
k∈ST
(P (G, k) − real(G, k)) • E(Cij, k)
(12)
where E(Cij, k) is computed in Equation 5. Parameter ωeij can be updated ac-
cording to Equation 13,
ωeij
(t+1) = ωeij
(t) − η •
∂l
∂ωeij
(13)
where η is the learning rate and ∂l
∂ωeij
is calculated in Equation 12.
Figure 6 shows the regression lines of the LinearMRF method. We use co-
efficient of determination 10 to measure the goodness of fit of the LinearMRF
method. Figure 6(a) shows the regression line with coefficient of determination
R2 = 0.3943 on the dataset N um = 800 when the RSE value is the smallest one
of the LinearMRF in the "Jackie Chan" community in Table 4. Figure 6(b) shows
the regression line with coefficient of determination R2 = 0.8115 on the dataset
N um = 200 when the RSE value is the smallest one of the LinearMRF in the
10 Coefficient of determination. Wikipedia. https://en.wikipedia.org/wiki/Coefficient of determination
16
Xiang Wang et al.
"Zhi-Hua Zhou" community in Table 5. The results show the goodness of fit of
the LinearMRF method.
Like [29], we use the Relative Squared Error (RSE) to evaluate the performance
of the prediction models as shown in Equation 14,
RSE =
P
k∈ST
P
k∈ST
(P (G, k) − real(G, k))2
(real(G, k) − real(G, k))2
(14)
where P (G, k) is the predicted popularity of the topics of our methods and real(G, k)
is the real popularity of topics. real(G, k) = 1
real(G, k) is an average of
ST P
k∈ST
the real popularity of the topics.
Table 4 Prediction Errors (Relative Squared Error) for the LinearMRF and EdgeMRF Models
for Topics in the "Jackie Chan" Datasets
Dataset
LinearMRF EdgeMRF
100
200
300
400
500
600
700
800
900
1000
0.8564
0.8595
0.7710
0.8732
1.0536
0.6935
0.6845
0.6437
0.9148
0.6990
0.7820
0.7555
0.7701
0.7016
0.7153
0.6997
0.7180
0.7053
0.7029
0.6764
Table 5 Prediction Errors (Relative Squared Error) for the LinearMRF and EdgeMRF Models
for Topics in the "Zhi-hua Zhou" Datasets
Dataset
LinearMRF EdgeMRF
1
10
50
100
150
200
0.8534
0.8417
0.7942
0.6658
0.5253
0.5219
0.7371
0.6957
0.4453
0.3748
0.2112
0.2607
We evaluate the performance of the LinearMRF and EdgeMRF models in the
"Jackie Chan" dataset and "Zhi-hua Zhou" dataset described in Section 3.6. In
each test dataset, we randomly split the dataset to train dataset and test dataset
with equal number of topics (the train dataset have one more topic when the
number of topics in the dataset N um is odd). Table 4 and 5 shows the prediction
errors of the two models in the "Jackie Chan" and "Zhi-hua Zhou" datasets. We
can find that only the RSE value 1.0536 of the LinearMRF model on dataset
N um = 500 is beyond 1.0 of the "Jackie Chan" dataset. Other RSE values are
all smaller than 1.0. In the "Jackie Chan" dataset, the RSE values of LinearMRF
in dataset N um = 600, N um = 700, N um = 800 and N um = 1000 are smaller
Title Suppressed Due to Excessive Length
17
than 0.7. The prediction errors of EdgeMRF are all less than 0.8 in the 10 datasets
of "Jackie Chan" community. In the "Zhi-hua Zhou" dataset, the RSE value of
EdgeMRF method even reaches 0.2112 when N um = 150. The prediction errors of
EdgeMRF are less than 0.5 when N um is equal to or larger than 50. The results
show that LinearMRF and EdgeMRF are effective in predicting popularity of
topics in both the "Jackie Chan" and "Zhi-hua Zhou" dataset. We use Student's t-
test to indicate statistically significant improvements of the EdgeMRF model over
the LinearMRF model. The p-value of the EdgeMRF model over the LinearMRF
model is 0.0691 in the "Jackie Chan" dataset and 0.0014 in the "Zhi-hua Zhou"
dataset. It's a significant improvement in the significant level 0.1 and 0.01 in the
two datasets. So the EdgeMRF model is statistically better than LinearMRF to
predict popularity of topics.
5 Discussion
In this paper, we try to predict the popularity of topics which have not appeared
in a microblogging website. Some existing works like TDT tasks have been done to
detect and track topics. Some researches predict the popularity of online content
based on their early popularity information. But these works predict the online
content which has already happened. We are the first trying to predict the popu-
larity of un-happened things.
The sentiment of a user on the key phrases of a topic can influence the deci-
sion of whether to discus about it. Based on this observation, we employ Markov
Random Field (MRF) model and graph entropy model to compute the community
sentiment energy of a topic, which is probably correlated with the real popular-
ity of the topic. Experiments show the linear correlation between the community
sentiment energy based on the MRF model and the real popularity of topics.
We propose two models LinearMRF and EdgeMRF to predict the popularity
of topics. The relative squared errors (RSE) of EdgeMRF can reach about 0.7 in
all the ten datasets of "Jackie Chan" community. The value of RSE even reach
0.2112 in the dataset N um = 150 of "Zhi-hua Zhou" community. The results
show the value of users' history sentiment on predicting the popularity of topics.
It also shows the sentiment of a community can affect collective decision making of
spreading a topic or not in the community. Our work can be used in many areas.
For example, online social network marketing can use our work of predicting the
popularity of topics to earn enough time in making plans for advertising. For
potential candidate of government, it is very useful for them to find what the
citizens care about for making helpful policies and earning the people's support.
The performance can be improved since our predicting models are simple and
straightforward. We'll try to improve the models in future. The early population
information and the structure of social network are also very helpful and we'll
add this information to our model to improve the performance of predicting the
popularity of topics in future.
Acknowledgements This work is supported by National Natural Science Foundation of
China (Grant No. 61502517) and the National Defense Science and Technology Project Funds
(Grant No. 3101283).
18
References
Xiang Wang et al.
1. Anand, K., Bianconi, G.: Entropy measures for networks: Toward an information theory
of complex topologies. Physical Review E 80(4), 045,102 (2009)
2. Bao, P., Shen, H.W., Huang, J., Cheng, X.Q.: Popularity prediction in microblogging
network: a case study on sina weibo. In: Proceedings of the 22nd international conference
on World Wide Web companion, pp. 177–178. International World Wide Web Conferences
Steering Committee (2013)
3. Barbosa, L., Feng, J.: Robust sentiment detection on twitter from biased and noisy
In: Proceedings of the 23rd International Conference on Computational Linguis-
data.
tics: Posters, pp. 36–44. Association for Computational Linguistics (2010)
4. Bifet, A., Frank, E.: Sentiment knowledge discovery in twitter streaming data. In: Discov-
ery Science, pp. 1–15. Springer (2010)
5. Bollen, J., Mao, H., Zeng, X.: Twitter mood predicts the stock market. Journal of Com-
putational Science 2(1), 1–8 (2011)
6. Bollen, J., Pepe, A., Mao, H.: Modeling public mood and emotion: Twitter sentiment and
socio-economic phenomena. arXiv preprint arXiv:0911.1583 (2009)
7. Buckley, C.: Topic prediction based on comparative retrieval rankings. In: Proceedings
of the 27th Annual International ACM SIGIR Conference on Research and Development
in Information Retrieval, SIGIR '04, pp. 506–507. ACM, New York, NY, USA (2004).
DOI 10.1145/1008992.1009093. URL http://doi.acm.org/10.1145/1008992.1009093
8. Crane, R., Sornette, D.: Robust dynamic classes revealed by measuring the response func-
tion of a social system. Proceedings of the National Academy of Sciences 105(41), 15,649–
15,653 (2008)
9. Cruz, J.D., Bothorel, C., Poulet, F.: Entropy based community detection in augmented
social networks. In: Computational aspects of social networks (cason), 2011 international
conference on, pp. 163–168. IEEE (2011)
10. Damasio, A.: Descartes' error: Emotion, reason and the human brain. Random House
(2008)
11. Dancey, C.P., Reidy, J.: Statistics without maths for psychology. Pearson Education (2007)
12. Davidov, D., Tsur, O., Rappoport, A.: Enhanced sentiment learning using twitter hashtags
In: Proceedings of the 23rd International Conference on Computational
and smileys.
Linguistics: Posters, pp. 241–249. Association for Computational Linguistics (2010)
13. Diakopoulos, N.A., Shamma, D.A.: Characterizing debate performance via aggregated
twitter sentiment.
In: Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems, CHI '10, pp. 1195–1198. ACM, New York, NY, USA (2010). DOI
10.1145/1753326.1753504. URL http://doi.acm.org/10.1145/1753326.1753504
14. Dolan, R.J.: Emotion, cognition, and behavior. science 298(5596), 1191–1194 (2002)
15. Figueiredo, F., Benevenuto, F., Almeida, J.M.: The tube over time: Characteriz-
ing popularity growth of youtube videos.
In: Proceedings of the Fourth ACM
International Conference on Web Search and Data Mining, WSDM '11, pp. 745–
754. ACM, New York, NY, USA (2011).
URL
http://doi.acm.org/10.1145/1935826.1935925
DOI 10.1145/1935826.1935925.
16. Gao, S., Ma, J., Chen, Z.: Effective and effortless features for popularity prediction
in microblogging network.
In: Proceedings of the Companion Publication of the 23rd
International Conference on World Wide Web Companion, WWW Companion '14,
pp. 269–270. International World Wide Web Conferences Steering Committee, Repub-
lic and Canton of Geneva, Switzerland (2014). DOI 10.1145/2567948.2577312. URL
http://dx.doi.org/10.1145/2567948.2577312
17. Hong, L., Dan, O., Davison, B.D.: Predicting popular messages in twitter. In: Proceedings
of the 20th international conference companion on World wide web, pp. 57–58. ACM
(2011)
18. Kindermann, R., Snell, J.L., et al.: Markov random fields and their applications, vol. 1.
American Mathematical Society Providence (1980)
19. Korner, J.: Coding of an information source having ambiguous alphabet and the entropy
of graphs. In: 6th Prague conference on information theory, pp. 411–425 (1973)
20. Lee, J.G., Moon, S., Salamatian, K.: An approach to model and predict the popularity
of online contents with explanatory factors. In: Web Intelligence and Intelligent Agent
Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference on, vol. 1, pp.
623–630. IEEE (2010)
Title Suppressed Due to Excessive Length
19
21. Lerman, K., Hogg, T.: Using a model of social dynamics to predict popularity of news. In:
Proceedings of the 19th international conference on World wide web, pp. 621–630. ACM
(2010)
22. Li, S.Z.: Markov random field modeling in image analysis. Springer Science & Business
Media (2009)
23. Metzler, D., Croft, W.B.: A markov random field model for term dependencies. In: Pro-
ceedings of the 28th annual international ACM SIGIR conference on Research and devel-
opment in information retrieval, pp. 472–479. ACM (2005)
24. Pinto, H., Almeida, J.M., Gon¸calves, M.A.: Using early view patterns to predict the pop-
ularity of youtube videos. In: Proceedings of the Sixth ACM International Conference on
Web Search and Data Mining, WSDM '13, pp. 365–374. ACM, New York, NY, USA (2013).
DOI 10.1145/2433396.2433443. URL http://doi.acm.org/10.1145/2433396.2433443
25. Read, J.: Using emoticons to reduce dependency in machine learning techniques for sen-
timent classification. In: Proceedings of the ACL student research workshop, pp. 43–48.
Association for Computational Linguistics (2005)
26. Salganik, M.J., Dodds, P.S., Watts, D.J.: Experimental study of inequality and unpre-
dictability in an artificial cultural market. science 311(5762), 854–856 (2006)
27. Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mobile
Computing and Communications Review 5(1), 3–55 (2001)
28. Simonyi, G.: Graph entropy: a survey. Combinatorial Optimization 20, 399–441 (1995)
29. Szabo, G., Huberman, B.A.: Predicting the popularity of online content. Communications
of the ACM 53(8), 80–88 (2010)
30. Thelwall, M., Buckley, K., Paltoglou, G.: Sentiment in twitter events. Journal of the
American Society for Information Science and Technology 62(2), 406–418 (2011)
31. Tong, H., Liu, Y., Peng, H., Tang, J.: Internet users' psychosocial attention prediction: Web
hot topic prediction based on adaptive ar model. In: Computer Science and Information
Technology, 2008. ICCSIT'08. International Conference on, pp. 458–462. IEEE (2008)
32. Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Predicting elections with twit-
ter: What 140 characters reveal about political sentiment. ICWSM 10, 178–185 (2010)
33. Wikipedia: Pearson
product-moment
correlation
coefficient
(2015).
URL
https://en.wikipedia.org/wiki/Pearson_product-moment_correlation_coefficient
34. Wu, T., Timmers, M., Vleeschauwer, D.D., Leekwijck, W.V.: On the use of reservoir
In: Evolving Internet (INTERNET), 2010 Second
computing in popularity prediction.
International Conference on, pp. 19–24. IEEE (2010)
35. Yin, P., Luo, P., Wang, M., Lee, W.C.: A straw shows which way the wind blows: ranking
potentially popular items from early votes. In: Proceedings of the fifth ACM international
conference on Web search and data mining, pp. 623–632. ACM (2012)
|
1808.04422 | 1 | 1808 | 2018-08-13T19:53:47 | Social media and mobility landscape: uncovering spatial patterns of urban human mobility with multi source data | [
"cs.SI",
"physics.soc-ph"
] | In this paper, we present a three-step methodological framework, including location identification, bias modification, and out-of-sample validation, so as to promote human mobility analysis with social media data. More specifically, we propose ways of identifying personal activity-specific places and commuting patterns in Beijing, China, based on Weibo (China's Twitter) check-in records, as well as modifying sample bias of check-in data with population synthesis technique. An independent citywide travel logistic survey is used as the benchmark for validating the results. Obvious differences are discerned from Weibo users' and survey respondents' activity-mobility patterns, while there is a large variation of population representativeness between data from the two sources. After bias modification, the similarity coefficient between commuting distance distributions of Weibo data and survey observations increases substantially from 23% to 63%. Synthetic data proves to be a satisfactory cost-effective alternative source of mobility information. The proposed framework can inform many applications related to human mobility, ranging from transportation, through urban planning to transport emission modelling. | cs.SI | cs | Social media and mobility landscape: uncovering spatial patterns of urban human mobility
with multi source data
Social media and mobility landscape
Yilan Cuia, Xing Xieb, Yi Liua*
a School of Environment, Tsinghua University, Beijing, 100084, China
b Microsoft Research Asia, Microsoft Corporation, Beijing, 100080, China
*Corresponding author: [email protected]
Graphic abstract
Highlights:
Identify personal activity-specific places based on Weibo data and surveys
Propose ways for detecting and moderating sample bias of Weibo data
Present a graphic representation of urban activity intensity in Beijing, China
Introduce the potential application of Weibo data for urban analysis
1
Abstract: In this paper, we present a three-step methodological framework, including location
identification, bias modification, and out-of-sample validation, so as to promote human mobility
analysis with social media data. More specifically, we propose ways of identifying personal
activity-specific places and commuting patterns in Beijing, China, based on Weibo (China's Twitter)
check-in records, as well as modifying sample bias of check-in data with population synthesis
technique. An independent citywide travel logistic survey is used as the benchmark for validating the
results. Obvious differences are discerned from Weibo users' and survey respondents'
activity-mobility patterns, while there is a large variation of population representativeness between
data from the two sources. After bias modification, the similarity coefficient between commuting
distance distributions of Weibo data and survey observations increases substantially from 23% to
63%. Synthetic data proves to be a satisfactory cost-effective alternative source of mobility
information. The proposed framework can inform many applications related to human mobility,
ranging from transportation, through urban planning to transport emission modelling.
Key words: social media, human mobility, population bias, sample reconstruction, data integration
1 Introduction
Urban passenger transport is leading to a range of societal and environmental externalities
including congestion, resource consumption, greenhouse gas emissions, and localized pollution.
Travel demand is derived from individuals' need for performing activities at different geographic
locations. A current trend of research in the field of human mobility is activity-based analysis (Zhang
et al., 2013; Rieser et al., 2014; Wu et al., 2014), which takes into account individual's diverse travel
demands behind spatial movements. Broadly stated, activity-based approaches pay close attention to
2
the responses to the common questions that each individual faces on a daily basis: 'what activity will
I perform?', 'with whom?', 'when?', 'for how long?', 'how do I get there?' and so on (Ghauche,
2010). Such approach allows researchers to examine, in detail, the diversity of travel demands that
spur movements, thus to dig into the driving forces of transport energy consumption and emissions.
Therefore, identifying the purposes behind human movements becomes a crucial part of
understanding human mobility. Such analysis relies heavily on the quality and representativeness of
human space-time data, which is traditionally obtained through travel surveys. However, data
collection is extremely time-consuming and expensive, which in turn limits its population coverage.
Furthermore, such surveys are not carried out on a continuously temporal basis. For example, the
most authoritative citywide travel survey in Beijing, China is only conducted every five years.
Over the past decade, the introduction and penetration of location-based services have
profoundly changed the way people live. People leave digital traces of their movements everywhere,
when swiping smart cards on public buses, making phone calls with friends, or sharing activity
related choices on online social networks. This large-scale user-generated data provide new
perspectives for spatiotemporal analysis of travel behavior. Temporal, spatial, and textual
information in this data are revealed by users in realistic situations, which makes them less prone to
cheating. Since such data have already been collected to help operate systems or provide user-side
services, additional uses for analysis incur little marginal cost. Different from Call Detail Records
(CDR) (Isaacman et al., 2011), Smart Card Data (SCD) (Yuan et al., 2013; Zhou and Long, 2014),
and trajectories derived from GPS trackers (Zhang et al., 2013), check-in data have two unique
features, which make them more suitable for activity-based mobility analysis. First, check-in records
not only contain geo- and time-tagged locations but also include the Point of Interests (POI)
3
categories of the venues indicating the potential functionalities of such locations (Hasan et al., 2013;
Wu et al., 2014). Second, users' sociodemographic profiles are available, enabling comparative
analysis of travel behavior for different social groups. Recently, a number of researchers have been
using check-in data to understand and model how individuals move in time and space (Hasan et al.,
2013; Wu et al., 2014; Hasan and Ukkusuri, 2014; Yang et al., 2015; Wang et al., 2015; Chen et al.,
2016). However, these studies limit the understanding of mobility dynamics due to the lack of
attention to the purposes behind human movements. Hasan et al. (2013), Wu et al. (2014), and Hasan
and Ukkusuri (2014) simply identified activity based on the POI category of each geo-tagged
location. Potential problems arise from this identification method. For example, checking in at a
shopping mall does not necessarily indicate engaging in recreational activities; it may also be a shop
manager complaining about his/her tedious day. Besides, each time users post a microblog, they have
the option to choose a location to share from several nearby locations. Out of privacy and safety
concerns, people tend to provide misleading information.
Previous studies have demonstrated that human mobility shows a high degree of regularity
(Hasan and Ukkusuri, 2014; Wu et al., 2014; Wang et al., 2015). Far from randomness, people spend
much of their time at a few important places, such as home and workplace, where they visit regularly
and often during the same period of the day (Isaacman et al., 2011). An individual's movements
typically will either be centered around home, work, or somewhere in between the two locations as
they commute in between them (Cho et al., 2011). Some studies have proposed suitable algorithms
for predicting semantically meaningful places in somebody's life (especially home locations), based
on the spatial and temporal features of movement records. The most commonly used method is a
'Most Check-ins' method. Home is assumed to be the location from which people most frequently
4
tweet (Pontes et al., 2012; Bojic et al., 2015; Hossain et al., 2016), (or make the maximum number of
phone calls in the case of CDR (Isaacman et al., 2011), or most frequently visit in the case of SCD
(Yuan et al., 2013)). In some cases, the sequence of a location in a user's daily movements (Zhou
and Long, 2014; Hossain et al., 2016) or surrounding land use features (Zhou and Long, 2014) is
used to determine the likelihood of corresponding activity.
Despite the fascinating features mentioned above, it has been argued that the limited population
representativeness would confine the scope of big data research on human mobility (Wu et al., 2014;
Chen et al., 2016). Travel survey data, acquired through rigorous sampling methods, is considered as
a relatively representative sample of the real population. However, only limited studies have
conducted out-of-sample validation of big data with such a dataset, quantitatively analyzing the
effect of representativeness of big data (Lenormand et al., 2014; Toole et al., 2015; Yang et al., 2015).
Most of the time, validation is performed on a coarse-grained spatial scale, such as municipality
(Lenormand et al., 2014) or town (Toole et al., 2015), because raw census data with high spatial
resolution remains inaccessible to the public. It remains an interesting question to ponder whether
social media check-in data would be suitable for regional activity-based travel analysis, whether and
what mobility measures are sensitive towards sample bias (Chen et al., 2016), and most importantly,
how to modify such bias.
Population synthesis is a widely-adopted technique for creating a full population microdata
based on limited number of observations, to enable analyzing estimates of variables at different
spatial scales. It was first developed in the field of economics in the 1960s, and has since been
introduced to the fields of geography and social sciences (Hermes and Poulsen, 2012; Ma et al.,
2014), for example, to analyze social policy and population changes (Haase et al., 2010),
5
transportation (Beckman et al., 1996; Zhang et al., 2013; Ma et al., 2014), building energy
consumption (Subbiah et al., 2013) and so on. In the transport-related field, the pioneering attempt of
population synthesis goes back to 1996, when Beckman et al. (1996) applied Iterative Proportional
Fitting (IPF) to create a baseline synthetic population of individuals and households, so as to estimate
future travel demand. After years of implementation and testing, population synthesis has become a
popular and cost-effective way for creating disaggregated data for spatial analysis and simulation,
generating long-term forecasts, and examining the geographical effects of government policies
(Zhang et al., 2013; Subbiah et al., 2013; Ma et al., 2014). In this article, we explore the potential
application of this technique for sample bias modification. A critical review on current algorithms to
generate synthetic spatial microdata can be found in Hermes and Poulsen (2012) and Müller and
Axhausen (2010).
In this study, we introduce how to identify home, work/school, and destination choices for
non-commuting activities based on multi source data in a simple and straightforward way and apply
classical methods of population synthesis to solve the bias-modifying problem of social media data
in a provably promising way. Compared with existing studies on activity-based mobility analysis
with check-in data, we go one-step further to detect and moderate the impact of sample
representativeness on mobility measures at sufficiently high spatial granularity.
2 Materials
2.1 Study area
As the capital city of China, Beijing was selected as our case study area. The city can be divided
into four zones including inner area, functional extended area, new urban district, and ecological
conservation area (Fig. 1). The inner-city districts of Dongcheng and Xicheng represent the
6
Fig. 1 Municipal districts of Beijing. The smallest geographical
units in this figure represent the Traffic Analysis Zones.
traditional business districts. The functional extended area includes the Chaoyang district in the
northeast (which is home to the Beijing International Airport, and Beijing's growing central business
district), Haidian in the northwest (which was deliberately developed as a university area, with most
of the universities, research institutes, and hi-tech firms located there), Fengtai in the southwest
(which is the interflow center of goods in the southwest Beijing), and Shijingshan in the far west
(which is the heavy industry center in this city) (Ma et al., 2014).The new urban district composes
Tongzhou in the east (where a new administrative sub-center is emerging), as well as districts of
Shunyi, Daxing, Changping, and Fangshan. The ecological conservation area refers to the remote
counties and villages.
Traffic analysis zone (TAZ) is the unit of geography most commonly used in travel surveys. In
the Forth Survey of Citywide Travel Logistics of Beijing, the metropolitan area was divided into
7
1,911 TAZs, with the zonal area ranging from 0.13km2 to 382.03km2, among which 87% is smaller
than 5 km2.
2.2 The mobility datasets
(1) User Profiles and Location Check-ins: This dataset contains 11,961,502 geo- and
time-tagged check-in records from 135,736 venues in Beijing by 1,670,968 registered Sina Weibo
users from Mar. 2011 to Sep. 2013, which was crawled through Sina Weibo API (Zhang et al., 2012).
Each check-in contains the user ID, check-in time, the venue's geo-coordinates, and POI category.
When registering for an account in Weibo, users can choose to share some of their personal
information on their home pages, including gender, birthday, education background, and marital
status etc. After removing users with less than 15 check-ins, we obtain 7,324,014 check-ins at
111,955 venues from 161,015 users where each user has 45 check-in records on average.
(2) Fourth Survey of Citywide Travel Logistics of Beijing: This survey tracks more than one
hundred thousand respondents' socio-economic attributes, as well as their detailed 24h travel diaries
in a generic workday or weekend, including a list of activities participated and corresponding trips
along with temporal, spatial and travel mode information.
2.3 User profiles
In our Weibo sample, almost all the users provide their gender information, 46% users provide
age information, and 53% users provide educational background. We found that Weibo is more
popular among females, young people and people with high levels of education. Obvious differences
exist in the age and education profiles of population covered by these two datasets (c.f. Fig. 2);
whereas, only a slight difference of 4% is discovered in the gender profiles.
8
Fig. 2 User profiles. (a) Education background, (b) Age. Here, education background is classified into three
categories; including primary (junior school and below), secondary (senior high school), and tertiary (college
and above).
2.4 Categorizing travel demands
To ease the analysis, daily activities are first classified into a limited number of categories. In
this research, considering the temporal characteristics of travel demand inferred from trip records in
survey data (c.f. Appendix A), we group activity-travel purpose into home, work (work/school),
entertainment (eating out, shopping and other leisure activities), and other (personal business,
business trip, visiting friends/relatives, etc.).
3 Methods
3.1 Ground truth for home and workplace identification
Building the ground truth is challenging, because it involves identifying a Weibo user's home
and workplace from several locations the user checked-in without being told. Intuitively, if someone
visits the same residential building frequently, this place holds a big change to be a living place.
Similarly, an office building where someone recursively checks-in, is more likely to be a working
place. Besides, reading a Weibo content that says 'enjoying my new working station', one can easily
tell that it might be sent from a workplace. Weibo content that says 'Good night, Beijing' is most
9
likely sent from home. In this research, we rely on POI category and content information together to
build the ground truth for the home and work location identification algorithm.
Firstly, we construct the ground truth for home by first filtering the locations each individual
checks in for 4 days or above long, and with a POI category of residential place. Similarly, ground
truth for workplace is filtered from locations each individual checks in for 4 days or above long, and
with a POI category of corporation, school or industrial park. Then location with largest check-in
days in each case is labeled as 'home' and 'work' respectively.
Secondly, to improve the reliability, we further crawl the Weibo contents posted from these
labelled locations, linked by user ID and geo-coordinates. Then, we select a set of 20 keywords (e.g.
'home', 'dormitory', 'sleep', 'office', 'work' etc.) which are most likely to be mentioned in Weibo
contents sent from home or workplace (c.f. SI Table 1). Next, based on these keywords, we label
'home' or 'work' tag to each user's potential locations. For example, if at least one of the
home-related words is contained in any of the Weibo contents posted from user's filtered locations,
then this location would be labeled as 'home'.
Finally, we only retain the filtered locations, which have been tagged the same label from the
two steps.
As a result, we obtain a training dataset containing 90,284 check-ins from 377 users, among
which 296 users' homes and 180 users' workplaces are labelled. Here, the labeled location is
represented by the geo-coordinates of the corresponding venue. As can be seen from Fig. 3 below,
the frequency of home-based activity in ground truth data is much lower during early morning hours,
when people are typically inactive. While, the frequency of work-based activity in ground truth is
much higher during late night, which is probably because, people who work overtime tend to
10
check-in at workplace more frequently, thus overestimating the frequency of work-based activity at
night. Apart from these, the basic temporal distribution patterns of home-based and work-based
activity from ground truth data are consistent with those from survey data. It means that, even as a
small portion in the Weibo data, this ground truth data would be sufficient for representing the
regularity of the temporal patterns of home-based and work-based activities and is scalable to the
whole Weibo data as well.
It has to be mentioned that, the small size of ground truth data is largely due to the limitation of
inferring home and work locations by POI category. Therefore, the labelling method introduced here
is just for building the ground truth for training our proposed identification algorithm.
Fig. 3. Temporal pattern of home-based (left) and work-based activity (right) from ground truth (up)
and survey data (bottom).
11
3.2 Purpose-specific location identification
3.2.1 Identification algorithm
We propose a threefold approach for home and work location identification adopted from
Isaacman et al. (2011) on location identification with CDR, which has shown to be able to find users'
important locations to within 3 miles 88% of the time. Existing studies have found strong agreement
and robustness in human mobility patterns between CDR and check-in data (Cho et al., 2011;
Lenormand et al., 2014). The factors used are listed below.
Days: The number of days on which the venue is geo-tagged.
Cluster Days: The number of days on which any venue in the cluster is geo-tagged. If two or
more venues are geo-tagged on the same day, the day is counted only once.
Timespan: The number of days interval between the first and the last check-in with any venue in
the cluster.
Total Days: The number of days between the first record and the last record in the dataset.
Work Event: The number of check-ins in the cluster on weekdays from 9am to 12pm and from
1pm to 6pm.
Home Event: The number of check-ins in the cluster on weekdays or weekends from 10pm to
7am.
Work/ Home Event Percentage: The percentage of 'Work/ Home Event' of each cluster in all
clusters.
We first spatially cluster the venues that appear in a user's check-in records. Because we do not
have any prior knowledge regarding the number of clusters in each user's traces, which is probably
different from one to another. As a result, we choose a distance-based clustering method (Isaacman et
al., 2011; Chen et al., 2016). We first sort the unique venues in a user's check-in records in
descending order based on 'Days'. Relative importance of a certain venue in an individual's traces is
represented by the days this venue is checked-in, instead of the total number of check-ins. Because,
'Days' helps to decrease the influence of venues that are visited only on a few days, but that has a
12
burst of events on those days (Isaacman et al., 2011).
Clustering starts with the first venue in the sorted list and makes this the centroid of the first
cluster. For each subsequent venue, the algorithm would assign it to a corresponding cluster if it falls
within a predetermined threshold radius,
, of any existing cluster centroid, or make this the
centroid of a new cluster otherwise. When a new venue is added to any existing cluster, the centroid
of that cluster will be moved to the days-weighted center of all the venues within the cluster. The
algorithm continues until all the venues in the sorted list have been visited.
Then our identification algorithm runs to the second stage of filtering important clusters.
Intuitively, important places in people's lives should be those that people visit frequently and
recursively. A cluster will be assumed as important if it has been visited on more than a certain
percentage of the total days, and the timespan in this cluster is more than a certain percentage of the
total days. These translate to Eqs. (1)-(2) listed below. Here,
,
are decision boundary values.
(1)
(2)
Finally, given all the important clusters, we infer where people live or work based on frequency
of check-ins during pre-defined 'home' or 'work' event hours. As demonstrated in previous studies,
for home identification, the most dominating factor is 'Home Event' (Isaacman et al., 2011) or
number of check-ins (Hossain et al., 2016). For workplace identification, there are two dominating
factors; location with higher 'Work Event' and lower 'Home Event' is more likely to be one's
workplace (Isaacman et al., 2011). Rules for home and work identification are illustrated as the
flowchart in Fig. 4. Here,
and
are decision boundary values.
13
rab/ClusterDaysTotalDaysa/TimespanTotalDaysb1k2k
Fig. 4. Flowchart for identification of home location and work place.
The algorithm for entertainment and other place identification starts with check-in records of a
user with home or workplace identified. For whom, our identification algorithm has already
differentiated places where one visits on a regular temporal basis from those one visits flexibly. After
removing geo-tagged locations in the clusters defined as 'Home' or 'Work', we can simply label each
remaining location as 'Entertainment', 'Other' or 'Unknown' based on their venue categories.
3.2.2 Controlled random search algorithm
We need to adjust the five tuning parameters,
, constantly until most individuals'
resulting identified locations give the best possible fitting to the labelled ones in ground truth. A
global optimization procedure called Controlled Random Search (CRS) is used for parameter
calibration (Hendrix et al., 2002).
In the context of minimization problems, CRS algorithm generates
uniformly distributed
14
12,,,,rabkkp
random points through
, defined by the value ranges of parameter vector
, and stores the points
and corresponding function values
. Let
and
be the largest and smallest
function values in the storage, and
and
be the corresponding points. At each iteration,
CRS randomly selects a subset
of
points from the storage. Then a new point
is generated by reflecting a randomly selected point from the subset through the centroid of the
other
points.
If
the
function value
at
is smaller
than
,
then
and
replace
and
in the storage respectively. Then the algorithm updates the
corresponding values of
and
as well. The process stops when the maximum number of
iteration stages
has been reached.
The objective function is defined by Eqs. (3)-(5), which take both the identification accuracy
and coverage into consideration, resulting in a number in [0, 1].
(3)
(4)
(5)
Where,
and
represents the geo-coordinates of the labelled and identified home location
of individual
from ground truth. Similarly,
and
represents the labelled and identified
work location of individual
respectively. M* and N* are the number of users from ground truth
whose home and work can be identified with our identification algorithm.
,
calculate the spherical distance between identified and labelled locations, which are
15
()1,...,pffmaxfminfmaxmin,...,,1mm+11m+*m()*f*maxf*()*fmaxmaxfminfminN()()****,,22**121111maxmaxdisdisWWHHNMiijjfNMHWddij=+==**max((,)),maxHddisHHiMii= **max((,)),maxWddisWWjNjj= *HiHii*WjWjj()*,disHHii()*,disWWjj
used as a measure of identification error. The error is normalized through dividing by its
corresponding maximum value,
and
. Mean distance error is then weighted by the
reciprocal of M* or N* to compensate for the accuracy gains at the cost of low coverage.
In this study, clustering radius
is set to be 20m, 50m, 70m, 100m, 200m, 300m, and 500m.
Under each setting of
, we use CRS algorithm to find the best estimates of the other four
parameters. By numerical test, the settings of
and N in this study are 200 and 20,000
respectively.
3.3 Sample reconstruction
As is shown in Fig.2, there is a large variation of population representativeness between Weibo
and survey data. Considering the strong influence of socio-demographics on people's activity
participation and destination choices (Ma et al., 2014), the limitation of population coverage of
Weibo data can only give us a biased understanding of human mobility. Therefore, we introduce a
method for correcting population bias of check-in data by linking personal mobility patterns to these
socio-demographics.
The basic idea behind sample reconstruction is to select an optimal configuration from the
partial sample of Weibo data, according to the known distributions of characteristics, such as age,
gender, from aggregated constraints calculated with travel surveys. Then the reconstructed sample is
a more representative configuration of the real population, whose sociodemographic is aligning
closely to that of survey respondents, while maintaining the rich variety of its original activity
mobility patterns.
To proceed with a reliable sample reconstruction, an appropriate selection of constraint
variables is crucial. First, the variables used need to be both included in the two data sources to
16
maxHdmaxWdrrp
enable the sampling process (Kirk, 2013; Ma et al., 2014). Second, they should cover or at least be
strongly related to the variables of interest (Kirk, 2013). Kruskal -- Wallis test, a non-parametric
method for testing whether samples originate from distributions with the same median, is used to
select attributes strongly related to travel behavior. Results show that, commuting distances vary
significantly among people in different age groups and among people living in different regions (c.f.
SI Table 2). People aged 30~40, and people living in suburban areas tend to commute further. While,
gender and education background only have slight influences on individuals' commuting distances.
In this study, we conduct sample reconstruction for commuters and non-commuters separately to
account for the influence of employment status on individuals' mobility patterns. For each case, we
use the tabulations of age, gender, and home district, as well as the cross-tabulations of age and
gender at the TAZs level as constraints. Home district is defined as the district that Weibo users'
identified home locations belong to. Besides, the difference between commuters and non-commuters
are determined by whether their work locations can be identified or not.
Flexible Modelling Framework (FMF), developed and tested at the University of Leeds since
2005, is an open source software framework for spatial population synthesis (Ma et al., 2014). It
incorporates a static spatial simulation algorithm based on Simulated Annealing, which proves to be
one of the most popular and effective methods for generating synthetic spatial microdata at different
geographical scales (Kirk, 2013). In addition to the FMF population synthesizer, the traditional IPF
and Combinatorial Optimization (CO) methods are still very popular (though they have drawbacks),
especially in those cases where a simple and easy population synthesizer is adequate. The choice of
FMF in our study is largely due to the availability of the open source software package that is
relatively feasible to implement.
17
Simulated Annealing approach is executed for each TAZ individually. Individuals from each
zone will first be given a unique person ID. The algorithm then clones, adjusts, and tests individuals
in the generated population repeatedly until an appropriate set of individuals is established whose
tabulated constraint variables give the best possible fit to the target aggregated sums. The
goodness-of-fit level is measured as Total Absolute Error (Eq. (6)).
(6)
Where,
is the count of individuals in category
living in zone
in survey data;
is
the count of individuals in category
living in zone
in the generated population. N is the
number of TAZs.
refers to one specific category in Table 1. M is the total number of categories.
Table 1 Constraint configuration for commuters/non-commuters
Constraint Variables
Categories
Gender
Age
Age by Gender
Male (m), Female (f)
15-24, 25-26, 27-28, 29-30, 31-33, 34-39, 40-49, 50+
15-24-f, 25-26-f, 27-28-f, 29-30-f, 31-33-f, 34-39-f, 40-49-f,
50+-f
15-24-m, 25-26-m, 27-28-m, 29-30-m, 31-33-m, 34-39-m,
40-49-m, 50+-m
Home District
Dongcheng, Xicheng, Chaoyang, Haidian,
Shijingshan, Changping, Shunyi, Tongzhou, Daxing
Fengtai,
After sample reconstruction, activity-specific location choices of Weibo samples can be
attached to the generated population based on the unique person ID.
18
11NMTAETEijijij=−==TijjiEijjij
3.4 Out-of-sample validation
Here we select three indexes for evaluating the performance of our method, through
out-of-sample validation with survey data, regarding spatial distribution pattern of activity-specific
locations and distribution of commuting distance. In travel surveys, respondents' activity locations
are mostly recorded using the TAZs code since GPS devices are rarely used to track the precise
locations of individuals during surveys. Therefore, in this study, we use TAZ as the geographical unit
for cross-validation between two data sources.
Cosine Similarity (CS) is a measure of similarity between two non-zero high-dimensional
vectors of an inner product space that measures the cosine of the angle between them (Wikipedia,
2017). In our study, each TAZ represents a unique dimension, and the region is characterized by a
vector where the value of each dimension corresponds to the percentage of users with identified
purpose-specific places located in corresponding TAZ. CS then can be used to measure how similar
two spatial distribution maps are likely to be, which is defined as Eq. (7). CS takes the value in [0, 1].
A larger CS indicates a better fit.
(7)
Where:
: The percentage of Weibo users with identified purpose-specific places located in TAZ i;
: The percentage of survey respondents with recorded purpose-specific places located in TAZ
i;
N : The number of TAZs.
19
()()12211CSNppiiiCSCSNNppiiii====CpiSpi
As a supplement to CS, we also calculate the Distance between Centers of Gravity (DC) of
identified locations with check-ins and recorded locations in surveys. In this case, the Centers of
Gravity of purpose-specific activity distribution maps is defined as Eq. (8). The spherical distance
between two centers is calculated from their longitudes and latitudes.
(8)
Where:
: The latitude of centroid of TAZ
;
: The longitude of centroid of TAZ
;
: The number of activity-specific destination choices located in TAZ
summed across all the
individuals, and
is the number of TAZs.
We further compare the distribution of commuters by commuting distance traveled (one-way)
from residence location to workplace, for Weibo's identified commuters and survey's self-reported
commuters. Commuting distance is calculated as the spherical distance between individual's
residence and work location. Coincidence Ratio (CR) measures the percent of the area that
'coincides' for the two curves of distribution to compare (Yang et al., 2015), as defined in Eq. (9).
The maximum commuting distance in our dataset is about 120 km long, thus the length interval is
identified as 0.24 km, which results in 500 intervals. CR ranges from 0 to 1, with a higher value
indicating a better fit.
20
,1111NNjjnnCentersXYnnjjjjNNiiii=====XiiYiiNiin
(9)
Where:
: The percentage of commuting distance in interval i in check-in data;
: The percentage of commuting distance in interval i in travel log survey;
N: The number of intervals.
4 Results
4.1 Activity-mobility pattern
The calibration results show that, all of the four parameters, concretely,
give the best
converging performance at the radius of 300 m (c.f. SI Figure 1 and SI Table 3), which is thus set to
be the radius for our clustering algorithm; and, the best estimates of
are set to be the
means of the best 200 points in storage, which are 0.93%, 9.25%, 6.1%, and 1.92% respectively.
Running the calibrated identification algorithm on the whole Weibo dataset, generates a newly
labelled sample in which 65,450 users' home and 63,399 users' work place can be identified. The CS
index for home spatial layout is 0.48. Hot spots for the residences of Weibo users are mostly
distributed in the districts of Haidian and Chaoyang, where most schools and universities are located;
whereas, hot spots for survey respondents' home locations are distributed in inner area and southern
suburban regions (c.f. Fig. 5 a1 and a2). This is probably because Weibo users are mainly students,
whose major residences are within the 'School District'. A high similarity of 0.65 for spatial
distribution exists between Weibo users' and survey respondents' workplaces (c.f. Fig. 5 b1 and b2).
In Beijing, the city center is still attractive regarding work opportunities and commercial
21
()()min,1max,1CSNppiiiCRCSNppiii===CpiSpi12,,,abkk12,,,abkk
Fig. 5 Validation of activity-specific locations identified from check-ins with independent travel logistic
surveys. The base map shows the spatial layout of Beijing's administrative districts. Kernel density
estimation is conducted to obtain a smooth distribution. (a1 and a2) The identified-home and
recorded-home density maps for major metropolitan districts in Beijing. (b1 and b2) The identified and
recorded workplace density maps of Beijing. (c1 and c2) The identified and recorded entertainment density
maps of Beijing.
infrastructure, where most employment is concentrated now, which may account partially for the
strong coincidence between work distributions discerned from the two datasets. Compared to
commuting locations, less consistency appears in the spatial distributions of locations for
entertainment and other activities, which is around 0.30~0.35. As inferred from Fig. 5 c1 and c2,
Weibo users' leisure areas are mostly towards the districts of Dongcheng and Chaoyang, whereas
22
survey respondents tend to go to the inner areas for entertainment. This is probably because Weibo
users, representative of young population in a city, prefer commercial facilities such as shopping
centers and bars that mostly located in the north and east of Beijing to public parks in the city center.
Intuitively, one would not travel long distances to a shopping mall far away from home, when similar
facilities are available nearby. Therefore, it is highly possible that most places where people
participate in non-commuting activities are distributed around their living places. Therefore, hot
spots for non-commuting activities are concentrated in the same region where most people live (for
other density maps, see SI Figure 2).
We further evaluate the commuting distance distribution of identified local commuters. Obvious
difference exists between the two cumulative distribution curves, with the CR index of only 0.28;
check-in data overestimate the frequency of zero-distance commuting (c.f. Fig. 7). In reality, some
people may work at home or live at their workplace. For those individuals, our algorithm would end
up with the same location identified as both home and workplace. The facts that students constitute a
significant portion of Weibo users, and home-based workers would not be treated as commuters in
travel surveys, are probably the reasons for this mismatch.
4.2 Sample reconstruction
We perform sample reconstruction on the central three zones of inner area, functional extended
area and new urban district to represent urban Beijing, because, as shown in our dataset, these zones
account for 91% of all the population and over 99% of working opportunities of Beijing. Fangshan
district is excluded for the limited number of sample data there. Based on the constraint variables we
specify, only the Weibo samples whose age and gender information are available, and home locations
can be identified as well as located within the selected districts, would be used for sample
23
reconstruction. These specifications give us a dataset composed of 24,518 samples.
Our analysis shows that all the constraining features at the TAZ level are reproduced with no
misclassification (c.f. SI Table 4). The reconstructed population can be seen as an artificial sample as
representative as survey respondents under the constraints we formulate. The results show that
socio-demographics and commuting patterns of the reconstructed population matches well with those
of survey respondents, with the CS index for the spatial distribution of population and workplace as
100% and 65% respectively. A good match is achieved for the spatial distributions of the destinations
for entertainment (54%) and for other activity (54%). Besides, all the centers of gravity migrate
southwest after sample reconstruction (c.f. Fig. 6 b); the resulting new activity-specific centers move
closer towards the corresponding centers discerned from survey data (c.f. Fig. 6 a).
Fig. 6 Performance of sample reconstruction. (a) Distance between Centers of Gravity index before and
after sample reconstruction for activity category of Home (H), Work (W), Entertainment (E) and Other (O).
The transparent bars with un-bold data labels indicate the check-in data's baseline accuracy, expressed in
terms of Weibo microdata-survey similarity. (b) Centers of Gravity of activity-specific spatial distribution
maps. We refer to the check-in data as 'microdata', and reconstructed data as 'syn'. Movements of centers
are denoted by arrows. Here, synthetic center coincides with survey center for home distributions.
Generally, our proposed sample reconstruction technique for correcting sample bias works
24
relatively better for commuting activities than for non-commuting activities. There are two main
reasons. First, working opportunities in Beijing are center-towards; meanwhile, the age profiles of
commuters are normally concentrated within a specific age range, like 27 to 50, which is covered
relatively sufficiently in both datasets. For non-commuting activities, the active participants are
usually people aged 50 and above, who have more leisure time available after retirement. However,
these people are under-represented in check-in data. Reconstructing a population with 'unbiased' age
profiles will result in cloning just a limited number of elderly persons multiple times, which could
only bring small modifications to the resulting activity spatial distributions. Second, compared with
commuting activities, individuals usually have much more freedom when choosing recreational
destinations. Therefore, it is quite likely that the discrepancies result from individual diversities.
Furthermore, we examine at the sub-district level how the commuting distance distribution
patterns change after sample reconstruction. In general, as compared with identified commuters from
Weibo data, the commuting distance distribution curve of synthetic commuters from reconstructed
population is more consistent with that of survey respondents (c.f. Fig. 7). More specifically, after
sample reconstruction, the CR index is increased substantially from 0.23 to 0.63. Furthermore, in
inner zone and functional extended zone, the district-specific CR index of the synthetic commuters
are all approximately 0.50 or above (c.f. SI Table 5). Commuting distance distributions of commuters
from new urban districts are only improved to a limited degree. This is probably because in these
areas, much bigger diversity exists in residents' travel behaviors, while available data there may not
be sufficient to reflect fully this large diversity.
25
Fig. 7 Commuting distance distributions. The direct and cumulative distribution curves of commuting distance.
Here, 'Survey' refers to survey data; 'Microdata' refers to Weibo data after location identification; 'Synthesis'
refers to generated population after sample reconstruction. After sample reconstruction, the frequency of
zero-distance commuting has been largely reduced. The synthetic distribution curve is more consistent with
survey data though it slightly overestimates the frequency of commuting distance longer than 3km.
Based on the above analysis, we have demonstrated that sample reconstruction can be a useful
sampling bias correction method to adjust the bias in social media data. However, discrepancies still
exist between spatial mobility patterns discerned from synthetic and survey data. First, there are still
other socio-demographics assumed to be influential on travel behavior, such as employment,
occupation, housing area, and housing tenure (Ma et al., 2014), which are absent in Weibo users'
profiles and thus cannot be included in our synthesis process. As a result, the generated population
may not match well with survey respondents under these attributes. Second, check-in data and travel
logistic survey data are both a representative sample from the total population and each just reflects
one component of the entire array of complicated daily human behavior. Considering that the data we
use are only a subset of all geo-tagged check-in records available on Weibo, when a sufficiently large
dataset is utilized, the inferred results would improve further.
26
5 Conclusion and Discussion
In this research, we explored the capacity of social media data for human mobility analysis. A
three-step methodological framework, including purpose-specific location identification, bias
modification, and out-of-sample validation, was proposed and then tested using check-in records
crawled from Sina Weibo. An independent citywide travel survey was used as the benchmark dataset
for validating the results. Our analysis shows that Weibo users' and survey respondents' demographic
profiles and mobility patterns have distinct features. This implies a strong influence of
socio-demographics on people's activity participation and destination choices. We first tested the
possibility of using a spatial population synthesis technique to solve the bias-modifying problem of
check-in data. Our results showed that socio-demographics and activity-specific spatial layouts of the
reconstructed population match satisfactorily with those of survey respondents. Comparing the
inferred results from big data to aggregated results from an independent travel survey represents a
very important step towards big data validation. However, it should be noted that the inferred results
at the individual level could have great uncertainty even though a high level of accuracy is observed
at the aggregate level (Chen et al., 2016). Besides, the target distribution used for sample
reconstruction in our study was extracted from the survey data. The extent to which the resulting
synthetic population could represent the real one largely depends on the quality of the survey data. In
general, such survey data have a relatively small sample size, compared with the whole population,
and thus the data might not be representative enough in some cases. Another thing to keep in mind is
that, check-in data and travel log survey data are both sampled from the total population, and each
only presents a certain configuration of the reality. Therefore, combining knowledge learned from
multi-source data would lead us much closer to the real system. The method we proposed in this
27
research would also be a straightforward and easy-undertaking technique for cross-domain
integration of heterogeneous human spatiotemporal data.
Another remaining challenge of using check-in data for transport-related analysis, especially in
advanced travel demand models, is that it has missing activities, since users share their activities
voluntarily. Moreover, information on the mode of transport is also missing. However, these are not
the focus of this article. An attempt in this domain can be found in Hasan and Ukkusuri (2018),
where they applied Continuous-Time Bayesian Network model to extract the true transition and
duration distributions from the incomplete trajectories of Twitter users. Transportation mode can also
be extracted from Weibo text using text mining and natural language processing approaches. As
suggested by Rashidi et al. (2017), constructing a dictionary for this purpose is not as complicated.
Social media check-in data opens up a novel dataset for urban analysis. Compared with
traditional surveys, this dataset apparently has more advantages, including larger sample size,
real-time updating, less-prone to cheating, and a much lower acquisition cost. Especially in new
urban districts, where population size, structure, and mobility patterns are significantly changing,
whereas the survey data is not available or too expensive to collect, this study has validated that
through a proper way for analyzing Weibo data, such data can be a moderate and cost-effective
alternative source of mobility information. The proposed framework can be extended in several
directions. Relying on the commuting mode shares and emission intensities of each mode from
supplementary databases, the commute estimates in our work can be easily extended to carbon
footprints analysis. Another potential extension is to fill the missing activities in check-in sequences
with the help of activity transition probabilities and purpose-specific trip distance distributions from
travel surveys. Such models will provide valuable information for transportation emission modelling.
28
For instance, the activity-location sequences generated can be integrated with state-of-the-art
network assignment model to obtain dynamic traffic flows on the road network, and then feed them
to transport emission model, which will be able to infer the gas consumption and pollution emissions
incurred by passenger travel at a high temporal and spatial scale. Most importantly, Weibo data
makes a detailed activity-based travel analysis possible as geo-tagged venues are categorized based
on the POI type of the visited places. Incorporating such information enables urban planners and
environmental specialists to estimate the volume of air pollutants that would be generated during
certain time intervals, between specific regions, and to fulfill different needs. This can facilitate a
better understanding of urban organization and its environmental effects. The longitudinal nature of
social media data could also enable planners to deal with valuable questions like 'how does human
mobility evolve over a year?', 'what is the role of the underlying built environment in forming
human mobility and further transportation emission?'
Acknowledgements
We would like to thank Fuzheng Zhang, Jianxun Lian, and Danyang Liu from Microsoft
Research Asia for helping us crawl and manage Weibo check-in data.
29
Appendixes
Appendix A
Appendix Figure 1. Temporal features of main activity category. (a) Home; (b) Travel; (c) Work; (d)
School; (e) Entertainment; (f) Eating out; (g) Other.
30
abcdefg00.050.10.150.20.250.30.350:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.20.40.60.811.20:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.10.20.30.40.50:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.020.040.060.080:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.020.040.060.080.10.120:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.0050.010.0150.020.0250.030.0350:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.010.020.030.040.050.060:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend
References
Beckman R J, Baggerly K A, Mckay M D (1996). Creating synthetic baseline populations. Transportation Research Part
A: Policy and Practice, 6(30): 415-429.
Bojic I, Massaro E, Alexander B (2015). Choosing the right home location definition method for the given dataset. In:
International Conference on Social Informatics, Springer International Publishing, 194-208.
Chen C, Ma J, Susilo Y, Liu Y, Wang M (2016). The promises of big data and small data for travel behavior (aka human
mobility) analysis. Transportation Research Part C: Emerging Technologies, 68: 285-299.
Cho E, Myers S A, Leskovec J (2011). Friendship and mobility: user movement in location-based social networks. In:
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM,
1082-1090.
Ghauche A. Integrated transportation and energy activity-based model (2010). Dissertation for the Master Degree.
Cambridge: Massachusetts Institute of Technology.
Haase D, Lautenbach S, Seppelt R (2010). Modeling and simulating residential mobility in a shrinking city using an
agent-based approach. Environmental Modelling & Software, 25(10): 1225-1240.
Hasan S, Ukkusuri S V (2014). Urban activity pattern classification using topic models from online geo-location data.
Transportation Research Part C: Emerging Technologies, (44): 363-381.
Hasan S, Ukkusuri S V (2018). Reconstructing activity location sequences from incomplete check-in data: a
semi-markov continuous-time bayesian network model. IEEE Transactions on Intelligent Transportation Systems,
19(3): 687-698.
Hasan S, Zhan X, Ukkusuri S V (2013). Understanding urban human activity and mobility patterns using large-scale
location-based data from online social media. In: Proceedings of the 2nd ACM SIGKDD International Workshop on
Urban Computing, ACM, 6.
Hendrix E M T, Ortigosa P M, García I (2002). On the efficiency and effectiveness of controlled random search. In:
Stochastic and Global Optimization. Boston: Springer ,129-145.
Hermes K, Poulsen M (2012). A review of current methods to generate synthetic spatial microdata using reweighting and
future directions. Computers, Environment and Urban Systems, 36(4): 281-290.
Hossain N, Hu T, White A M, Luo J, Kautz H (2016). Inferring fine-grained details on user activities and home location
from social media: detecting drinking-while-tweeting patterns in communities. arXiv preprint arXiv, 1603.03181.
Isaacman S, Becker R, Caceres R, Kobourov S, Martonosi M, Rowland J et al (2011). Identifying important places in
people's lives from cellular network data. In: International Conference on Pervasive Computing, Springer Berlin
Heidelberg, 133-151.
Kirk H (2013). Microsimulation model user guide (flexible modelling framework). Leeds: School of Geography,
University of Leeds.
Lenormand M, Picornell M, Cantu-Ros O G, Tugores A N, Louail T, Herranz R et al (2014). Cross-checking different
sources of mobility information. PloS One, 9(8): e105184.
Ma J, Heppenstall A, Harland K, Mitchell G (2014). Synthesising carbon emission for mega-cities: a static spatial
microsimulation of transport CO2 from urban travel in Beijing. Computers, Environment and Urban Systems, 45:
78-88.
Müller K, Axhausen K W (2010). Population synthesis for microsimulation: state of the art. ETH Zürich, Institut für
Verkehrsplanung, Transporttechnik, Strassen-und Eisenbahnbau (IVT).
Pontes T, Magno G, Vasconcelos M, Guptay A, Almeida J, Kumaraguruy P et al (2012). Beware of what you share:
31
inferring home location in social networks. In: 2012 IEEE 12th International Conference on Data Mining
Workshops, IEEE, 571-578.
Rashidi T H, Abbasi A, Maghrebi M, Hasan S, Walle T S (2017). Exploring the capacity of social media data for
modelling travel behaviour: opportunities and challenges. Transportation Research Part C: Emerging Technologies,
75: 197-211.
Rieser M, Dobler C, Dubernet T, Grether D, Horni A, Ammel G L et al (2014). MATSim user guide.
Subbiah R, Lum K, Marathe A, Marathe M (2013). Activity based energy demand modeling for residential buildings. In:
Innovative Smart Grid Technologies (ISGT), IEEE PES, 1-6.
Toole J L, Colak S, Sturt B, Alexander L P, Evsukoff A, González M C (2015). The path most traveled: travel demand
estimation using big data resources. Transportation Research Part C: Emerging Technologies, 58: 162-177.
Wang Y, Yuan N J, Lian D, Xu L, Xie X, Chen E et al (2015). Regularity and conformity: location prediction using
heterogeneous mobility data. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, ACM, 1275-1284.
Wikipedia
online
https://en.wikipedia.org/w/index.php?title=Cosine_similarity&oldid=767962382 (accessed March 7, 2017).
Contributors
Available
(2017).
Cosine
similarity.
at
Wu L, Zhi Y, Sui Z, Liu Y (2014). Intra-urban human mobility and activity transition: evidence from social media
check-in data. PloS One, 9(5): e97010.
Yang F, Jin P J, Cheng Y, Zhang J, Ran B (2015). Origin-destination estimation for non-commuting trips using
location-based social networking data. International Journal of Sustainable Transportation, 8(9): 551-564.
Yuan N J, Wang Y, Zhang F, Xie X, Sun G (2013). Reconstructing individual mobility from smart card transactions: a
space alignment approach. In: ICDM, IEEE, 877-886.
Zhang F, Yuan N J, Xie X (2012). Data from 'LifeSpec: learning the spectrum of urban lifestyles'. Available online at
https://www.microsoft.com/en-us/research/project/lifespec-learning-spectrum-urban-lifestyles-2/ (accessed March 7,
2017).
Zhang L, Yang W, Wang J, Qian R (2013). Large-scale agent-based transport simulation in Shanghai, China.
Transportation Research Record: Journal of the Transportation Research Board, 2399: 34-43.
Zhou J, Long Y (2014). Jobs-housing balance of bus commuters in Beijing. Transportation Research Record: Journal of
the Transportation Research Board, 2418: 1-10.
32
Supporting Information for
Social media and mobility landscape: uncovering spatial
patterns of urban human mobility with multi source data
In this supporting information, we present the essential extended details of the results and analysis.
Calibration Results
This section gives the results of calibrating home and work identification algorithm with the
ground truth data, given the optimal objective. Besides, we also evaluate the calibrated results
based on mean distance error, standard deviation of distance error and identification coverage (that
is, the share of users with home/work identified in those with home/work labelled from the ground
truth) (c.f. SI Table 3).
After 20,000 times of iteration, the objective functions under seven settings of clustering radius all
converge to some single value. It means that the pre-set algorithmic control parameters of CRS
(including, iteration stages N and initial points in storage p) are sufficiently moderate to generate a
set of parameters with which most individuals' resulting identified home and workplaces give the
best fittings to the labelled ones.
We further calculate the 25th, 50th, 75th, 97.5th percentile error between the home and
workplaces as identified by our algorithm and the labelled ones as in ground truth. Both
algorithms perform well, achieving median errors of 0.08 km and 0.64 km, respectively. Moving
out to the 75th percentile, the home algorithm continues to work well, with 2.90 km of error,
whereas the work algorithm's error increases to 6.58 km. A further exploitation into the few cases
with larger distance errors reveals that the poor performance usually happens to users who do not
use Weibo frequently at workplace, or users who would post a microblog only when they are
working overtime, which time period is not covered by the peak work event hours defined in our
algorithm. In general, our home algorithm performs better than work algorithm.
Sample Reconstruction
It has to be noted that, in this study, due to the limited size of non-commuters identified with
check-in dataset, population reconstruction for those has to sample from the whole microdata.
Considering the dataset we use is only a subset of all geo-tagged check-in records available on
Weibo, when a sufficiently large dataset is utilized, this process would improve further.
33
Figure 1 The first 200 best parameter estimates of CRS algorithm under different
settings of clustering radius (m). The upper bond: indicates the maximum value, lower
bond, the minimum value and center, the best estimate of objective function.
Comparatively, all of the four parameters give the best converging performance at the
radius of 300m.
34
Figure 2 Other activity density maps. The identified (up) and recorded
(down) other activity density maps for the major metropolitan area in Beijing
(person_ days/km2), with a Cosine Similarity index of 0.35. Among all the
non-commuting locations, we calculate the number of days each unique venue
is visited (Days). Then, the popularity of a certain place as a candidate
location for other activity can be calculated as the sum of the corresponding
Days of all the users.
35
Table 1 Bags of words used when building ground truth data
Words
Work/School:
上班/下班/上学/放学(work/school), 单位/公司(company); 办公室(office room); 工位
(working station); 教室(classroom); 加班(work overtime); 值班(on duty)
Home:
家 (home), 床 (bed), 起 床 / 早 起 (wake up), 睡 觉 (sleep), 早 安 (morning), 晚 安 (good
night), 宿舍/寝室(dormitory); 出门(go out)
Table 2 Mean values of commuting distances by attributes
Attributes
female
Gender
male
Distance(km)
Attributes
Distance(km)
2.20
2.02
Education
primary
secondary
tertiary
2.01
2.10
2.13
Chi-sq (P)
0.01(0.91)
Chi-sq (P)
0.00(0.99)
15~24
25~26
27~28
29~30
31~33
Age
34~39
40~49
50+
1.81
1.67
2.12
2.53
2.66
2.58
1.86
0.93
Dongcheng
Xicheng
Chaoyang
Haidian
Shijingshan
District
Fengtai
Changping
Shunyi
Tongzhou
Daxing
1.89
1.53
2.07
1.39
3.27
2.82
3.03
3.25
3.49
2.50
Chi-sq (P)
335.92(0.00)
Chi-sq(P)
103.64(0.00)
Info: Kruskal -- Wallis test (or, KW test), a non-parametric method for testing whether samples
originate from distributions with the same median, is used to select attributes strongly related to
travel behavior. A significant KW test, with a P value close to zero, indicates that at least one
sample is from a distribution with a different median.
36
Table 3 Calibration results of home and workplace identification
Home
Standard
Deviation
6.83
6.76
6.63
6.64
6.89
6.54
7.32
Mean
3.32
3.24
3.20
3.18
3.43
3.18
3.67
Coverage
Mean
Work
Standard
Deviation
Coverage
91%
88%
95%
92%
97%
92%
97%
4.60
4.42
4.69
4.66
4.66
4.48
5.21
7.97
7.87
7.76
7.90
7.29
7.25
7.87
87%
86%
93%
92%
96%
91%
99%
Objective
Function
4.28E-04
4.37E-04
4.38E-04
4.34E-04
5.05E-04
5.08E-04
5.03E-04
r(m)
20
50
70
100
200
300
500
Table 4 Representation of the model constraint at the TAZs level
District
Age
Gender
Age by Gender
Commuting
Non-commuting
TAE
CPE (%)
TAE
CPE (%)
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Info: Total Absolute Error (TAE) and Cell Percentage Error (CPE) are used to evaluate the goodness-of-fit of the
synthetic population. TAE is calculated with Eq. (6) in the manuscript, while CPE is derived by TAE/N*100, where
N is the population of the relevant cell, zone or attribute.
Table 5 Sub-district level Coincidence Ratio of commuting trip-length distribution before and after sample
reconstruction
Total
Dongcheng
Xicheng
Chaoyang
Haidian
Fengtai
Shijingshan
Changping
Shunyi
Tongzhou
Daxing
Sample
Synthesis
Sample size
0.23
0.24
0.20
0.25
0.23
0.24
0.20
0.28
0.26
0.22
0.20
0.63
0.59
0.58
0.55
0.52
0.60
0.49
0.43
0.25
0.41
0.42
24,518
1,589
2,137
6,979
5,820
2,671
714
1,698
977
925
1,008
37
|
1212.1002 | 1 | 1212 | 2012-12-05T12:07:05 | Stochastic Models of Misinformation Distribution in Online Social Networks | [
"cs.SI",
"physics.soc-ph"
] | This report contains results of an experimental study of the distribution of misinformation in online social networks (OSNs). We consider the classification of the topologies of OSNs and analyze the parameters identified in order to relate the topology of a real network with one of the classes. We propose an algorithm for conducting a search for the percolation cluster in the social graph. | cs.SI | cs |
Konstantin
Abramov,
Yuri
Monakhov
STOCHASTIC
MODELS
OF
MISINFORMATION
DISTRIBUTION
IN
ONLINE
SOCIAL
NETWORKS
Department
of
Informatics
and
Information
Security,
Vladimir
State
University,
Vladimir
600000
Russian
Federation
This
report
contains
results
of
an
experimental
study
of
the
distribution
of
misinformation
in
online
social
networks
(OSNs).
We
consider
the
classification
of
the
topologies
of
OSNs
and
analyze
the
parameters
identified
in
order
to
relate
the
Results
of
current
research
show
the
intensive
growth
in
OSN
users’
activity
[1].
This
topology
of
a
real
network
with
one
of
the
classes.
We
propose
an
algorithm
for
phenomenon
is
observed
throughout
the
entire
Internet.
Currently
there
are
many
factors
conducting
a
search
for
the
percolation
cluster
in
the
social
graph.
enabling
massive
waves
of
misinformation
spread
through
different
social
media.
Finding
ways
to
mitigate
these
phenomena
is
an
extremely
actual
and
very
complicated
problem.
One
of
the
aspects
that
we
need
to
take
into
account
is
building
adequate
models
and
prediction
methods
for
the
misinformation
spread.
The
easiest
and
most
researched
way
to
model
(and
predict)
these
processes,
in
our
opinion,
is
to
use
the
classic
epidemiological
models
developed
in
19th
century
to
study
how
infectious
diseases
spread
among
the
population.
These
models
generally
are
based
on
systems
of
differential
equations.
Such
models
though
are
rather
primitive
and
they
don’t
take
into
the
account
some
of
the
vital
characteristics
of
the
misinformation
process[2].
Therefore
the
development
of
the
new
models
is
relevant
and
necessary
to
predict
the
spread
of
misinformation
and
to
mitigate
it.
Researchers
present
different
classifications
of
the
network
topologies
and
their
characteristic
properties.
According
to
one
of
these
classifications[3],
there
are
three
different
types
of
small
world
networks:
wide
scale,
single
scale
and
scale
free
(SF)
networks.
The
first
type
is
characterized
by
the
node
degree
distribution
function,
which
is
a
mix
of
power-‐law
and
exponential
distributions.
The
primary
characteristic
of
the
second
type
is
an
absence
(or
very
low
percent)
of
the
nodes
with
high
degree,
i.e.
Watts-‐Strogatz
networks.
Finally,
the
scale
free
networks
are
strictly
described
by
the
power-‐law
node
degree
distribution,
meaning
the
probability
of
the
nodes
with
high
degree
of
connectivity
is
relatively
high.
The
most
known
example
of
the
SF
networks
is
the
Barabasi-‐Albert
(BA)
network.
The
table
(Tab.
1)
describes
features
one
can
use
to
relate
the
OSN
topology
to
one
of
the
types[4].
These
features
are:
• the
number
of
connections
in
the
network
with
N
nodes
–
the
number
of
all
possible
connections
between
N
nodes;
• the
average
path
length
l
between
any
pair
of
vertices
(nodes);
• the
node
connectivity
degree
distribution
function
shows
the
probability
of
the
node
having
the
degree
of
k;
• the
clustering
coefficient
that
is
defined
as
the
probability
of
a
connection
between
two
nodes
having
a
common
neighbor.
This
probability
(for
an
i-‐th
neighboring
node)
is
calculated
as
E i
where ki
is
the
i-‐th
neighboring
node
degree
and Еi
is
the
total
number
of
,
C i
1=
connections
between
k
nodes
adjacent
to
the
i-‐th
node.
The
total
(or
average)
(k i
)
1-
k i
2
clustering
coefficient
for
a
network
with
N
nodes
will
be
C 1
.
Ci
∑=
N
i
Tab.1
Feature
Number of
connections
Average path length
Basic topological features
Barabasi-Albert
Watts-Strogatz small
world network
scale free
network
) 1-Nm ⋅
(
Nk ⋅
2
ln~
ln
N
k
N
l
m
ln~:1
;
=
3
l
m
N
>
α
:2≥
ln≈
;
BA
3
l
N
N
α
=
ln≈
lnln/
BA
2
3
l
N
<<
α
lnln≈
.
BA
;
Random networks
(i.e. Erdos-Renyi
graph)
Nk ⋅
2
ln~
ln
N
k
C
5~
k
N
k~C
N
Clustering
pC
~1→
k/N,
pC
0pC
coefficient
>>
1→
>
Power law:
Node degree
Poisson's law:
Poisson's law:
distribution
α-k~
k
k
p(k)
pN
(
)
pN
(
)
pN-e~kp
pN-e~kp
)(
)(
Gubanov,
Novikov
and
Chkhartishvili
in
their
book
[5]
provide
an
extensive
review
of
k
!
k
!
the
approaches
towards
social
network
modeling.
In
their
research
they
classify
netwoks
not
by
their
structure
but
rather
by
the
types
of
social
influence.
On
the
other
hand
their
statement
concerning
the
necessity
of
having
at
least
two
features
to
identify
the
network
type
is
well
applicable
in
our
case.
We
select
the
node
degree
distribution
function
and
the
clustering
coefficient
for
these
two
features.
During
the
research
we
had
extracted
the
topological
data
of
the
Facebook
OSN,
the
size
of
the
obtained
sample
equals
6927
nodes.
The
following
research
was
conducted
on
this
subgraph.
The
authors
have
conducted
a
comparison
between
the
node
degree
distribution
acquired
from
the
Facebook
OSN
subgraph
and
the
degree
distributions
of
small
world,
scale
free
and
Erdos-‐Renyi
networks.
For
Erdos-‐Renyi
and
small
world
networks
one
can
approximate
the
degree
distribution
with
Poisson’s
law,
and
for
scale
free
networks
the
distribution
of
the
degrees
is
approximated
by
power
law.
In
our
social
subraph
maximum
degree
equals
507,
minimum
degree
equals
1.
The
histogram
of
the
node
degree
distribution
of
the
sample
is
shown
in
Fig.
1
Fig.
1.
Node
degree
distribution
of
the
sample
It
is
well
known
that
the
characteristic
feature
of
scale
free
networks
is
the
presence
of
a
few
nodes
with
very
high
degrees
of
connectivity
and
a
mass
of
nodes
with
small
connectivity
degrees.
We
can
presume
that
the
obtained
sample
is
scale
free.
To
test
this
hypothesis
the
probabilities
of
a
node
having
different
degrees
were
calculated.
The
results
show
that
the
acquired
dataset
can
be
(with
sufficient
accuracy,
Δ=0,01)
approximated
by
a
power
function.
Therefore
the
degree
distribution
function
for
our
social
subgraph
is
that
of
a
scale
free
network.
The
value
of
a
clustering
coefficient
calculated
for
this
subgraph
complies
with
the
criterion
shown
in
Tab.
1,
which
is
typical
for
the
scale
free
networks.
We
therefore
can
conclude
that
our
Facebook
OSN
sample
has
the
scale
free
topology[6].
During
this
research
we
carried
out
the
simulation
of
the
misinformation
process
in
OSNs.
The
simulation
was
conducted
using
proprietary
softwrae
developed
by
authors.
The
most
commonly
used
models
of
social
influence
are
the
classic
epidemic
models,
such
as
SI,
SIR,
SIS,
PSIDR,
AAWP,
SIM.
Every
model
has
its
specific
features
and
no
model
is
universally
applicable.
In
this
research
we
use
SIR
model
as
the
source.
The
most
significant
result
we
achieve
from
the
simulation
is
that
in
most
cases
the
cluster
that
consists
of
R-‐nodes
(nodes
“immune”
to
misinformation)
significantly
reduces
the
speed
of
spread
by
isolating
the
“infected”
nodes
or
spreaders
of
misinformation
from
the
nodes
“susceptible”
to
misinformation.
We
use
the
term
“cluster”
to
describe
the
linked
subgraph
constructed
from
the
nodes
with
high
clustering
coefficients.
[1]
Industry
report
of
the
Federal
Agency
for
Press
and
Mass
Communications
“Internet
in
Russia:
Status,
Trends
and
Prospects",
August
2010.
[Russian:
Отраслевой
доклад
REFERENCES
Федерального
агентства
по
печати
и
массовым
коммуникациям
«Интернет
в
России:
состояние,
тенденции
и
перспективы
развития»,
август
2010г.]
[2]
Konstantin
Abramov,
Yuri
Monakhov.
Modeling
of
unwanted
information
in
social
media
[text]
/
Proceedings
of
XXX
All-‐Russian
Conference
on
problems
of
efficiency
and
safety
of
complex
engineering
and
information
systems.
Part
IV,
section
number
6.
-‐
Serpukhov
VI
RV.
-‐
2011.
-‐
376
p.;
-‐
P.
178-‐182.
-‐
ISBN
978-‐5-‐91954-‐029-‐8
[Russian:
Абрамов
К.Г.,
Монахов
Ю.М.
Моделирование
распространения
нежелательной
информации
в
социальных
медиа
[Текст]
//
Труды
XXX
Всероссийской
научно-‐
технической
конференции.
Проблемы
эффективности
и
безопасности
функционирования
сложных
технических
и
информационных
систем.
Часть
IV,
секция
№6.
-‐
Серпуховский
ВИ
РВ.
-‐
2011.
-‐
376
c.;
-‐
С.
178-‐182.
-‐
ISBN
978-‐5-‐91954-‐
029-‐8]
[3]
Leveille
J.
Epidemic
Spreading
in
Technological
Networks
//
M.
Sc.
Thesis,
HP
Labs
Bristol,
2002
–
100
pp.
[4]
Zharinov
IV,
Krylov
VV.
Construction
of
graphs
with
minimum
average
path
length
/
/
Bulletin
of
Izhevsk
State
Technical
University
-‐
№
4,
2008.
-‐P.
164-‐169.
[Russian:
Жаринов
И.В.,
Крылов
В.В.
Конструирование
графов
с
минимальной
средней
длиной
пути
//
Вестник
Ижевского
государственного
технического
университета
-‐№4,
2008.
–С.
164-‐169.
]
[5].
Gubanov
DA,
Novikov
DA,
Chkhartishvili
AG.
Models
of
influence
in
social
networks,
overview
of
classes
of
modern
models
of
social
networks,
2004.
[Russian:
Губанов
Д.А.,
Новиков
Д.А.,
Чхартишвили
А.Г.
«Модели
влияния
в
социальных
сетях»,
обзор
классов
современных
моделей
социальных
сетей,
2004.]
[6].
Yuri
Monakhov,
Konstantin
Abramov,
Alexandra
Nikitashenko.
On
the
question
of
improving
the
models
of
misinformation
spread
in
online
social
networks
//
Information
Systems
and
Technology
IST-‐2011:
Proceedings
of
the
XVII
International
Scientific
and
Technical
Conference,
Nizhny
Novgorod,
2011
[Russian:
Абрамов
К.Г.,
Монахов
Ю.М.,
Никиташенко
А.В.
К
вопросу
об
уточнении
моделей
распространения
нежелательной
информации
в
социальных
сетях
Интернета
/
Информационные
системы
и
технологии
ИСТ-‐2011:
материалы
XVII
международной
научно-‐
технической
конференции
-‐
Н.
Новгород:
-‐
2011.
-‐
ISBN
978-‐5-‐9902087-‐2-‐8]
|
1303.5675 | 1 | 1303 | 2013-03-22T18:06:33 | Markov random walk under constraint for discovering overlapping communities in complex networks | [
"cs.SI",
"cond-mat.stat-mech",
"physics.soc-ph"
] | Detection of overlapping communities in complex networks has motivated recent research in the relevant fields. Aiming this problem, we propose a Markov dynamics based algorithm, called UEOC, which means, 'unfold and extract overlapping communities'. In UEOC, when identifying each natural community that overlaps, a Markov random walk method combined with a constraint strategy, which is based on the corresponding annealed network (degree conserving random network), is performed to unfold the community. Then, a cutoff criterion with the aid of a local community function, called conductance, which can be thought of as the ratio between the number of edges inside the community and those leaving it, is presented to extract this emerged community from the entire network. The UEOC algorithm depends on only one parameter whose value can be easily set, and it requires no prior knowledge on the hidden community structures. The proposed UEOC has been evaluated both on synthetic benchmarks and on some real-world networks, and was compared with a set of competing algorithms. Experimental result has shown that UEOC is highly effective and efficient for discovering overlapping communities. | cs.SI | cs | Markov random walk under constraint for discovering
overlapping communities in complex networks
Di Jin1, Bo Yang1, Carlos Baquero2, Dayou Liu1, Dongxiao He1 and
Jie Liu1
1 College of Computer Science and Technology, Jilin University,
Changchun 130012, China
2 CCTD/DI, University of Minho, Braga, Portugal
E-mail:
[email protected], [email protected], [email protected],
[email protected], [email protected] and [email protected]
Abstract. Detection of overlapping communities in complex networks has
motivated recent research in the relevant fields. Aiming this problem, we
propose a Markov dynamics based algorithm, called UEOC, which means,
“unfold and extract overlapping communities”. In UEOC, when identifying
each natural community that overlaps, a Markov random walk method
combined with a constraint strategy, which is based on the corresponding
annealed network (degree conserving random network), is performed to unfold
the community. Then, a cutoff criterion with the aid of a local community
function, called conductance, which can be thought of as the ratio between the
number of edges inside the community and those leaving it, is presented to
extract this emerged community from the entire network. The UEOC
algorithm depends on only one parameter whose value can be easily set, and it
requires no prior knowledge on the hidden community structures. The
proposed UEOC has been evaluated both on synthetic benchmarks and on
some real-world networks, and was compared with a set of competing
algorithms. Experimental result has shown that UEOC is highly effective and
efficient for discovering overlapping communities.
Keywords: analysis of algorithms, clustering techniques, network
dynamics
PACS: 89.75.Hc, 89.75.Fb, 02.10.Ox, 02.60.Cb
1. Introduction
Many complex systems in real world exist in the form of networks, such as social networks,
biological networks, Web networks, etc., which are collectively referred to as complex
networks. One of the main problems in the study of complex networks is the detection of
community structure, i.e. the division of a network into groups of nodes having dense
intra-connections, and sparse inter-connections [1]. In the last few years, many different
approaches have been proposed to uncover community structure in networks; the interested
reader can consult the excellent and comprehensive survey by Fortunato [2].
However, it is well known that many real-world networks consist of communities that
overlap because nodes are members of more than one community [3]. Such observation is
visible in the numerous communities each of us belongs to, including those related to our
scientific activities or personal life (school, hobby, family, and so on). Another, biological
example is that a large fraction of proteins simultaneously belong to several protein
complexes [4]. Thus, hard clustering is inadequate for the investigation of real-world
networks with such overlapping communities. Instead, one requires methods that allow nodes
to be members of more than one community in the network.
Recently, a number of approaches to the detection of overlapping communities in graphs
have been proposed. One type, among these methods, is based on the idea of clique
percolation theory, i.e. that a cluster can be interpreted as the union of small fully connected
sub-graphs that share nodes [3, 5, 6]. Another type of method transforms the interaction graph
into the corresponding line graph in which edges represent nodes and nodes represent edges,
and then apply a known clustering algorithm on the line graph [7-10]. A third type of method,
which our work belongs to, discovers each natural community that overlaps by using some
local property based approach [11-13].
Though there are already some algorithms for detecting overlapping communities, which
have been presented recently, there is still ground for improvements in the performance.
Moreover, while the Markov dynamics model has been successfully used in the area for
community detection [14-18], unfortunately, the existing approaches still largely lack the
ability to deal with overlapping communities. To the best of our knowledge, only to recent
works, available in pre-print format, constitute exceptions to this. Esquivel et al. [19]
generalized the map equation method [16] by releasing the constraint that a node can only
belong to one module codebook, and made it able to measure how well one can compress a
description of flow in the network when we partition it into modules with possible overlaps.
Kim et al. [20] extended the map equation method [16], which is originally developed for
node communities, in order to find link communities in networks, and made it able to find
overlapping communities of nodes by partitioning links instead of nodes.
In this paper, an algorithm UEOC based on the Markov dynamics model is proposed to
discover communities that share nodes. In the UEOC approach, so as to detect all the natural
communities, a Markov random walk method is combined with a new constraint strategy,
which is based on the corresponding annealed network [21], and used to unfold each
community. Then, a cutoff criterion with the aid of conductance, which is a local community
fitness function [22], is applied to extract the emerged community. These extracted
communities will naturally overlap if this configuration is present in the network.
Furthermore, a strong point in our approach is that UEOC is not sensitive to the choice of its
only parameter, and needs no prior knowledge on the community structure, such as the
number of communities.
2. Algorithm
2.1. Overview of the UEOC
Let N = (V, E) denote an unweighted and undirected network, where V is the set of nodes (or
vertices) and E is the set of edges (or links). We define a cover of network N as a set of
overlapping communities with a high density of edges. In this case, some nodes may belong
to more than one community. This is an extension of the traditional concept of community
detection (in which each node belongs to a single community), to account for possible
overlapping communities. In our case, detecting a cover amounts to discovering the natural
community of each node in network N.
The straightforward way to compute a cover of a targeted network is to repeatedly detect
the community for each single node. This is, however, computationally expensive. The natural
communities of many nodes often coincide, so most of the computer time is spent to
rediscover the same modules over and over. For our algorithm, UEOC, a more efficient way is
summarized as follows.
S1. Pick node s with maximum degree, which has not been assigned to any community;
S2. Unfold the natural community of node s by a Markov random walk method
combined with a constraint strategy;
S3. Extract the emerged community of node s by a cutoff criterion based on a
conductance function;
S4. If there are still nodes that have not been assigned to any community, repeat from S1.
The core of UEOC is how to unfold and extract the natural community of each node, and
this directly decides the performance of our algorithm. For the first goal, a Markov random
walk method combined with a constraint strategy is proposed here, and this will result in
making each community clearly visible. For the second one, a cutoff criterion based on the
conductance function is presented, so as to precisely extract the emerged community.
2.2. Unfolding a community
Given a network N = (V, E), consider a stochastic process defined on N, in which an
imaginary agent freely walks from one node to another along the links between them. When
the agent arrives at one node, it will randomly select one of its neighbors and move there.
Assume that X = {Xt, t 0} denote the agent positions, and P{Xt = j, 1 j n} denote
the probability that the agent arrives at node j after t steps walking. For t > 0 we have P{Xt
X0, X1, …, Xt-1} = P{Xt Xt-1}. That is, the next state of the agent is completely decided by its
previous state, which is called a Markov property. So, this stochastic process is a discrete
Markov chain and its state space is V. Furthermore, Xt is homogeneous because P{Xt = j Xt-1
= i} = pij, where pij is the transition probability from node i to node j. In terms of the
adjacency matrix of N, A = (aij)nn, pij is defined as (1).
a
ir
r
Lets consider the Markov dynamics model above. Given a specific source node s for the
l
s i denotes the probability that this agent starts from node s and eventually
( )
agent, let
l
( )
s i can be estimated
arrives at an arbitrary destination node i within l steps. The value of
(1)
p
ij
ij
a
iteratively by (2).
l
s
( )
i
p
ri
1
( )
r
(2)
communities. Thus, in general, vector
n
l
s
1
r
l
s is called the l step transition probability distribution (vector). Note that the
Here,
sum of the probability values arriving at all the nodes from source node s will be 1, i.e.
n
l
. When step number l equals to 0, which means the agent is still on node s, then
( ) 1
i
s
1
i
0
0
( )
( )
s s equals to 1 and
i equals to 0 for each i s.
s
As the link density within a community is, in general, much higher than that between
communities, a random walk agent that starts from the source node s should have more paths,
to choose from, to reach the nodes in its own community within l steps, when the value of l is
suitable. On the contrary, the agent should have much lower probability to arrive at the nodes
outside its associated community. In other words, it will be difficult for the agent to escape
from its existing community by passing those “bottleneck” links and to arrive at other
l
s should broadly meet the condition (3) when the
step number l is suitable. In this equation, Cs denotes the community where node s is situated.
(3)
l
l
:
( )
( )
i
j
s
s
i C j C
s
s
However, though the above Markov method is well suitable for some simple networks,
such as the benchmark graphs in the Newman model [1] and some small real networks, it is
not so effective for some complicated networks, like the benchmark graphs in the
Lancichinetti model [23] (such as in the example of figure 1(a)) and some large-scale real
networks. Furthermore, this method is very sensitive to the choice of the step number l, which
depicts a crucial influence in its performance.
l
s and shown in figure 1(b). As we can see, the
associated probability values of many within community nodes are smaller than that of the
l
s
does not fit condition (3) well enough for this relatively complicated network. Moreover, the
result shown in this figure is the best performance case (when l equals to 3). It will become
worse when step number l is greater or smaller than 3.
In order to overcome these drawbacks, a Markov random walk method combined with a
constraint strategy based on the corresponding annealed network is proposed here. The idea of
our method arises in the intuition that a Markov random process on a network with
community structure is different from that process on its corresponding annealed network
without communities. Considering this, in each step, the probability that an agent starts from a
specific source node s and arrives at each destination node i will be defined as the difference
between its associated probability computed on the community network N and that on the
corresponding annealed network R. Due to R having no community structure, the link density
within a community in network N should be much higher than that in R, while the link
density between communities in N should be much lower than that in R. Thus, under the
constraint brought by the annealed network, this agent will be deterred from escaping it’s
associated community and reach the nodes outside that community. This will also cause that,
outside community nodes, thus it cannot unfold a clear community. This also means that
There is an example, depicting vector
the computed probability value of each within community node will be high, whilst that of
each outside node will be relatively low and in most cases even equal to 0.
Given network N = (V, E) with its degree distribution D, and the corresponding annealed
network
R V' E' with its degree distribution D' , it should be so that
V V' ,
D D'
(
,
)
E E' . This means that N and R have the same degree distribution [21]. Let A =
while
(aij)nn denote the adjacency matrix of network N. There will be D = diag(d1, … dn), in which
i
a denotes the degree of node i. Assume that B = (bij)nn is the adjacency matrix
d
ij
j
l
s
, 0
q
ij
r
/
( ) max
i
(4)
(also called probability matrix) of R. We have
n
d , which denotes the
b
d d
ij
i
j
r
1
r
expected number of links (or called expected link probability) between nodes i and j. Let qij
denote the transition probability from node i to node j on graph R. It will be defined as (4).
b
ij
b
ir
l
( )
s i denote the
Considering the constraint generated by this annealed network R, let
probability that this agent starts from the source node s and eventually arrives at an arbitrary
l
( )
s i can be estimated iteratively by (5).
destination node i within l steps. The value of
n
n
1
l
s
1
1
r
r
l
( )
i
s
n
l
s
1
r
n
1
l
denotes the transition probability from node s to
p
s
ri
1
r
n
1
l
node i within l steps on network N, while
denotes that probability
( )
r q
ri
s
1
r
l
s i always a nonnegative
computed on annealed network R. Furthermore, we make each
( )
value. Since the sum of the probability values arriving at all the nodes from source node s
l
s i after each step.
should be 1, we also normalize
( )
An example for the proposed l step transition probability distribution
l
s is shown in
figure 1(c). As we can see, the associated probability values of almost all within community
nodes are greater than that of the outside community nodes, except for only a few special
nodes whose community relations may be not very clear. In particular, there are 766 out of
It’s obvious that
(5)
( )
r q
ri
p
ri
1
l
s
( )
r
l
s
( )
i
( )
r
( )
r
903 outside community nodes whose probability values are 0. Thus, it’s obvious that,
l
s
can meet condition (3) well, and unfold a very clear community for source node s. Moreover,
this Markov process will convergence very well when step number l is greater than some
value (in particular, 20 was found to be a good lower value). Thus, its performance is not as
sensitive as before to the parameter l. Later, we will offer some detailed analysis on this
parameter.
Furthermore, most complex networks have power-law degree distribution, which means
there are more paths arriving at the nodes with high degrees than those with low degrees. If
not compensated, this will lead to detrimental effects when unfolding communities. Thus, we
take into account the effect of power-law degree distribution in complex networks, and
propose a further improved l step transition probability distribution
l
s as defined as (6),
where di denotes the degree of node i. Note that this equation is not iteratively computed.
l
l
( )
( )
i
i
s
s
n
d
l
i
s
1
r
l
s shown as figure 1(d). As we can see, this improved
There is an example for vector
l
l
method can unfold a more clear community, and
s can meet (3) a little better than
s .
x 10-3
(6)
l
s
( )
r
( )
i
( )
i
l
s
,
the probabilities of w ithin community nodes
the probabilities of outside community nodes
8
7
6
5
4
3
2
1
n
o
i
t
u
b
i
r
t
s
i
d
y
t
i
l
i
b
a
b
o
r
p
n
o
i
t
i
s
n
a
r
t
e
h
t
0
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
200
400
600
800
1000
0
0.04
0.035
0.03
0.025
0.02
0.015
0.01
0.005
n
o
i
t
u
b
i
r
t
s
i
d
y
t
i
l
i
b
a
b
o
r
p
n
o
i
t
i
s
n
a
r
t
e
h
t
0
0
200
800
600
400
400
600
the ID number of each node
the ID number of each node
(a) (b)
1000
200
0
0
800
1000
the probabilities of w ithin community nodes
the probabilities of outside community nodes
the probabilities of w ithin community nodes
the probabilities of outside community nodes
0.025
n
o
i
t
u
b
i
r
t
s
i
d
y
t
i
l
i
b
a
b
o
r
p
n
o
i
t
i
s
n
a
r
t
e
h
t
0.02
0.015
0.01
0.005
0
0
800
800
200
200
1000
1000
400
600
400
600
the ID number of each node
the ID number of each node
(c) (d)
Figure 1. An illustration for the Markov random walk method combined with our constraint
strategy to unfold a community. (a) A benchmark network with power-law distribution of
degree and community size by Lancichinetti model [23]. In this network, the number of nodes
is 1000, the minimum community size is 20, the mixing parameter is 0.3, and the number of
overlapping nodes is 400. Here we just consider the largest community, which contains 97
nodes. They are all put on the top of the nodes sequence. The selected source node s is the one
with maximum degree in this community. (b) The generated l step transition probability
vector according to (2). The best performance appears when l equals 3. (c) The generated l
step transition probability vector according to (5). Its performance is insensitive to the
increase of parameter l after it is greater than 20. (d) The generated l step transition
probability vector according to (6). Its performance is insensitive to the increase of
parameter l after it is greater than 20.
Based on this above idea, a method for unfolding the community, which contains a
specific source node s, will be described bellow. This method is called UC (Unfolding
Community).
l
s ;
S1. Calculate the l step transition probability vector of node s, which is
S2. Rank all the nodes according to their associated probability values in descending
order, producing the sorted node list L.
After these two steps, almost all the within community nodes will be ranked on the top
of the sorted node sequence L. The target community has now clearly emerged and is ready
for detection. Now, by properly setting a cutoff point (to be explained in the next section), we
can precisely extract the community’s nodes.
Proposition 1. The time complexity of the UC is O(ln2), where l is the step number of
the random walk agent, and n corresponds to the number of nodes in network N.
l
s by (5) and (6) will be O(ln2). In
Proof. In S1, It’s obvious that the time to compute
l
s will be O(nlogn), derived from quick sorting algorithms. Thus, the
S2, the time to rank
time complexity of the UC will be O(ln2).
2.3. Underlying mechanism in Unfolding Community
Let an agent freely walk on a network N. For any node i, j and step number l, the probability
l
that the agent starts from node i and arrives at node j within l steps will be
( )
j according
i
to (2). This is a discrete Markov process.
From the analysis of [24], according to large deviation theory, we know that the Markov
chain has n local mixing states, and the i-th local mixing state corresponds to the number of
communities i. In particular, if the network N has a well-defined community structure with k
clear communities, this Markov chain will stay, in a stable way, in the k-th local mixing state
during a period of time with a probability of 1, called a metastable state in this situation.
According to this theory [24], all the local mixing times of the Markov chain can be
estimated by using the spectrum of its Markov generator (normalized graph Laplacians) M =
I−P, where I is the identity matrix and P is (pij)nn according to (1). For an undirected
network, M is positive semi-definite and has n non-negative real-valued eigenvalues
ext
ent
iT
iT
be the entering time and exiting time of the
2
). Let
n
1
2
and
( 0
o
1 /
(1))
state. That is
i-th local mixing state. We have
. Reasonably, we can also use the exiting
ext
1 (1
iT
i
time of the (i+1)-th local mixing state to estimate the entering time of the i-th local mixing
ext
ent
.
T
T
1
1
i
i
i
There is an example shown as figure 2. In order to depict this Markov process more
clearly, we use a simple network and adopt the transition probability matrix instead of the
transition probability vector here. Figure 2(a) shows a Newman network [1] which contains a
known community structure with four clear communities. Figure 2(b) shows the spectrum of
this network. Figure 2(c) shows the exiting time of each local mixing state. Especially, it also
offers the entering time and exiting time of the 4-th local mixing state, which corresponds to a
metastable state and evidences the real community structure of the network. Figure 2(d)-(f)
depict the process of the Markov chain when it goes through the metastable state and finally
ent
ext
reaches the global mixing state. Figure 2(d) denotes the t1 (
) step
t
T
T
1
4
5
5
transition probability matrix when it begins to enter the metastable state which corresponds to
ext
the four clear communities. Figure 2(e) denotes the t2 (
) step transition
T
4
2
4
probability matrix when it begins to exit this metastable state. Figure 2(f) shows the t3
ext
ent
T
T
2
1
) step transition probability matrix after it enters the global
2
7
2
20
1 /
1 /
1 /
(
3
t
t
mixing state and eventually converges to this state, where we now have
t
i
3
( )
j
/
d
j
r
d
r
for each node i and j.
As we can see from this example, if a network has a community structure with k clear
communities, there will be a short entering time (1/k+1) and a relatively long exiting time
(1/k) for the k-th local mixing state, which denotes a metastable state. During this period of
time, each community locally mixes together and we can observe the k communities of the
network. Furthermore, the Markov chain will quickly converge to the global mixing state
after it enters this state (> 1/2).
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
20
40
60
80
100
120
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
0
i
X: 5
Y : 0.6212
X: 4
Y : 0.1535
10
8
6
4
2
X: 4
Y : 6.514
X: 5
Y : 1.61
i
/
1
20
40
60
80
100
120
the ID number of each node
i
i
(a) (b) (c)
140
100
120
20
60
40
40
80
60
20
80
0
0
0
-0.2
0
20
40
60
80
100
120
0.07
0.06
0.05
0.04
0.03
0.02
0.01
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
20
40
60
80
100
120
0.025
0.02
0.015
0.01
0.005
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
100
120
140
x 10-3
13
12
11
10
9
8
7
6
5
4
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
20
40
60
80
100
120
20
20
40
60
20
40
60
80
100
120
80
100
120
40
60
80
100
120
the ID number of each node
the ID number of each node
the ID number of each node
(d) (e) (f)
Figure 2. An example to demonstrate the characteristic of the iteration process for the
Markov chain according to (2) on a benchmark network by Newman model [1]. (a) A
Newman network consists of 128 nodes divided into four groups of 32 nodes. Each node has
on average 14 edges connecting it to members of the same group and 2 edges to members of
other groups, with the expected degree 16. (b) The spectral distribution (i) of this network. (c)
The exiting time (1/i) of the local mixing state for each number of communities. (d) The t1
(t1 = 1/5) step transition probability matrix when the Markov chain begins to enter the
metastable state. (e) The t2 (t2 = 1/4) step transition probability matrix when the Markov
chain begins to exit the metastable state. (f) The t3 (t2 > 1/2) step transition probability matrix
when the global stable state is finally reached.
Though the Markov chain of a random walk on the network contains a metastable state
that corresponds to its real community structure, it will eventually reach the global mixing
state, which denotes a trivial solution. For detecting communities, the followed intuition is
that, if we can make the Markov chain remain and converge to this metastable state by
deliberately adjusting transition probabilities, a nontrivial solution, which corresponds to the
real community structure of the network, will be naturally attained due to this adjustment.
Starting from this intuition, here we consider the difference between the Markov random
process on a network N with community structure and that on its corresponding annealed
network R without communities. It’s obvious that, the link density within a community in
network N will be much higher than that in R, while the link density between communities in
N will be much lower than that in R. Then, for any node i, j and step number l, if the l step
transition probability from node i to node j computed on the community network N is no
better (lower) than that computed on the annealed network R, we will have reason to believe
that node i will have no chance of being in a same community of node j. Thus, we adjust and
rescale the transition probability according to (5), which will make the probability that the
constrained walker (agent) starts from node i and arrive at node j, within l steps, be null. It’s
obvious that this will make the agent have almost no chance escaping from its own
community, and the constrained Markov chain can hardly exit the metastable state that
corresponds to the real community structure of the network.
There is an example shown as figure 3, which corresponds to the case in figure 2. We
find out that this constrained Markov chain can also enter the metastable state corresponding
to the real community structure at time t1 = 1/5, which is shown as figure 3(a). However, it
will not begin to exit the metastable state at time t2 = 1/4, but has almost converged to this
state, which is shown as figure 3(b). At time t2 > 1/2, it has completely converged to the
metastable state, which depicts the four clear communities shown as figure 3(c).
As we can see from this example, the constrained Markov chain (according to (5)) has
similar characteristics to the iteration process with the unconstrained Markov chain
(according to (2)). However, the difference is that the unconstrained Markov chain will
quickly converge to the global mixing sate after it enters this state (> 1/2), while the
constrained Markov chain will quickly converge to the metastable sate that shows its k real
communities after it enters this state (> 1/k+1). Therefore, we can make use of the spectrum
of a network to approximate the convergence characteristics of the method UC. In fact, if the
network has k real communities, the convergence time of the UC should be only a little longer
than the entering time of the k-th local mixing state (> 1/k+1).
20
40
60
80
100
120
0.12
0.1
0.08
0.06
0.04
0.02
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
20
40
60
80
100
120
0.045
0.04
0.035
0.03
0.025
0.02
0.015
0.01
0.005
0
20
40
60
80
100
120
0.045
0.04
0.035
0.03
0.025
0.02
0.015
0.01
0.005
e
d
o
n
h
c
a
e
f
o
r
e
b
m
u
n
D
I
e
h
t
20
20
40
60
20
40
60
80
100
120
80
100
120
40
60
80
100
120
the ID number of each node
the ID number of each node
the ID number of each node
(a) (b) (c)
Figure 3. An example that demonstrates the characteristics of the iteration process for the
constrained Markov chain according to (5) on the network which is shown as figure 2(a). (a)
The t1 (t1 = 1/5) step transition probability matrix of the constrained Markov chain, which
corresponds to figure 2(d). (b) The t2 (t2 = 1/4) step transition probability matrix of the
constrained Markov chain, which corresponds to figure 2(e). (c) The t3 (t2 > 1/2) step
transition probability matrix of the constrained Markov chain, which corresponds to figure
2(f).
It is noteworthy that the above analysis on the characteristics of the iteration process of
our UC method is in a close to ideal situation. It becomes more complex when dealing with
networks depicting overlapping communities and some more complex topological properties,
such as the sample network in figure 1(a) and for some large real-world networks. However,
as we can see from figure 1, our UC method can still clearly unfold each node’s community
and it’s also effective in this relatively complicated situation. Later, we will give some
detailed analysis on the convergence characteristics of the UC in the experimental section of
this article.
2.4. Extracting the emerged community
As the community emerged from UC by computing the l step transition probability vector
l
s , so that the associated probability values of the within community nodes are much greater
than those of outside community nodes, the community associated to source node s can be
easily distilled by designing a suitable cutoff criterion.
At first we considered a simple method that takes the average probability value of all
n
l
s
1
i
whose associated probabilities are greater than as the detected community. For instance, in
figure 4(b), the black line denotes the average probability as cutoff value. We find out that,
although this can make all the within community nodes present in the same community, it will
also include several outside nodes into this community. Let the structural similarity [25] of
the nodes as a cutoff value, which is defined as
( ) /
i n
. Then we extract the nodes
two arbitrary sets v and w be
v w
/
v w . This average cutoff method will show that
the structural similarity between the extracted community and the actual community is 0.8068.
It’s obvious that the method is far from ideal to extract the emerged community on the sample
network, even though this network already depicts some complexity.
In order to improve this result and propose a more effective cutoff method, a well-known
conductance function [22], corresponding to the weak definition of community [26], is used
here in substitute of the less efficient boundary.
The conductance can be simply thought of as the ratio between the number of edges
inside the community and those leaving it. More formally, conductance (S) of a set of nodes
S is (S) = cS/min(Vol(S), Vol(V \S)), where cS denotes the size of the edge boundary, cS =
u
{(u, v) : uS, vS}, and Vol(S) =
u S d , where du is the degree of node u. Thus, in
particular, more community-like sets of nodes have lower conductance. Moreover, this
community function has some local characteristics, making it suitable to extract the emerged
community.
Based on the ranked node list L obtained from UC, the emerged community can be
easily distilled by computing the cut position that corresponds to the minimum conductance
value, and taking it as the cutoff point along this ranked list of nodes. We can now summarize
the method to extract the emerged community. This method is called EC (Extract
Community).
S1. Remove the nodes whose associated probability is 0 from the sorted node list L;
S2. Compute the conductance value of the community corresponding to each cut
position;
S3. Take the community corresponding to the minimum conductance as the extracted
one.
Here we consider an example illustrating EC operation when extracting the emerged
community, which is shown as figure 4 and corresponds to the case in figure 1. In figure 4(a),
the blue curve denotes that the conductance value varies with the cut position. The pink
triangle indicates the cutoff position corresponding to the minimum conductance value, while
the black inverted triangle denotes the cutoff position corresponding to that of the average
probability as cutoff value. In figure 4(b), the pink line denotes the cutoff value
corresponding to the cut position that makes the conductance of the community to be minimal.
It’s obvious that, EC can very effectively extract the community, which has emerged by UC,
and the structural similarity between the extracted community and the real one is now much
higher, 0.9379.
1
0.9
0.8
0.7
0.6
s
e
u
l
a
v
e
c
n
a
t
c
u
d
n
o
c
g
n
i
d
n
o
p
s
e
r
r
o
c
e
h
t
the sequence of conductance values
the cut pos corresponding to
the cut pos corresponding to min conductance
the probabilities of w ithin community nodes
the probabilities of outside community nodes
average probability as cutoff value
local min conductance as cutoff criterion
0.025
0.02
0.015
0.01
0.005
n
o
i
t
u
b
i
r
t
s
i
d
y
t
i
l
i
b
a
b
o
r
p
n
o
i
t
i
s
n
a
r
t
e
h
t
0.5
0
250
0
0
800
200
1000
50
200
150
100
400
600
the cutoff position of the sorted nodes
the ID number of each node
(a) (b)
Figure 4. An illustration EC extraction of the emerged community, which comes from figure
1. (a) The conductance value for the extracted community as a function of the cutoff position
of the sorted node sequence L. These nodes are ranked according to their probabilities in
descending order. There are only 234 of 1000 nodes whose associated probabilities are greater
than 0, thus the x-axis is just in the range of 1~234. (b) Extracting the emerged community by
l
s via two types of cutoff criterions.
cutting the l step transition probability vector
Proposition 2. The time complexity of the EC is smaller than O(dn2), where d denotes
the average degree of all the nodes.
Proof. It’s obvious that S2 is the most computationally costly step in EC. We employ an
incremental method to calculate the conductance value for each cut pos in the node list L.
When the cut pos equals to 1, there is S1 = {L(1)} where L(1) denotes the first node in the
1 = dL(1), Vol(S1) = dL(1), and Vol(V \S1) = m Vol(S1) where m is the
sorted node list L, cS
number of edges in the network. When the cut pos equals to k, there should be Sk =
Sk-1 {L(k)}, cS
k-1 + dL(k) 2*Sk NL(k) where NL(k) denotes the neighbor set of node
k = cS
L(k), Vol(Sk) = Vol(Sk-1) + dL(k), and Vol(V \Sk) = m Vol(Sk). It’s obvious that, for each cut
pos k, Sk NL(k) is the most costly step, whose time complexity is Sk*NL(k) = k*dL(k). Due to
k being placed in the range of 1 k kmax where kmax << n, the time complexity of EC should
k
1 max
, which is much smaller than O(dn2).
be
*
k d
( )
L k
k
Proposition 3. The time complexity of UEOC is O(lKn2), where K denotes the number
of communities.
Proof. From proposition 1 and proposition 2, it’s obvious that the time to unfold and
extract a community is O((l+d)n2). As there are K communities in the cover, the time
complexity of UEOC is O((l+d)Kn2). Since the average degree d can be regarded as a
constant as most complex networks are sparse graphs, it results that the time complexity of
UEOC can also be given by O(lKn2).
There is a simple example to illustrate our UEOC method, which is shown as figure 5.
As we can see, the UC subroutine induces two clear overlapping communities by calculating
the transition probabilities. Meanwhile, the EC subroutine easily extracts these two
communities by using our cut strategy. Furthermore, on this simple network this algorithm
will attain convergence within five iterations.
(a) (b)
Figure 5. A simple example showing UEOC operation for the detection of overlapping
communities. (a) A simple network with two overlapping communities. Node 3 is the
overlapping node. (b) The result attained by the UEOC. The UC subroutine unfolds each
source node’s community by calculating the transition probabilities. The EC subroutine
extracts each emerged community by using our cut strategy.
3. Experiments and evaluation
In order to evaluate the performance of algorithm UEOC, we tested it in benchmark
computer-generated networks as well as on some widely used real-word networks. Two
well-known algorithms CPM [3] and LFM [11] were selected to compare with UEOC. We
conclude by analyzing the step number parameter l, which is defined in this algorithm.
There is only one parameter l in UEOC. Here, we set l = 20 based on the experimental
analysis in Sec. 3.3. Thus, the time complexity of UEOC can now be given by O(Kn2). For
CPM, we set k = 4, which will return the best overall results [3]. For LFM, we set = 1,
which is a natural choice, as it is the ratio of the internal degree to the total degree of the
community [11].
All experiments are done on a single Dell Server (Intel(R) Xeon(R) CPU 5130 @
2.00GHz 2.00GHz processor with 4Gbytes of main memory), and the source code of the
algorithms used here can be obtained from the authors.
3.1. Computer-generated networks
Here, we adopt two kinds of randomly generated synthetic networks (following both Newman
model [1] and the Lancichinetti model [23]) with a known community structure, in order to
evaluate the performance of the different algorithms.
There are various standard measures [27] that can be used to compare the known
community structure of the benchmark and the one delivered by the algorithm. Unfortunately,
most of these are not suitable for overlapping communities. The exception is a new variant of
the Mutual Information measure, which has been widely used in the scientific area and was
extended to handle overlapping communities [11]. We adopt this Normalized Mutual
Information (NMI) as the accuracy measure in the following experiments.
3.1.1. Benchmarks by Newman model. The first type of synthetic networks employed here is
that proposed by Newman at al. [1]. For these benchmarks, each graph consists of n = 128
vertices divided into four groups of 32 nodes. Each vertex has on average zin edges connecting
it to members of the same group and zout edges to members of other groups, with zin and zout
chosen so that the total expected degree zin+zout = 16. As zout is increased, starting from small
initial values, the resulting graphs become more challenging to the community detection
algorithms. Especially, when zout is greater than 8, meaning that the number of
within-community edges is less than that of between-community edges for per vertex, the
network doesn’t have a community structure [1]. In figure 6(a), we show the NMI accuracy
attained by each algorithm as a function of zout. As we can see, our algorithm UEOC
outperforms CPM and LFM in terms of NMI accuracy on these benchmarks.
Computational speed is another very important criterion to evaluate the performance of
an algorithm. Time complexity analysis for UEOC has been covered under proposition 3 in
Sec. 2.4 and refined by the second paragraph in Sec. 3. Nevertheless, here we show the actual
running time of UEOC from an experimental angle, in order to further evaluate its efficiency.
Here we also address synthetic networks based on the Newman model [1]. In this case,
each graph consists of n = 40a vertices divided into forty groups of a nodes. Each vertex has
on average zin = 10 edges connecting it to members of the same group and zout = 6 edges to
members of other groups. The only difference between the networks used here and the former
ones is that, now zout is fixed while the community size a is changeable. Figure 6(b)-(d) shows
the actual running time of the UEOC and LFM. As we can see, when the community number
K is a constant, the square root of the running time by UEOC is nearly proportional to the
number of nodes in the network, which is shown as figure 6(c). In the meantime, its efficiency
is the same as that of the function y=ax2+b, which is shown as figure 6(d). Thus, the
experiment concurs with the analysis on the time complexity for UEOC, which is O(Kn2)
when parameter l is set at 20.
As far as we know, the worst-case computational complexity of LFM is O(n2logn) [11],
even though the efficiency of LFM seems to be better than UEOC on our test graphs, which is
shown as figure 6(d). Meanwhile, the time complexity of CPM is non-polynomial even
though it proves to be very efficient when applied to the real networks [3]. Thus, the
efficiency (time complexity) of UEOC should be competitive with the efficiency of LFM, and
higher than that of CPM.
UEOC
60
50
40
30
20
10
)
d
n
o
c
e
s
(
e
m
i
t
g
n
i
n
n
u
r
l
a
u
t
c
a
e
h
t
CPM
LFM
UEOC
0
8
6
4
2
1000 2000 3000 4000 5000 6000 7000 8000 9000
number of inter-community edges per vertex z out
the number of nodes in the network
(a) (b)
0
0
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
n
1
0.8
0.6
0.4
0.2
0
8
7
6
5
4
3
2
1
e
m
i
t
g
n
i
n
n
u
r
e
h
t
f
o
t
o
o
r
e
r
a
u
q
s
0
0
LFM
UEOC
y=ax2+b
UEOC
102
101
100
10-1
)
2
n
(
O
d
n
a
C
O
E
U
,
M
F
L
e
h
t
f
o
n
o
s
i
r
a
p
m
o
c
103
1000 2000 3000 4000 5000 6000 7000 8000 9000
the number of nodes in the network
the number of nodes in the network
(c) (d)
Figure 6. Testing the performance of UEOC on artificial networks under the Newman model.
Error bars show the standard deviations estimated from 50 graphs. (a) Comparison of UEOC
with CPM and LFM in terms of NMI accuracy. (b) Actual running time of UEOC as a
function of the network scale. (c) Square root of the running time of UECO as a function of
the network scale. (d) Efficiency of LFM, UECO and O(n2) under the log-log plots.
104
3.1.2. Benchmarks by Lancichinetti model. There are some basic statistical properties found in
real networks, such as heterogeneous distributions of degree and community size, that are not
found in benchmark networks based on Newman model. Accordingly, a new type of
benchmark proposed by Lancichinetti et al. [23] is here adopted to further evaluate the
accuracy of these algorithms. This class of benchmark networks not only has the property of
heterogeneous distributions of degree and community size, but also can exhibit overlapping
community structure.
Like the experiment designed by Lancichinetti et al. [23] to test CPM’s ability to detect
overlapping communities, the parameters setting for the Lancichinetti benchmarks are as
follows. The network size n is 1000, the minimum community size cmin is set to either 10 or
20, the mixing parameter (each vertex shares a fraction of its edges with vertices in other
communities) is set to either 0.1 or 0.3, the fraction of overlapping vertices (on/n) varies from
0 to 0.5 with interval 0.05. We keep the remaining parameters fixed: the average degree d is
20, the maximum degree dmax is 2.5*d, the maximum community size cmax is 5*cmin, the
1
0.9
0.8
0.7
0.6
0.5
0.4
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
n
CPM
LFM
UEOC
CPM
LFM
UEOC
1
0.9
0.8
0.7
0.6
0.5
0.4
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
n
0.3
0
1
0.9
0.8
0.7
0.6
0.5
0.4
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
n
0.3
number of communities, each overlapping vertex belongs to (denoted om), is 2, and the
exponents of the power-law distribution of vertex degrees 1 and community sizes 2 are -2
and -1, respectively. This design space leads to four sets of benchmarks.
Figure 7 shows the results that compare UEOC with CPM and LFM in terms of NMI
accuracy on the heterogeneous artificial networks with overlapping communities. As we can
see, UEOC is most effective for networks with relatively big communities while CPM gives
its best results for networks with small communities, and LFM has medium performance
along both cases. Moreover, the quality of UEOC is relatively stationary with the increase of
mixing parameter , while that of the other two algorithms quickly declines in this situation.
Thus, it’s clear that our algorithm UEOC is competitive with, or better, than the other two
algorithms on the Lancichinetti benchmarks.
n=1000 u=0.1 cmin=10 cmax=50
n=1000 u=0.3 cmin=10 cmax=50
0.5
0.4
0.3
0.2
0.1
0.4
0.3
0.2
0.1
fraction of overlapping nodes
fraction of overlapping nodes
(a) (b)
n=1000 u=0.3 cmin=20 cmax=100
n=1000 u=0.1 cmin=20 cmax=100
0
0.3
0.5
1
0.9
0.8
0.7
0.6
0.5
0.4
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
n
CPM
LFM
UEOC
CPM
LFM
UEOC
0.3
0
0
0.5
0.5
0.1
0.4
0.3
0.2
0.1
0.4
0.3
0.2
fraction of overlapping nodes
fraction of overlapping nodes
(c) (d)
Figure 7. NMI accuracy of each algorithm as a function of the fraction of overlapping nodes.
Error bars show the standard deviations estimated from 50 graphs. (a) Comparison on
synthetic networks with small mixing parameter and small communities ( = 0.1, cmin = 10,
cmax = 50). (b) Comparison on synthetic networks with big mixing parameter and small
communities ( = 0.3, cmin = 10, cmax = 50). (c) Comparison on synthetic networks with small
mixing parameter and big communities ( = 0.1, cmin = 20, cmax = 100). (d) Comparison on
synthetic networks with big mixing parameter and big communities ( = 0.3, cmin = 20, cmax =
100).
3.2. Real-world networks
As real networks may have some different topological properties from the synthetic ones, we
now consider several widely used real-world networks to further evaluate the performance of
these algorithms. These networks are listed in table 1.
As the inherent community structure for real networks is usually unknown, we make use
of two widely used quality measures for overlapping communities in order to evaluate the
performance of the algorithms. The first one is the average conductance (AC), used by
Leskovec et al. [22], which maps the average value of conductance for all the communities in
a cover. The AC is defined as (7), where K denotes the number of communities, Ci denotes the
i-th community, and (S) denotes the conductance of a community S. The calculation of (S)
has been already given in Sec. 2.4.
AC
K
1
(7)
)
(
C
i
K
1
i
The second one is a variant of the commonly used modularity (Q) metric [28], which is
defined for overlapping communities by Shen et al. [5]. This extended modularity (EQ) is
defined bellow (8), where m denotes the number of total edges, Ci denotes the i-th community,
Ov denotes the number of communities which node v belongs to, dv denotes the degree of
node v.
EQ
1
2
m
,
i v w C
(8)
1
O O
v w
A
vw
d d
v w
2
m
i
It is noteworthy that, the quality of a cover is better when its AC-value is lower, whereas
it is better when its EQ-value is higher.
Table 2 shows the results that compares UEOC with CPM and LFM in terms of both AC
and EQ measures on the real-world networks described in table 1. As we can see, the AC
quality of UEOC is markedly better than that of CPM and LFM, while the EQ quality of
UEOC is also competitive with that of these two algorithms. To sum up, our algorithm is also
very effective on real-word networks.
Table 1. Real-world networks used here.
Descriptions
V
Networks
E
1/2
78
7.5602
Zachary’s karate club [29]
34
karate
Dolphin social network [30]
25.4027
160
62
dolphin
Books about US politics [31]
26.4520
441
105
polbooks
613
7.3097
American College football [1]
115
football
Emails of human interactions [32]
8.2563
5,451
1,133
email
word
31,784
6.8955
Word semantic network [3]
7,207
Table 2. The average result of 50 runs by UEOC, CPM and LFM on real networks.
EQ-values (the greater the better)
AC-values (the smaller the better)
UEOC
LFM
CPM
UEOC
LFM
CPM
0.4750
0.3201
0.6028
0.5206
0.1147
0.2648
0.3846
0.3887
0.3470
0.2908
0.4494
0.3846
0.5996
0.2823
0.5158
0.5593
0.3895
0.3696
0.2528
0.4744
0.4093
0.2749
0.4308
0.4155
0.3506
0.4627
0.7018
0.6937
0.2282
0.2641
0.4553
0.1648
0.8089
0.7286
0.1624
0.1389
Karate
Dolphin
football
polbooks
email
word
3.3. Parameters analysis
Sec. 2.3 shows that, if a network contains k real communities, the convergence time of the
UC should be a little longer than of the entering time in the k-th local mixing state (metastable
state), which is 1/k+1. However, the actual community structure of most real-world networks
is unknown. Thus, we adopt the entering time of the global mixing state (1/2), which is
greater than the entering time of the metastable state (1/k+1), to coarsely evaluate the
convergence time of the UC. As we can see from table 1, the 1/2 of all these real networks
used in this paper is very small, meanwhile, they are found to be independent of the network
scale. Thus, it shows that the UC will converge fast in the general case. Moreover, in order to
further study the convergence characteristics of the UC, we also proceed to supply some
quantitative analysis on the iteration number l from an experimental angle.
l
s will be updated and, thus,
In the UC, after each step, the transition probability vector
the ranking of all nodes will be changed according to the probability values incoming from
l
source node s. As long as
s is stationary, or say, all members of the source community are
put on the top of the sorted nodes sequence, it will be good enough for our purpose of
unfolding a community.
Thus, the convergence of UC can be evaluated by considering the convergence of the
transition probability vector, or that of the sorted node sequence. Figure 8 shows the
convergence process of the UC with the increase of step number l. In figure 8(a), the x-axis
refers to the l-value, and the y-axis refers to the difference between the two consecutive
transition probability vectors, which is defined as the Euclidean distance between them. In
figure 8(b), the x-axis still refers to the l-value, while the y-axis refers to the difference
between the two consecutive sorted nodes lists L1 and L2, defined as nnz(L1L2), which
counts the number of non-zeros of a given vector.
We have tested different l values, in the range 1 l 20, for all real networks mentioned
in the paper. It’s clear that the transition probability vector and the sorted node list can both
converge well within 20 steps on each of the networks. Through these experiments, we also
have found that UC in fact converges very quickly, thus its performance is insensitive to the
choice of the parameter l when it is greater than 20.
karate network (34 nodes)
dolphin network (62 nodes)
polbooks network (105 nodes)
football network (115 nodes)
email network (1133 nodes)
word network (7207 nodes)
0.16
0.14
0.12
0.1
0.08
0.06
0.04
0.02
s
r
o
t
c
e
v
y
t
i
l
i
b
a
b
o
r
p
t
n
e
c
a
j
d
a
n
e
e
w
t
e
b
e
c
n
e
r
e
f
f
i
d
karate network (34 nodes)
dolphin network (62 nodes)
polbooks network (105 nodes)
football network (115 nodes)
email network (1133 nodes)
word network (7207 nodes)
8000
7000
6000
5000
4000
3000
2000
1000
s
e
c
n
e
u
q
e
s
s
e
d
o
n
t
n
e
c
a
j
d
a
n
e
e
w
t
e
b
e
c
n
e
r
e
f
f
i
d
0
0
5
0
0
5
15
20
10
10
L-steps
L-steps
(a) (b)
Figure 8. Convergence analysis of UC with the increase of parameter l. For each network, the
node with maximum degree is selected as source node s here. (a) Convergence process of the
transition probability vector with the increase of step number l. (b) Convergence process of
the sorted node sequence with the increase of step number l.
20
15
4. Discussion and conclusion
In this work, we have developed a new algorithm, called UEOC, for the identification of
overlapping communities in complex networks. The key idea behind it rests on a Markov
random walk method combined with a constraint strategy, based on which the UC phase can
clearly unfold each natural community that overlaps. Thereafter, the community emerged by
UC will be extracted from the entire network by the EC subroutine, which is an effective
cutoff method based on a conductance function. Furthermore, the UEOC depends on only one
parameter whose value can be easily set and requires no prior knowledge on the community
structure, namely the number of communities.
We have tested this algorithm by using different types of networks. On Newman
benchmarks, the accuracy of UEOC is higher than that of CPM and LFM. On Lancichinetti
benchmarks, UEOC is most effective for networks with relatively big communities, and its
clustering accuracy is relatively stationary with the increase of the mixing parameter. On real
networks, the performance of our algorithm is in overall also better than that of the other two
algorithms.
It is noteworthy that, there is also a similar approach so called Markov Cluster Algorithm
(MCL) [14], which has been widely applied for discovering communities in graphs [33, 34].
The MCL and our method UEOC have in common that they both are based on the dynamic of
Markov random walk, and detect the communities present in networks by changing and
adjusting the Markov chain. However, they also have some important difference. The MCL
simulates many random walks (or flows) on the network. By raising the transition
probabilities to a certain power greater than one, it strengthens flow where it is already strong,
and weakens flow where it is weak. By repeating the process an underlying community
structure will gradually become visible. The process ends up with a number of regions with
strong internal flow (communities), separated by ‘dry’ boundaries with hardly any flow.
Different from the MCL, our method UEOC makes use of the distinction between the Markov
random process on a network with community structure and that on its corresponding
annealed network without communities. By preventing the walker (or flow) from escaping its
own community, it makes the constrained Markov chain converge to a metastable state
instead of the global mixing state, which then unfolds the real community structure of the
network. Furthermore, the UEOC is a local community finding method that is able to detect
the community of each node. Moreover, it can be also effectively used to discover
overlapping communities from networks that hold them.
Other research, covering local methods for community detection, also harbors some
potential for the detection of overlapping communities in complex networks. In 2002, Flake et
al. [35] proposed an approach called Maximum Flow Communities (MFC). This method is
based on the Max Flow-Min Cut theorem [36], stating that the maximum flow is identical to
the minimum cut. Therefore, if you know the maximum flow between two points, you also
know what edges you would have to remove to completely disconnect the same two points.
The MFC has been successfully applied to the Web community mining area. However, this
method is sensitive to the choice of its initial seed vertices, and its computational complexity,
O(mnlog(n2/m)), is significant. In 2004, Costa [37] presents a hub-based approach to
community finding in complex networks. After identifying the network nodes with highest
degree (the so-called hubs), the network is flooded with wavefronts of labels emanating from
the hubs, accounting for the identification of the involved communities. This method is
simple, efficient and proved to be effective for some social networks organized around hubs.
However, it has the following drawback: the number of communities detected is arbitrarily
preassigned and the algorithm neglects the possibility of having two hubs within the same
community. In 2005, Bagrow et al. [38] proposed another efficient hub-based method for
detecting local communities. This algorithm works by expanding an l shell outward from
some starting vertex j and comparing the change in total emerging degree to some threshold .
When this change is lower than a given value , the l shell ceases to grow and all vertices
covered by shells of a depth l are listed as members of vertex j’s community. This method is
also suitable for the graphs organized around hubs, such as most social networks. However, it
sensitive to the choice of its starting vertex j and the setting of the threshold value . A
potential compensating solution could be that, one would run the algorithm multiple times by
using different starting vertices, and then achieve a group consensus as to which vertices
belong to which communities. Different from these previous works, our algorithm UEOC is
based on the Markov random walk on networks. It simulates the constrained probability flow
starting from an arbitrary source node, and makes the local community of this node gradually
appear during the iteration process. It is noteworthy that, our method is insensitive to the
choice of its only one parameter (step number l), and it can effectively discover each node’s
local community for the more general networks.
Concluding, our future work can be laid as follows. In most real-word networks, there
are often some marginal nodes, which will cause no energy change even they belong to
several different communities. Generally speaking, if one does not comprehend the real
meanings of the network structure, it will be very difficult for an algorithm to distinguish
whether a specific marginal node is an overlapping node which plays an important role in the
network and belongs to multi-communities, or an outlier which is just a isolated role in the
network and belongs to none of these communities. However, it’s very important for an
algorithm to be able to identify both overlapping nodes and outliers in the real world. As far
as we know, most of the current approaches including our method UEOC can only discover
overlapping nodes, but cannot distinguish outliers. Thus, it will be promising to design a type
of algorithm that can not only detect overlapping nodes, but also outliers. Therefore, we will
take this direction in our future work so as to further improve the presented UEOC method.
Moreover, as we argued, the efficiency of UEOC is competitive with the efficiency of
LFM and higher than that of CPM. Nevertheless, in order to deal with some large-scale
networks such as WWW, Internet etc., it’s still important to improve it by exploring some
potential optimization angles. Thus, we also intend to further use UEOC in some applied
research areas, such as biological networks analysis, Web community mining, etc., and try to
uncover and interpret the significant overlapping community structure that one can expect to
be found.
Acknowledgments
This work was supported by National Natural Science Foundation of China under Grant Nos.
60873149, 60973088, the National High-Tech Research and Development Plan of China
under Grant No. 2006AA10Z245, the Open Project Program of the National Laboratory of
Pattern Recognition, and the Erasmus Mundus Project of European Commission.
References
[1] Girvan M and Newman M E J, Community structure in social and biological networks,
2002 Proc. Natl. Acad. Sci. 9(12) 7821-7826
[2] Fortunato S, Community detection in graphs, 2010 Phys. Rep. 486(3-5) 75-174
[3] Palla G, Derenyi I, Farkas I and Vicsek T, Uncovering the overlapping community
structures of complex networks in nature and society, 2005 Nature 435(7043) 814-818
[4] Gavin A C, Bosche M and Krause R, Functional organization of the yeast proteome by
systematic analysis of protein complexes, 2002 Nature 415 141-147
[5] Shen H, Cheng X, Cai K and Hu M, Detect overlapping and hierarchical community
structure in networks, 2009 Physica A, 388(8) 1706-1712
[6] Evans T S, Clique graphs and overlapping communities, 2010 J. Stat. Mech. P12037
[7] Pereira J B, Enright A J and Ouzounis C A, Detection of functional modules from protein
interaction networks, 2004 Proteins 54(1) 49–57
[8] Evans T S and Lambiotte R, Line graphs, link partitions and overlapping communities,
2009 Phys. Rev. E 80 016105
[9] Evans T S and Lambiotte R, Line graphs of weighted networks for overlapping
communities, 2010 Eur. Phys. J. B 77(2) 265-272
[10] Ahn Y Y, Bagrow J P and Lehmann S, Link communities reveal multiscale complexity in
networks, 2010 nature 466 761-764
[11] Lancichinetti A, Fortunato S and Kertesz J, Detecting the overlapping and hierarchical
community structure in complex networks, 2009 New J. Phys. 11 033015
[12] Lee C, Reid F, McDaid A and Hurley N, Detecting highly overlapping community
structure by greedy clique expansion, 2010 SNA-KDD’10: Proc. 4th International
Workshop on Social Network Mining and Analysis (Washington DC, USA: ACM)
pp33-42
[13] Havemann F, Heinz M, Struck A and Gläser J, Identification of overlapping
communities and their hierarchy by locally calculating community-changing resolution
levels, 2011 J. Stat. Mech. P01023
[14] Stijn van Dongen, 2000 Graph clustering by flow simulation, Ph.D. thesis, University of
Utrecht, Utrecht, Netherlands
[15] Yang B, Cheung W K and Liu J, Community mining from signed social networks, 2007
IEEE Transactions on Knowledge and Data Engineering 19 1333-1348
[16] Rosvall M and Bergstrom C T, Maps of random walks on complex networks reveal
community structure, 2008 Proc. Natl. Acad. Sci. 105 1118-1123
[17] E W, Li T and Vanden-Eijnden E, Optimal partition and effective dynamics of complex
networks 2008 Proc. Natl. Acad. Sci. 105 7907
[18] Steinhaeuser K and Chawla N V, Identifying and evaluating community structure in
complex networks, 2010 Pattern Recognition Letters 31(5) 413-421
[19] Esquivel A V and Rosvall M, Compression of flow can reveal overlapping modular
organization in networks, arXiv:1105.0812v1
[20] Kim Y and Jeong H, The map equation for link community, arXiv:1105.0257v1
[21] Newman M E J, Strogatz S H and Watts D J, Random graphs with arbitrary degree
distributions and their applications, 2001 Phys. Rev. E 64 026118
[22] Leskovec J, Lang K J and Mahoney M W, Empirical comparison of algorithms for
network community detection, 2010 WWW’10: Proc. 19th International World Wide Web
Conference (Raleigh, North Carolina USA: ACM) pp631-640
[23] Lancichinetti A and Fortunato S, Benchmarks for testing community detection algorithms
on directed and weighted graphs with overlapping communities, 2009 Phys. Rev. E 80
016118
[24] Yang B, Liu J and Feng J, On the spectral characterization and scalable mining of
network communities, 2011 IEEE Transactions on Knowledge and Data Engineering, 17
Nov. 2010. IEEE computer Society Digital Library. IEEE Computer Society,
<http://doi.ieeecomputersociety.org/10.1109/TKDE.2010.233>
[25] Xu X, Yuruk N, Feng Z and Schweiger T A J, SCAN: a structural clustering algorithm for
networks, 2007 KDD’07: Proc. 13th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining (New York, NY, USA: ACM) pp824-833
[26] Radicchi F, Castellano C, Cecconi F, Loreto V and Parisi D, Defining and identifying
communities in networks. 2004 Proc. Natl. Acad. Sci. 101(9) 2658- 2663
[27] Danon L, Duch J, Diaz-Guilera A and Arenas A, Comparing community structure
identification, 2005 J. Stat. Mech. P09008
[28] Newman M E J and Girvan M, Finding and evaluating community structure in networks,
2004 Phys. Rev. E 69 026113
[29] Zachary W W, An information flow model for conflict and fission in small groups, 1977
Journal of Anthropological. Research 33 452-473
[30] Lusseau D, The emergent properties of a dolphin social network, 2003 Proc. Biol. Sci.
270(Suppl2) S186-8
[31] Newman M E J, Modularity and community structure in networks, 2006 Proc. Natl. Acad.
Sci. 103(23) 8577-8582
[32] Guimerà R, Danon L, Diaz-Guilera A, Giralt F and Arenas A, Self-similar community
structure in a network of human interactions, 2003 Phys. Rev. E 68 065103
[33] Capocci A, Rao F and Caldarelli G, Taxonomy and clustering in collaborative systems:
The case of the on-line encyclopedia Wikipedia, 2008 EPL 81 28006
[34] Vlasblom J and Wodak S J, Markov clustering versus affinity propagation for the
partitioning of protein interaction graphs, 2009 BMC Bioinformatics 10 99-112
[35] Flake G W, Lawrence S, Giles C L and Coetzee F M, Self-organization and identification
of web communities, 2002 IEEE Computer 35(3) 66-70.
[36] Ford L R and Fulkerson D R, Maximal flow through a network, 1956 Canadian J. Math
8(3) 399-404
[37] Costa L F, Hub-based community finding, 2004 Arxiv: cond-mat/0405022.
[38] Bagrow J P and Bollt E M, Local method for detecting communities, 2005 Phys. Rev. E 72
046108
|
1012.4621 | 1 | 1012 | 2010-12-21T11:49:15 | Self-organized Emergence of Navigability on Small-World Networks | [
"cs.SI",
"physics.soc-ph"
] | This paper mainly investigates why small-world networks are navigable and how to navigate small-world networks. We find that the navigability can naturally emerge from self-organization in the absence of prior knowledge about underlying reference frames of networks. Through a process of information exchange and accumulation on networks, a hidden metric space for navigation on networks is constructed. Navigation based on distances between vertices in the hidden metric space can efficiently deliver messages on small-world networks, in which long range connections play an important role. Numerical simulations further suggest that high cluster coefficient and low diameter are both necessary for navigability. These interesting results provide profound insights into scalable routing on the Internet due to its distributed and localized requirements. | cs.SI | cs |
Self-organized Emergence of Navigability on Small-World Networks
Zhao Zhuo1, Shi-Min Cai1,∗ Zhong-Qian Fu1,† and Wen-Xu Wang2
1Department of Electronic Science and Technology,
University of Science and Technology of China, Hefei Anhui, 230026, PR China
2Department of Systems Science, School of Management,
Center for Complexity Research, Beijing Normal University, Beijing 100875, China
(Dated: November 10, 2018)
This paper mainly investigates why small-world networks are navigable and how to navigate
small-world networks. We find that the navigability can naturally emerge from self-organization in
the absence of prior knowledge about underlying reference frames of networks. Through a process
of information exchange and accumulation on networks, a hidden metric space for navigation on
networks is constructed. Navigation based on distances between vertices in the hidden metric space
can efficiently deliver messages on small-world networks, in which long range connections play an
important role. Numerical simulations further suggest that high cluster coefficient and low diameter
are both necessary for navigability. These interesting results provide profound insights into scalable
routing on the Internet due to its distributed and localized requirements.
PACS numbers: 89.75.Fb, 89.20.Ff, 05.40.-a, 89.75.Da
I.
INTRODUCTION
Small-world (SW) networks are ubiquitous in nature
and society. Travers and Milgram discovered small-world
phenomenon through delivering letters among people in
late 1960s [1]. In the experiment, each participant could
only deliver letters to a single acquaintance who was more
possible to deliver letters to target persons based on their
own judgement. Relying on this greedy routing strat-
egy, or so-called navigation, at last 29 percent of letters
reached target persons and the average length of acquain-
tance chains of letters that were successfully sent was 6.
Recent experiments have proved that the greedy rout-
ing strategy could efficiently pass messages on email net-
works and online social service networks [2 -- 4]. These
striking results suggest that people are connected with
much shorter chains than our imagination and they can
find the short paths based solely on local information, re-
gardless of the network size and the topological distances
among people.
Navigability of SW networks has gained tremendous
interests of scientists. A variety of models have been
proposed to explain the underlying mechanisms that en-
sure finding shortest paths based exclusively on local in-
formation [5 -- 7]. In these models, networks were gener-
ated based on underlying reference frames, e.g. grids,
hierarchy, and hyperbolic spaces, which determined how
networks were organized. Vertices were contained in the
underlying reference frames which provided definitions
of distances between vertices, and adjacent vertices were
more likely to be connected. Navigation was modeled by
greedy routing: messages were sent to one neighbor near-
est to the target in underlying reference frames, which
∗Electronic address: [email protected]
†Electronic address: [email protected]
was efficient for passing messages if vertices were aware of
positions of its neighbors and targets. Indeed, the afore-
mentioned works suggest that networks act as an overlay
on underlying reference frames during navigation. There-
fore, navigability of networks are based on the fact that
the underlying reference frames are navigable. In these
models, efficient navigation needs prior knowledge about
organization of networks. However, several real large-size
networks, e.g. email networks and online social service
networks, are self-organized, so that it's hard for indi-
viduals to be aware of underlying reference frames and
discover their exact positions.
Here, we aim to address the navigability of SW net-
works through a different way: establishing a general
scheme for efficient navigation, regardless of the under-
lying reference frames of networks. This kind of prob-
lems have been considered before. One method is to re-
construct underlying reference frames, e.g. embedding
networks generated by Kleinberg's model into Euclidean
plane and reconstructing the dimension of the underlying
lattice when network generated by long-range percolation
[8, 9]. The other method is to embed a network into a
metric space and ensure that distances between vertices
are proportional to shortest path length through a proper
embedding algorithm, regardless of underlying reference
frames [10 -- 12].
We construct a scheme for navigation following the
idea of metric space. The embedding algorithm is in-
spired by the fact that navigation on social networks
is based on information exchanged and accumulated by
communication, which is used to determine who among
the acquaintances are 'socially closest' to target persons.
Therefore we embed networks into a metric space through
a process of information exchange and accumulation, in
which vertices find their positions by distributed and lo-
calized self-organization. It is demonstrated by numerical
simulations that the self-organized algorithm can estab-
lish a scheme for efficient navigation, irrespective of the
underlying reference frames of networks, and we find that
the navigability of networks is influenced by SW proper-
ties which are characterized by low diameter and high
cluster coefficient.
where di is the degree of vertex i. Equations (4) and (5)
can be rewritten in matrix form as the combinations of
eigenvectors of normal matrix N of network
2
P0 = X0 = VA,
II. ALGORITHM TO ESTABLISH
NAVIGATION SCHEME
Xt = NXt−1 = NtX0 = VDtA,
(6)
(7)
(8)
The key for addressing the navigability lies in the self-
organized embedding algorithm in the absence of prior
knowledge about underlying reference frames. In our al-
gorithm, an m-dimension Euclidean space is chosen as
the metric space to define distances between vertices.
Then we follow the self-organized process of information
exchange and accumulation on social networks, which is
described as follows
xi,t = f (xj,t−1), j ∈ Ni,
pi,t = pj,t−1 + xi,t,
(1)
(2)
where Ni is the set of immediate neighbors of vertex i.
Vectors x and p consist of m elements corresponding to
the m dimensions of metric space. The vector x is cou-
pled through the network topology and simultaneously
updated according to Eq. (1), while position vector p is
the cumulative summation of historical vector x. Since
information exchange in Eq.
(1) is restricted between
vertices and their direct neighbors, the algorithm is dis-
tributed and localized. Meanwhile, distances between
vertices will be constant if vector x can converge after
sufficient evolving steps. Moreover, vertices can be seen
as flocking in a metric space, and vectors x and p rep-
resent velocity and position, like in Vicseck model [13].
Velocities of tightly connected vertices synchronize more
quickly. Therefore, vertices connected by shorter paths
will gather in the metric space, which ensures that the
distances between vertices in the metric space are asso-
ciated with path lengths on networks. Messages can be
delivered along short paths by navigation based on dis-
tances in the metric space.
Many dynamics can be applied as a realization of
Eq. (1), such as chaotic oscillators coupled by networks
which can synchronize depending on suitable coupling
strengths. For the purpose of its simplicity, we choose
the updating rule of vector x as follows: at every time
step, values of xi is the average of its neighbors and the
initial pi,0 equals to xi,0. Then the algorithm can be
written as
p0 = x0,
xi,t =
1
di Xj
xj,t−1, j ∈ Ni,
pi,t = pi,t−1 + xi,t,
(3)
(4)
(5)
Pt = Pt−1 + Xt = V(I +
Di)A.
t
Xi=1
Every row of matrices X and P is the vector of velocities
and positions of each vertex. Columns of matrix V are
the eigenvectors of N. A consists of linear combination
coefficients when eigenvectors of N are chosen as basis
vectors. Matrix D is a diagonal matrix with eigenvalues
of normal matrix on the main diagonal. Because eigen-
values of N are in the interval [−1, 1], for long enough
evolving time t, we get the final position matrix P as
P = VEA.
(9)
Matrix E is a diagonal matrix whose ith diagonal ele-
ment is 1/(1 − λi), where λi is the eigenvalue of normal
matrix. It can be seen that eigenvectors corresponding
to large eigenvalues play more important roles in the po-
sition matrix as a result of the factor 1/(1 − λi).
Since the positions of vertices in the metric space are
linear combinations of eigenvectors of normal matrix, it
demonstrates that the embedding can represent network
topology, which is reflected by the fact that adjacent ver-
tices in the metric space are connected by shorter paths
on network. The distance between vertex i and j after
sufficient evolving time is
(vi,k − vj,k)#2
((vi,k − vj,k))2+
m
d2
i,j =
1 − λk
m
n
ak,l
Xl=1" n
Xk=1
1 − λk(cid:21)2
Xk=1(cid:20) ak,l
Xl=1
Xq=p+1
Xp=1
Xl=1
m
n
n
=
2
ap,laq,l
(1 − λp)(1 − λq)
(vi,p − vj,p)(vi,q − vj,q),
(10)
where ai,j and vi,j are the elements of matrix A and
V, respectively.
If elements of X0 are uniformly dis-
tributed in interval [−1, 1], the elements of matrix A
have the following properties: hai,ji = 0, hai,jak,li = 0
and ha2
i,ji = hx2i. In addition, if m is sufficiently large,
the distance can be expressed by
d2
i,j =
n
Xk=1
mhx2i
(1 − λk)2 (vi,k − vj,k)2.
(11)
Equation (11) shows that the distances between vertices
can be seen as those in the situation that position values
of vertices are elements of weighted eigenvectors of nor-
mal matrix. Due to the factor (1 − λk)−2, distances are
mostly determined by eigenvectors associated with large
eigenvalues. It has been proved that these eigenvectors
are the solutions of following constrained optimization
problem [14]. Let the energy of system z(x) be defined
as
z(x) =
1
2
x′Lx,
(12)
where L is the Laplace matrix of network and x are posi-
tion values assigned to the vertices together with a con-
straint
x′Kx = 1,
(13)
where matrix K is a diagonal matrix whose ith main di-
agonal element is the degree of vertex i. Let λ1 < λ2 <
. . . < λn−1 < λn = 1 be the eigenvalues, and the corre-
sponding eigenvectors under constraint of Eq. (13) are
v1, v2, . . . , vn−1 and vn. The minimum nontrivial value of
z is 1 − λn−1, and the relevant position vector x is vn−1.
If the energy reaches the minimum nontrivial value, ver-
tices which are connected by a number of short paths
are sufficiently close in the metric space constructed by
eigenvectors, which ensures that distances in the metric
space correspond to path lengths on networks.
Due to the fact that similar vertices are more likely to
be connected, it's natural to evaluate similarities based
on the number of paths between vertices and the length
of paths in the absence of prior knowledge of underlying
reference frames [15]. Through this evaluation, vertices
connected by more and shorter paths, which will be adja-
cent in the metric space after self-organized embedding,
are deemed to be more similar. Therefore, the results
of embedding algorithm are in consistent with the basic
ideas of underlying reference frames: similar vertices are
adjacent, and more likely to be connected.
III. EXPERIMENTAL RESULTS
A. Experimental Results of Small-World Networks
Generated by WS Model
The self-organized embedding algorithm is applied to
build navigation scheme on SW networks generated by
WS (Watts-Strogatz) model, in which SW properties re-
sult from rewiring edges of original regular network at
probability p [16]. The chosen original regular network
has n=1000 vertices, and each vertex link to k=10 near-
est others. The diameters and cluster coefficients of net-
works at different rewiring probabilities are shown in Fig.
1(a). Experimental results are averaged over 20 network
realizations. As shown in Fig 1(a), even for the small
rewiring probability, the diameters of networks decrease
sharply while the cluster coefficients are nearly the same
as the original regular network.
3
At the beginning of embedding algorithm, every vertex
is assigned an initial velocity xi,0, whose values of each
dimension are uniformly distributed within [−0.5, 0.5].
Dimensions of metric spaces chosen to be m = 5, 10 and
20 are to investigate how the metric space influences nav-
igation. The embedding algorithm is terminated when
the velocities of vertices reaches a certain synchroniza-
tion level. We defined the synchronization error of xi of
dimension k at evolving time t as
et(k) =
1
n
n
(xi,t(k) − hxi,t(k)i)2.
Xi=1
(14)
When the synchronization errors of velocities at each di-
mension are less than a small value, which is chosen as
10−4, the embedding algorithm is terminated.
The greedy routing strategy to simulate navigation on
networks can be described as follows: vertices are aware
of positions of their neighbors in the metric space and po-
sitions of targets are transmitted by messages. Messages
are passed through current hop to the neighbor closest
to targets at each step. To avoid loops, messages are
prohibited from neighbors that have been visited. The
routing will terminate if message reaches target or all the
neighbors of current hop have been visited. We randomly
pick 104 source and target pairs for every network to be
navigated. Notice that the navigation is not symmetric,
e.g. navigation from vertex i to j is not equivalent to
navigation from j to i because the local environments of
vertex i and j are different. Efficient navigation is de-
fined by the fact that messages are successfully passed
to targets along the shortest paths. Therefore, we exam-
ine two metrics to evaluate navigability: the successfully
routing rate (the ratio of number of successfully routing
messages and all messages) and the stretch (average of
the ratios of routing path length and shortest path length
of each message).
Figure 1(b), (c) and (d) show that the successfully
routing rates and stretches are as a function of rewiring
probability p for the hidden metric space of different di-
mension. When rewired connections start to arise, suc-
cessfully routing rates increase quickly, whereas stretches
grow much slower until cluster coefficients drop sharply.
As a result of the different growing speeds, high success-
fully routing rates and low stretches, which indicates the
efficient navigation and strong navigability, simultane-
ously occur when the networks show small-world proper-
ties, and are much more apparent for the hidden metric
space of larger dimensions.
In other words, the larger
dimension of hidden metric space is useful to improve
performances of navigation, which is reflected by higher
successfully routing rates and lower stretches at the same
rewiring probability.
Long range connections, or the so-called weak ties in
sociology, play an important role in activities on net-
works, e.g.
information which people receive through
weak ties is more useful and successfully routing messages
on Email networks are conducted primarily through in-
diameter
cluster coefficien
100
80
60
40
20
0
r
e
t
e
m
a
d
i
1E-4
1E-3
0.1
1
0.01
p
(a) diameter and cluster coefficient
e
t
a
r
g
n
i
t
u
o
r
y
l
l
u
f
s
s
e
c
c
u
s
successfully routing rate
stretch
1.0
0.9
0.8
0.7
0.6
0.5
1E-4
1E-3
0.1
1
0.01
p
(c) m = 10
0.8
0.6
0.4
0.2
0.0
15
10
5
0
l
c
u
s
t
e
r
c
o
e
f
f
i
c
e
n
i
s
t
r
e
t
c
h
4
s
t
r
e
t
c
h
20
15
10
5
0
10
s
t
r
e
t
c
h
5
successfully routing rate
stretch
1.0
0.9
0.8
0.7
0.6
0.5
0.4
1E-4
1E-3
0.1
1
0.01
p
(b) m = 5
successfully routing rate
stretch
1.0
0.9
0.8
0.7
0.6
1E-4
1E-3
0.01
p
(d) m = 20
0.1
0
1
e
t
a
r
g
n
i
t
u
o
r
y
l
l
u
f
s
s
e
c
c
u
s
e
t
a
r
g
n
i
t
u
o
r
y
l
l
u
f
s
s
e
c
c
u
s
FIG. 1: (Color online) Diameter and cluster coefficient as a function of rewiring probability p (a); performance of greedy routing
for different dimension of metric space (b) m = 5, (c) m = 10 and (d) m = 20. Networks are generated by WS model [16].
Numerical simulations at each p are averaged over 20 realizations of model. SW networks show strong navigability with high
successfully routing rate and low stretch for all dimensions. In particular, the SW properties are necessary for navigability, and
the large metric space dimension is useful to improve navigability.
termediate to weak strength ties [2, 17]. Hence it is wor-
thy of studying that long range connections affect nav-
igation by passing messages to vertices far away from
each other on networks. We calculate the distributions
of shortest path length between all pairs and success-
fully routed pairs at different rewiring probability p when
the metric space dimension is 20 (see in Fig. 2). When
there are fewer long range connections, navigation finds
more nearby targets than those far away. The reason is
that many messages can't travel far away from the start
vertices on networks with high cluster coefficients result-
ing from quickly arriving at the vertices whose neighbors
have been all visited. As the number of long range con-
nections increases, messages can escape from the local
area of source vertices and travel a long distance on net-
works to arrive at targets. Therefore, targets are suc-
cessfully reached at the same probability for different
path length from sources. Moreover, the two distribu-
tions have agreed well with each other when the rewiring
probability is 0.0008, which results in sufficiently small
number of long-range connections compared to the total
number of connections. The weak ties are extremely use-
ful in the sense that even if a few long range connections
exist, messages could be passed to the whole network.
This fact also explains why the successfully routing rates
immediately increase fast when there are only a few long
range connections.
Navigability of networks in terms of self-organized em-
bedding algorithm is based on the fact that distances in
the metric space are associated with similarities of ver-
tices extracted from topology. However, we can't ensure
that distance between every vertex pairs represents its
similarity in the absence of central control, e.g. adjacent
vertices in the metric space may not be tightly connected.
Actually, greedy routings performed on networks consist
of two parts: properly directed part is more relevant to
0.025
0.020
0.015
0.010
0.005
0.000
n
o
i
t
u
b
i
r
t
s
d
i
0.025
0.020
0.015
0.010
0.005
0.000
n
o
i
t
u
b
i
r
t
s
d
i
0
0
5
successfully routing messages
all routing messages
successfully routing messages
all routing messages
0.025
0.020
0.015
0.010
0.005
0.000
n
o
i
t
u
b
i
r
t
s
d
i
40
20
80
shortest path length
60
100
0
40
20
80
shortest path length
60
100
(a) p = 0.0001
(b) p = 0.0002
successfully routing messages
all routing messages
successfully routing messages
all routing messages
0.04
0.03
n
o
i
t
u
b
i
r
t
s
d
i
0.02
0.01
40
20
80
shortest path length
60
100
0.00
0
40
20
80
shortest path length
60
100
(c) p = 0.0004
(d) p = 0.0008
FIG. 2:
(Color online) Distributions of shortest path length between vertices of all routing messages and successfully routing
messages for different rewiring probability p:(a) p = 0.0001, (b) p = 0.0002, (c) p = 0.0004 and (d) p = 0.0008. As the number
of long range connections increases, messages can escape from the local area of source vertices and travel a long distance. The
two distribution have agreed well with each other even when the rewiring probability is still very small. These results reflects
the power of weak ties: even if a few long range connections exist, messages could be passed to the whole network.
navigation, while the remaining part is more tendency to
random walks. For numerical simulations on SW net-
works, when cluster coefficients stay at a high value,
there are clusters consisting of tightly connected similar
vertices, which satisfies the organizing rules of networks
based on underlying reference frames. In this case, net-
work topology can be mapped into a hidden metric space
by self-organized embedding algorithm. Meanwhile, mes-
sages cannot travel along paths through random walk on
networks with high cluster coefficients because they are
easy to reach a vertex, all of whose neighbors have been
visited. Successfully passed messages on highly clustered
networks are mostly routed by navigation, which leads
to low stretches. When cluster coefficients drops quickly,
the local clusters vanish by randomly rewired connec-
tions and vertices are randomly placed in the hidden
metric space, which differs the embedding of networks
from the network topology. In this regard, random walks
can travel a long path to reach targets because vertices
have little common neighbors. Therefore, most messages
are successfully delivered by random walks, which leads
to large stretches and the successfully routing rates are
close to 1.
B. Experimental Results of Small-World Networks
with Power-Law Degree Distribution
Many real SW networks have the power-law degree dis-
tribution p(k) ∼ k−γ, such as the Internet and WWW.
They are called scale-free networks in which there are ver-
tices with much larger degrees than randomly connected
networks, such as ER (Erdos-R´enyi) model. The largest
degree of scale-free network is proportional to N 1/(γ−1),
where N is the number of vertices in networks. The BA
(Barab´asi-Albert) model has been proposed to explain
10
8
6
4
2
0
r
e
t
e
m
a
d
i
e
t
a
r
g
n
i
t
u
o
r
y
l
l
u
f
s
s
e
c
c
u
s
1.0
0.9
0.8
0.7
0.6
0.5
2
2
diameter
cluster coefficient
3
exponent
4
(a) diameter and cluster coefficient
0.8
0.6
0.4
0.2
0.0
15
10
5
successfully routing rate
stretch
0
4
3
exponent
(c) m = 10
l
c
u
s
t
e
r
c
o
e
f
f
i
c
e
n
i
t
s
t
r
e
t
c
h
e
t
a
r
g
n
i
t
u
o
r
y
l
l
u
f
s
s
e
c
c
u
s
1.0
0.9
0.8
0.7
0.6
0.5
e
t
a
r
g
n
i
t
u
o
r
y
l
l
u
f
s
s
e
c
c
u
s
1.0
0.9
0.8
0.7
0.6
0.5
2
2
6
s
t
r
e
t
c
h
15
10
5
0
4
10
5
s
t
r
e
t
c
h
0
4
successfully routing rate
stretch
3
exponent
(b) m = 5
successfully routing rate
stretch
3
exponent
(d) m = 20
FIG. 3:
(Color online) Diameter and cluster coefficient as a function of exponent γ (a); performance of greedy routing for
different dimension of metric space (b) m = 5, (c) m = 10 and (d) m = 20. Networks are generated by the generalized BA
model [19, 20]. Experimental results at each γ are averaged over 20 realizations of the model. Scale-free networks with small
exponent γ show strong navigability represented by high successfully routing rate and low stretch for all dimensions. Like the
results of SW models, both high cluster coefficient and low diameter are also necessary for navigability, and the large metric
space dimension is also helpful to improve navigability.
the emergence of power-law degree distributions based on
the ideal of preferential attachment [18]. We also investi-
gate the navigability of scale-free networks generated by
the generalized BA model [19, 20]. In this model, a ver-
tex is added in the network with m connections at each
step. The probability of attaching to an existing vertex
of degree k is proportional to k + k0, where the offset k0
is a constant. Note that k0 being larger than −m is to
ensure positive probabilities. This model yields a power-
law degree distribution with exponent γ = 3 + k0/m.
Negative values of k0 lead to exponent less than 3, which
has been observed in many real complex networks.
The scale-free networks consist of 103 vertices together
with m = 3 and the offset k0 being turnable to get expo-
nent γ from 2 to 4. Results for different γ are averaged
over 20 networks. Small-world properties of scale-free
networks are shown in Fig. 3(a). It is interesting that the
cluster coefficients of scale-free networks quickly decrease
with the growth of exponent, meanwhile the diameters
only increase a little. Thus, the scale-free networks with
small exponents exhibit strong SW properties. We con-
struct a metric space and exactly execute greedy routing
similar to SW models. Figure 3(b), (c) and (d) show the
performance of navigation for different exponent γ.
It
demonstrates that when networks exhibit SW properties
with small γ, strong navigability emerges. Stretches are
also affected by cluster coefficients because topology of
highly clustered networks can be more properly mapped
into a metric space. In addition, it can be seen that the
high degree nodes act as hubs in navigation on scale-free
networks [7]. Therefore, as γ increases, successfully rout-
ing rates slightly drop because the highest degrees de-
crease. However, when cluster coefficients continuously
decrease, successfully routing rates start to increase be-
7
cause most messages are passed by random walks, which
also lead to large stretches.
IV. CONCLUSION
In conclusion, we have well
investigated the self-
organized emergence of navigability on SW networks via
mapping network topology into an Euclidean hidden met-
ric spaces through a simple embedding algorithm inspired
by information exchanging and accumulating and estab-
lished in the absence of prior knowledge of underlying
reference frames of networks. It has been demonstrated
that high navigability emerges only if networks exhibit
strong small-world properties. Because of the lacking of
prior knowledge of underlying reference frames, the self-
organized embedding algorithm can establish navigable
scheme for different kinds of SW networks, which is sup-
ported by the results of SW networks generated by WS
model and BA model.
Underlying reference frames, in which similar vertices
are adjacent and connected at higher probability, explain
how real complex networks are organized based on sim-
ilarities between individuals. Since the clustering ten-
dency of small-world networks satisfies the preferential
attachment in underlying reference frames, the hidden
metric space based on vertices similarities can be estab-
lished by a universal algorithm, regardless of the explicit
organizing pattern of networks.
The self-organized navigation may be a possible ap-
proach available for scalable routing on the Internet,
which has gained lots interests recently. Many algorithms
have been proposed to reduce the storage space of rout-
ing table without remarkable increase of routing path
lengths, e.g. the compact routing schemes [21 -- 23]. The
size of routing table could be reduced to polylogarith-
mic of the network size in compact routing with stretch
smaller than 3, yet global topology and central control
required to build routing scheme in these algorithm have
to demand large amount of communications on networks.
In our work, since the constructing hidden metric space
and greedy routing are distributed and localized in a self-
organized way, communication are restricted between im-
mediate connected vertices. Meanwhile, the sizes of rout-
ing tables are the degrees of vertices, and stretches are
quite small when the networks show small-world prop-
erties. Comparing with previous work on navigation [5 --
7], our work may provide profound insights into scalable
routing scheme through a self-organized way in the ab-
sence of prior knowledge.
Acknowledgments
This work is supported by the National Natural Sci-
ence Foundation of China under Grant Nos. 60874090,
60974079, 61004102. S-MC appreciates the financial sup-
port of K.C. Wong Education Foundation, China Post-
doctoral Science Foundation, and Youth Innovation fund-
ing of University of Science and Technology of China.
[1] J. Travers and S. Milgram, Sociometry 32, 425 (1969).
[2] P. S. Dodds, R. Muhamad, and D. J. Watts, Science 301,
827 (2003).
[12] F. Dabek, R. Cox, F. Kaashoek, and R. Morris, ACM
SIGCOMM Comput. Commun. Rev. 34(4), 15 (2004).
[13] T.Vicsek, A.Czirok, E.B.Jacob, and O.Schodhet, Phys.
[3] L. Adamic, and E. Adar, Social Networks 27(3), 187
Rev. Lett. 75, 1226 (1995).
(2005).
[4] D. Liben-Nowell, J. Novak, R. Kummar, P. Raghavan,
and A. Tomkins, Proc. Natl. Acad. Sci. USA 102(33),
11623 (2005).
[14] A. Capocci, V. D. P. Servedio, G. Galdarelli, and F. Co-
laiori, Physica A 352, 669 (2005).
[15] E. A. Leicht, P. Holme, and M. E. J. Newman, Phys.
Rev. E 73, 023120(2006)
[5] J. Kleinberg, Nature 406, 845 (2000)
[6] D. J. Watts, P. S. Dodds, and M. E. J. Newman, Science
[16] D. J. Watts and S. H. Strogatz, Science 393, 6684 (1998).
[17] M. Granovetter, Amer. Jour. Sociology, 78(6), 1360
296, 1302 (2002).
(1973).
[7] M. Bogun´a, D. Krioukov, and K. C. Claffy, Nature
Physics 5, 74 (2009).
[8] O. Sandberg, Distributed Routing in Small-World Net-
works, Proceedings of the eight Workshop on Algorithms
Engineering and Experiment, 144 (2006).
[18] A. L. Barab´asi and R. Albert, Science 286, 509 (1999).
[19] S. N. Dorogovtsev and J. F. F. Mendes, Phys. Rev. Lett.
85, 4633 (2000).
[20] P. L. Krapivsky and S. Redner, Phys. Rev. E 63, 066123
(2001).
[9] I. Benjamini and N. Berger, Random Struct. Algor. 19,
[21] I. Abraham, C. Gavoille, D. Malkhi, and N. Nisan, and
102 (2001).
[10] P. Francis, S. Jamin, V. Paxson, L. Zhang, D. F.
Gryniewicz, and Y. Jin, An architecture for a global In-
ternet host distance estimation service, Proceedings of
IEEE INFOCOM '99, 210 (1999)
[11] T. S. E. Ng and H. Zhang, Predicting Internet network
distance with coordinates-based approaches, Proceedings
of IEEE INFOCOM '02, 170 (2002).
M. Thorup, ACM Trans. Algor. 4(3), 37 (2008).
[22] A. Brady and L. Cowen, Compact routing on power-law
graphs with additive stretch, Proceedings of the eight
Workshop on Algorithms Engineering and Experiment,
119 (2006).
[23] M. Thorup and U. Zwick, Compact routing schemes, Pro-
ceedings of ACM SPAA '01, 1 (2001).
|
1808.09922 | 1 | 1808 | 2018-08-29T16:50:16 | Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness | [
"cs.SI"
] | Today's social media platforms enable to spread both authentic and fake news very quickly. Some approaches have been proposed to automatically detect such "fake" news based on their content, but it is difficult to agree on universal criteria of authenticity (which can be bypassed by adversaries once known). Besides, it is obviously impossible to have each news item checked by a human.
In this paper, we a mechanism to limit the spread of fake news which is not based on content. It can be implemented as a plugin on a social media platform. The principle is as follows: a team of fact-checkers reviews a small number of news items (the most popular ones), which enables to have an estimation of each user's inclination to share fake news items. Then, using a Bayesian approach, we estimate the trustworthiness of future news items, and treat accordingly those of them that pass a certain "untrustworthiness" threshold.
We then evaluate the effectiveness and overhead of this technique on a large Twitter graph. We show that having a few thousands users exposed to one given news item enables to reach a very precise estimation of its reliability. We thus identify more than 99% of fake news items with no false positives. The performance impact is very small: the induced overhead on the 90th percentile latency is less than 3%, and less than 8% on the throughput of user operations. | cs.SI | cs | Limiting the Spread of Fake News on Social Media Platforms by
Evaluating Users' Trustworthiness
Oana Balmau
EPFL
[email protected]
Alexandre Maurer
EPFL
[email protected]
Rachid Guerraoui
EPFL
[email protected]
Matej Pavlovic
EPFL
[email protected]
Anne-Marie Kermarrec
[email protected]
Mediego, EPFL
[email protected]
Willy Zwaenepoel
EPFL
8
1
0
2
g
u
A
9
2
]
I
S
.
s
c
[
1
v
2
2
9
9
0
.
8
0
8
1
:
v
i
X
r
a
ABSTRACT
Today's social media platforms enable to spread both authentic and
fake news very quickly. Some approaches have been proposed to
automatically detect such "fake" news based on their content, but it
is difficult to agree on universal criteria of authenticity (which can
be bypassed by adversaries once known). Besides, it is obviously
impossible to have each news item checked by a human.
In this paper, we a mechanism to limit the spread of fake news
which is not based on content. It can be implemented as a plugin on
a social media platform. The principle is as follows: a team of fact-
checkers reviews a small number of news items (the most popular
ones), which enables to have an estimation of each user's inclina-
tion to share fake news items. Then, using a Bayesian approach,
we estimate the trustworthiness of future news items, and treat
accordingly those of them that pass a certain "untrustworthiness"
threshold.
We then evaluate the effectiveness and overhead of this tech-
nique on a large Twitter graph. We show that having a few thou-
sands users exposed to one given news item enables to reach a very
precise estimation of its reliability. We thus identify more than 99%
of fake news items with no false positives. The performance impact
is very small: the induced overhead on the 90th percentile latency is
less than 3%, and less than 8% on the throughput of user operations.
1 INTRODUCTION
The expression "fake news" has become very popular after the
2016 presidential election in the United States. Both political sides
accused each other of spreading false information on social media,
in order to influence public opinion. Fake news have also been
involved in Brexit and seem to have played a crucial role in the
French election. The phenomenon is considered by many as a threat
to democracy, since the proportion of people getting their news
from social media is significantly increasing [1].
Facebook and Google took a first concrete measure by removing
advertising money from websites sharing a significant number of
fake news [2]. This, however, does not apply to websites that do
not rely on such money: popular blogs, non-professional streaming
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for third-party components of this work must be honored.
For all other uses, contact the owner/author(s).
, ,
© Copyright held by the owner/author(s).
channels, or media relying on donations, to name a few. Facebook
also considered labeling some news items as "disputed" when inde-
pendent human fact-checkers contest their reliability [3]. However,
there cannot be enough certified human fact-checkers for a world-
wide social network. While it is very easy to share fake news, it
may take very long to check them, clearly too long to prevent them
from getting viral.
We present Credulix, the first content-agnostic system to pre-
vent fake news from getting viral. From a software perspective,
Credulix is a plugin to a social media platform. From a more ab-
stract perspective, it can also be viewed as a vaccine for the social
network. Assuming the system has been exposed to some (small)
amount of fake news in the past, Credulix enables it to prevent fu-
ture fake news from becoming viral. It is important to note that our
approach does not exclude other (e.g. content-based) approaches,
but complements them.
At the heart of our approach lies a simple but powerful Bayesian
result we prove in this paper, estimating the credibility of news
items based on which users shared them and how these users treated
fake news in the past. News items considered fake with a sufficiently
high probability can then be prevented from further dissemination,
i.e., from becoming viral.
Our Bayesian result is in the spirit of Condorcet's jury Theorem
[26], which states that a very high level of reliability can be achieved
by a large number of weakly reliable individuals. To determine the
probability of falsehood of a news item X, we look at the behavior
of users towards X. This particular behavior had a certain a priori
probability to happen. We compute this probability, based on what
we call user credulity records: records of which fact-checked items
users have seen and shared. Then, after determining the average
fraction of fake news on the social network, we apply Laplace's
Rule of Succession [73] and then Bayes' Theorem [45] to obtain the
desired probability.
Credulix does retain the idea of using a team of certified human
fact-checkers. However, we acknowledge that they cannot review
all news items. Such an overwhelming task would possibly require
even more fact-checkers than users. Here, the fact-checkers only
check a few viral news items, i.e., ideally news items that have
, ,
Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel
been shared and seen the most on the social network1. Many such
fact-checking initiatives already exist all around the world [6 -- 10].
Such checks enable us to build user credulity records. Our Bayesian
formula determines the probability that a given news item is fake
using the records of users who viewed or shared it. When this prob-
ability goes beyond a threshold (say 99.9999%), the social network
can react accordingly. E.g., it may stop showing the news item in
other users' news feeds. It is important to note that our approach
does not require any users to share a large amount of fake news. It
suffices that some users share more fake news than others.
Our approach is generic in the sense that it does not depend
on any specific criteria. Here, for instance, we look at what users
share to determine if a news item is fake. However, the approach
is independent of the precise meanings of "share" and "fake": they
could respectively be replaced by ("like" or "report") and ("funny",
"offensive", "politically liberal" or "politically conservative").
Turning the theory behind Credulix into a system deployable
in practice is a non-trivial task. In this paper we address these
challenges as well. In particular, we present a practical approach to
computing news item credibility in a fast, incremental manner.
We implement Credulix as a standalone Java plugin and connect
it to Twissandra [22] (an open source Twitter clone), which serves
as a baseline system. Credulix interferes very little with the critical
path of users' operations and thus has a minimal impact on user
request latency. We evaluate Credulix in terms of its capacity
to detect fake news as well as its performance overhead when
applied to a real social network of over 41M users [49]. After fact-
checking the 1024 most popular news items (out of a total of over
35M items), over 99% of unchecked fake news items are correctly
detected by Credulix. We also show that Credulix does not incur
significant overhead in terms of throughput and latency of user
operations (sharing items and viewing the news feed): average
latency increases by at most 5%, while average throughput decreases
by at most 8%.
The paper is organized as follows. Section 2 presents the theoret-
ical principles behind Credulix. Section 3 presents the design and
implementation of Credulix. Section 4 reports on our evaluation
results. Section 5 discusses the limitations and tradeoffs posed by
Credulix. Section 6 discusses related work and Section 7 concludes.
2 THEORETICAL FOUNDATIONS
In this section we give an intuition of the theoretical result underly-
ing Credulix, followed by its formalization as a theorem. We finally
show how to restate the problem in a way that allows efficient, fast
computation of news item credibility.
2.1 Intuition
The context is a social network where users can post news items,
such as links to newspapers or blog articles. Users exposed to these
1Some news items are indeed seen by millions, and are easy to check a posteriori. For
instance, according to CNN [4], the following fake news items were read by millions:
"Thousands of fraudulent ballots for Clinton uncovered"; "Elizabeth Warren endorsed
Bernie Sanders"; "The NBA cancels 2017 All-Star Game in North Carolina". According to
BuzzFeed [5], the fake news item "Obama Signs Executive Order Banning The Pledge Of
Allegiance In Schools Nationwide" got more than 2 millions engagements on Facebook,
and "Pope Francis Shocks World, Endorses Donald Trump for President, Releases Statement"
almost 1 million.
Figure 1: News item falsehood probability computation.
Figure 2: Users reacting to new item X.
news items can in turn share them with other users (Twitter follow-
ers, Facebook friends etc.). The social network has a fact-checking
team whose role is to determine whether certain news items are
fake (according to some definition of fake)2. The news items that
the fact-checking team needs to check is very low compared to the
total number of items in the social network.
The Main Steps. Our approach goes through the following three
main steps:
(1) The fact-checking team reviews few news items (ideally
those that have been the most viral ones in the past). This is
considered the ground truth in our context.
(2) Credulix creates a probabilistic model of each user's sharing
behavior based on their reactions (share / not share) to the
fact-checked items in Step (1). This captures the likelihood
of a user to share true (resp. fake) news items.
(3) For a new, unchecked news item X, we use the behavior
models generated in Step (2) to determine the probability
that X is fake, based on who viewed and shared X.
A high-level view of our technique is depicted in Figure 1. We
use a Bayesian approach. For example, if an item is mostly shared
by users with high estimated probabilities of sharing fake items,
while users with high estimated probabilities of sharing true items
rarely share it, we consider the item likely to be fake (Figure 2).
Preventing the Spread of Fake News. Once we estimate the
probability of a news item X being fake, preventing its spread
becomes easy. Let p0 be any cutoff probability threshold. Each time
a user views or shares X, we compute p, the probability of X being
fake, which we detail below. If p ≥ p0 (i.e., X has a probability at
least p0 to be fake), Credulix stops showing X in the news feed of
users, preventing X from spreading and becoming viral.
2.2 Basic Fake News Detection
User Behavior. We model the behavior of a user u using the two
following probabilities:
2Our truth and falsehood criteria here are as good as the fact-checking team.
Fact-checkednewsitemsNo. viewed/shared/true/fake news items for each userGlobal fraction of fake newsBehavioral model of users exposed to XNews item XProbability that X is fakeXProbsharefakeProbsharetrueProbsharefakeProbsharetrueX probably fakeSHARE XNO SHARELimiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness
, ,
u∈S PT (u)
u∈S PF(u)
• If X is true, the probability of E is P(ET) =
u∈V −S(1 − PT (u)) = πT (V , S).
• If X is fake, the probability of E is P(EF) =
u∈V −S(1 − PF(u)) = πF(V , S).
The probability that X is fake (independently of E) is P(F) = д∗,
and the probability that X is true (independently of E) is P(T) =
1 − д∗.
Thus, we can determine the probability that E is true: P(E) =
P(ET)P(T) + P(EF)P(F) = (1 − д∗)πT (V , S) + д∗πF(V , S).
P(FE) = P(EF)P(F)/P(E) according to Bayes' Theorem [45].
Then, P(FE) = д∗πF(V , S)/(д∗πF(V , S)+(1−д∗)πT (V , S)) = p(V , S).
Thus, the result.
□
If д∗ is unknown, we assume that д is a lower bound of д∗. We
get in this case the following theorem.
Theorem 2. For д ≤ д∗, a news item viewed by a set of users V
and shared by a set of users S is fake with probability at least p(V , S).
Proof. First, note that πT (V , S) and πF(V , S) are strictly positive
by definition. Thus, the ratio πT (V , S)/πF(V , S) is always strictly
positive.
∀x ∈ (0, 1), let д(x) = xπF(V , S)/(xπF(V , S) + (1 − x)πT (V , S)).
Then, p(V , S) = h(д), and according to Theorem 1, the news item
is fake with probability h(д∗).
Written differently, д(x) = 1/(1 + k(x)), with k(x) = (1/x −
1)πT (V , S)/πF(V , S).
As д ≤ д∗, 1/д ≥ 1/д∗, 1 + k(д) ≥ 1 + k(д∗) and h(д) ≤ h(д∗).
Thus, the result.
□
2.3 Fast Fake News Detection
Credulix' measure of credibility of a news item X is the probability
p(V , S) that X is fake. An obvious way to compute this probability is
to recalculate p(V , S) using eq. (1) each time X is viewed or shared
by a user. Doing so, however, would be very expensive in terms of
computation. Below, we show an efficient method for computing
news item credibility. We first describe the computation of UCRs,
and then present our fast, incremental approach for computing
news item credibility using item ratings and UCR scores. This is
crucial for efficiently running Credulix in practice.
Computing User Credulity Records (UCRs). Recall that the
four values (vT (u), sT (u), vF(u), sF(u)) constituting a UCR only
concern fact-checked news items. We thus update the UCR of user u
(increment one of these four values) in the following two scenarios.
(1) When u views or shares a news item that has been fact-
checked (i.e., is known to be true or fake).
(2) Upon fact-checking a news item that u had been exposed to.
In general, the more fact-checked news items a user u has seen
and shared, the more meaningful u's UCR. Users who have not been
exposed to any fact-checked items cannot contribute to Credulix.
Item Rating. In addition to p(V , S), we introduce another measure
of how confident Credulix is about X being fake: the item rating
α(V , S), whose role is equivalent to that of p(V , S). We define it as
α(V , S) = πT (V , S)/πF(V , S), V and S being the sets of users that
viewed and shared X, respectively. If we also define α0 = (1/p0 −
• PT (u): probability that u shares a news item if it is true.
• PF(u): probability that u shares a news item if it is fake.
The probabilities PT (u) and PF(u) are assumed to be independent
between users. In practice, this is the case if the decision to share a
news item X is mainly determined by X itself.
We obtain estimates of PT (u) and PF(u) for each user based
on the user's behavior (share / not share) with respect to fact-
checked items. For any given user u, let vT (u) (resp. sT (u)) de-
note the number of fact-checked true news items viewed (resp.
shared) by u, and vF(u) (resp. sF(u)) the number of fact-checked
fake news items viewed (resp. shared) by u. We call the tuple
(vT (u), sT (u), vF(u), sF(u)) the User Credulity Record (UCR) of u.
User behavior has been modeled similarly in prior work, for
instance, in Curb [44]. In Curb, users exposed to a news item decide
probabilistically whether to share it, potentially exposing all their
followers to it. Curb relies on very similar metrics, namely the num-
bers of viewed and shared items for each user, and the probabilities
that users would share true or false news items.
on the UCR:
For any given user u, we define the following functions, based
• β1(u) = (sT (u) + 1)/(vT (u) + 2)
• β2(u) = (sF(u) + 1)/(vF(u) + 2)
• β3(u) = (vT (u) − sT (u) + 1)/(vT (u) + 2)
• β4(u) = (vF(u) − sF(u) + 1)/(vF(u) + 2)
According to Laplace's Rule of Succession [73], we have PT (u) =
β1(u) and PF(u) = β2(u).
Probability of a News Item Being Fake. At the heart of Credulix
lies a formula to compute the likelihood of a new (not fact-checked)
news item X to be fake. Let V and S be any two sets of users that
have viewed and shared X, respectively. The probability that X is
fake, p(V , S) is computed as:
p(V , S) = дπF(V , S)/(дπF(V , S) + (1 − д)πT (V , S))
(1)
Where:
• πT (V , S) =
• πF(V , S) =
u∈S β1(u)
u∈S β2(u)
u∈V −S β3(u)
u∈V −S β4(u), and
• д is the estimated global fraction of fake news items in the
social network, with д ∈ (0, 1).
д can be estimated by fact-checking a set of news items picked
uniformly at random from the whole social network. Let д∗ be
the real fraction of fake news items in the social network. We
distinguish two cases: д∗ is known, and д∗ is unknown. If д∗ is
known, we have the following theorem.
Theorem 1. Let д = д∗. A news item viewed by a set of users V
and shared by a set of users S is fake with probability p(V , S).
Proof. Consider a news item X that has not been fact-checked.
Consider the following events:
E : X viewed by a set of users V and shared by a set of users S.
F : X is fake.
T : X is true.
Our goal is to evaluate P(FE): the probability that X is fake
knowing E.
, ,
Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel
Figure 4: CREDULIX' view operation.
Despite the fast computtation described in Section 2.3, there
are still notable challenges posed by turning an algorithm into a
practical system. In order for the Credulix plugin to be usable in
practice, it must not impair user experience. In particular, its impact
on the latency and throughput of user operations (retrieving news
feeds or tweeting/sharing articles) must be small. Our design is
motivated by minimizing Credulix' system resource overhead.
Selective Item Tracking. Every second, approximately 6000 new
tweets appear on Twitter and 50000 new posts are created on Face-
book [11, 12]. Monitoring the credibility of all these items would
pose significant resource overhead. With Credulix, each view /
share event requires an additional update to the news item's meta-
data. However, we do not need to keep track of all the items in the
system, but just the ones that show a potential of becoming viral.
Credulix requires each item's metadata to contain an additional
bit indicating whether that item is tracked. The rating of item X is
only computed and kept up to date by Credulix if X is tracked.
We set the tracked bit for item X when X is shared by an influ-
ential user. We define influential users as users who have a high
number of followers. The intuition behind this approach is that a
news item is more likely to become viral if it is disseminated by a
well-connected user [43]. The follower threshold necessary for a
user to be considered influential is a system parameter. It can be
chosen, for instance, as an absolute threshold on the number of
followers or relatively to the other users (e.g., the first n most pop-
ular users are influential). There are many methods to determine
influential users [25, 34, 35, 50, 57, 66, 67] or the likelihood of items
to become viral [27, 39, 40, 51, 55, 68, 71, 72]. For simplicity, in our
experiments we consider the 5% most popular users influential.
Interaction with the Social Media Platform. We consider two
basic operations a user u can perform:
• Sharing a news item and
• Viewing her own news feed.
Sharing is the operation of disseminating a news item to all of u's
followers (e.g., tweeting, sharing, updating Facebook status etc.).
Viewing is the action of refreshing the news feed, to see new posts
shared by users that u follows. In the following, we describe how
these operations are performed in a social network platform (in-
spired by Twitter) without Credulix (Baseline) and with Credulix.
We assume that, like in Twitter, all users' news feeds are repre-
sented as lists of item IDs and stored in memory, while the item
contents are stored in an item data store [13].
Figure 3: CREDULIX' share operation.
1)/(1/д−1) as the rating threshold corresponding to the probability
threshold p0, then, p(V , S) ≥ p0 is equivalent to α(V , S) ≤ α0.
We have p(V , S) = дπF(V , S)/(дπF(V , S) + (1 − д)πT (V , S)) =
д/(д + (1 − д)(πT (V , S)/πF(V , S))) = д/(д + (1 − д)α(V , S)). We
have p(V , S) ≥ p0 if and only if д/p(V , S) ≤ д/p0, that is: д + (1 −
д)α(V , S) ≤ д/p0, which is equivalent to α(V , S) ≤ (1/p0−1)/(1/д−
1), that is: α(V , S) ≤ α0.
When the item X with α(V , S) ≤ α0 is about to be displayed in
a user's news feed, Credulix suppresses X. Note that α0 can be a
fixed constant used throughout the system, but may also be part of
the account settings of each user, giving users the ability to control
how "confident" the system needs to be about the falsehood of an
item before suppressing it.
According to the definition of πT (V , S) and πF(V , S), each time X
is viewed (resp. shared) by a new user u, we can update X's rating
α(V , S) by multiplying it by γv(u) = β1(u)/β2(u) (resp. γs(u) =
β3(u)/β4(u)). We call γv(u) and γs(u) respectively the view score
and share score of u's UCR, as their value only depends on u's UCR.
Consequently, when a user views or shares X, we only need to
access a single UCR in order to update the rating of X. This is
what allows Credulix to update news item credibility fast, without
recomputing eq. (1) each time the item is seen by a user.
In what follows, we refer to γv(u) and γs(u) as u's UCR score.
The more a UCR score differs from 1, the stronger its influence on
an item rating (which is computed as a product of UCR scores). We
consider a UCR score to be useful if it is different from 1.
3 CREDULIX AS A SOCIAL MEDIA PLUGIN
Credulix can be seen as a plugin to an existing social network, like,
for instance, Facebook's translation feature. The translator observes
the content displayed to users, translating it from one language
to another. Similarly, Credulix observes news items about to be
displayed to users and tags or suppresses those considered fake.
User UItem X1Share Item XGet followersUser GraphAdd X IDto U's followers'news feeds...Items Data StoreCREDULIXnoyesStore XratingStore Xif X is newBASELINE SHARINGCREDULIX SHARINGXUX bodyyesRatingstopno23U1News feedUnNews feedU followers list4X tracked?U influential?Track XUpdateX rating4User UView news feedGet U news feed item IDs…Items Data StoreGet itemsCREDULIXReturn filtered itemsStore new ratingsU news feed itemsBASELINE NEWS VIEWINGCREDULIX NEWS VIEWING31X1Xn2Filter itemsUpdateratings if items are tracked45Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness
, ,
Baseline Sharing. A schema of the Share operation is shown in
Figure 3. The regular flow of the operation is shown in blue and
Credulix is shown in orange. User u shares an item X (1). First, the
social graph is queried to retrieve u's followers (2). The system then
appends the ID of X to the news feeds of u's followers (3). Finally,
if X is a new item, the body of X is stored in a data store (4).
Sharing with Credulix. If u is not an influential user, the flow of
the share operation described above stays the same. If u is influential,
we mark X as tracked and associate an item rating with X, because
we expect X to potentially become viral. If X is tracked, Credulix
updates the rating of X using u's UCR share score. Thus, for tracked
items, Credulix may require one additional write to the data store
compared to the Baseline version, in order to store the updated
item rating. This is done off the critical path of the user request,
hence not affecting request latency.
Baseline News Feed Viewing. A schema of the View operation
is shown in Figure 4. User u requests her news feed (1). For each
item ID in u's news feed (stored in memory), the system retrieves
the corresponding item body from the data store (2) and sends all
of them back to the user (3).
Viewing News Feed with Credulix. Credulix augments the
View operation in two ways. First, after the news feed articles
are retrieved from the data store, Credulix checks the ratings of
the items, filtering out the items with a high probability of being
fake. Second, if u's news feed contains tracked items, Credulix
updates the rating of those items using u's UCR view score. Hence,
a supplementary write to the data store is necessary, compared to
the Baseline version, for storing the items' updated ratings. Again,
we do this in the background, not impacting user request latency.
4 EVALUATION
In this section, we evaluate our implementation of Credulix as a
stand-alone Java plugin. We implement a Twitter clone where the
share and view operation executions are depicted in Figures 3 and 4.
We refer to the Twitter clone as Baseline and we compare it to the
variant with Credulix plugged in, which we call Credulix. For
the data store of the Baseline we use Twissandra's data store [22],
running Cassandra version 2.2.9 [19].
The goals of our evaluation are the following. First, we explore
Credulix's fake news detecting efficiency. Second, we measure the
performance overhead of our implementation. More precisely, we
show that:
(1) Credulix efficiently stops the majority of fake news from be-
coming viral, with no false positives. Credulix reduces the
number of times a viral fake news item is viewed from hun-
dreds of millions to hundreds of thousands (in Section 4.2).
(2) Credulix succeeds in stopping the majority of fake news
from becoming viral for various user behaviors in terms of
how likely users are to share news items they are exposed
to (in Section 4.3).
(3) Credulix's impact on system performance is negligible for
both throughput and latency (in Section 4.4).
4.1 Experimental Setup
We perform our evaluation using a real Twitter graph of over 41M
users [49]. We consider users to be influential (as defined in Sec-
tion 3) if they are among the 5% most followed users. We use a set
of tweets obtained by crawling Twitter to get a distribution of item
popularity. Out of over 35M tweets we crawled, the 1024 (0.003%)
most popular tweets are retweeted almost 90 million times, which
corresponds to over 16% of all the retweets.
Two key values influence Credulix' behavior:
• r: The number of fact-checked news items during UCR cre-
ation (i.e., the number of news items constituting the ground
truth). In our experiments we use a value of r = 1024, which
causes one third of the user population to have useful UCR
scores (more than enough for reliable fake item detection).
• msp: The max share probability models users' intrinsic shar-
ing behavior: how likely users are to share news items they
are exposed to. This models how users react to news items.
It is not a system parameter of Credulix. We expect msp to
be different for different news items, as some items become
viral (high msp) and some do not (low msp). Regardless of
what the real value of msp is, Credulix effectively prevents
fake items from going viral, as we show later.
While the network and the tweets come from real datasets, we
generate the user behavior (i.e., probability to share fake and true
news items), as we explain in the remainder of this section. We
proceed in two steps.
(1) UCR creation: determining the UCR (i.e., vT , sT , vF , sF ) for
each user based on propagation of fact-checked news items.
(2) Fake item detection: using the UCRs obtained in the previous
step, we use Credulix to detect fake news items and stop
them from spreading.
This two-step separation is only conceptual. In a production system,
both UCR creation and fake item detection happen continuously
and concurrently.
UCR Creation. For each user u, we set PT (u) and PF(u) (see Sec-
tion 2) to values chosen uniformly at random between 0 and msp.
The likelihood of a user to share true or fake news is the main
user characteristic used by Credulix. This approach yields differ-
ent types of user behavior. We take a subset of r tweets from our
tweet dataset and consider this subset the ground truth, randomly
assigning truth values to news items.
To create the UCRs, we propagate r items through the social
graph. We assign each of the r items a target share count, which
corresponds to its number of retweets in our dataset. The propa-
gation proceeds by exposing a random user u to the propagated
item X and having u decide (based on PT (u) and PF(u)) whether to
share X or not. If u shares X, we show X to all u's followers that
have not yet seen it. During item propagation, we keep track of
how many true/fake items each user has seen/shared and update
the UCRs accordingly.
We repeat this process until one of the following conditions is
fulfilled:
(1) The target number of shares is reached.
(2) At least 80% of users have been exposed to X, at which point
we consider the network saturated.
, ,
Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel
Fake Item Detection. After creating the UCRs, we measure how
effectively these can be leveraged to detect fake news. To this end,
in the second step of the evaluation, we propagate tweets through
the social graph. One such experiment consists of injecting an item
in the system, by making a random user u share it. The propagation
happens as in the previous phase, with two important differences:
(1) Since in this second step the item we propagate is not fact-
checked, we do not update u's UCR. Instead, whenever u
is exposed to an item, we update that item's rating using
u's UCR score. We use the share score if u shares the item,
otherwise we use the view score (see Section 2).
(2) We only propagate the item once, continuing until the prop-
agation stops naturally, or until the probability of an item
being fake reaches p0 = 0.999999.
We repeat this experiment 500 times with a fake news item and 500
times with a true news item to obtain the results presented later in
this section.
We conduct the experiments on a 48-core machine, with four
12-core Intel Xeon E7-4830 v3 processors operating at 2.1 GHz, 512
GB of RAM, running Ubuntu 16.04.
4.2 Stopping Fake News from Becoming Viral
This experiment presents the end-to-end impact of
Credulix on the number of times users are exposed to fake news.
To this end, we measure the number of times a user is exposed to a
fake news item in two scenarios:
(1) Baseline propagation of fake news items.
(2) Propagation of fake items, where we stop propagating an
item when Credulix labels it as fake with high probability.
Figure 5 conveys results for items with varying rates of virality,
modeled by our msp parameter. It shows how many times a user has
been exposed to a fake item, cumulatively over the total number
of fake items that we disseminate. We can see that regardless of
how viral the items would naturally become, Credulix is able to
timely detect the fake items before they spread to too many users.
Credulix restricts the number of views from hundreds of millions
to tens or hundreds of thousands.
None of our experiments encountered false positives (i.e., true
items being incorrectly labeled as fake). Considering the increas-
ing responsibility being attributed to social network providers as
mediators of information, it is crucial that true news items are not
accidentally marked as fake.
4.3 Fake News Detection Relative to Sharing
Probability
In Figure 6 we plot the percentage of fake items displayed with
Credulix for two graph sizes. On a smaller graph of 1M users
generated with the SNAP generator [52], Credulix achieves a
lower fake item detection rate. This is because the impact of fact-
checked items is smaller on a small graph, leading to fewer users
with relevant UCR scores. This result suggests that on a real social
graph that is larger than the one we use, Credulix would be more
efficient than in our experiments.
Figure 6 also shows how the detection rate depends on the ten-
dency of users to share news items (that we model using msp). The
Figure 5: Fake news spreading with CREDULIX, as a func-
tion of msp (lower is better). For low msp, news items do not
become viral. For high msp, CREDULIX blocks the majority
of fake news items.
Figure 6: Fake news spreading with CREDULIX, as a func-
tion of msp, for different social graph sizes (lower is better).
more viral the items get (the higher the msp value), the more effec-
tive Credulix becomes at fake item detection. Intuitively, the more
items users share, the more precisely we are able to estimate their
sharing behavior. The lower detection rate for small msp values
does not pose a problem in practice, as a low msp also means that
items naturally do not become viral.
While not visible in the plot, it is worth noting that not only
the relative amount of viewed fake items decreases, but also the
absolute one. For example, while for msp = 1/32 a fake news item
has been displayed almost 3k times (out of over 84k for Baseline),
for msp = 1/16 a fake item has only been displayed 1.2k times (out of
over 128k Baseline) in the 1M graph. Interestingly, with increasing
tendency of items to go viral (i.e. increasing msp), even the absolute
number of displayed fake items decreases. The relative decrease
effect is not due to an absolute increase for Baseline. Instead, it is
due to a higher msp value ensuring more spreading of (both true and
fake) news items in our UCR creation phase. This in turn produces
better UCRs, increasing Credulix' effectiveness.
4.4 CREDULIX Overhead
In this experiment, we evaluate Credulix' impact on user opera-
tions' (viewing and sharing) throughput and latency. We present
our results for four workloads, each corresponding to a value of
msp discussed above (Figures 5 and 6). The four workloads are
summarized in Table 1. We present results for two social graph
sizes: 41M users, and 1M users, with 16 worker threads serving
00.511.5200.050.10.15Number of views (Billions)Maximum share probability (msp)CREDULIXBaseline1/81/161/321/6404812162000.050.10.15% Fake items displayedMaximum share probability (msp)CREDULIX, 1M graphCREDULIX, 41M graph1/81/161/321/64000.511.5200.050.10.15Number of views (Billions)Maximum share probability (msp)CREDULIXBaseline1/81/161/321/6404812162000.050.10.15% Fake items displayedMaximum share probability (msp)CREDULIX, 1M graphCREDULIX, 41M graph1/81/161/321/640Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness
, ,
Figure 7: Credulix's throughput overhead
Figure 8: Credulix's latency overhead: 94% views
user operations, showing that the Credulix's overhead in terms of
throughput and latency is low.
Figure 7 shows the throughput comparison between Credulix
and Baseline, for the four workloads. The throughput penalty
caused by Credulix is at most 8%. The impact on throughput is
predominantly caused by Credulix' background tasks, as detailed
in Section 3. Moreover, Credulix does not add significant overhead
relative to the Baseline as the graph size increases. The throughput
differences between the two graph sizes are not larger than 10%.
This is due to our design which relies on selective item tracking.
Figures 8 and 9 show view and share latencies for the 94% views
and 99.9% views workloads, respectively. The latency values for the
two other workloads are similar and we omit them for brevity.
For the 41M User Twitter graph, the average and 90th percentile
latencies are roughly the same for Credulix and for Baseline. We
notice, however, heavier fluctuations for the 1M User graph. Overall,
latency increases by at most 17%, at the 90th percentile, while the
median latency is the same for both operations, for both systems,
for both graphs (4 microseconds per operation). The low overhead
in latency is due to Credulix keeping its computation outside the
critical path. Standard deviation of latencies is high both for the
Baseline and for Credulix, for both share and view operations.
The high variation in latency is caused by the intrinsic differences
between the users; for instance, share operations of a user with
more followers need to propagate to more users than posts of users
with few or no followers.
The high 99th percentile latency for both systems results from
Twissandra (our Baseline) being implemented in Java, a language
(in)famous for its garbage collection breaks. Certain operations,
during which garbage collection is performed by the JVM, thus
experience very high latencies. This effect is not inherent to the
system itself, but is caused by the Java implementation and can be
avoided by using a language with explicit memory management.
msp Value
1/8
1/16
1/32
1/64
% Views, % Shares
94% Views, 6% Shares
97% Views, 3% Shares
99% Views, 1% Shares
99.9% Views, 0.1% Shares
Table 1: Workload Characteristics. The only parameter we
vary is msp, from which the view/share ratio follows.
Figure 9: Credulix's latency overhead: 99.9% views
The impact of garbage collection is stronger with Credulix than
with Baseline, as Credulix creates more short-lived objects in mem-
ory to orchestrate its background tasks. In addition to the intrinsic
differences between users discussed above, garbage collection also
significantly contributes to the high standard deviation observed
in all latencies.
5 DISCUSSION AND LIMITATIONS
We believe that Credulix is a good step towards addressing the fake
news problem, but we do not claim it to be the ultimate solution.
Credulix is one of many possible layers of protection against
fake news and can be used independently of other mechanisms.
With Credulix in place, news items can still be analyzed based
on content using other algorithms. It is the combination of several
approaches that can create a strong defense against the fake news
phenomenon. This section discusses the limitations of Credulix.
News Propagation. Credulix does not prevent users from ac-
tively pulling any (including fake) news stories directly from their
sources. Credulix identifies fake news on a social media platform
and, if used as we suggest, prevents users from being notified about
other users sharing fake news items.
Manual Fact-Checking. Credulix relies on manual fact-checking
and thus can only be as good as the fact-checkers. Only users who
have been exposed to manually fact-checked items can be leveraged
by Credulix. However, fact-checking a small number of popular
news items is sufficient to obtain enough users with usable UCRs.
Fact-checking a small number of news items is feasible, especially
given the recent upsurge of fact-checking initiatives [6 -- 10].
00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% Views00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% ViewsBaselineCREDULIX050100150Avg90p99pAvg90p99pAvg90p99pAvg90p99p41M Usr.1M Usr.41M Usr.1M Usr.MicrosecondsView LatencyShare Latency00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% ViewsBaselineCREDULIX94% Views -- 6% Shares Workload99.9% Views -- 0.1% Shares Workload050100150Avg90p99pAvg90p99pMicrosecondsView LatencyShare Latency00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% ViewsBaselineCREDULIX41M Usr.1M Usr.41M Usr.1M Usr.Avg90p99pAvg90p99p, ,
Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel
User Behavior. Credulix's algorithm is based on the assumption
that among those users exposed to fact-checked news items, some
share more fake items than others. Analogous assumptions are
commonly used in other contexts such as recommender systems.
For example, a user-based recommender system would not be useful
if all users behaved the same way, i.e. everybody giving the same
ratings to the same items. Note that, even in the case where all
users did behave the same, running Credulix would not negatively
impact the behavior of the system: Credulix would not detect
any fake news items, nor would it classify fake news items as
true. Our approach shines when the inclination of most users to
share fake news does not change too quickly over time. Looking at
social media today, some people seem indeed to consciously and
consistently spread more fake news than others [14 -- 16]. In fact,
many systems that are being successfully applied in practice (e.g.
reputation systems, or systems based on collaborative filtering)
fundamentally rely on this same assumption.
Malicious Attacks. The assumption that users do not change their
behavior too quickly could, however, potentially be exploited by a
malicious adversary. Such an adversary controlling many machine-
operated user accounts could deceive the system by breaking this
assumption. For example, all accounts controlled by the adversary
could be sharing only true reviewed news items for an extended
period of time and then suddenly share an un-reviewed fake one
(or do the opposite, if the goal is to prevent a truthful news item
from being disseminated). Even then, a successful attack would
only enable the spread of the news item, without guaranteeing its
virality. Moreover, the adversary runs a risk that the fake item will
later be fact-checked and thus will appear in their UCRs, reducing
the chances of repeating this attack with another fake item. In fact,
the more popular such an item becomes (which is the likely goal of
the adversary), the higher the chance of it being fact-checked. The
trade-off between false positives and false negatives is expressed
by the p0 parameter (see Section 2), i.e. the certainty required to
flag an item as fake. A high value of p0 might make it easier for the
adversary to "smuggle" fake items in the system, but makes it more
difficult to prevent true news items from spreading.
Updating of the Ground Truth. Like any vaccine, Credulix re-
lies on a fraction of fake news to exist in the social network in order
to be efficient. If Credulix stops the fake news from becoming
viral, then the system might lack the ground truth to make future
predictions. Hence, there might be periods when fake news can
appear again. To avoid such fluctuations, Credulix' ground truth
should be continuously updated with some of the most current
fake news items. Credulix' evolution in time, including changes
in user behavior as well as updating of the ground truth related to
system dynamics, are research directions we are considering for
future work.
Filtering News. One could argue that removing some news items
from users' news feeds might be seen as a limitation, even as a
form of censorship. But social media already take that liberty as
they display to users only about 10% of the news that they could
show. Rather than censorship, Credulix should be viewed as an
effort to ensure the highest possible quality of the items displayed,
considering the credibility of an item to be one of the quality criteria.
6 RELATED WORK
Credulix shares similarities with reputation systems [46, 61, 63], in
creating profiles for users (UCRs in Credulix) and in assuming that
the future behavior of users will be similar to their past behavior. In
our approach, however, users are not rated directly by other users.
Instead, we compute users' UCRs based on their reaction to what
we consider ground truth (fact-checked items).
Credulix also resembles recommender systems [23, 24, 29, 32,
48, 53, 54, 58, 62, 65] in the sense that it pre-selects items for users
to see. Unlike in recommender systems, however, the pre-selection
is independent of the requesting user. Our goal is not to provide a
personalized selection.
Another approach to detect fake news is to automatically check
content [28]. Content analysis can also help detect machine-generated
fake blogs [47] or social spam using many popular tags for irrele-
vant content [56]. Another line of research has been motivated by
the role of social networks for news dissemmination in the case of
catastrophic events such as hurricanes and earthquakes[38, 42].
News item credibility can also be inferred by applying machine
learning techniques [30], by using a set of reliable content as a
training set [64], or by analyzing a set of predetermined features
[37]. Other parameters of interest are linguistic quantifiers [69],
swear words, pronouns or emoticons [36]. Yet, a malicious agent
knowing these specific features could use them to spread fake news.
Following the events of 2016, Facebook received much media
attention concerning their politics about "fake news". Their first
aproach was to assess news sources reliability in a centralized way
[17]. Recently, Facebook launched community-based assesment ex-
periment [18]: asking the users to evaluate the reliability of various
news sources. The idea is to give more exposure to news sources
that are "broadly trusted"'. Our approach is finer-grained and goes
to the level of news items. Facebook also used third-party fact
checkers to look at articles flagged by users.
Dispute Finder [31] also takes a community approach asking
users not only to flag claims they believe to be disputed, but also to
link the disputed claim to a reliable source that refutes it. Credulix,
does not look at concrete claims, but infers the trustworthiness of
news items based on user behavior.
Fact-checking tools can help to annotate documents and to cre-
ate knowledge bases [20, 21, 33, 59, 60]. Automated verification of
claims about structured data, or finding interesting claims that can
be made over a given set of data has been researched as well [41, 70].
These tools facilitate the fact-checking process that Credulix relies
on, but by themselves do not prevent the spreading of fake news.
Curb [44], is algorithm that is close to Credulix in several aspects.
Like Credulix, it leverages the crowd to detect and reduce the
spread of fake news and misinformation and assumes a very similar
user behavior model. Curb, however, focuses on the problem of
which items to fact-check and when, relying on users to manually
flag items. Curb only prevents the spreading of items that have
been fact-checked. In addition, it assumes fact-checking to happen
instantaneously, i.e., a fake item selected for fact-checking by Curb
is assumed to stop spreading immediately, without taking into ac-
count the considerable fact-checking delay. Credulix could benefit
from Curb by using it as a fact-checking module.
Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness
, ,
7 CONCLUSIONS
We presented Credulix, the first content-agnostic system to detect
and limit the spread of fake news on social networks with a very
small performance overhead. Using a Bayesian approach, Credulix
learns from human fact-checking to compute the probability of
falsehood of news items, based on who shared them. Applied to
a real-world social network of 41M users, Credulix prevents the
vast majority (over 99%) of fake news items from becoming viral,
with no false positives.
REFERENCES
[1] [n. d.].
investigate-threat-democracy.
news-presidential-election/.
https://www.theguardian.com/media/2017/jan/29/fake-news-mps-
[2] [n. d.]. http://money.cnn.com/2016/11/15/technology/facebook-google-fake-
[3] [n. d.]. http://learningenglish.voanews.com/a/facebook-fake-news/3752639.html.
[4] [n. d.]. http://money.cnn.com/2016/11/02/media/fake-news-stories/.
[5] [n. d.]. http://nymag.com/selectall/2016/12/here-are-the-most-viral-fake-news-
stories-of-2016.html.
[6] [n. d.]. http://www.politifact.com/.
[7] [n. d.]. https://www.snopes.com/.
[8] [n. d.]. https://www.washingtonpost.com/news/fact-checker/.
[9] [n. d.]. https://www.truthorfiction.com/.
[10] [n. d.]. https://fullfact.org/.
[11] [n. d.]. http://www.internetlivestats.com/twitter-statistics/.
[12] [n. d.].
internet-activity/.
http://www.zettasphere.com/mind-boggling-stats-for-1-second-of-
sources.
[13] [n. d.]. https://www.infoq.com/presentations/Twitter-Timeline-Scalability.
[14] [n. d.]. http://www.bbc.com/news/magazine-38168281.
[15] [n.
http://www.reuters.com/article/us-france-election-cyber-
d.].
idUSKBN15S192.
[16] [n. d.]. https://www.washingtonpost.com/news/the-fix/wp/2016/11/22/a-harsh-
truth-about-fake-news-some-people-are-super-gullible.
[17] [n.
d.].
https://www.washingtonpost.com/news/the-
switch/wp/2018/01/19/facebook-will-now-ask-its-users-to-rank-news-
organizations-they-trust.
[18] [n. d.]. https://techcrunch.com/2018/01/19/facebooks-news-feed-update-trusted-
[19] [n. d.]. Cassandra. http://cassandra.apache.org/.
[20] [n. d.]. DocumentCloud. https://www.documentcloud.org/.
[21] [n. d.]. Open Calais. http://opencalais.com/.
[22] [n. d.]. Twissandra Twitter clone, build on top of Cassandra. https://github.com/
twissandra/twissandra/.
[23] J. Ahn and X. Amatriain. 2010. Towards Fully Distributed and Privacy-Preserving
Recommendations via Expert Collaborative Filtering and RESTful Linked Data.
In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent
Agent Technology, Vol. 1.
[24] Xavier Amatriain, Neal Lathia, Josep M Pujol, Haewoon Kwak, and Nuria Oliver.
2009. A collaborative filtering approach based on expert opinions from the web.
SIGIR.
[25] Cigdem Aslay, Francesco Bonchi, Laks V. S. Lakshmanan, and Wei Lu. 2017.
Revenue Maximization in Incentivized Social Advertising. VLDB (2017).
[26] David Austen-Smith and Jeffrey S. Banks. [n. d.].
Information Aggregation,
Rationality, and the Condorcet Jury Theorem. American Political Science Review.
[27] Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable Influence Maximization
for Prevalent Viral Marketing in Large-scale Social Networks. In ACM SIGKDD.
[28] Giovanni Luca Ciampaglia, Prashant Shiralkar, Luis M. Rocha, Johan Bollen,
Filippo Menczer, and Alessandro Flammini. 2015. Computational Fact Checking
from Knowledge Networks. PLOS ONE (2015).
[29] Gianmarco De Francisci Morales, Aristides Gionis, and Claudio Lucchese. 2012.
From chatter to headlines: harnessing the real-time web for personalized news
recommendation. In WSDM.
[30] P. Dewan and P. Kumaraguru. 2015. Towards automatic real time identification
[31] Rob Ennals, Beth Trushkowsky, and John Mark Agosta. 2010. Highlighting
of malicious posts on Facebook. In PST.
Disputed Claims on the Web. In WWW.
[32] Kiran Garimella, Gianmarco De Francisc iMorales, Aristides Gionis, and Michael
Mathioudakis. 2017. Mary, Mary, Quite Contrary: Exposing Twitter Users to
Contrarian News. In WWW Companion.
[33] François Goasdoué, Konstantinos Karanasos, Yannis Katsis, Julien Leblay, Ioana
Manolescu, and Stamatis Zampetakis. 2013. Fact Checking and Analyzing the
Web. In ACM SIGMOD.
[34] Amit Goyal, Francesco Bonchi, and Laks V.S. Lakshmanan. 2008. Discovering
Leaders from Community Actions. In CIKM.
[35] Amit Goyal, Francesco Bonchi, and Laks V.S. Lakshmanan. 2010. Learning
Influence Probabilities in Social Networks. In WSDM.
[36] Aditi Gupta and Ponnurangam Kumaraguru. 2012. Credibility Ranking of Tweets
During High Impact Events. In PSOSM.
[37] Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014.
TweetCred: Real-Time Credibility Assessment of Content on Twitter. In SocInfo.
[38] Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi.
2013. Faking Sandy: Characterizing and Identifying Fake Images on Twitter
During Hurricane Sandy. In WWW.
[39] Viet Ha-Thuc, Yelena Mejova, Christopher Harris, and Padmini Srinivasan. 2009.
A relevance-based topic model for news event tracking. In SIGIR.
[40] Viet Ha-Thuc, Yelena Mejova, Christopher Harris, and Padmini Srinivasan. 2010.
News event modeling and tracking in the social web with ontological guidance.
In ICSC.
[41] Naeemul Hassan, Afroza Sultana, You Wu, Gensheng Zhang, Chengkai Li, Jun
Yang, and Cong Yu. 2014. Data in, Fact out: Automated Monitoring of Facts by
FactWatcher. VLDB (2014).
[42] Muhammad Imran, Carlos Castillo, Fernando Diaz, and Sarah Vieweg. 2015.
Processing Social Media Messages in Mass Emergency: A Survey. ACM CSUR
(2015).
[43] Maximilian Jenders, Gjergji Kasneci, and Felix Naumann. 2013. Analyzing and
Predicting Viral Tweets. In WWW Companion.
[44] Jooyeon Kim, Behzad Tabibian, Alice Oh, Bernhard Schölkopf, and Manuel
Gomez Rodriguez. 2018. Leveraging the Crowd to Detect and Reduce the Spread
of Fake News and Misinformation. In WSDM.
[45] Karl-Rudolf Koch. 1990. Bayes' Theorem. Bayesian Inference with Geodetic
Applications (1990).
[46] Marios Kokkodis and Panagiotis G. Ipeirotis. 2013. Have You Done Anything
Like That?: Predicting Performance Using Inter-category Reputation. In WSDM.
[47] Pranam Kolari, Akshay Java, Tim Finin, Tim Oates, and Anupam Joshi. 2006.
Detecting Spam Blogs: A Machine Learning Approach. In AAAI.
[48] Danai Koutra, Paul N Bennett, and Eric Horvitz. 2015. Events and controversies:
Influences of a shocking news event on information seeking. In WWW.
[49] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What is
Twitter, a social network or a news media?. In WWW.
[50] Janette Lehmann, Carlos Castillo, Mounia Lalmas, and Ethan Zuckerman. 2013.
Finding news curators in Twitter. In WWW Companion.
[51] Kristina Lerman and Tad Hogg. 2010. Using a model of social dynamics to predict
popularity of news. In WWW.
[52] Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network
Dataset Collection. http://snap.stanford.edu/data.
[53] Chen Lin, Runquan Xie, Lei Li, Zhenhua Huang, and Tao Li. 2012. Premise:
Personalized news recommendation via implicit social experts. In CIKM.
[54] Nathan N Liu, Xiangrui Meng, Chao Liu, and Qiang Yang. 2011. Wisdom of the
better few: cold start recommendation via representative based rating elicitation.
In RecSys.
[55] Xiaoyan Lu and Boleslaw Szymanski. 2017. Predicting Viral News Events in
Online Media. In IPDPSW.
tion. In AIRWeb.
[56] Benjamin Markines, Ciro Cattuto, and Filippo Menczer. 2009. Social spam detec-
(1997).
[57] Michael Mathioudakis and Nick Koudas. 2009. Efficient identification of starters
and followers in social media. In EDBT.
[58] Kensuke Onuma, Hanghang Tong, and Christos Faloutsos. 2009. TANGENT: a
novel, 'Surprise me', recommendation algorithm. In KDD.
[59] Ravali Pochampally, Anish Das Sarma, Xin Luna Dong, Alexandra Meliou, and
Divesh Srivastava. 2014. Fusing Data with Correlations. In ACM SIGMOD.
[60] Theodoros Rekatsinas, Amol Deshpande, Xin Luna Dong, Lise Getoor, and Divesh
Srivastava. 2016. SourceSight: Enabling Effective Source Selection. In ACM
SIGMOD.
[61] Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Repu-
tation Systems. Commun. ACM (2000).
[62] Paul Resnick and Hal R Varian. 1997. Recommender systems. Commun. ACM
[63] Marko A Rodriguez, Daniel J Steinbock, Jennifer H Watkins, Carlos Gershenson,
Johan Bollen, Victor Grey, et al. 2007. Smartocracy: Social networks for collective
decision making. In HICSS.
[64] Kanda Runapongsa Saikaew and Chaluemwut Noyunsan. 2015. Features for
International Scholarly and
measuring credibility on facebook information.
Scientific Research & Innovation (2015).
[65] Xiaoyuan Su and Taghi M Khoshgoftaar. 2009. A survey of collaborative filtering
techniques. Advances in artificial intelligence, Article 4 (2009).
[66] Jie Tang, Jimeng Sun, Chi Wang, and Zi Yang. 2009. Social Influence Analysis in
Large-scale Networks. In ACM SIGKDD.
[67] Ming-Feng Tsai, Chih-Wei Tzeng, Zhe-Li Lin, and Arbee L. P. Chen. 2014. Dis-
covering leaders from social network by action cascade. Social Network Analysis
and Mining (2014).
, ,
Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel
[68] Sharan Vaswani, Branislav Kveton, Zheng Wen, Mohammad Ghavamzadeh, Laks
V. S. Lakshmanan, and Mark Schmidt. [n. d.]. Model-Independent Online Learning
for Influence Maximization. In Proceedings of the 34th International Conference on
Machine Learning.
[69] Marco Viviani and Gabriella Pasi. 2016. A Multi-criteria Decision Making Ap-
proach for the Assessment of Information Credibility in Social Media. In WILF.
[70] You Wu, Brett Walenz, Peggy Li, Andrew Shim, Emre Sonmez, Pankaj K. Agarwal,
Chengkai Li, Jun Yang, and Cong Yu. 2014. iCheck: Computationally Combating
"Lies, D -- ned Lies, and Statistics". In ACM SIGMOD.
[71] Yang Yang, Jie Tang, Cane Wing-ki Leung, Yizhou Sun, Qicong Chen, Juanzi Li,
and Qiang Yang. 2015. RAIN: Social Role-Aware Information Diffusion.. In AAAI.
[72] Y. Yang, Z. Wang, J. Pei, and E. Chen. 2017. Tracking Influential Individuals
in Dynamic Networks. IEEE Transactions on Knowledge and Data Engineering
(2017).
[73] Sandy L. Zabell. 1989. The rule of succession. Erkenntnis (1989).
|
1406.2909 | 2 | 1406 | 2015-06-11T13:23:11 | Identification of Patient Zero in Static and Temporal Networks - Robustness and Limitations | [
"cs.SI",
"physics.soc-ph"
] | Detection of patient-zero can give new insights to the epidemiologists about the nature of first transmissions into a population. In this paper, we study the statistical inference problem of detecting the source of epidemics from a snapshot of spreading on an arbitrary network structure. By using exact analytic calculations and Monte Carlo estimators, we demonstrate the detectability limits for the SIR model, which primarily depend on the spreading process characteristics. Finally, we demonstrate the applicability of the approach in a case of a simulated sexually transmitted infection spreading over an empirical temporal network of sexual interactions. | cs.SI | cs |
Identification of Patient Zero in Static and Temporal Networks - Robustness and
Limitations
Nino Antulov-Fantulin
Computational Biology and Bioinformatics Group, Division of Electronics,
Rudjer Boskovi´c Institute, Zagreb 10000, Croatia
Alen Lanci´c
Faculty of Science, Department of Mathematics,
University of Zagreb, Zagreb 10000, Croatia
Computational Biology and Bioinformatics Group,
Division of Electronics, Rudjer Boskovi´c Institute, Zagreb 10000, Croatia
Tomislav Smuc
Theoretical Physics Division, Rudjer Boskovi´c Institute, Zagreb 10000, Croatia and
Catholic University of Croatia, Zagreb, Croatia
Hrvoje Stefanci´c
Mile Siki´c
Faculty of Electrical Engineering and Computing,
Department of Electronic Systems and Information Processing,
University of Zagreb, Zagreb 10000, Croatia∗ and
Bioinformatics Institute, A*STAR, Singapore 138671, Republic of Singapore
(Dated: September 17, 2018)
Detection of patient-zero can give new insights to the epidemiologists about the nature of first
transmissions into a population. In this paper, we study the statistical inference problem of detecting
the source of epidemics from a snapshot of spreading on an arbitrary network structure. By using
exact analytic calculations and Monte Carlo estimators, we demonstrate the detectability limits
for the SIR model, which primarily depend on the spreading process characteristics. Finally, we
demonstrate the applicability of the approach in a case of a simulated sexually transmitted infection
spreading over an empirical temporal network of sexual interactions.
INTRODUCTION
One of the most prevalent types of dynamic processes
of public interest characteristic for the real-life complex
networks are contagion processes [1 -- 7]. Epidemiologists
detect the epidemic source or the patient-zero either by
analysing the temporal genetic evolution of virus strains
[8 -- 10], which can be time-demanding or try to do a con-
tact backtracking [11] from the available observed data.
However, in cases where the information on the times
of contact is unknown or incomplete or the infection is
asymptomatic or subclinical the backtracking method is
no longer adequate. Due to its practical aspects and the-
oretical importance, the epidemic source detection prob-
lem on contact networks has recently gained a lot of at-
tention in the complex network science community. This
has led to the development of many different source de-
tection estimators for static networks, which vary in their
assumptions on the network structure (locally tree-like)
or on the spreading process compartmental models (SI,
SIR) [12 -- 21] or both.
In the case of the SIR model (Susceptible-Infected-
Recovered) there are two different approaches. Zhu et.
al.
proposed a sample path counting approach [15],
where they proved that the source node minimizes the
maximum distance (Jordan centrality) to the infected
nodes on infinite trees. Lokhov et. al. used a dynamic
message-passing algorithm (DMP) for the SIR model to
estimate the probability that a given node produces the
observed snapshot. They use a mean-field-like approx-
imation (node independence approximation) and an as-
sumption of a tree-like contact network to compute the
source likelihoods [17]. Altarelli. et. al.
remove the
independence assumption and use the message passing
method with an assumption of a tree-like contact network
to estimate the source [18]. In our study, we drop all the
network structure and node independence assumptions
and analyse the source probability estimators for general
compartmental models. The main contributions of our
paper are the following:
(i) we developed the analytic combinatoric, as well as
the Monte-Carlo methods (Direct and Soft Margin) for
determining exact and approximate source probability
distribution, and have also produced the benchmark so-
lutions on the 4-connected regular lattice structure;
(ii) we measured the source detectability by using
the normalized Shannon entropy of the estimated source
probability distribution for each of the source detection
problems, and have observed the existence of some highly
detectable, as well as some highly undetectable regimes
for the SIR and other spreading models. We notice that
the detectability primarily depends on the spreading pro-
cess characteristics;
(iii) using the simulations of the sexually transmitted
infection (STI) on a realistic time interval of 200 days
on an empirical temporal network of sexual contacts we
demonstrate the robustness of the Soft Margin source
estimator.
METHODS
In a general case, the contact-network during an epi-
demic process can be temporal and weighted, but we first
concentrate our analysis on a static undirected and non-
weighted network G = (V, E), where V denotes a set of
nodes and E denotes a set of edges. The random bi-
nary vector ~R indicates which nodes got infected up to
a certain time T . For the contagion model, we use the
SIR model with the simultaneous updates in time de-
scribed by the probability p that an infected node infects
a susceptible neighbour node in one discrete step and the
probability q that an infected node recovers in one dis-
crete step. We observe one epidemic realization ~r∗ of ~R
at a time T of the SIR process (p, q, T ) on a network G
and want to calculate the source posterior probabilities
P (Θ = θi ~R = ~r∗). We have developed two complemen-
tary approaches that can provide exact posterior proba-
bility distributions over nodes in the spreading realization
~r∗ via the Bayesian approach: the direct Monte-Carlo ap-
proach and analytical combinatoric approach.
Using the direct Monte-Carlo approach, for each
potential source node i (infected node in the realiza-
tion ~r∗), a large number n of epidemic spreading sim-
ulations with maximum duration T is performed with i
as an epidemic source. The number of simulations ni
which coincides with the realization ~r∗ is recorded. To
cut down on the extensive calculation required for the
Monte-Carlo simulations, we employ a pruning mecha-
nism (no errors introduced), stopping the simulations at
t < T if the current simulation realization has infected a
node which is not infected in ~r∗. The probability of the
node i being the source of the epidemic is then calculated
as P (Θ = θi ~R = ~r∗) = ni/Pj nj. The statistical sig-
nificance of the direct Monte-Carlo results are controlled
with the convergence conditions. For more information,
see SI section 2.
An alternative approach, the analytical combina-
toric approach assigns to each node of degree n a gen-
erating function which is maximally (n + 1)-dimensional,
which captures the events of node first infection and
infection spreading through its edges at specific times.
Then, by multiplication of the generating functions of
all the infected nodes from a realization, we are able to
2
FIG. 1. Plots A, B and C: Box plots depicting distribution
of entropy values (H) of source probability distributions for a
number of randomly generated spreading realizations across
with different (p, q) parameters on the 4-connected lattice:
N = 30 × 30 nodes with T = 5, calculated by the direct
Monte-Carlo method with 106
− 108 simulations per source.
merge all contributions together and get the source prob-
ability distribution. In the SI section 1, along with the
detailed description of analytical combinatoric method,
we demonstrate the correspondence between the direct
Monte-Carlo and analytical combinatorics. The detailed
description of analytical combinatoric method can be
found in SI section 1. A serious disadvantage of the
analytical method is that the calculations become pro-
hibitively intricate in the case of non tree-like configura-
tions.
We have generated a series of benchmark cases on a
4-connected lattice (N = 30 × 30), for which we have
calculated the probability distributions over the poten-
tial source candidates using the direct Monte-Carlo esti-
mator (see the SI section 4). The source detectability
D(~r∗) = 1 − H(~r∗), is characterized via the normalized
Shannon entropy H (normalization by entropy of uni-
form distribution) of the calculated probability distribu-
tion P (Θ = θi ~R = ~r∗).
Results depicting distributions of H for different parts
of the SIR parameter space for the regular lattice are
given in Figure 1 plots A, B and C. Figures show quali-
tatively the same detectability behaviour across p param-
eter, for different values of parameter q. It is important
to observe the existence of three different regions:
low
detectability-high entropy region (p < 0.2), intermediate
detectability-intermediate entropy region (0.2 < p < 0.7)
and high detectability-low entropy region (p > 0.7). We
observe that the detectability transition is still present
3
between a fixed realization ~r∗ and a random vector real-
ization that comes from SIR process with the source θ.
The empirical cumulative distribution function of the n
samples from the random variable ϕ( ~r∗, ~Rθ) is denoted
Fθ(x), where x is the value of the similarity variable. By
taking the derivative of Fθ(x), we get the PDF estimate:
fθ(x) =
d
dx
Fθ(x) =
1
n
n
Xi=1
δ (x − ϕ( ~r∗, ~rθ,i)) ,
(1)
where δ(x) denotes the Dirac delta distribution. Having
defined the PDF for the observed similarities fθ(x), we
can now define the main Soft-Margin inference expression
as:
P ( ~R = ~r∗Θ = θ) = Z 1
0
wa(x) fθ(x)dx,
(2)
where wa(x) is a weighting function. We use the following
Gaussian weighting form: wa(x) = exp(−(x−1)2/a2). In
the limit where the parameter a → 0, we obtain the direct
Monte-Carlo likelihood estimation. For cases when the
parameter a > 0, we obtain an estimator which estimates
the likelihood by using the weighting function wa(x) to
accept contributions from realizations whose similarity
to observed realization is less than 1. Using the property
of delta distribution, we simplify the expression for the
Soft Margin estimator to (for more details see SI section
5):
P ( ~R = ~r∗Θ = θ) =
1
n
exp(cid:18) −(ϕ( ~r∗, ~rθ,i) − 1)2
a2
(cid:19) .
n
Xi=1
(3)
Note, that alternative view on the Soft margin estimator
is the non-parametric density estimation with the Gaus-
sian kernels [22]. Finally, we do not need to set the Soft
Margin width parameter a in advance. After we calcu-
late the estimated PDF for every potential source Fθ(x),
we can choose the parameter a as the infimum of the
set of parameters for which the PDFs have converged.
The implementation details, time complexity analysis
and pruning mechanism for the Soft Margin estimator
can be found in the SI sections 5, 6 and 7.
RESULTS
We now demonstrate the applicability of our inference
framework to detect the source of the simulated STI epi-
demic spreading in an empirical temporal network of sex-
ual contacts in Brazil (see Figure 3 plot A). This pub-
licly available dataset [23] was obtained from Brazilian
Internet community and is used as an approximation of
temporal sexual contacts. The dataset (see SI section 8)
consists out of the triplets (vi, vj, t), which represents the
event that the nodes vi and vj had a sexual interaction at
FIG. 2. Plots A, B and C: Box plots depicting distribution
of entropy values (H) of source probability distributions for a
number of realizations starting from the central node denoted
with red colour on the 4-connected lattice with different sizes
(3 × 3, 5 × 5 and 7 × 7) with the SIR model for q = 0.5, T = 5
and different p values, calculated with the Soft Margin method
with the (104 - 106) simulations per source and adaptive a
chosen from the convergence condition.
even for different spreading models (SI, ISS, IC) and we
observe the interplay of the network size and stopping
time T on the detectability (see SI section 10 and Fig-
ure 2). In Figure 2, plot A, we observe that in a regime,
when the network size restricts the epidemic spreading
but not the epidemic itself via its natural evolution char-
acterized by the parameters (p, q) or stopping time T , the
entropy is high as the realizations from different sources
are almost identical.
As application of direct Monte-Carlo and analytical
combinatoric approaches becomes prohibitively expen-
sive for realistic network sizes, we formulate an estimator
which is much more efficient in approximating the true
underlying source probability distribution for the partic-
ular epidemic spread. We continue with the definition
of the Soft-Margin estimator, a generalization of the
Monte-Carlo inference method, in which direct Monte-
Carlo method represents a limiting case. In order to pro-
ceed we first need to introduce some useful definitions.
The random binary vector ~Rθ describes the outcome of
epidemic process and sample vectors: {~rθ,1, ..., ~rθ,n} de-
scribe n independent outcomes of that process. Each
sample vector ~rθ,i is obtained using the Monte Carlo sim-
ulation of the contagion process with the θ as the source.
We measure the similarity between vectors ~r1 and ~r2 by
the Jaccard similarity function ϕ : (RN × RN ) → [0, 1]
calculated as the ratio of the size of the interaction of set
of infected nodes in ~r1, ~r2 and the size of their union.
The random variable ϕ( ~r∗, ~Rθ) measures the similarity
4
by marginalization procedure (see SI section 5). The re-
laxation of knowing the starting point of the epidemic t0
is done by using the marginalization over time, sampling
over all possible starting points t0 from a uniform prob-
ability distribution over [t0 − ǫ, t0 + ǫ], 2ǫ = {0, 50, 100}
days. In Figure 3 plot C, we show the summary results
from 500 independent experiments, when the starting
time t0 was chosen from the interval of [100 − 200] days,
the end of the epidemic was set to the day t = 300 and
using different uniform priors (ǫ) for the moment t0. Us-
ing the uniform uncertainty of ǫ = 50 days, we can still
detect the source within its first neighbourhood (distance
0 and 1 from the source) in approximately 60% of exper-
iments. These results are of great practical importance,
since in reality we do not know the exact starting times,
but rather only an upper and a lower bound on starting
point.
Next, we demonstrate how the uncertainty in the tem-
poral orderings of interactions within a time window of
the length ∆ affects the performance of source detection.
We use a randomization algorithm which permutes time
stamps inside of a bin of ∆ days from the start to the end
of the contact interaction network in a non-overlapping
way. From Figure 3, plot D, we observe that higher un-
certainty in orderings (higher ∆) reduces the detectabil-
ity of the source of infection. However, the estimation
framework is robust to small-scale interaction noise.
We have also shown that our Soft Margin algorithm es-
timates source probabilities with much higher precision
than other estimators (Jordan and DMP estimator) on
benchmark cases by comparing the results against the di-
rect Monte-Carlo source probability estimations on regu-
lar lattice (see SI section 3). Results for source detection
for different values of (p, q) parameters and for the case
when only a random subset of the node states is observed
can be found in SI section 9.
DISCUSSION
The assumption about missing dynamic information
about times of infection or recovery in our case study
seems rather plausible for two realistic cases: STI infec-
tions and computer viruses. Many STIs generate silent
epidemics since many of them are unrecognized, asymp-
tomatic or subclinical as the pathogens are being trans-
mitted from patients with mild or totally absent symp-
toms. A large number of people with STIs: chlamydia
[24], gonorrhea [24], Human papillomavirus and other
show mild or no symptoms at all. The second motivation
comes from silent spreading of a certain class of computer
viruses and worms through computer networks which be-
come active simultaneously on a specific date. Unlike
other approaches [12 -- 21], we identified different source
detectability regimes and our methodology is applicable
to arbitrary network structures, and is limited solely by
FIG. 3. Plot A: Visualization of a part of the aggregated em-
pirical temporal network of sexual contacts in Brazil [23]. In
plots B,C and D the performance is measured as the fraction
of 500 experiments with specific graph distance of the max-
imum likelihood candidate to the true source. The average
execution time of a single experiment to calculate source prob-
ability distribution over all potential candidates was around
12 seconds (on 50 cpu cores) with 20000 STI simulations per
node. Plot B: The baseline performance of a random esti-
mator, which uniformly assigns likelihood to potential nodes.
Plot C: The influence of prior knowledge about initial out-
break moment [t0 − ǫ, t0 + ǫ] of the outbreak on performance.
Plot D: The influence of randomized temporal ordering of in-
teractions within ∆ days, with ǫ = 0 (we know the starting
time t0) on performance.
a time t. First 1000 days in original dataset are discarded
due to the transient period with sparse encounters [23]
and therefore all temporal moments are measured rela-
tive to day 1000, as have done the authors in the original
study [23]. For our temporal network, we use the SIR
model (p = 0.3, q = 0.01) for STI. The upper limit of the
transmission probability for the STI that was previously
used on this contact network is p = 0.3 [23]. The recovery
parameter q = 0.01 represents a disease with the mean
recovery of 100 days.
Note that here the calculation of exact source proba-
bility distributions is computationally too demanding for
both the direct Monte-Carlo and the analytical combina-
toric method. Therefore, we use the Soft Margin esti-
mator with the smallest width a for which the ML node
probability estimate converged. Our experiments consist
of two parts: (i) simulation of STI spreading through a
temporal network of sexual contacts and (ii) detection of
the patient zero from the observed process.
In order to demonstrate applicability of the approach
in realistic conditions, we introduce uncertainty in the
epidemic starting time t0, and later on also with respect
to node states in observed epidemic realization. Note,
that uncertainties in (p, q) parameters can also be relaxed
the ability to computationally produce realizations of the
particular contagion process.
ACKNOWLEDGMENTS
The authors would like to thank: Professor Dirk
Brockmann for valuable discussions about the epidemic
source detection problems during internship of NAF at
the Robert Koch-Institute in Berlin, Germany. For
proofreading the manuscript we would like to thank:
Vinko Zlati´c, Sebastian Krause and Ana Bulovi´c. The
work is financed in part by: the Croatian Science Founda-
tion under the project number I-1701-2014, the EU-FET
project MULTIPLEX under the grant number 317532
and the FP7-REGPOT-2012-2013-1 InnoMol project un-
der the grant number 316289.
Disclaimer: The authors of this study used the pub-
lished existing dataset of sexual contacts in high-end
prostitution because it contains valuable and rarely avail-
able information on temporal network of contacts serving
as pathways of STD spreading. It is important to note
that the use of this dataset does not reflect the authors'
views, opinions and attitudes on prostitution and it does
not in any way imply that the authors support the activ-
ities documented in the dataset or the way the data were
gathered.
∗ Corresponding mail: [email protected]
[1] A. Vespignani, Nat Phys 8, 32 (2012), ISSN 1745-2473,
URL http://dx.doi.org/10.1038/nphys2160.
[2] W. Broeck, C. Gioannini, B. Goncalves, M. Quag-
and A. Vespignani, BMC
(2011), URL
giotto, V. Colizza,
Infectious Diseases
http://www.biomedcentral.com/1471-2334/11/37.
(2011)
11,
37
C. M.
Schneider,
[3] M. Tizzoni, P. Bajardi, A. Decuyper, G. Kon
V. Blondel,
Kam King,
and V. Colizza,
Z. Smoreda, M. C. Gonzlez,
PLoS Comput Biol 10,
(2014), URL
http://dx.doi.org/10.1371%2Fjournal.pcbi.1003716.
and A. Vespig-
URL
[4] V. Colizza, R. P.
Phys
Satorras,
3,
nani,
http://dx.doi.org/10.1038/nphys560.
e1003716
(2007),
Nat
276
[5] C. Castellano and R. Pastor-Satorras, Phys Rev Lett
105, 218701 (2010).
[6] R. Pastor-Satorras and A. Vespignani, Phys. Rev. Lett.
86, 3200 (2001).
[7] N.
Antulov-Fantulin,
A.
Lancic,
fancic,
and M.
Sikic,
Information
H.
Ste-
Sciences
239,
http://dx.doi.org/10.1016/j.ins.2013.03.036.
ISSN 0020-0255,
(2013),
226
5
URL
[8] M. Worobey, G.-Z. Han, and A. Rambaut, Pro-
Sciences
ISSN 1091-6490, URL
ceedings
pp.
http://dx.doi.org/10.1073/pnas.1324197111.
the National Academy
201324197+ (2014),
of
of
[9] X. Du, L. Dong, Y. Lan, Y. Peng, A. Wu,
Y. Zhang, W. Huang, D. Wang, M. Wang, Y. Guo,
et al., Nature Communications 3, 709 (2012), URL
http://dx.doi.org/10.1038/ncomms1710.
and
9,
S. D. W.
[10] E. M. Volz
Biol
PLoS
Comput
URL
http://dx.doi.org/10.1371%2Fjournal.pcbi.1003397.
[11] D. M. Auerbach, W. W. Darrow, H. W. Jaffe,
of
ISSN 0002-9343, URL
and J. W. Curran, The American Journal
Medicine 76, 487
http://dx.doi.org/10.1016/0002-9343(84)90668-5.
Frost,
(2013),
e1003397
(1984),
[12] D. Shah and T. Zaman,
the
on
ACM SIGMETRICS
Measurement
systems
(ACM, New York, NY, USA, 2010), SIGMETRICS
'10,
ISBN 978-1-4503-0038-4, URL
http://doi.acm.org/10.1145/1811039.1811063.
in Proceedings of
conference
and modeling
pp. 203 -- 214,
international
computer
of
[13] W. Dong, W. Zhang, and C. W. Tan, in Proceedings of the
IEEE Intl. Symp. on Information Theory 2013 (2013),
URL http://dx.doi.org/10.1109/ISIT.2013.6620711.
[14] Z. Wang, W. Dong, W. Zhang, and C. W. Tan, SIGMET-
RICS Perform. Eval. Rev. 42, 1 (2014), ISSN 0163-5999,
URL http://doi.acm.org/10.1145/2637364.2591993.
in IEEE/ACM Transactions
(2014), vol.PP, no.99, pp.1, URL
on Networking
http://dx.doi.org/10.1109/TNET.2014.2364972.
[15] K. Zhu and L. Ying,
[16] P. C. Pinto, P. Thiran, and M. Vetterli, Phys-
ical Review Letters 109,
068702+ (2012), URL
http://dx.doi.org/10.1103/PhysRevLett.109.068702.
[17] A. Y. Lokhov, M. M´ezard, H. Ohta, and L. Zde-
012801 (2014), URL
borov´a, Phys. Rev. E 90,
http://link.aps.org/doi/10.1103/PhysRevE.90.012801.
A.
Altarelli,
[18] F.
A.
Phys. Rev. Lett.
http://link.aps.org/doi/10.1103/PhysRevLett.112.118701.
Dall'Asta,
Zecchina,
(2014), URL
Lage-Castellanos,
and
118701
Braunstein,
L.
R.
112,
[19] N. Antulov-Fantulin, A. Lancic, H. Stefancic, M. Sikic,
and T. Smuc, Proceedings of 2014 IEEE Eighth
and
International Conference
Self-Organizing Systems Workshops
(2014), URL
http://dx.doi.org/10.1109/SASOW.2014.35.
Self-Adaptive
on
[20] C. H. Comin
and
L.
da
Phys.
http://link.aps.org/doi/10.1103/PhysRevE.84.056105.
(2011),
056105
Rev.
84,
E
Fontoura Costa,
URL
[21] D.
Brockmann
and
D.
342,
http://dx.doi.org/10.1126/science.1245200.
(2013),
ISSN
1337
Helbing,
1095-9203,
Science
URL
[22] J. S. Marron and D. Nolan, Statistics & Probability Let-
ters 7, 195 (1988).
[23] L. E. C. Rocha, F. Liljeros,
and P. Holme,
PLoS Comput Biol 7,
(2011), URL
http://dx.doi.org/10.1371%2Fjournal.pcbi.1001109.
[24] E. L. Korenromp et al., Int J STD AIDS 13, 91 (2002).
e1001109
|
1506.01760 | 1 | 1506 | 2015-06-05T01:13:54 | Predicting Neighbor Distribution in Heterogeneous Information Networks | [
"cs.SI",
"physics.soc-ph"
] | Recently, considerable attention has been devoted to the prediction problems arising from heterogeneous information networks. In this paper, we present a new prediction task, Neighbor Distribution Prediction (NDP), which aims at predicting the distribution of the labels on neighbors of a given node and is valuable for many different applications in heterogeneous information networks. The challenges of NDP mainly come from three aspects: the infinity of the state space of a neighbor distribution, the sparsity of available data, and how to fairly evaluate the predictions. To address these challenges, we first propose an Evolution Factor Model (EFM) for NDP, which utilizes two new structures proposed in this paper, i.e. Neighbor Distribution Vector (NDV) to represent the state of a given node's neighbors, and Neighbor Label Evolution Matrix (NLEM) to capture the dynamics of a neighbor distribution, respectively. We further propose a learning algorithm for Evolution Factor Model. To overcome the problem of data sparsity, the learning algorithm first clusters all the nodes and learns an NLEM for each cluster instead of for each node. For fairly evaluating the predicting results, we propose a new metric: Virtual Accuracy (VA), which takes into consideration both the absolute accuracy and the predictability of a node. Extensive experiments conducted on three real datasets from different domains validate the effectiveness of our proposed model EFM and metric VA. | cs.SI | cs |
Predicting Neighbor Distribution in Heterogeneous Information Networks
Yuchi Ma∗
Ning Yang†
Chuan Li‡
Lei Zhang§
Philip S. Yu¶k
Abstract
Recently, considerable attention has been devoted to the
prediction problems arising from heterogeneous information
networks. In this paper, we present a new prediction task,
Neighbor Distribution Prediction (NDP), which aims at
predicting the distribution of the labels on neighbors of a
given node and is valuable for many different applications in
heterogeneous information networks. The challenges of NDP
mainly come from three aspects: the infinity of the state
space of a neighbor distribution, the sparsity of available
data, and how to fairly evaluate the predictions. To address
these challenges, we first propose an Evolution Factor Model
(EFM) for NDP, which utilizes two new structures proposed
in this paper, i.e. Neighbor Distribution Vector (NDV) to
represent the state of a given node's neighbors, and Neighbor
Label Evolution Matrix (NLEM) to capture the dynamics of
a neighbor distribution, respectively. We further propose a
learning algorithm for Evolution Factor Model. To overcome
the problem of data sparsity, the learning algorithm first
clusters all the nodes and learns an NLEM for each cluster
instead of for each node. For fairly evaluating the predicting
results, we propose a new metric: Virtual Accuracy (VA),
which takes into consideration both the absolute accuracy
and the predictability of a node. Extensive experiments
conducted on three real datasets from different domains
validate the effectiveness of our proposed model EFM and
metric VA.
1 Introduction
As part of the recent surge of research on information
networks, considerable attention has been devoted to
prediction problems in heterogeneous information net-
works. The existing researches, however, mainly focus
just on the predictions around a single link. For exam-
∗School of Computer Science, Sichuan University, Chengdu,
China. [email protected]
†Corresponding author. School of Computer Science, Sichuan
University, Chengdu, China. [email protected]
‡School of Computer Science, Sichuan University, Chengdu,
China. [email protected]
§School of Computer Science, Sichuan University, Chengdu,
China. [email protected]
¶Department of Computer Science, University of Illinois at
Chicago, Chicago, USA. [email protected]
kInstitute for Data Science, Tsinghua University, Beijing,
China.
ple, some works are interested in predicting whether or
when a link will be built in the future [4, 6, 7, 16, 14, 12],
and some works concern predicting strength of a link,
such as predicting the ratings that customers will give to
items or locations [9, 11, 3, 2]. Existing researches sur-
prisingly pay little attention to the prediction of neigh-
bor distributions, where states of neighbors are consid-
ered as a whole.
Romance Action Crime
Movie Genre :
Romance
Movie 1
User A
Movie Genre :
Action Crime
Movie 2
Neighbor Distribution
of User A
Figure 1: Neighbors Distribution
Fig. 1 offers an illustration of neighbor distribution.
The left part of Fig. 1 illustrates User A has two movie
nodes as its neighbors, which means User A rented two
movies. The neighbor distribution of node User A is the
distribution of labels on its neighbor nodes, as shown by
the right part of Fig. 1, where the neighbors of a given
node have equal weight, and the weight of a neighbor
node is uniformly divided by its labels.
The neighbor distribution of a node usually evolves
over time. For example, a user might rent movies of
different genres as his/her taste changes. Such evolution
makes the prediction of neighbor distributions valuable
for many different applications.
if
Motivating Example For an online sports video
provider, the type distribution of subscribers is crucial
to develop its sales strategy. The provider may be
misled,
it only takes the recent sales data into
consideration, and ignores the evolutionary feature of
the type distribution. For example, the soccer fans are
the major subscribers on May 2014, which may lead
the provider to put more soccer advertisements online.
However, the soccer fans are increasing slowly on May,
and become the major subscribers on June 2014, as the
opening of four-yearly soccer celebration "World Cup".
Traditional recommender system methods may ignore
the tiny increase of soccer fans on May.
In this paper, we aim at the problem of predict-
ing the neighbor distribution of a given node in a het-
erogeneous information network, which has three main
challenges we have to overcome:
propose a prediction metric in Section 4. We present the
experimental results and analysis in Section 5. Finally,
we discuss related works in Section 6, and conclude in
Section 7.
• Infinite state space of neighbor distribu-
tions Since the fraction of a label is a real value, the
number of possible states of a neighbor distribution is
theoretically infinite. Traditional temporal models such
as Markov chain cannot serve our goal because they of-
ten assume a finite state space.
• Sparsity of heterogeneous links In most cases,
the links between one specific node and its heteroge-
neous neighbors are relatively sparse compared with
the huge volume of a whole data set, e.g., "publish-
ing" in DBLP, "rating" in Netflix and "checking in"
in Foursquare. The sparsity of links between heteroge-
neous nodes makes it harder to mine sufficient mean-
ingful patterns for individuals.
• Fairly evaluating predictions Not all nodes are
equally predictable, hence the traditional metrics that
just take absolute accuracy into account are unable to
appropriately assess the predictions for the nodes that
are less predictable. We need a new metric that can
treat every node fairly.
In this paper, inspired by the idea of Factor Model
[17, 18], we propose an Evolution Factor Model (EFM)
to accurately predict neighbor distributions from the
sparse data. Our main contributions can be summarized
as follows:
(1) We introduce an Evolution Factor Model (EFM) for
accurately predicting neighbor distributions. EFM
employs our proposed data structures, Neighbor
Distribution Vector (NDV) and Neighbor Label
Evolution Matrix (NLEM), to represent the infinite
state space of a neighbor distribution and capture
the evolution of neighbor distributions respectively.
(2) We propose a new prediction metric, Virtual Ac-
curacy (VA), which takes into consideration both
the absolute accuracy and the difficulty of a pre-
diction to fairly evaluate the prediction results of
nodes with different predictabilities.
(3) We conduct extensive experiments on three real
datasets, and compare EFM with an empirical
method and two existing methods. The results
validate the performance of our proposed model,
algorithm and accuracy metric.
The rest of this paper is organized as follows.
We give the problem definition and formalization in
Section 2.
In Section 3, we describe our prediction
model EFM, and further present the learning algorithm
for EFM. We discuss the predictability of nodes and
2 Problem Definition
2.1 Heterogeneous Information Network A het-
erogeneous information network contains multiple types
of objects and links.
In this paper, we only consider
those heterogeneous information networks with star net-
work schema [13], i.e., links only exist between the cen-
ter type of nodes as target nodes, and several other
types of nodes as attribute nodes. For example, in
Location Based Social Network, the target nodes are
users, and the attribute nodes can be venues, ratings or
tips.
We denote the heterogeneous information networks
with star network schema by G = hV, Ei, where V is
the node set and E is the link set. We denote the
target and attribute node set by X ⊂ V and U ⊂ V
respectively. The nodes and the links in networks are
being constructed and destructed over time.
In order
to capture the dynamics, we use time window, which
is denoted by T , to capture the neighbor distribution
with timeliness from dynamic networks. The node set
and the attribute node set in T are denoted by VT and
UT . We use Th, Tc and Tf to represent the historical,
current and future time windows respectively.
2.2 Label Distribution Vector
Assuming the universal label set of a given attribute
node set U is denoted by βU = nβ(1)
U
, ..., β(i)
U
, ..., β(n)
U o,
where β(i)
is a label, and n is the number of label types,
U
the definition of label distribution vector is given as
follow:
Distribution
Definition 2.1. Label
Vector
(LDV) For a given attribute node u ∈ U, its LDV,
−→v u ∈ Rn, is defined as:
−→v u = (v(1)
u , ..., v(n)
u , ..., v(i)
u ),
(2.1)
where n is the number of all attribute nodes' label types;
Iu(β(i)
U )
) is 1 if u has the label β(i)
v(i)
u =
k=1 Iu(β(k)
U
U )
and 0, otherwise.
, Iu(β(i)
U
Pn
,
LDV measures the label distribution of an attribute
node, which is fixed. For example, the labels of an
article are subject areas, thus the LDV depicts the
direction of this article.
2.3 Neighbor Distribution Vector
Definition 2.2. Neighbor Distribution Vector
(NDV) For a given target node x ∈ X , the NDV of
x's attribute node neighbors U′T ⊆ UT in time window
T , −→w x(U′T ) ∈ Rn, is defined as:
(2.2)
x , ..., w(n)
x ),
−→w x(U′T ) = (w(1)
Pu∈U ′
T+n
U ′
(v(i)
where n is the number of the given attribute nodes' label
types; w(i)
u )+1
x =
T
, i ∈ [1, n].
Hereinafter, we just denote a NDV by −→w x if the
context is unambiguous. Note that: (1) For smoothing,
we add 1 in the numerator and n in the denominator
of w(i)
x . (2) A node has an NDV corresponding to each
different type of attribute node neighbors. For example,
in DBLP, there are two type of attribute nodes, which
are "Articles" and "Journals"; therefore, the target
node "Scholar" should have two NDVs, one for its
"Article" neighbors and the other for its "Journal"
neighbors.
2.4 Problem Statement
Based on NDV, we can formally state the problem of
Neighbor Distribution Prediction (NDP) as follow :
Assigned the historical, current and future time
window Th, Tc and Tf respectively, given a target node
x and its NDV of x's attribute node neighbors U in time
window Th and Tc, we want to predict −→w x(U′Tf
).
3 Evolution Factor Model
In this section, we describe our Evolution Factor Model
(EFM). At first, we briefly introduce the basic idea of
Factor Model.
3.1 Evolution Factor Model
Recommender system methods based on latent factor
matrix model take the data in historical and current
time window as a whole, but dismiss the evolution of the
network. In order to capture the dynamics, Evolution
Factor Model first stores the probability of changes
from one label to another, which leads to the following
definition of Neighbor Label Evolution Matrix (NLEM).
Definition 3.1. Neighbor Label Evolution Ma-
trix For a given node x, its Neighbor Label Evolution
Matrix of attribute nodes U from time window Tp to Tq,
∈ Rn×n, is a matrix in which a
denoted by L
cell Lx(i, j) is the probability that x's neighbor label
changes from β(j) to β(i), i.e.,
<U ′
,U ′
Tp
Tq
>
x
(3.3)
Lx(i, j) = P (β(i)β(j)).
the transformation of its historical NDV, −→w x(U′Th+Tc)
<U ′
x
Th
,U ′
Tc
>
, which leads to our EFM
through its NLEM L
as follows:
(3.4)
−→w x(U′Tf
) = L
<U ′
x
Th
,U ′
Tc
>
× −→w x(U′Th+Tc).
DB
ML
DM
IP
DB
ML
DM
IP
DB ML DM IP
0.251
Scholar A
DB
ML
DM 0.22 0.22 0.55 0.02
IP
0.058
NLEM
Scholar B
The Predicted NDV
DB
ML
DM
IP
DB
ML
DM
IP
0.7
0.2
0.1
0
Scholar A
0
0.2
0
0.8
Scholar B
The Historical NDV
Figure 2: An example of Evolution Factor Model
Fig.
2 gives an example that shows how EFM
In Fig. 2, there are four labels representing
works.
different research directions: DB (Data Base), ML (Ma-
chine Learning), DM (Data Mining), IP (Image Process-
ing). A cell (i, j) of NLEM represents the probability
that scholars change their research directions from i to
j. By given an NLEM learned from historical data, and
the current NDVs of Scholar A and Scholar B, we can
infer their next NDVs by transforming their historical
NDVs by the learned NLEM.
Note that the essence of the matrix product in EFM
is different from that in a general factor model.
In a
general factor model, the matrix product is static, which
consider the data in historical and current time window
as a whole.
In contrast, NLEM, in our EFM, which
can capture the changes from historical time window to
current time window agilely, and changes as the given
target node's neighbor labels evolve over time.
3.2 Model Learning
To overcome the issue of data sparsity, in the light of the
heuristic knowledge that similar individuals have similar
behaviors, we first apply a clustering algorithm to all the
target nodes, and learn the NLEM for the cluster which
x belongs to. According to this idea, given target node
x and the node set X ′ consisting of the nodes belonging
to the same cluster of x, we can learn NLEM as follow:
Evolution Factor Model Based on NLEM, for a
) as
given target node x, we can predict its NDV −→w x(U′Tf
(3.5)
L
<U ′
x
Th
,U ′
Tc
>
= argmin
L X
x′∈X ′
ǫ2,
).
where ǫ = c−→w x′(U′Tc ) − −→w x′ (U′Tc), L ∈ Rn×n,
c−→w x′(U′Tc ) = L × −→w x′(U′Th
Note that c−→w x′(U′Tc ) is an estimate of −→w x′(U′Tc ) for
target node x′. So NLEM is actually defined as the
optimal matrix that minimizes the overall error of the
estimates over all target nodes in X . Thus, for learning
NLEM, we adopt least square method to establish linear
regression, indicating the NDVs in Th and Tc as follows:
the similarities are measured by Euclidean distances
between NDVs. The selection of K is discussed in
Section V.
3.3 Prediction
Given a target node x, its NDV −→w x(U′Th+Tc ) and the
, the prediction of −→w x(U′Tf
learned NLEM L
can be made by EFM(Equation (3.4)).
<U ′
,U ′
Th
Tc
>
)
x
<U ′
x
Th
,U ′
Tc
>
= (X T X)−1X T Y,
4 Prediction Metric
(3.6)
L
where
)
...
X =
X (1) = −→w x(1) (U′Th
X (N ) = −→w x(N ) (U′Th
Y =
Y (1) = −→w x(1) (U′Tc )
Y (N ) = −→w x(N )(U′Tc)
...
)
,
.
The learning algorithm for EFM is shown in Algorithm
1.
Algorithm 1
(x, Th, Tc,XTh ,XTc ,U, K)
INPUT:
Learning Algorithm for EFM
x: A given node;
Th: Assigned historical time window;
Tc: Assigned current time window;
XTh : A subset of X in time window Th;
XTc : A subset of X in time window Tc;
U: The given attribute node set;
K: The parameter of K-means;
OUTPUT:
,U ′
<U ′
Th
Tc
L
x
>
: The NLEM needed to be learned;
) and −→w x′(U′Tc );
tween −→w x′(U′Th );
1: X ′ = Φ, X = 0, Y = 0, W = {x′ x′ ∈ XTh ,XTc};
2: for each x′ ∈ W do
3: Compute −→w x′(U′Th
4: end for
5: Do K−means on W based on the similarities be-
6: X ′ = {the nodes of the cluster that x belongs to};
7: for i = 1 to X ′ do
8: X (i) = −→w x(i) (U′Th
);
Y (i) = −→w x(i) (U′Tc );
,U ′
according to Equation (3.6),
where inverse matrix is computed by Gauss Jordan
method;
9:
10: end for
11: Compute L
<U ′
Th
Tc
>
x
In our learning algorithm, any classical clustering
algorithm is qualified for our learning algorithm. We
choose K-means as the clustering algorithm, where
4.1 Normalized Absolute Accuracy
We can intuitively measure the absolute accuracy of pre-
dictions for the given node x in terms of the Euclidean
distance between a true −→w x and its estimate c−→w x.
By Definition 2, components of an NDV are positive
and the sum of them is equal to 1, so the Euclidean
distance between any two NDVs is less than or equal
to √2. Then we can define the normalised absolute
accuracy as follow:
(4.7)
ηx = 1 − d( b−→w x,−→w x)
√2
,
where d(c−→w x,−→w x) is the Euclidean distance between c−→w x
and −→w x.
4.2 Predictability
As we have mentioned, it is unfair to assess a prediction
just in terms of absolute accuracy, since the predictabil-
ity of nodes are different.
Intuitively, the predictability of a node is relevant
to its susceptibility to the similar homogeneous nodes.
Specifically, the easier the node can be influenced by
others, the more disordered its temporal pattern is, and
the greater its predictability is. For example, in a given
research field, the leading scholars' directions are dif-
ficult to capture, because they change their research
directions rarely and such changes are mainly break-
throughs. These changes can hardly be predicted com-
pared with their long-term stable studies. In contrast,
the research direction of a PhD candidate is more likely
influenced by his/her supervisor or the leading scholars.
Inspired by this observation, we can define Prediction
Difficulty as the measure on how difficult to predict a
given node's NDV.
Definition 4.1. Prediction Difficulty (PD) For a
node x, the prediction difficulty of its NDV of attribute
node neighbors U′T in time window T , denoted by
gx(U′T ) is defined as:
gx(U′T ) = 1 − hx(U′T )/2,
where hx(U′T ) is the temporal entropy of x's NDV in
time window T , and
hx(U′T ) = −Pn
i=1 w(i)
x (U′T )lognw(i)
x (U′T ).
i=1
Note that, w(i) ∈ (0, 1), so hx(U′T ) > 0, and
when w(i) = 1/n,∀i ∈ [1, n], hx(U′T ) reaches the
maximum, which equals −Pn
1
1
n = 1. Thus,
n logn
hx(U′T ) ∈ (0, 1] and gx(U′T ) ∈ [1/2, 1).
In Definition
4, we use temporal entropy hx(U′T ) to measure how
disordered a node's temporal pattern is. We can
see the more disordered the temporal pattern, the
greater the temporal entropy, and consequently the
less the prediction difficulty, which is in line with our
expectation.
4.3 Virtual Accuracy
Now we further define Virtual Accuracy based on abso-
lute accuracy and prediction difficulty as follow:
Definition 4.2. Virtual Accuracy (VA) For a pre-
diction of −→w x(U, Tf ), its Virtual Accuracy, denoted by
δx, is defined as:
(4.8)
δx = ηx × gx,
where ηx is the absolute accuracy and gx is the predic-
tion difficulty.
As Equation (4.8) shows, we define VA of a predic-
tion as the product of the absolute accuracy and the
predictability of that prediction. Since ηx and gx are
both nonnegative, it is obvious that VA favors the pre-
dictions whose absolute accuracy and difficulty are both
great. As we can see in later experiments, ηx is nega-
tively correlated with gx. Thus even the absolute accu-
racy of a difficult prediction is low, the VA of it can still
be expected be not low since its prediction difficulty is
large. On the other hand, even the absolute accuracy
of an easy prediction is high, the VA of it is expected to
be low due to its small prediction difficulty.
5 Experimental Evaluation
5.1 Datasets
We learn the NLEM from the NDVs in Th and Tc. For
predicting neighbor distribution, we take the NDVs in
Th + Tc as training set, and the NDVs in Tf as test set.
The datasets we use to validate our model and
algorithm are from three different domains, DBLP (a
Coauthor Network), Netflix (a Movie Rental Network),
and Foursquare (a Location Based Social Network).
The summary of datasets is shown in Table 1
DBLP [15] indexes more than about 230 million
articles and contains massive links to home pages of
computer scientists. The labels of "Article" contain
25 directions on Computer Science, thus an NDV of
a "Scholar" node consists of 25 components. By as-
signed historical, current and future time window Th =
[2006, 2010), Tc = [2010, 2011) and Tf = [2011, 2012],
we randomly select 1000 scholars who published arti-
cles in all the three time window.
Netflix [1] contains about more than 100 million
rating records from about 480, 000 customers over about
17, 000 movie titles. The labels of "Movie" contain
28 genres crawled from the website IMDb [5], thus
an NDV of a "User" node consists of 28 components.
By assigned historical, current and future time window
Th = [Apr.12th 2005, Oct.12th 2005), Tc = [Oct.12th
2005, Nov.12th 2005) and Tf = [Nov.12th 2005, Dec.12th
2005], we randomly select 1, 000 users who have movie
rating records in all the three time window.
Foursquare[2] involves about 4.3 million friend-
ships and about 80, 000 check-in tips of users during
3 years. The labels of "Venue" contain 8 categories
given by Foursquare. By assigned historical, current
and future time window Th = [0
day), Tc
= [966
day], we randomly select 500 users who have check-in
records during in all the three time window.
day) and Tf = [996
day, 1026
day, 996
day, 966
th
th
th
th
th
th
5.2 Baseline
In order to demonstrate the effectiveness of our EFM,
we compare our method with the following baseline
methods:
• MVM (Mean Value Method) MVM is an empirical
method. It takes the mean of the latest NDVs of the
nodes in the cluster that the predicted node belongs
to, as the estimate of the next NDV of a given node.
• MF (Basic Matrix Factorization)[17] MF is proposed
by B. Webb to solve the movie recommender problem
in Netflix Price. MF assumes the features of objects
can be expressed as a series of factors, and different
types of objects have factors with the same amount.
When predicting the preference of the given objects
of type A for the objects of type B, the preferences
(which is called "ratings" in many cases) can be
expressed as the product of the factors of the given
objects of type A and B. The general expression of
factor model is:
(5.9)
R = P QT ,
where P ∈ RN×D is the factor matrix of the objects
of type A. Q ∈ RM×D is the factor matrix of objects
of type B. N and M are the number of the objects
of type A and the number of the objects of type B,
respectively. D is the factor number.
Dataset
Network
The type of
The type of
#Neighbor's lables #Predicted Nodes
predicted nodes
predicted node's neighbors
DBLP
Netflix
Foursquare
heterogeneous
heterogeneous
heterogeneous
author
user
user
paper
movie
venue
25
28
8
1000
1000
500
Table 1: Summary of Datasets.
• BiasedMF (Biased Matrix Factorization)[9] Bi-
asedMF is proposed by Paterek, which is an exten-
sion of Basic Matrix Factorization. BiasedMF adds
biased rates to the objects of either type. The pre-
diction formula is:
(5.10)
ru,m = bu + bm +Pn
k=1 pu,k · qm,k,
where ru,m is an estimate of rate that the object u
of type A gives to the object m of type B. The pu,k
and qm,k are the cells of the factor matrixes of type
A and type B respectively. bu and bm are the biases
of object u and m respectively.
In our experiments, we set the parameters of MF
and BiasedMF as learning rate η = 0.001 and punishing
parameter λ = 0.02, as suggested by Paterek [9] and
Gorrell et al.
[3]. We choose the number of NDV
components as the latent feature numbers in MF and
BiasedMF. Thus the feature numbers of DBLP, Netfilix
and Foursquare are 25, 28 and 8 respectively.
5.3 The Determination of K
Learning Algorithm for EFM requires the number of
clusters, K, as the input when it invokes a K-means
procedure, so we have to determine K before we start
our experiments. For each dataset, we first randomly
select 500 nodes from it, then apply our model to
make predictions for these nodes and choose the K
that maximizes the average absolute accuracy of the
predictions. As Fig. 3 shows, we finally get K = 5
for DBLP, K = 1 for Netflix, and K = 155, 156 for
Foursquare during [2 : 00, 3 : 00] and [11 : 00, 12 : 00]
respectively.
99.90%
66.60%
33.30%
y
c
a
r
u
c
c
A
e
t
u
l
o
s
b
A
DBLP
Netflix
90.00%
85.00%
80.00%
y
c
a
r
u
c
c
A
e
t
u
l
o
s
b
A
[2:00,3:00]
[11:00,12:00]
0.00%
1
34
67
k
100
75.00%
1
251
k
501
(a) DBLP and Netflix
(b) Foursquare
Figure 3: The Selection of K
5.4 The Validation of Predictability
Now we investigate how the absolute accuracy of a pre-
diction correlates with its prediction difficulty. For each
dataset, we first rank the nodes by PD in descending or-
der, then divide the nodes into five groups. The nodes
in a same group have equal PD. Finally we observe the
absolute accuracies by applying EFM and three baseline
methods, MVM, MF and BiasedMF, on the five groups
respectively.
The results are shown in Fig.
4. We can see
that the absolute accuracies of the methods we use in
the experiments decrease in overall with the increase
of the prediction difficulty. Such result validates our
assumption that the more disordered the temporal
pattern of a node is, the greater its predictability is.
It also shows the necessity to assess a model by a
fair metric which should take the predictability into
consideration.
Note that, on Foursquare, the absolute accuracies of
baseline methods do not decrease linearly with PD. It is
because the human's daily routines are not all the same,
which leads to the fluctuation of absolute accuracies
of baseline methods. The absolute accuracy of EFM,
however, has a linear decrease with PD. It is because
EFM is not limited to the recognition of daily pattern,
but instead takes the evolution regularity (represented
by the neighbor label evolution matrix in EFM) into
consideration. For example, the office workers who
like nightlife can go to the nightclub for sleepover only
on Weekends. For the nodes of that type, the two
empirical methods can not perform as expected because
the activities of sleepover on weekends are not common
to everyone (which is the reason why MVM's curve
fluctuates), or to an individual on everyday (which is the
reason why the curve of MF and BiasedMF fluctuate).
5.5 The Comparison between EFM and Base-
line Methods
In this part, we compare the virtual accuracy of EFM
with three baseline methods: MVM, MF and BiasedMF.
The summarized result is shown in Fig. 5 and the de-
tailed result is listed in Table 2. Our remarks on the
result are as follows:
100.00%
92.00%
84.00%
76.00%
94.00%
71.00%
48.00%
25.00%
y
c
a
r
u
c
c
A
e
t
u
l
o
s
b
A
y
c
a
r
u
c
c
A
e
t
u
l
o
s
b
A
84.00%
76.00%
68.00%
60.00%
0.0011
0.0117
0.0249
0.0339
0.1148
0.1680
0.1984
0.2220
0.2530
0.3224
Prediction Difficulty (PD)
Prediction Difficulty (PD)
(a) DBLP
(b) Netflix
99.60%
76.40%
53.20%
30.00%
0.3205
0.5133
0.6845
0.9492
0.9892
0.3718
0.5792
0.7731
0.9856
0.9918
Prediction Difficulty (PD)
Prediction Difficulty (PD)
(c) Foursquare [2:00, 3:00]
(d) Foursquare [11:00, 12:00]
EFM
MVM
MF
BiasedMF
which performs similarly to MVM on DBLP and
Netflix, but far worse on Foursquare.
(4) EFM outperforms MVM, MF and BiasedMF es-
pecially on Foursquare. This is because the three
baseline methods only pay attention to the daily
pattern (MVM) or the profile of users (MF and Bi-
asedMF). However, the activities in Foursquare are
limited to not only the daily pattern or profile of
users, but also the evolution regularity over weeks,
even months.
In summary, EFM is a robust and effective method.
The VA of EFM is generally better than all the baseline
methods.
Figure 4: The Relationship between Absolute Accuracy
and Prediction Difficulty on Three Datasets
6 Related Work
y
c
a
r
u
c
c
A
l
a
u
t
r
i
V
EFM
MVM
MF
BiasedMF
0.60
0.50
0.40
0.30
DBLP
Netflix
Foursquare
(2:00~3:00)
Foursquare
(11:00~12:00)
Figure 5: The Comparison of VA between EFM and
Baseline Methods
Method
DBLP
Netflix
EFM
MVM
MF
BiasedMF
0.5049
0.4359
0.4937
0.4360
0.4960
0.4216
0.4917
0.4217
Foursquare
[2:00, 3:00]
Foursquare
[11:00, 12:00]
0.5722
0.5179
0.3793
0.4381
0.5606
0.5032
0.3619
0.4852
Table 2: Virtual Accuracies of EFM, MVM, MF and
BiasedMF
(1) EFM performs far better than MVM on all the
datasets, while MVM has the worst performance
on the Netflix and DBLP datasets.
(2) Although having the worst performance on the
two Foursquare datasets, MF does have a good
performance on Netflix dataset comparing with
the other baseline methods, since MF is originally
proposed for the movie recommendation problem
in Netflix. EFM, however, still performs better
than MF, which is because EFM can take into
consideration not only the profile of the predicted
nodes, but also the evolution regularity.
(3) As shown in Fig. 5, EFM outperforms BiasedMF,
Three domains are relevant to our work, namely link
prediction, rating prediction and factor model.
[16]
Link Prediction: Hasan et al. [4] first introduces
supervised learning to predict whether a link will be
built in the future. Wang et al.
introduces
probabilistic model for link prediction. Leroy et al.
[6] solves the cold start problem in link prediction.
Lichtenwalter et al.
[7] proposes new perspectives and
methods in link prediction. Taskar et al.
[14] propose
a method to address the problem of link prediction in
heterogeneous networks, based on the observations of
the attributes of the objects. Sun et al.
[12] extends
the traditional link prediction to relationship prediction,
which not only predicts whether it will happen, but also
infers when it will happen. However, Sun's work, still
focuses on the predictions of a single link.
Rating Prediction (Recommender System):
Basically, the methods predicting ratings of links fall
into two categories: memory-based algorithms and
model-based algorithms. The memory-based algorithms
directly make predictions based on homogeneous neigh-
bors of a given node [8, 10, 19], while model-based al-
gorithms make predictions based on a prediction model
learned in advance. Savia et al.[11] proposes a predic-
tion model based on bayesian networks. These existing
methods pay insufficient attention to the evolution of
neighbor distributions.
Factor Model: Factor Model assumes the features
of objects can be expressed as a series of factors, which
is also called Matrix Factorization (MF). MF is first
proposed by Webb[17] to solve the movie recommender
problem in Netflix Price. Based on Webb's work,
G. Gorrell et al.[3] optimize the learning rate and
the punishing parameter in MF. Paterek [9] proposes
Biased Matrix Factorization (BiasedMF) to improve
the performance of MF. However, the existing methods
[8] G. Linden, B. Smith, and J. York. Amazon.com
recommendations: Item-to-item collaborative filtering.
2003.
[9] A. Paterek. Improving regularized singular value de-
composition for collaborative filtering. In Proceedings
of KDD cup and workshop, volume 2007, pages 5 -- 8,
2007.
[10] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl.
Item-based collaborative filteringrecommendation al-
gorithms. 2001.
[11] E. Savia, K. Puolamaki, and S. Kaski. Latent grouping
models for user preference prediction. Machine Learn-
ing, 74(1):75 -- 109, 2009.
[12] Y. Sun, J. Han, C. C. Aggarwal, and N. V. Chawla.
When will it happen? - relationship prediction in het-
erogeneous information networks. WSDM' 12, pages
663 -- 672, 2012.
[13] Y. Sun, J. Tang, J. Han, C. Chen, and M. Gupta.
Co-evolution of multi-typed objects in dynamic star
networks. IEEE TKDE, 2013.
[14] B. Taskar, M. fai Wong, P. Abbeel, and D. Koller. Link
prediction in relational data. NIP' 03, 2003.
[15] D. Team. Dblp. URL http://dblp.uni-trier.de/.
[16] C. Wang, V. Satuluri, and S. Parthasarathy. Local
ICDM' 07,
probabilistic models for link prediction.
pages 322 -- 331, 2007.
[17] B. Webb. Netflix update: Try this at home. URL
http://sifter.org/simon/journal/20061211.html.
[18] K. Yehuda, B. Robert, and V. Chris. Matrix factoriza-
tion techniques for recommender systems. Computer,
42(8):30 -- 37, 2009.
[19] K. Yu, A. Schwaighofer, V. Tresp, X. Xu, and H. P.
Kriegel. Probabilistic memorybased collaborative fil-
tering. IEEE TKDE, 16(1):56 -- 69, 2004.
can not capture the dynamics of neighbor distributions
agilely, which is exactly why we propose a new model
EFM for our goal.
7 Conclusion
In this paper, we present a new prediction problem,
Neighbor Distribution Prediction in heterogeneous in-
formation network. To address this problem, we pro-
pose an Evolution Factor Model (EFM), which takes
Neighbor Label Evolution Matrix (NLEM) as the dy-
namic factor, and predicts the next NDV of a given
node by transforming its current NDV by the NLEM.
We also propose a learning algorithm for EFM, which
learns the NLEM from the homogeneous nodes which
are in the same cluster as a given node.
For fairly evaluating the predictions made by differ-
ent methods, we propose Virtual Accuracy, which not
only measures the absolute accuracy, but also takes the
difficulty of a prediction into consideration.
We conduct the experiments on the datasets from
three different applications, and compare EFM with
three baseline methods: Mean Value Method, Basic
Matrix Factorization and Biased Matrix Factorization.
The results show EFM outperforms all the baseline
methods in overall.
Acknowledgments
This work is supported by the National Science Founda-
tion of China under Grant Nos. 61173099, 61103043 and
the Doctoral Fund of Ministry of Education of China
under Grant No. 20110181120062. This work is also
supported in part by NSF through grants CNS-1115234,
DBI-0960443, and OISE-1129076, and US Department
of Army through grant W911NF-12-1-0066.
References
[1] Netflix prize. URL http://www.netflixprize.com.
[2] J. Bao, Y. Zheng, and M. F. Mokbel. Location-based
and preference-aware recommendation using sparse
geo-social networking data. GIS 2012, 2012.
[3] G. Gorrell and B. Webb. Generalized hebbian algo-
rithm for incremental latent semantic analysis. In Pro-
ceedings of Interspeech, 2006.
[4] M. A. Hasan, V. Chaoji, S. Salem, and M. Zaki. Link
prediction using supervised learning. SDM' 06 work-
shop on Link Analysis, Counterterrorism and Security,
2006.
[5] IMDb. URL http://www.imdb.com/.
[6] V. Leroy, B. B. Cambazoglu, and F. Bonchi. Cold start
link prediction. KDD' 10, 2010.
[7] R. N. Lichtenwalter, J. T. Lussier, and N. V. Chawla.
New perspectives and methods in link prediction.
KDD' 10, 2010.
|
1304.6459 | 5 | 1304 | 2016-05-12T07:40:07 | Measuring Transport Difficulty of Data Dissemination in Large-Scale Online Social Networks: An Interest-Driven Case | [
"cs.SI",
"cs.NI"
] | In this paper, we aim to model the formation of data dissemination in online social networks (OSNs), and measure the transport difficulty of generated data traffic. We focus on a usual type of interest-driven social sessions in OSNs, called \emph{Social-InterestCast}, under which a user will autonomously determine whether to view the content from his followees depending on his interest. It is challenging to figure out the formation mechanism of such a Social-InterestCast, since it involves multiple interrelated factors such as users' social relationships, users' interests, and content semantics. We propose a four-layered system model, consisting of physical layer, social layer, content layer, and session layer. By this model we successfully obtain the geographical distribution of Social-InterestCast sessions, serving as the precondition for quantifying data transport difficulty. We define the fundamental limit of \emph{transport load} as a new metric, called \emph{transport complexity}, i.e., the \emph{minimum required} transport load for an OSN over a given carrier network. Specifically, we derive the transport complexity for Social-InterestCast sessions in a large-scale OSN over the carrier network with optimal communication architecture. The results can act as the common lower bounds on transport load for Social-InterestCast over any carrier networks. To the best of our knowledge, this is the first work to measure the transport difficulty for data dissemination in OSNs by modeling session patterns with the interest-driven characteristics. | cs.SI | cs | Measuring Transport Difficulty of Data Dissemination in
Large-Scale Online Social Networks:
An Interest-Driven Case
6
1
0
2
y
a
M
2
1
]
I
S
.
s
c
[
5
v
9
5
4
6
.
4
0
3
1
:
v
i
X
r
a
Cheng Wang, Zhenzhen Zhang, Jieren Zhou, Yuan He, Jipeng Cui, Changjun Jiang
Department of Computer Science and Technology
Tongji University, Shanghai, China
[email protected]
ABSTRACT
In this paper, we aim to model the formation of data dissem-
ination in online social networks (OSNs), and measure the
transport difficulty of generated data traffic. We focus on a
usual type of interest-driven social sessions in OSNs, called
Social-InterestCast, under which a user will autonomously
determine whether to view the content from his followees
depending on his interest. It is challenging to figure out the
formation mechanism of such a Social-InterestCast, since it
involves multiple interrelated factors such as users' social
relationships, users' interests, and content semantics. We
propose a four-layered system model, consisting of physi-
cal layer, social layer, content layer, and session layer. By
this model we successfully obtain the geographical distribu-
tion of Social-InterestCast sessions, serving as the precondi-
tion for quantifying data transport difficulty. We define the
fundamental limit of transport load as a new metric, called
transport complexity, i.e., the minimum required transport
load for an OSN over a given carrier network. Specifically,
we derive the transport complexity for Social-InterestCast
sessions in a large-scale OSN over the carrier network with
optimal communication architecture. The results can act
as the common lower bounds on transport load for Social-
InterestCast over any carrier networks. To the best of our
knowledge, this is the first work to measure the transport dif-
ficulty for data dissemination in OSNs by modeling session
patterns with the interest-driven characteristics.
Keywords
Online social networks, data dissemination, transport load,
fundamental limits, scaling behavior
1.
INTRODUCTION
As social networking services are becoming increasingly
popular, online social networks (OSNs) play a growing role
in individuals' daily lives. The user population of OSNs has
grown drastically in recent years. According to the research
proceeded by Statista1 demonstrated that the number of so-
cial network users worldwide in 2014 had reached 1.87 bil-
1One of the largest statistics portals, http://www.statista.com/
lion and estimated that there will be around 2.72 billion so-
cial network users around the globe in 2019 [1]. In addition,
people are spending more and more time on OSNs. For ex-
ample, in January 2015, GlobalWebIndex2 showed that the
average user spends 1.72 hours per day on social platforms,
which represents about 28 percent of all online activity [2].
What's more, various kinds of social applications are con-
stantly emerging, which are rendering an increasing user
population of OSNs and providing users with more types
of content to choose from, e.g., audios, videos, and pictures.
In addition, OSNs are covering a wider range around the
world. All of the factors involved above are resulting in the
heavy load imposed on the carrier communication network
of OSNs. Furthermore, the load in the OSNs will increase
continually with the expansion of OSNs.
Over a long period of time, this growth will give rise to
the limitation of Internet's bandwidth, so practically mea-
suring the load imposed by OSNs enjoys a crucial mean-
ing. To measure such a load, i.e., the load imposed on the
carrier communication network by the OSN, we first intro-
duce a metric called transport load.
It is defined as the
product of two key factors: data generating rate at users
and transport distance of messages. The former depends on
the format of message (e.g., text, picture, and video, etc.)
and the performance request in terms of quality of service
(e.g., throughput, latency, and deliver ratio, etc.). The lat-
ter is directly determined by the geographical distribution
of dissemination sessions and the communication architec-
ture of network. Both parameters are critical for measuring
the transport capacity of networks. To be specific, it is de-
fined as the product of bits and the transport distance over
which the data is successfully transported from the source
to the intended destinations.
In this work, we further de-
fine the fundamental limit of such transport load as transport
complexity, i.e., the minimum required transport load for an
OSN over a given carrier communication network. We note
that, unlike some classical performance metrics, e.g., net-
work capacity, the transport complexity is a metric to define
the fundamental transport difficulty of a specific data com-
2A market research firm running world's largest market research
study on the digital consumer, https://www.globalwebindex.net/
Transport Capability
of A Network
How well
a network can do
for a given application
of data transportation?
Transport Difficulty
of An Application
How difficult
for a given network
to make an application
of data transportation?
Transport Capacity
Transport Complexity
Maximum Achievable
Transport Throughput
Minimum Required
Transport Load
Figure 1: Transport Complexity vs. Transport Capacity.
They are the typical and intuitive metrics of the trans-
port difficulty of an application and the transport capa-
bility of a network, respectively. The transport capabil-
ity is the capability of a network in terms of data trans-
portation, while the transport difficulty is the inherent
difficulty of an application in terms of data transporta-
tion.
munication applications instead of the transport capability
of a given network for specific applications. Regarding the
essential difference between transport capacity of a network
and transport complexity of a data transport application, we
give an explicit explanation with the help of the illustration
in Figure 1.
For computing the transport load, the first thing is to comb
rightly the procedure of a data dissemination in OSNs. From
our perspective, the session can be divided into two suc-
cessive phases: Passive Phase and Initiative Phase. In the
passive phase, a source user holding a message sends the
digest of this message to all his followers. The followers
passively receive this digest. This process of such a dis-
semination just acts like a broadcast in all the followers of
this source user. We call this process Social-BroadCast, and
sessions generated in this process are straightforward called
Social-BroadCast sessions. In the initiative phase, according
to the interest, a user will autonomously determine whether
to download the complete message based on the digest of a
message from who he follows, [40]. We define such a dis-
semination process Social-InterestCast and sessions gener-
ated in this process are Social-InterestCast sessions. In our
work, the Social-InterestCast is defined by taking into ac-
count specific user interests and their effects on session gen-
eration. We give an intuitive explanation as follows: There
exists usually a user-message mapping between the user set
and message set, [43]. That is, when a user broadcasts a
message to others, only the users whose interests are con-
sistent with the topic of the message can be the potential
destinations. For example, if a user broadcasts a video mes-
sage characterized by several words (a digest or a title) in
his Facebook, only the followers who are interested in this
message will open the video file. It is convincing that this
behavior occurs due to an underlying user-message map-
ping. In fact, the transport load in the former process, i.e.,
the transport load for the Social-BroadCast has been inves-
tigated in [37], then our focus of this work is to model the
formation of a Social-InterestCast. Accordingly, we propose
a four-layered model consisting of the physical layer, social
layer, content layer, and session layer, as illustrated in Fig-
ure 2. Compared with the three-layered model in [37], this
model introduces a content layer where the relationship links
are defined as the semantic similarity among the messages.
We take an example shown in Figure 2 to explain this pro-
cedure: A user delivers a "Message 1". Then, all his four
followers can receive the glance (or say abstract) of "Mes-
sage 1". Finally, only two followers are filtered through the
content layer to act as the valid destinations due to their in-
terests to "Message 1".
After the preparations made above, we compute the trans-
port load. Recall its definition, we first need to investigate
the complex geographic characteristics of data dissemina-
tion sessions in OSNs, i.e., the spacial distribution of traf-
fic sessions (the location distribution of sources and destina-
tions).
We adopt the following three steps (as shown in Figure 3)
to get the spacial distribution of Social-InterestCast sessions
depending on users' geographical distribution:
✄ Firstly, we model the spatial distribution of social rela-
tionships, i.e., the geographical distribution of followers, by
investigating the correlations between user's social relation-
ship formation and geographical distribution. We adopt the
population-based model in [37] for the advantages in realis-
tic and analytical aspects.
✄ Secondly, we build the user-content interest mapping
by matching the topics of content and interests of users. Un-
der the Social-InterestCast, for measuring the transport com-
plexity, it is important to estimate how many followers of a
source user will be interested in a given message and make a
decision to view it. We divide this problem into two cases in
terms of the dependency among followers' decisions and the
attractivity difference of message content. To be specific,
when the decisions of a source user's followers are non-
independent, Matthew Effect [30] should be considered due
to the preferential attachment of some messages that have at-
tracted more followers; when the attractivity of messages is
of significant difference, the preferential attachment of some
popular messages comes on the stage. Furthermore, com-
bining with the experimental results based on Foursquare
users' dataset [11], we get that: Under both cases above, for
a source user, say vk, we reasonably assume that the number
of destinations of a session from vk follows a Zipf's distri-
bution whose parameters depend on the degree of node vk.
✄ Thirdly, we model the spatial distribution of traffic ses-
sions, i.e., the geographical distribution of session sources
and destinations, by combining the effects of both users' so-
cial relationships on the social layer and the user-content in-
terest mapping across the social and content layers.
2
1
3
Session(cid:3)
Layer
Content(cid:3)
Layer
Social(cid:3)
Layer
Physical(cid:3)
Layer
Physical(cid:3)
Proximity
Social(cid:3)
Relationship
Interest(cid:3)
Mapping
Content(cid:3)
Correlation
Data(cid:3)
Flow
Figure 2:
InterestCast.
Four-layered Architecture and Social-
Session(cid:3)Layer(cid:3)
Content(cid:3)Layer(cid:3)
Social(cid:3)Layer(cid:3)
Physical(cid:3)Layer(cid:3)
Geographical(cid:3)Distribution(cid:3)
of(cid:3)Social(cid:3)Relationships
Geographical(cid:3)Distribution(cid:3)
of(cid:3)Traffic(cid:3)Sessions
User(cid:882)Content(cid:3)
Interest(cid:3)Mapping
Step(cid:3)1
Step(cid:3)2
Step(cid:3)3
Figure 3: Three Steps for Modeling The Generation of
Traffic Sessions.
Based on these three steps, we can obtain the geographi-
cal distribution of traffic sessions, and thereby compute the
bound on the aggregate transport distance over which the
data is successfully transported from the source to the in-
tended destinations. Under a realistic assumption that ev-
ery source sustains a data generating rate of constant or-
der, our result demonstrates that the transport complexity for
Social-InterestCast in an OSN over a carrier network with
an optimal communication architecture varies in the range
(cid:2)Θ(n), Θ(n2)(cid:3) depending on the clustering exponents of re-
lationship degree, relationship formation and dissemination
pattern, where n is the user number of the OSN.
The aforementioned results for Social-InterestCast clarify
the differences from those for data dissemination in conven-
tional communication networks, and can serve as a valuable
metric to measure network performance and the difficulty of
data dissemination in large-scale networks. Furthermore, if
a specific carrier communication network is introduced, our
results on transport distances can also play an important role
in analyzing some system performances, e.g., network ca-
pacity and latency.
To the best of our knowledge, this is the first work to mea-
sure the transport difficulty for data dissemination in OSNs
for modeling session patterns by taking into account the interest-
driven characteristic and users' behaviour in real-world OSNs.
The rest of this paper is organized as follows. Firstly, we
show the related work in Section 2, and give the metric of
transport difficulty in Section 3. In Section 4, we propose
our system model of Social-InterestCast. In Section 5, we
derive the transport complexity for the Social-InterestCast.
Finally, we draw a conclusion and make a discussion on our
future work in Section 6.
2. RELATED WORK
Online social networks (OSNs) provide a platform for hun-
dreds of millions of the Internet users worldwide to produce
and consume content. Users in OSNs have the access to
the unprecedented large-scale information repository [21].
Moreover, OSNs play an important role in the information
diffusion by increasing the spread of novel information and
diverse viewpoints, and have shown their power in many
situations [10]. There are some representative topics that
have been extensively studied in the research community of
OSNs, such as detecting popular topics [29], digging po-
tential popularity of contents [7], modeling information dif-
fusion [23, 31], identifying influential spreaders, leaders or
followers [33], presenting influence mechanisms [26], max-
imizing the spread of an information epidemic [24], predict-
ing the properties/signs of links [42] and the missing prefer-
ence of a user [27], estimating the proximity of social net-
works [34], and exploring security issues [36], and so on.
However, most existing work mainly focused on the infor-
mation diffusion scheme in overlay relationship networks of
users in social networking sites/services (SNSs), [41].
Meanwhile, as SNSs become increasingly popular for in-
formation exchange, the traffic generated by social appli-
cations rapidly expands [4]. A report of Shareaholic [5]
showed that, between November 2012 and November 2013,
social media referral traffic from the top five social media
sites increased by 111% while search traffic from the top five
search engines had decreased by 6%. Therefore, besides the
analysis of information diffusion schemes in overlay social
networks [10,24,29,31], and the gain of social relationships
in terms of the information dissemination [17, 39], an in-
depth understanding of the impact of increasing traffic gen-
erated by OSNs on carrier communication networks, e.g.,
the Internet, is convincingly necessary for evaluating current
OSNs systems, optimizing network architectures and the de-
ployment of servers for OSNs, and even designing future
OSNs [16]. To address this issue, we need to propose prac-
tical modeling and effective analytic methods for content
distribution of OSNs implemented in carrier communication
networks, since OSNs change both information propagation
schemes and traffic session patterns in communication net-
works due to the involvement of overlay social relationships,
users' preferences and decisions, [20]. Accordingly, in this
paper, we aim at modeling content distribution [8] in OSNs,
and measuring its transport difficulty imposed on the carrier
communication networks of OSNs.
The most relevant work investigating the load imposed on
the carrier communication network is [37], where the met-
ric called transport load (or traffic load ) was proposed to
quantify such a load. In [37], only a theoretical lower bound
on transport load was derived without sufficiently clarifying
the role of this result in measuring the transport difficulty
of data dissemination for specific online social networking
applications. We state that transport difficulty for a specific
application should be an intrinsic property of this applica-
tion when the carrier network is given. Consequently, the
metric for transport difficulty should be a fundamental limit
of a certain metric on transport burden. From such a per-
spective, we define the fundamental limit of transport load
as a new metric called transport complexity, i.e., the mini-
mum required transport load for an OSN over a given car-
rier network. Besides this, comparing with [37], we make
some significant improvements in this work: In [37], the au-
thors proposed a three-layered model to formulate data dis-
semination sessions for social applications in OSNs. The
session generation is simply modeled as Social-BroadCast,
where the source broadcasts messages to all of its followers,
and all followers have to be the passive destinations. Appar-
ently, they neglected the important features of session gen-
eration in OSNs, i.e., the fact that the generation of traffic
sessions depends on both users' social relationships and the
user-content interest mappings. Accordingly, in this work,
we focus on an interest-driven session pattern, called Social-
InteretCast. To model its formation, we introduce a content
layer as an interest-based filter to build interest links from
users to messages, and propose a four-layered system model
as illustrated in Figure 2.
i=1. Let a subset S = {uS,k}ns
3. METRIC OF TRANSPORT DIFFICULTY
Considering an online social network (OSN), denoted by
N, consisting of n users, we denote the set of all users by
U = {ui}n
k=1 ⊆ U denote
the set of all sources, where S = ns. Denote a data dis-
semination session from a source uS,k by an ordered pair
DS,k =< uS,k,DS,k >, where DS,k is the set of all desti-
nations of uS,k.
In this work, we intend to investigate the transport diffi-
culty for data dissemination in OSNs, i.e., the load on the
carrier communication networks generated by a specific so-
cial applications. To quantify such a load, we introduce a
metric from [37], called transport load, which depends on
two factors: data requested rate and data transport distance.
Data Requested Rate: Data requested rate is determined
by QoS (quality of service) of the application. For data dis-
semination applications in OSNs, the QoS of data transport
applications is usually set up according to the generating
rate of content at source users, i.e., the so-called data arrival
rate. Moreover, data requested rate is generally defined as a
certain portion of data arrival rate. In other words, a portion
of data arriving at the source user is requested to be success-
fully disseminated. Therefore, we reasonably assume that
the data requested rate has the same order as the data ar-
rival rate.
The temporal behavior of messages arriving at a user in an
OSN has been addressed by analyzing some real-life OSNs,
[12,32]. For example, Perera et al. [32] developed a software
architecture that uses a Twitter application program interface
(API) to collect the tweets sent to specific users. They indi-
cated that the arrival process of new tweets to a user can be
modeled as a Poisson Process. In this paper, we just take it
as an empirical argument for assuming the data arrival for a
user as a data source follows a Poisson Process, [32]. In our
work, for each session DS,k =< uS,k,DS,k >, we simply
set the data requested rate to be a portion of the data arrival
rate. Then, we can denote the data requested rate by a vector
ΛS = (λS,1, λS,2,··· , λS,ns), where λS,k is the rate of a
Poisson Process at user uS,k (for k = 1, 2,··· , ns).
In practice, the data arrival rate is dispensable on the scale
of the specific OSN, i.e., the value of n, although the data
arrival rate depends on many factors, such as the specific
form and quality of social services. Combining the facts that
the data requested rate is a certain portion of the data arrival
rate, we can make a reasonable and practical assumption that
λS,k = Θ(1) for k = 1, 2,··· , ns.
In this work, we aim to analyze the fundamental limits on
the transport load for data dissemination in OSNs according
to the network size. Therefore, it is appropriate to note at
this point that the specific distribution of data requested rate
has no impact on the results (in order sense) as long as it
holds that λS,k = Θ(1) for k = 1, 2,··· , ns. This is why
we do not make an intensive study of the specific distribution
of data requested rates.
Data Transport Distance: The data transport distance
is comprehensively determined by traffic session pattern of
the application, communication network architecture, and
transmission schemes. For a given transmission scheme in a
given OSN N, say SN, define a vector
DS (SN) = (dS,1(SN), dS,2(SN),··· , dS,ns(SN)) ,
where dS,k(SN) represents the transport distance over which
the message for session DS,k is successfully transported from
the source uS,k to all destinations.
Transport Load and Transport Complexity: In the OSN
N, given a specific carrier communication network, define
the transport load for a dissemination session, say DS,k, as
eLN,S(DS,k) = λS,k · dS,k(SN).
Furthermore, the aggregated transport load for dissemination
sessions from all sources in S can be defined as
LN,S = minSN∈S ΛS ∗ DS(SN),
(1)
where S is the set of all feasible transmission schemes, and
∗ is an inner product.
duce the feasible transport load.
Based on the definition of transport load, we further intro-
DEFINITION 1
(FEASIBLE TRANSPORT LOAD). For a
social data dissemination with a set of social sessions DS =
k=1, we say that the transport load LN,S is feasible if
{DS,k}n
and only if there exists an appropriate transmission scheme
with a communication deployment, denoted by SN, such that
it holds that DS(SN)∗ΛS ≤ LN,S ensuring that the network
throughput of ΛS is achievable.
Based on the definition of feasible transport load, we fi-
nally define the transport complexity.
DEFINITION 2
(TRANSPORT COMPLEXITY). We say that
the transport complexity of the class of random social data
disseminations DS is of order Θ(f (n)) bit-meters per sec-
ond if there are deterministic constants c1 > 0 and c2 < ∞
such that: There exists a communication architecture N and
corresponding transmission schemes such that
lim
n−→∞
Pr(LN,S = c1 · f (n) is feasible) = 1,
and for any possible communication architectures and trans-
mission schemes, it holds that:
lim inf
n−→∞
Pr(LN,S = c2 · f (n) is feasible) < 1.
4. MODEL OF SOCIAL-INTERESTCAST
For each session, the geographical distribution of the source
and destination(s) plays a key role in generating the transport
load. So it is critical to analyze the correlation between the
spatial distribution of sessions and geographical distribution
of users in online social networks (OSNs).
To address this issue, we propose a four-layered model,
consisting of the physical layer, social layer, content layer,
and session layer, as illustrated in Figure 2.
4.1 Four-Layered System Model
4.1.1 Physical Layer- Physical Network Deployment
The deployment of the so-called physical network can be
divided into two parts. The first is the geographical distri-
bution of social users. The second is the communication
architecture of the carrier network.
Geographical Distribution of Social Users: We con-
sider the random network consisting of a random number
N (with E(N ) = n)3 users who are randomly distributed
over a square region of area S := n, where E[N ] = n. To
avoid border effects, we consider wraparound conditions at
the network edges, i.e., the network area is assumed to be the
surface of a two-dimensional Torus O. To simplify the de-
scription, we assume that the number of nodes is exactly n,
3Throughout the paper, let E[X] denote the mean of a random vari-
able X.
k=1, without chang-
and denote the set of nodes by V = {vk}n
ing our results in order sense. We make a compromise in the
generality and practicality of the geographical distribution of
social users, in order to concentrate on clarifying the impacts
of users' interest on the session formation. Specifically, we
follow the setting where all users are distributed according to
a homogeneous Poisson point process, taking no account of
the inhomogeneous property of the uneven population dis-
tribution in real-life OSNs. The derived results are expected
to serve as the basis for investigating more realistic scenar-
ios under the more practical but complex deployment mod-
els, such as the Clustering Random Model (CRM) according
to the shotnoise Cox process [6] and Multi-center Gaussian
Model (MGM) in [15].
Communication Architecture of Carrier Network: For
online social networking services, we state that the carrier
network is indeed the mobile Internet. This means that there
is hardly a uniform communication architecture, e.g., cen-
tralized or distributed network architecture, practically char-
acterizing the architecture of a real-world carrier network for
OSNs. This is also the reason why we derive the transport
complexity for Social-InterestCast sessions over the carrier
network with optimal communication architecture. The re-
sults can serve as the common lower bounds on transport
complexity for Social-InterestCast sessions over any carrier
networks.
4.1.2 Social Layer- Social Relationship
To model the geographical distribution of relationships,
we introduce the population-distance-based model from [37].
In [37], Wang et al. provided a numerical evaluation for this
social model based on a Brightkite users' dataset [18]. Be-
fore deciding to adopt this model, we complement an eval-
uation based on another dataset from [22], i.e., a Gowalla
users' dataset. For the completeness, we include the evalua-
tions based on these datasets in Appendix B.
Let D(u, r) denote the disk centered at a node u with ra-
dius r in the deployment region O, and let N (u, r) denote
the number of nodes contained in D(u, r). Then, for any two
nodes, say u and v, we can define the population-distance
from u to v as N (u,u − v), where u − v denotes the
Euclidean distance between node u and node v.
For completeness, we include the population-distance-based
model as follows: For a node vk ∈ V, we construct its re-
lationship set Fk of qk (qk ≥ 1) follower nodes by the fol-
lowing procedures: For a particular node vk ∈ V, denote
the number of followers by qk, we assume that it follows a
Zipf's distribution [28], i.e.,
Pr(qk = l) =(cid:18)Xn−1
j=1
j−γ(cid:19)−1
· l−γ.
(2)
Note that we accordingly give a numerical evaluation based
on Gowalla dataset [22] for the Zipf's degree distribution in
Appendix B.2.
Then, to model the geographical distribution of social re-
lationships, we make the position of node vk as the reference
point and choose qk points independently on the torus region
O according to a probability distribution with the following
density function:
fvk (X) = Φk(S, β) · (E[N (vk,X − vk)] + 1)−β ,
where the random variable X := (x, y) denotes the position
of a selected point in the deployment region, and β ∈ [0,∞)
represents the clustering exponent of relationship formation;
the coefficient Φk(S, β) > 0 depends on β and S (the area
of deployment region), and it satisfies:
(3)
(4)
(E[N (vk,X − vk)] + 1)−β dX = 1.
Φk(S, β) ·ZO
Further, we determine the nearest followers for specific
users. Let Ak = {pki}qk
i=1 denote the set of these qk points.
Let vki be the nearest node to pki, for 1 ≤ i ≤ qk (ties
are broken randomly). Denote the set of these qk nodes by
Fk = {vki}qk
i=1. We call point pki the anchor point of vki,
and define a set Pk := {vk} ∪ Ak.
In this model, we can observe that the degree distribution
above depends on the specific network size, i.e., the num-
ber of users n. Note that the correlation between the users'
degree distribution and geographical distribution should not
be neglected, although we simplify it in this work. We will
entirely address this issue in the future work. Throughout
this paper, we use P(γ, β) to denote the population-distance-
based model. Here, γ and β denote the clustering exponents
of relationship degree and relationship formation, respec-
tively. For their detailed meanings, please refer to Eq.(2)
and Eq.(3), respectively.
4.1.3 Content Layer- User-Content Interest Mapping
In this work, we focus on the case where a user only view
the messages within his interest. Then, modeling the map-
ping between users and content is the first critical step for
the final generation of traffic sessions. The basic idea for
this issue is to build the interest links from users to mes-
sages according to the similarity of users' interests to mes-
sage semantics. Specifically, we dig the user's interest by
abstracting the topics of all his posted messages.
4.1.4 Session Layer- Data Traffic Session
When observing users' behaviour in real-life OSNs, there
exists a significant feature of traffic session in OSNs, i.e., the
users' intrinsic interest and subjective choice are often indis-
pensable for forming the sessions, [25]. For all the common
traffic patterns in OSN, we focus on a typical data dissem-
ination, called SocialCast, which can be divided into two
successive phases: Passive Phase and Initiative Phase. In
the passive phase, a source user holding a message sends
self-appointedly the digest of this message to all his fol-
lowers. The followers passively receive this digest. This
process just acts like a broadcast in all the followers of this
source user. This process is called Social-BroadCast in [37].
In the initiative phase, according to the interest, a user will
autonomously determine whether to download the complete
message based on the digest of a message from who he fol-
lows. We define such an interest-driven dissemination pro-
cess Social-InterestCast. The Social-InterestCast is defined
by taking into account specific user interests and their ef-
fects on session generation. Our focus in this work is Social-
InterestCast.
4.2 Social-InterestCast
In real-life OSNs, there exists naturally a common phe-
nomenon: When a user broadcasts messages to others, the
number of potential destinations is depending on underlying
relationships among users (both the source and destinations),
[25]. For a delivered message, to explore the characteristics
of source user and final destinations, we begin with studying
relationships between users and messages. Then, it is com-
mon that if a user broadcasts a message characterized by sev-
eral words (abstract/digest) in his Facebook, only the users
whose interests are consistent with the topic of the message
can be the final destinations. We say that this behavior oc-
curs due to an underlying user-message mapping between
user set and message set. For such type of session, we call
it Social-InterestCast, which is different from Unicast in [9]
and Social-BroadCast in [37]. In the following, we firstly dig
the distribution of destinations of Social-InterestCast ses-
sions based on a real-life dataset of Foursquare [11].
4.2.1 Analyzing Social-InterestCast Formation
In this part, we aim to analyze the distribution of destina-
tion number for Social-InterestCast by exploring the session
formation mechanism over a real-life Foursquare dataset [11].
Foursquare was created in 2009. It is a location-based social
networking service provider where users share their loca-
tions via "checking-in" function. The dataset contains 104, 478
check-in tips generated by 31, 544 users in Los Angeles (LA).
It provides the follower lists and check-in messages of all
users.
In real-life OSNs, the users' intrinsic interest and subjec-
tive choice are usually indispensable for forming the traffic
sessions. Under such a common type of sessions, a user will
autonomously determine whether to download the content
from whom he follows depending on his interest, [14]. We
apply the Latent Dirichlet Allocation (LDA) [13] to extract
topics from the check-in messages generated by users. LDA
assumes that words of each document are drawn from a mix-
ture of topics. We define all messages generated by a user,
say v, as a user document cv. Then, we apply LDA model to
extract the topic distribution θcv, serving as user's interests.
Figure 4 depicts the LDA model. With the user's interest
distribution θcv, we introduce Jensen-Shannon divergence
JSD(PQ) [19] to measure the similarity between users'
interest θcv and newly arrived message θcnew.
In our evaluation, we assume that only when the user's in-
terest θcv is similar to the message's topic distribution θcnew,
user v will further view the newly arrived message cnew. In
φ
λ
θ
z
User Interest/
Message Topic
w
Word
Document
Corpus
and are the super parameters of LDA mod-
is the topic distribution of user document, i.e., user
Figure 4:
el,
interest or message topic,
and
Figure 4: λ is the hyperparameter of LDA model, φ is the
topic-word distribution, θ is the topic distribution of user
document, i.e., user interest, z denotes the latent topic in
document cv, and w is an observed word.
is a word of the message in message set.
is the topic assignment of
800
800
400
400
i
s
n
o
s
s
e
S
c
i
f
i
c
e
p
S
f
t
o
r
e
b
m
u
N
e
a
g
e
r
g
g
A
e
h
T
0
0
1
2
3
4
5
6
7
8
9
10 11 12 13 14 15
The Number of Destinations of A Session
i
s
n
o
s
s
e
S
c
i
f
i
c
e
p
S
f
t
o
r
e
b
m
u
N
e
a
g
e
r
g
g
A
e
h
T
1
2
3
4
5
6
7
8
9
10 11 12 13 14 15
Figure 5: Destinations Distribution with Relationship
Degree = 22
The Number of Destinations of A Session
Figure 5: Destinations Distribution with Relationship
Degree qk = 22.
4. Destinations Distribution with
larity between users' interest
and newly arrived message
= 22
new
In our evaluation, we assume that only when the user's in-
new
is similar to the message's topic distribution
other words, when the value of JSD(θcvθcnew) is smaller
than that of a pre-defined threshold δ, the user v is selected
as a final destination of the message cnew.
terest
user will further view the newly arrived message new. In
new is smaller
other words, when the value of J SD
As illustrated in Figure 5, one of the experimental results
than that of a pre-defined threshold , the user
is selected
as a final destination of the message new
based on Foursquare dataset [11] shows the distribution of
session destinations initiated from users who have 22 fol-
lowers. In Figure 5, the X-axis denotes the number of des-
tinations at a certain degree 22, the Y -axis denotes the num-
ber of cases where destination number equals X. We can
see that Y decreases rapidly at first and then gently with the
increasing of X.
As in Figure 5 illustrated, one of the experimental result-
s based on Foursquare dataset [11] shows the distribution of
session destinations initiated from users who have 22 follow-
-axis denotes the number of destina-
ers. In Figure 5, the
tions at a certain degree 22, the
-axis denotes the number
of cases where destination number equals
. We can see
that
decreases rapidly at first and then gently with the in-
To provide more insights, Figure 6 illustrates the distri-
creasing of
5. Destinations Distribution of Foursquare Messages.
butions of destination number for different relationship de-
gree qk with the threshold δ = 6.5. Since users with larger
relationship degree cannot show convincingly the statistical
characteristics due to the small number of such users (the
small sample size), we have removed those users whose de-
gree is larger than 32 to obtain a more representative result.
In Figure 6, the experimental result in each subfigure shows
that the distribution of destination number for each Social-
In order to provide more insights, we include the distribu-
tions of destination number for different relationship degree
on Foursquare dataset [9], one of the experimental
with the threshold = 6
in Figure 6. Here, Figure 6
only gives the results with degree from to 32, since user-
is showed in Fig.4.
, and
In Fig.4, the friendship degree is 22
of
of
to
of destinations at certain degree,
experimental results based on the threshold = 6
For the completeness of validations, we include some other
in Fig.5.
we want to say that due to the number of users with
degree is few, which cannot show the general
of destinations distribution, So Fig.5 only gives
degree from to 42
to all cases above, the experimental result in each
L
V
Q
R
V
V
H
6
F
L
I
L
F
H
S
6
I
W
R
U
H
E
P
X
1
H
D
J
H
U
J
J
$
H
K
7
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
GHJUHH
7KH1XPEHURI'HVWLQDWLRQVRI$6HVVLRQ
Figure 6: Destinations Distribution in Foursquare.
Figure 6: Destinations Distribution in Foursquare.
InterestCast session appears a long-tailed feature.
s with larger relationship degree cannot show convincingly
the statistical characteristics due to the small number of such
users.
Note that the long-tailed property in the distribution of
destination number is just derived under our hypothetical
formation mechanism of Social-InterestCast using LDA model.
The experimental result in each figure provides an insight
that the distribution of destination number for each Social
As an important empirical argument, Li et al. [25] has pro-
InterestCast session appears a long-tailed feature. As an em-
vided a numerical validation based on RenRen dataset for
pirical argument for this result, Li et al. [24] has provided
such a long-tailed distribution by counting the ratio of the
a numerical validation based on Renren dataset for such a
number of viewed videos and that of the received videos
long-tailed distribution.
from friends.
4.2.2 Modeling Social-InterestCast
4.2.2 Modeling Social-InterestCast
Based on the observations above, we assume that the dis-
tribution of session destinations for Social-InterestCast fol-
lows approximately a Zipf's distribution. To be specific, fo
a source node
, based on the dependency among follower-
s' decisions and the attractivity difference of message con
tent, we make a reasonable assumption that the number of
destinations follows a Zipf's distribution whose parameters
depend on the relationship degree of
Based on the result in Section 4.2.1, we assume that the
distribution of session destinations for Social-InterestCast
follows approximately a Zipf's distribution. Specifically, for
a source node vk, based on the dependency among follow-
ers' decisions and the attractivity difference of message con-
tent, we make a reasonable assumption that the number of
destinations follows a Zipf's distribution whose parameters
depend on the relationship degree of vk, i.e.,
Pr(
) =
i.e.
(5)
(5)
· d−ϕk ,
m−ϕk(cid:19)−1
Pr(dk = dqk = l) =(cid:18)Xl
, and
is the number of final destinations of a session ini-
where
is the exponent of data dis-
tiated by
semination. Here, for problem simplification, we first study
the special case where
where dk is the number of final destinations of a session ini-
tiated by vk, and ϕk ∈ [0,∞) is the exponent of data dis-
semination. Here, for problem simplification, we first study
In the following Section 5, we mainly study this type of
the special case where ϕk ≡ ϕ for every vk.
data disseminations and give the corresponding results for
transport complexity.
In the following Section 5, we mainly study this type of
data disseminations and give the corresponding results for
transport complexity.
5. TRANSPORT COMPLEXITY FOR
for every
m=1
[0
=1
SOCIAL-INTERESTCAST
5. TRANSPORT COMPLEXITY FOR
In this section, we aim to derive the transport complexity
for Social-InterestCast.
SOCIAL-INTERESTCAST
5.1 Social-InterestCast Sessions
In this section, we aim to derive the transport complexity
for Social-InterestCast.
5.1 Social-InterestCast Sessions
Denote a Social-InterestCast session by an ordered pair
if a user sends a message characterized by several
words (an abstract) in his Facebook, only the users whose
of the message can be
We say that this behavior occurs due
, which is a more common session pattern than
in [29] and Social-BroadCast in [7]. In the following,
to model the internal mathematical rule in this, we first provide
1) Validations Based on Foursquare Dataset: In this sec-
we give the validation based on Foursquare dataset [9]
to find out the distribution of session destinations for Social-
to Foursquare: Foursquare was created in
It is a location-based social networking service provider
by "checking-in" function,
by
in Los Angeles (LA) and it was collected using
It provides each user with the friend lists and
of Social-InterestCast Session Destinations:
In Foursquare dataset [9], each of user has personal interests,
to facilitate the comprehension of users' interests, we first
A) [41] to extract
xt generated by users. For LDA,
it is assumed that words of each document are arised from a
of topics. What's more, LDA allows each document
to share multiple topics with different proportions, and each
words with the joint influence of word proportions
To be specific, in our validation,
is an arbitrary random user) with the check-in tips generated
by users. Then we apply LDA model to extract the topics
, we introduce
Kullback-Leibler Divergence to measure the similarities of
KL distance
in the dataset,
xt
, θ
DI
k = {pki}dk
k =< vk,Ik >, where vk is the source and each element
vki in Ik = {vki}dk
i=1 is the nearest node to the correspond-
i=1, the random variable dk denotes
ing pki in AI
k, i.e., the
the number of potential destinations for session DI
followers of vk who are interested in the message from vk
in this session. We call point pki the anchor point of vki,
and define a set P I
k. Then, we can get the
following lemma.
k := {vk} ∪ AI
LEMMA 1. For a Social-InterestCast session DI
k, when
dk = ω(1), with probability 1, it holds that
EMST(AI
k) = Θ( EMST(P I
k)) = Θ(LI
P (β, dk)),
where EMST(·) denotes the Euclidean minimum spanning
tree over a set, and
(6)
where
1 < β < 2;
it holds that
β > 2;
β = 2;
0 ≤ β < 1.
EMST(AI
LI
P(β, dk) =
PROOF. By Lemma 4 in Appendix A, with probability 1,
Θ(cid:0)√dk(cid:1) ,
Θ(cid:0)√dk · log n(cid:1) ,
2(cid:17) ,
Θ(cid:16)√dk · n1− β
log n(cid:17) , β = 1;
Θ(cid:16)√dk ·q n
Θ(cid:0)√dk · √n(cid:1) ,
k) = Θ(pdk ·ZOpfX0 (X)dX),
fX0 (X) =
Θ(cid:0)(X − X02 + 1)−β(cid:1) ,
Θ(cid:16)(cid:0)log n · (X − X02 + 1)(cid:1)−1(cid:17) , β = 1;
Θ(cid:0)nβ−1 · (X − X02 + 1)−β(cid:1) ,
Next, we computeROpfX0 (X)dX. According to the value
2!
ZOpfX0 (X)dX = Θ n
= Θ(cid:16)n
(1) When 0 ≤ β < 1,
(X − X02 + 1)
(2) When β = 1,
of β, we have:
·ZO
2(cid:17) = Θ (√n).
· n1− β
√log n ·ZO
ZOpfX0 (X)dX = Θ 1
(X − X02 + 1)
2!
β > 1;
dX
dX
(3) When β > 1,
= Θ(cid:16) 1√log n · √n(cid:17) = Θ(cid:16)q n
log n(cid:17).
2! .
2(cid:19) = Θ(cid:16)n1− β
2(cid:17);
ZOpfX0 (X)dX = Θ ZO
when 1 < β < 2, Θ(cid:18)RO
when β = 2, Θ(cid:16)RO
(X−X02+1)(cid:17)=Θ (log n);
(X − X02 + 1)
(X−X02+1)
dX
Especially,
dX
dX
β
β
β−1
β
β−1
2
2
1
0 ≤ β < 1.
when β > 2, Θ(cid:18)RO
dX
(X−X02+1)
2(cid:19)=Θ (1).
β
Then, by summarizing the derived results above, we can
obtain that
EMST(AI
k) = Θ(LI
P(β, dk) is defined in Eq.(6).
P(β, dk)),
where LI
Let L denote the smallest distance from the points in AI
k
to point X0. We can get that
EMST(AI
k) ≤ EMST(P I
k) + L,
Furthermore, according to the fact that L = O( EMST(AI
with probability 1, we get EMST(P I
k) = Θ( EMST(AI
which finally completes the proof.
k) ≤ EMST(AI
k))
k)),
5.2 Main Results on Transport Complexity
5.2.1 Bounds on Aggregated Transport Distance
lowing theorem.
k=1 EMST(P I
The bound on the transport complexity depends on the
k), which we compute in the fol-
value ofPn
THEOREM 1. For all Social-InterestCast sessions {DI
probability, the order ofPn
k}n
with the Zipf's distribution as defined in Eq.(5), with high
k) holds as pre-
k=1 EMST(P I
sented in Table 1.
PROOF. Let Tl denote the number of users with l destina-
tions. Then, by laws of larger numbers (LLN, Lemma 5 in
Appendix A), we have
k=1
Tl = n · Pr(qk = l) = n ·(cid:18)Xn−1
j=1
j−γ(cid:19)−1
· (l)−γ.
For all sessions {DI
k}n
k=1, we define two sets:
K1 := {kqk = Θ(1)},K∞ := {kqk = ω(1)}.
Then, it follows that
(7)
Xn
k=1 EMST(P I
k) =bΣ1 +bΣ∞,
where
k).
k),bΣ∞ = Xk∈K∞ EMST(P I
bΣ1 = Xk∈K1 EMST(P I
We first address the part of bΣ1. Since for qk = Θ(1), it
k) = Θ(X−vk), we then havebΣ1 =
holds that EMST(P I
Pk∈K1 X − vk. For k ∈ K1, we define a sequence of ran-
k := X − vk/√n, which have finite mean-
dom variables φ1
k] = E[X−vk]/√n, where E[X−vk]
ing as follows: E[φ1
is given in Lemma 5 of [37]. Then, according to Lemma 4,
with probability 1, it holds that
k(cid:17) ,
bΣ1 = Θ(cid:16)√n ·Xk∈K1 φ1
andPk∈K1 φ1
k/K1 = Θ(E [X − vk/√n]), where K1
denotes the cardinality of set K1. Therefore,
Xk∈K1 φ1
k = Θ(cid:0)K1 · E(cid:2)X − vk/√n(cid:3)(cid:1) .
Table 1: The Order ofPn
1 < β < 2
Θ(n2− β
β = 2
Θ(n · log n) , γ ≥ 0;
k=1 EMST(P I
k)
β = 1
Θ(n
ϕ \ β
ϕ > 3
2
ϕ = 3
2
1 < ϕ < 3
2
ϕ = 1
0 ≤ ϕ < 1
β > 2
Θ(n) , γ ≥ 0;
γ > 1;
Θ(n · log n),
Θ(n),
0 ≤ γ ≤ 1.
Θ(n),
7
γ > 5
2 − ϕ;
Θ(n · log n),
γ = 5
2 − ϕ;
2−γ−ϕ),
Θ(n
1 < γ < 5
2−ϕ/ log n),
γ = 1;
2−ϕ),
0 ≤ γ < 1.
Θ(n
Θ(n
5
5
2 − ϕ;
Θ(n),
Θ(n
Θ(n
Θ(n
3
5
γ ≥ 3
2 ;
2−γ/ log n),
1 < γ < 3
2 ;
2 /(log n)2),
γ = 1;
2 / log n),
0 ≤ γ < 1.
3
Θ(n),
5
γ > 3
2 ;
Θ(n · log n),
γ = 3
2 ;
2−γ),
Θ(n
1 < γ < 3
2 ;
2 / log n),
γ = 1;
2 ),
0 ≤ γ < 1.
Θ(n
Θ(n
3
3
Θ(n · log n),
γ > 1;
Θ(n · (log n)2),
0 ≤ γ ≤ 1.
7
Θ(n · log n),
γ > 5
2 − ϕ;
Θ(n · (log n)2),
γ = 5
2 − ϕ;
2−γ−ϕ · log n),
Θ(n
1 < γ < 5
2 − ϕ;
2−ϕ),
γ = 1;
2−ϕ · log n),
0 ≤ γ < 1.
Θ(n
Θ(n
5
5
5
Θ(n · log n),
γ ≥ 3
2 ;
2−γ),
Θ(n
1 < γ < 3
2 ;
2 / log n),
γ = 1;
2 ),
0 ≤ γ < 1.
Θ(n
Θ(n
3
3
5
Θ(n · log n),
γ > 3
2 ;
Θ(n · (log n)2),
γ = 3
2 ;
2−γ · log n),
Θ(n
1 < γ < 3
2 ;
2 ),
γ = 1;
2 · log n),
0 ≤ γ < 1.
Θ(n
Θ(n
3
3
Θ(n2− β
2 ) , γ ≥ 0;
γ > 1;
2 ),
Θ(n2− β
Θ(n2− β
Θ(n2− β
2 · log n),
0 ≤ γ ≤ 1.
2 ),
γ > 5
7
7
9
2 ),
2 − ϕ;
2 · log n),
γ = 5
2 − ϕ;
2 −γ−ϕ− β
2 ),
1 < γ < 5
2 − ϕ;
2 −ϕ− β
2 / log n),
γ = 1;
2 −ϕ− β
0 ≤ γ < 1.
2 ),
γ ≥ 3
2 ;
2 −γ− β
2 / log n),
1 < γ < 3
2 ;
2 − β
γ = 1;
2 − β
2 / log n),
0 ≤ γ < 1.
2 ),
γ > 3
2 ;
2 /(log n)2),
5
5
7
Θ(n2− β
Θ(n
Θ(n
Θ(n
Θ(n
Θ(n
Θ(n
Θ(n2− β
Θ(n2− β
7
5
2 · log n),
γ = 3
2 ;
2 −γ− β
2 ),
1 < γ < 3
2 ;
2 − β
2 / log n),
γ = 1;
2 − β
2 ),
0 ≤ γ < 1.
5
Θ(n
Θ(n
Θ(n
3
3
3
3
3
Θ(n
Θ(n
Θ(n
γ = 5
2 /√log n) , γ ≥ 0;
2 /√log n),
γ > 1;
2 · √log n),
0 ≤ γ ≤ 1.
2 /√log n),
γ > 5
2 − ϕ;
2 · √log n),
Θ(n
2 − ϕ;
Θ(n4−γ−ϕ/√log n),
1 < γ < 5
2 − ϕ;
Θ(n3−ϕ/(log n)
2 ),
Θ(n3−ϕ/√log n),
0 ≤ γ < 1.
2 /√log n),
γ ≥ 3
2 ;
Θ(n3−γ/(log n)
1 < γ < 3
2 ;
2 ),
Θ(n2/(log n)
γ = 1;
Θ(n
2 ),
3
5
3
3
γ = 1;
3
3
3
Θ(n
γ = 3
2 ;
Θ(n2/(log n)
2 ),
0 ≤ γ < 1.
2 /√log n),
γ > 3
2 ;
2 · √log n),
Θ(n
Θ(n3−γ/√log n),
1 < γ < 3
2 ;
Θ(n2/(log n)
2 ),
Θ(n2/√log n),
0 ≤ γ < 1.
γ = 1;
3
2 − ϕ;
0 ≤ β < 1
Θ(n
3
3
3
3
Θ(n
Θ(n
2 ) , γ ≥ 0.
Θ(n
2 ),
γ > 1;
2 · log n),
0 ≤ γ ≤ 1.
2 ),
γ > 5
2 · log n),
γ = 5
Θ(n4−γ−ϕ),
2 − ϕ;
2 − ϕ;
1 < γ < 5
Θ(n3−ϕ/ log n),
Θ(n
3
γ = 1;
Θ(n3−ϕ),
3
Θ(n
0 ≤ γ < 1.
2 ),
γ ≥ 3
2 ;
Θ(n3−γ/ log n),
1 < γ < 3
2 ;
Θ(n2/(log n)2),
γ = 1;
Θ(n2/ log n),
3
Θ(n
0 ≤ γ < 1.
2 ),
γ > 3
2 ;
2 · log n),
γ = 3
2 ;
Θ(n3−γ),
Θ(n
3
1 < γ < 3
2 ;
Θ(n2/ log n),
γ = 1;
Θ(n2),
0 ≤ γ < 1.
Then, by Lemma 5 in Appendix A, with probability 1, it
holds that
where LI
P
5), with probability 1, it follows that
(β, dk) is defined in Eq.(6). And using LLN (Lemma
bΣ1 = Θ(cid:0)K1 · E[X − vk](cid:1) .
Next, we consider bΣ∞. By introducing anchor points, all
k) with k ∈ K∞ are indepen-
random variables EMST(P I
dent. For users with follower number in K∞, we define two
sets:
(8)
∞,
where
Then, it follows that
∞ = {kdk = ω (1)}.
K∞1 = {kdk = Θ (1)},K∞
bΣ∞ =bΣ∞1 +bΣ∞
∞ = Xk∈K∞
k(cid:1),bΣ∞
EMST(cid:0)P I
bΣ∞1 = Xk∈K∞
k(cid:1).
EMST(cid:0)P I
We first consider the K∞1 . For dk = Θ (1), the order of
bΣ∞1 is lower than that of bΣ1. For the final summation, the
specific value ofbΣ∞1 is relatively infinitesimal.
Next, we consider K∞
∞
probability 1, it holds that
P(β, dk)(cid:1) ,
EMST(cid:0)P I
k(cid:1) = Θ(cid:0)LI
. According to Lemma 1, with
∞
1
l=2 Xl
∞ =Xn−1
bΣ∞
Tl · Pr(dk = dqk = l) · LI
P (β, d) .
(10)
Combining with Eq.(7), Eq.(8), Eq.(9) and Eq.(10), we com-
plete the proof of Theorem 1.
d=1
5.2.2 Tight Bounds on Transport Complexity
Firstly, we give the main result (Theorem 2), i.e., the scal-
ing laws of transport complexity, and prove them tight bounds
on the transport complexity by deriving lower bounds (Lemma
2) and computing upper bounds (Lemma 3), respectively.
(9)
THEOREM 2. Let CI
N denote the transport complexity for
Social-InterestCast sessions in a large-scale OSN over the
carrier network with optimal communication architecture.
Then, it holds that
CI
N = Θ (G (β, γ, ϕ)) ,
where G (β, γ, ϕ) depends on the clustering exponents of re-
lationship degree γ, relationship formation β and dissemi-
nation pattern ϕ, and the value is presented in Table 3 in
Appendix C.
Note that the results in Table 3 synthetically depend on
three parameters, i.e., γ, β, and ϕ. This contributes to the
informative and comprehensive form of results. For carding
the flow and improving the readability, we move the detailed
results to Appendix C (Table 3). We will provide an intuitive
explanation and discussion on the results in Section 5.2.3.
In the following proofs, we let LI
N denote the transport
complexity for all data dissemination sessions in OSN N.
Lower Bounds on Transport Complexity: The follow-
ing Lemma 2 demonstrates a lower bound on transport com-
plexity for OSN N.
LEMMA 2. For the Social-InterestCast with the Zipf's
distribution as defined in Eq.(5), it holds that
LI
N = Ω (G (β, γ, ϕ)) ,
where G (β, γ, ϕ) is presented in Table 3 in Appendix C.
PROOF. Since
Tl · Pr(dk = dqk = l) · d! ,
dk = Θ n−1Xl=1
nXk=1
we can get thatPn
described in Table 2. Additionally, for all vk ∈ V,
k=1 dk = W (γ, ϕ) , where W (γ, ϕ) is
lXd=1
Table 2: The Number of All Destinations, W (γ, ϕ)
ϕ
ϕ > 2
ϕ = 2
1 < ϕ < 2
ϕ = 1
0 ≤ ϕ < 1
W (γ, ϕ)
Θ(n) , γ ≥ 0.
( Θ(n),
γ > 1;
γ > 3 − ϕ;
γ = 3 − ϕ;
1 < γ < 3 − ϕ;
0 ≤ γ < 1.
γ ≥ 2;
Θ(n · log n), 0 ≤ γ ≤ 1.
Θ(n),
Θ(n · log n),
Θ(n4−γ−ϕ),
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ),
Θ(n),
Θ(n3−γ/ log n), 1 < γ < 2;
Θ(n2/(log n)2), γ = 1;
Θ(n2/ log n),
Θ(n),
Θ(n · log n),
Θ(n3−γ),
Θ(n2/ log n), γ = 1;
Θ(n2),
γ > 2;
γ = 2;
1 < γ < 2;
0 ≤ γ < 1.
0 ≤ γ < 1.
E[vki − pki] = Θ Z √n
0
x · e−π·x2
dx! .
That is, E[vki − pki] = Θ (1) . Therefore, according to
Lemma 5, with probability 1, it follows that
dk(cid:17) = Θ (W (γ, ϕ)) .
k=1Xdk
Xn
i=1 vki−pki = Θ(cid:16)Xn
(11)
k=1
G(β, γ, ϕ)
Θ(n3−ϕ)
Θ(n3−ϕ/ log n)
Θ(2 − β
2 )
0
•
1
1 < β < 2, 1 < ϕ < 3
2
γ ≥ 3 − ϕ :
1 < γ < 3 − ϕ :
γ = 1 :
0 ≤ γ < 1 :
•
Θ(n4−γ−ϕ)
3 − ϕ
γ
e 7: The Order of Lower Bounds on The Derived
Figure 7: The Order of Lower Bounds on The Derived
Transport Load,
Transport Complexity, G (β, γ, ϕ), under 1 < β < 2 and
ϕ <
1 < ϕ < 3/2.
β, γ, ϕ , under < β <
Combining with Theorem 1, for all Social-InterestCast ses-
k, k = 1, 2, ..., n, with high probability, it holds that
sions DI
Xn
k=1 EMST(DI
6. CONCLUSION AND FUTURE WORK
k) = Ω (G (β, γ, ϕ)) ,
To measure the transport difficulty for data dissemination
where G (β, γ, ϕ) is provided in Table 3 in Appendix C.
in online social networks (OSNs), we have defined a new
Then, we complete the proof of Lemma 2.
. To model the formation
of the interest-driven social session, i.e., Social-InterestCast,
Upper Bounds on Transport Complexity: Here, we an-
we have proposed a four-layered architecture to model the
alyze the upper bounds on transport complexity for Social-
dissemination in OSNs, including the physical layer,
InterestCast sessions over an optimal carrier network, i.e.,
, content layer, and session layer. By analyz-
a dedicated carrier communication network for this applica-
vances among these four layers, we have ob-
tion. In such a carrier network, a dedicated link can be built
of dis-
for every link in EMST(P I
k), k = 1, 2,··· , n. Therefore,
in OSNs. We have presented the den-
from Lemma 1 and Theorem 1, for Social-InterestCast ses-
of general social relationship distribution and
sions, the aggregated transport distances of each session and
of bounds on transport load for large-scale
all sessions can respectively reach to the orders as presented
we have derived the tight lower bound
in Eq.(6) and Table 1. Then, we have
on transport complexity of Social-InterestCast.
work still remains to be done. Main issues are as
LEMMA 3. For the Social-InterestCast with the Zipf's
LI
distribution as defined in Eq.(5), it holds that
N = O (G (β, γ, ϕ)) ,
In our work, although we have assumed that users are
it is also applicable to the mobile scenario where each
moves within a bounded distance from exact one
where G (β, γ, ϕ) is presented in Table 3 in Appendix C.
, in our numerical evaluation, we have
of each mobile user as his stat-
5.2.3 Explanation of Results
ic location. However, mobile users in real-life scenario are
Based on the complete results in Table 3 in Appendix
by more than one home point rather than
C, we can observe that the final results vary in the range
exact one home point. Therefore, it is necessary to further
e into account a more realistic model for users distribu-
in the physical deployment layer, such as Multi-center
(cid:2)Θ(n), Θ(n2)(cid:3), when the parameters γ, β, and ϕ have dif-
ferent values in the range [0, +∞).
For Table 3, it is too complex to provide a clear insight on
the results. To facilitate the understanding of our results, we
choose a case of results and make them visualized. Figure 7
illustrates the results for the case 1 < β < 2 and 1 < ϕ < 3
2 .
Next, we mainly discuss the impacts of the clustering ex-
ponents of relationship degree γ, relationship formation β
and dissemination pattern ϕ on the transport complexity. Our
result demonstrates that the transport complexity for Social-
We have provided only the explicit result for the model
of users. This
of real-
& social-based information dissemi-
a subsequent traffic session initiated from a
is usually triggered by the previous session from an-
However, we have focused exclusively on the
val model without considering the correlations of
InterestCast is non-increasing within the range(cid:2)Θ(n), Θ(n2)(cid:3)
in terms of the parameters γ, β, and ϕ. An intuitive explana-
tion for this impact can be provided as follows: Under each
Social-InterestCast, a larger clustering exponent of relation-
ship degree γ can limit the number of friends of each user
or the advantages of the introduced
in [14].
γ, β
overly accumulate the transport distance of such a dis-
on the explanation as follows: For a data dissemination, the
of the last hop is relatively infinitesimal to the ag-
gate distance of this dissemination. What's more, for the
of scaling laws issue, we only care about the order
of transport load imposed on the carrier communication net-
works of OSNs. Anyway, it is a significant work to seek for
a more accurate and practical metric to measure the transport
of data dissemination in OSNs.
7. REFERENCES
worldwide-social-network-users/.
fic forecast update, 2013-2018.
G. Alfano, M. Garetto, and E. Leonardi. Capacity
E. Altman. A stochastic game approach for
M. M. Amble, P. Parag, S. Shakkottai, and L. Ying.
E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The
of social networks in information diffusion. In
Proc. ACM WWW 2012
J. Bao, Y. Zheng, and M. F. Mokbel. Location-based
F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida.
into smaller upper bound with high probability, then leads
to a lower transport complexity; a larger clustering expo-
nent of relationship formation β makes the followers more
closer to each user with high probability, then possibly re-
duces the total transport distance of each Social-InterestCast
session, finally also leads to a lower transport complexity; a
larger clustering exponent of dissemination pattern ϕ leads
to a smaller probability that the source chooses larger num-
ber of destinations from its followers, which leads to a lower
transport load.
ric overly accumulate the transport distance of such a dis-
semination. Even so, our results are still reasonable based
on the explanation as follows: For a data dissemination, the
distance of the last hop is relatively infinitesimal to the ag-
gregate distance of this dissemination. What's more, for the
feature of scaling laws issue, we only care about the order
of transport load imposed on the carrier communication net-
works of OSNs. Anyway, it is a significant work to seek for
a more accurate and practical metric to measure the transport
difficulty of data dissemination in OSNs.
6. CONCLUSION AND FUTURE WORK
To measure the transport difficulty for data dissemination
in online social networks (OSNs), we have defined a new
metric, called transport complexity. To model the formation
of the interest-driven social session, i.e., Social-InterestCast,
we have proposed a four-layered architecture to model the
data dissemination in OSNs, including the physical layer, so-
cial layer, content layer, and session layer. By analyzing mu-
tual relevances among these four layers, we have obtained
the geographical distribution characteristics of dissemina-
tion sessions in OSNs. We have presented the density func-
tion of general social relationship distribution and the gen-
eral form of bounds on transport load for large-scale OSNs.
Furthermore, we have derived the tight bounds on transport
complexity of Social-InterestCast.
7. REFERENCES
[1] http://www.statista.com/statistics/278414/number-of-
worldwide-social-network-users/.
[2] https://www.globalwebindex.net/blog/daily-time-
spent-on-social-networks-rises-to-1-72-hours.
[3] http://snap.stanford.edu/data/loc-brightkite.html.
[4] Cisco visual networking index: Global mobile data
traffic forecast update, 2013-2018.
[5] Shareaholic's search traffic vs. social referrals report.
https://blog.shareaholic.com/search-traffic-social-referrals-12-2013/.
[6] G. Alfano, M. Garetto, and E. Leonardi. Capacity
scaling of wireless networks with inhomogeneous
node density: Upper bounds. IEEE Journal on
Selected Areas in Communications, 27(7):1147 -- 1157,
2009.
Much work still remains to be done. Main issues are listed
[7] E. Altman. A stochastic game approach for
as follows:
✄ In our work, although we have assumed that users are
static, it is also applicable to the mobile scenario where each
mobile user moves within a bounded distance from exact one
home point. Actually, in our numerical evaluation, we have
made the most visited point of each mobile user as his static
location. However, mobile users in real-life scenario are usu-
ally constrained by more than one home point rather than
exact one home point. Therefore, it is necessary to further
take into account a more realistic model for users distribu-
tion in the physical deployment layer, such as Multi-center
Gaussian Model (MGM) in [15].
✄ We have provided only the explicit result for the model
with homogeneous geographical distribution of users. This
cannot still highlight sufficiently the characteristics of real-
life OSNs or the advantages of the population-distance-based
model.
✄ Under the profile & social-based information dissemi-
nation pattern, a subsequent traffic session initiated from a
source is often triggered by the previous session from an-
other source. However, we have focused exclusively on the
data arrival model without considering the correlations of
data generating processes.
✄ When applying the metric transport complexity to wire-
less broadcast, the definition will overestimate the transport
difficulty for data dissemination in OSNs. To be specific, in
some scenarios, data targeted to multiple destinations can be
transmitted by a simple wireless broadcast, while our met-
competition over popularity in social networks.
Dynamic Games and Applications, 3(2):313 -- 323,
2013.
[8] M. M. Amble, P. Parag, S. Shakkottai, and L. Ying.
Content-aware caching and traffic management in
content distribution networks. In Proc. IEEE
INFOCOM 2011.
[9] B. Azimdoost and H. Sadjadpour. Capacity of scale
free wireless networks. In Proc. IEEE GlobeCom
2012.
[10] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The
role of social networks in information diffusion. In
Proc. ACM WWW 2012.
[11] J. Bao, Y. Zheng, and M. F. Mokbel. Location-based
and preference-aware recommendation using sparse
geo-social networking data. Gis, pages 199 -- 208, 2012.
[12] F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida.
Characterizing user behavior in online social
networks. In Proc. ACM IMC 2009.
[13] D. M. Blei, A. Y. Ng, M. I. Jordan, and J. Lafferty.
Latent dirichlet allocation. Journal of Machine
Learning Research, 3:993 -- 1022, 2003.
[14] Y. Borghol, S. Ardon, N. Carlsson, D. Eager, and
A. Mahanti. The untold story of the clones:
content-agnostic factors that impact youtube video
popularity. In Proc. ACM SIGKDD 2012.
[15] I. K. C. Cheng, H. Yang and M. R. Lyu. Fused matrix
factorization with geographical and social influence in
R. Chandramouli. Twitter analytics: Architecture,
tools and analysis. In Proc. IEEE MILCOM 2010.
[33] M. Shafiq, M. Ilyas, A. Liu, and H. Radha. Identifying
leaders and followers in online social networks. IEEE
Journal on Selected Areas in Communications,
31(9):618 -- 628, 2013.
[34] H. H. Song, B. Savas, T. W. Cho, V. Dave, Z. Lu, I. S.
Dhillon, Y. Zhang, and L. Qiu. Clustered embedding
of massive social networks. In Proc. ACM
SIGMETRICS PER 2012.
[35] J. Steele. Growth rates of Euclidean minimal spanning
trees with power weighted edges. The Annals of
Probability, 16(4):1767 -- 1787, 1988.
[36] M. Tavakolifard and K. Almeroth. Social computing:
an intersection of recommender systems,
trust/reputation systems, and social networks. IEEE
Network, 26(4):53 -- 58, 2012.
[37] C. Wang, S. Tang, L. Yang, Y. Guo, F. Li, and
C. Jiang. Modeling data dissemination in online social
networks: A geographical perspective on bounding
network traffic load. In Proc. ACM MobiHoc 2014.
[38] D. Williams. Probability with martingales. Cambridge
university press, 1991.
[39] O. Yagan, D. Qian, J. Zhang, and D. Cochran.
Conjoining speeds up information diffusion in
overlaying social-physical networks. IEEE Journal on
Selected Areas in Communications, 31(6):1038 -- 1048,
2013.
[40] M. Yan, J. Sang, and C. Xu. Mining cross-network
association for youtube video promotion. In Proc.
ACM Multimedia 2014.
[41] X. Yang, Y. Guo, and Y. Liu.
Bayesian-inference-based recommendation in online
social networks. IEEE Transactions on Parallel and
Distributed Systems, 24(4):642 -- 651, 2012.
[42] J. Ye, H. Cheng, Z. Zhu, and M. Chen. Predicting
positive and negative links in signed social networks
by transfer learning. In Proc. ACM WWW 2013.
[43] R. Zhou, S. Khemmarat, and L. Gao. The impact of
youtube recommendation system on video views. In
Proc. ACM IMC 2010.
location-based social networks. In Proc. AAAI 2012.
[16] K.-C. Chen, M. Chiang, and H. V. Poor. From
technological networks to social networks. IEEE
Journal on Selected Areas in Communications,
31(31):548 -- 572, 2013.
[17] X. Chen, B. Proulx, X. Gong, and J. Zhang. Social
trust and social reciprocity based cooperative D2D
communications. In Proc. ACM MobiHoc 2013.
[18] E. Cho, S. A. Myers, and J. Leskovec. Friendship and
mobility: User movement in location-based social
networks. In Proc. ACM SIGKDD 2011.
[19] I. S. Dhillon, S. Mallela, and R. Kumar. Enhanced
word clustering for hierarchical text classification. In
Proc. ACM SIGKDD 2002.
[20] L. Fu, J. Zhang, and X. Wang. Evolution-cast:
Temporal evolution in wireless social networks and its
impact on capacity. IEEE Transactions on Parallel
and Distributed Systems, 25(10):2583 -- 2594, 2014.
[21] A. Guille, H. Hacid, C. Favre, and D. A. Zighed.
Information diffusion in online social networks: A
survey. ACM SIGMOD Record, 42(2):17 -- 28, 2013.
[22] T. Hossmann, T. Spyropoulos, and F. Legendre.
Putting contacts into context: Mobility modeling
beyond inter-contact times. In Proc. ACM MobiHoc
2011.
[23] Y. Jin, J. Ok, Y. Yi, and J. Shin. On the impact of
global information on diffusion of innovations over
social networks. In Proc. IEEE INFOCOM 2013.
[24] K. Kandhway and J. Kuri. Campaigning in
heterogeneous social networks: Optimal control of si
information epidemics. IEEE/ACM Transactions on
Networking, PP(99), 2014.
[25] H. Li, X. Cheng, and J. Liu. Understanding video
sharing propagation in social networks: Measurement
and analysis. Acm Transactions on Multimedia
Computing Communications & Applications,
10(4):1 -- 20, 2014.
[26] Y. Li, B. Q. Zhao, and J. Lui. On modeling product
advertisement in large-scale online social networks.
IEEE/ACM Transactions on Networking,
20(5):1412 -- 1425, 2012.
[27] X. Liu and K. Aberer. Soco: a social network aided
context-aware recommender system. In Proc. ACM
WWW 2013.
[28] C. Manning and H. Schutze. Foundations of statistical
natural language processing. MIT press, 1999.
[29] M. Mathioudakis and N. Koudas. Twittermonitor:
trend detection over the twitter stream. In Proc. ACM
SIGMOD 2010.
[30] R. K. Merton et al. The matthew effect in science.
Science, 159(3810):56 -- 63, 1968.
[31] S. A. Myers, C. Zhu, and J. Leskovec. Information
diffusion and external influence in networks. In Proc.
ACM SIGKDD 2012.
[32] R. Perera, S. Anand, K. Subbalakshmi, and
APPENDIX
A. SOME USEFUL LEMMAS
We provide some useful lemmas as follows:
LEMMA 4
(MINIMAL SPANNING TREE [35]). Let Xi,
1 ≤ i < ∞, denote independent random variables with val-
ues in Rd, d ≥ 2, and let Mn denote the cost of a minimal
spanning tree of a complete graph with vertex set {Xi}n
i=1,
where the cost of an edge (Xi, Xj) is given by Ψ((Xi −
Xj)). Here, Xi − Xj denotes the Euclidean distance
between Xi and Xj and Ψ is a monotone function. For
bounded random variables and 0 < σ < d, it holds that
as n → ∞, with probability 1, one has
Mn ∼ c1(σ, d) · n
d−σ
d
f (X)
d−σ
d dX,
·ZRd
provided Ψ(x) ∼ xσ, where f (X) is the density of the ab-
solutely continuous part of the distribution of the {Xi}.
LEMMA 5
(KOLMOGOROV'S STRONG LLN [38]). Let
{Xn} be an i.i.d. sequence of random variables having fi-
nite mean: For ∀n, E[Xn] < ∞. Then, a strong law of large
numbers (LLN) applies to the sample mean:
¯Xn
a.s.−→ E[Xn],
where a.s.−→ denotes almost sure convergence.
B. EVALUATIONS BASED ON GOWALLA
DATASET AND BRIGHTKITE DATASET
In this section, we provide the evaluations of the adopted
55
50
45
40
35
30
e
d
u
t
i
t
a
L
=
Y
25
−130
−120
−110
−100
−90
X=Longitude
−80
−70
−60
Figure 8: The geographical position of Gowalla Users in
North America.
B.2 Evaluation of Degree Distribution
In this work, we assume that the number of followers of
a particular node vk ∈ V, denoted by qk, follows a Zipf's
distribution [28], i.e.,
Pr(qk = l) =(cid:18)Xn−1
j=1
j−γ(cid:19)−1
· l−γ.
Next, we validate the Zipf's degree distribution of social re-
lationships by investigating the negative linear correlation
between
degree distribution model and population-distance-based model
using Gowalla and Brightkite users datasets [18, 22].
B.1 Gowalla and Brightkite Datasets
Gowalla and Brightkite were both created in 2007. They
were once two location-based social networking service providers
where users shared their locations by "checking-in" func-
tion, [3, 18, 22]. For Gowalla, the relationship network con-
sists of 196, 591 nodes and 950, 327 undirected edges. The
Gowalla users' dataset in [22] collected a total of 6, 442, 890
checkins of these users over the period from February 2009
to October 2010. It provides each user with the incoming
and outgoing follower lists as well as the latitude and lon-
gitude. For Brightkite, the relationship network consists of
58, 228 nodes and 214, 078 directed edges. The Brightkite
users' dataset in [18] collected a total of 4, 491, 143 check-
ins of these users over the period from April 2008 to October
2010. It provides each user with the incoming and outgoing
follower lists.
In our evaluations, because of the deficiency of users' data
in Asia and other areas, for Gowalla users' dataset [22], we
extracted 52, 161 users who locate in North America to im-
prove the accuracy and decrease the computation complex-
ity. Figure 8 shows the geographical distribution of users in
North America. Y and X represent the latitude and longi-
tude of users' locations, respectively.
Y := Nout(Kout) and X := Kout,
where Kout represents an outgoing degree, and Nout(Kout)
denotes the number of the users with an outgoing degree
Kout.
In Gowalla and Brightkite datasets [18, 22], the correla-
tion between Y and X is described as in Figure 9. It shows
that the correlation is approximately to be a line segment
with negative slope, which basically matches our proposed
model.
B.3 Evaluation of Population-Distance-Based
Model
We discretize the network area O into a lattice consisting
of 120, 000 points. Each point acts as a candidate anchor
point. We denote this lattice by Od.
Let d(u, p) denote the distance between user u and a ran-
dom position/cell p in Od that serves as a candidate anchor
point. Let D(u, p) denote the disk centered at u with a ra-
dius d(u, p). Let N (u, p) denote the number of nodes in the
disk D(u, p). Let vp denote the closest user to the candidate
anchor point p. Furthermore, we define a variable
I(u, vp) = 1 · {vp is a follower of u}.
We validate the geographical distribution of relationships
by investigating the negative linear correlation between Y
(a)
(b)
Figure 9: (a) is the validation for social degree distribution of Gowalla users, while (b) is of Brightkite users from [37].
(a)
(b)
Figure 10: (a) is the validation for Population-Distance-Based social probability distribution of Gowalla users, while (b)
is of Brightkite users.
and X, where X denotes a number of nodes contained in a
certain disk, and
Y :=
1
E · XI(u,vp)=1
1 · {N (u, p) = N},
with E denoting the set of all social links, respectively.
In real-world dataset, the candidate anchor points located
on the sea or in the desert are quite far from their nearest
users, which leads to a high probability of outer sphere of
users chosen to be a follower of vk. To get rid of these can-
didate anchor points which are apart from the corresponding
users, we set a threshold distance df to filter such positions
as outliers. In this Gowalla dataset [22], df is set to be 200
kilometers, which makes the positions p cover most of the
land and filter the ocean area simultaneously.
In the Gowalla and Brightkite datasets [18, 22], the corre-
lation between Y and X is described by Figure 10. It shows
that the correlation tendency is approximated very coarsely
to a line segment with a negative slope.
The experimental result also basically validates the model,
although it does not perfectly match. The main reason of
mismatch possibly lies in the facts as follows: (1) The lo-
cations of users in these datasets are actually the positions
where they check-in, instead of the place where they usu-
ally stay. (2) Based on these dataset, more than 90% results
fall within the cases with X > 103. The accumulation of
experimental errors here leads to the "bloated" tails in the
evaluation figures.
C. COMPLETE MAIN RESULTS
Here, we summarize the main results of a complete form
in the following table:
β > 2
β = 2
1 < β < 2
β = 1
Table 3: The Order of Transport Complexity, G (β, γ, ϕ)
Θ(n · log n), γ ≥ 0
Θ(n · log n) , γ ≥ 0.
Θ(n2− β
2 ), γ ≥ 0
Θ(n2− β
2 ), γ ≥ 0.
Θ(n
Θ(n
3
2 /√log n), γ ≥ 0
2 /√log n) , γ ≥ 0.
3
0 ≤ β < 1
Θ(n
3
2 ), γ ≥ 0
Θ(n
3
2 ), γ ≥ 0.
ϕ \ β
ϕ > 2
ϕ = 2
3
2 < ϕ < 2
ϕ = 3
2
1 < ϕ < 3
2
ϕ = 1
0 ≤ ϕ < 1
Θ(n), γ ≥ 0
Θ(n), γ > 1;
Θ(n · log n), 0 ≤ γ ≤ 1.
Θ(n), γ > 3 − ϕ;
Θ(n · log n), γ = 3 − ϕ;
Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ;
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ), 0 ≤ γ < 1.
Θ(n), γ > 3
2 ;
Θ(n · log n), γ = 3
2 ;
2−γ), 1 < γ < 3
2 ;
Θ(n
5
Θ(n
3
2 / log n), γ = 1;
3
Θ(n
2 ), 0 ≤ γ < 1.
Θ(n), γ > 3 − ϕ;
Θ(n · log n), γ = 3 − ϕ;
Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ;
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ), 0 ≤ γ < 1.
Θ(n), γ ≥ 2;
Θ(n3−γ/ log n), 1 < γ < 2;
Θ(n2/(log n)2), γ = 1;
Θ(n2/ log n), 0 ≤ γ < 1.
Θ(n), γ > 2;
Θ(n · log n), γ = 2;
Θ(n3−γ), 1 < γ < 2;
Θ(n2/ log n), γ = 1;
Θ(n2), 0 ≤ γ < 1.
Θ(n · log n), γ ≥ 3 − ϕ;
Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ;
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ), 0 ≤ γ < 1.
Θ(n · log n), γ ≥ 3
2 ;
2−γ), 1 < γ < 3
2 ;
Θ(n
5
Θ(n
3
2 / log n), γ = 1;
Θ(n
3
2 ), 0 ≤ γ < 1.
Θ(n · log n), γ ≥ 3 − ϕ;
Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ;
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ), 0 ≤ γ < 1.
Θ(n · log n), γ ≥ 2;
Θ(n3−γ/ log n), 1 < γ < 2;
Θ(n2/(log n)2), γ = 1;
Θ(n2/ log n), 0 ≤ γ < 1.
Θ(n · log n), γ ≥ 2;
Θ(n3−γ), 1 < γ < 2;
Θ(n2/ log n), γ = 1;
Θ(n2), 0 ≤ γ < 1.
Θ(n2− β
2 ), γ ≥ 0.
Θ(n
3
2 /√log n), γ ≥ 0.
Θ(n
3
2 ), γ ≥ 0.
Θ(n2− β
2 ), γ ≥ 3
2 ;
Θ(n
5
2−γ), 1 < γ < 3
2 ;
Θ(n
3
2 / log n), γ = 1;
Θ(n
3
2 ), 0 ≤ γ < 1.
Θ(n2− β
2 ), γ ≥ 3 − ϕ;
Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ;
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ), 0 ≤ γ < 1.
2 ), γ > 3
2 ;
Θ(n2− β
Θ(n3−γ/ log n), 1 < γ ≤ 3
2 ;
Θ(n2/(log n)2), γ = 1;
Θ(n2/ log n), 0 ≤ γ < 1.
2 ), γ ≥ 2;
Θ(2 − β
Θ(n3−γ), 1 < γ < 2;
Θ(n2/ log n), γ = 1;
Θ(n2), 0 ≤ γ < 1.
3
2 /√log n), γ > 1;
2 · √log n), 0 ≤ γ ≤ 1.
3
Θ(n
Θ(n
Θ(n
Θ(n
3
2 /√log n), γ > 5
2 · √log n), γ = 5
3
2 − ϕ;
2 − ϕ;
2 − ϕ;
Θ(n4−γ−ϕ), 1 < γ < 5
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ), 0 ≤ γ < 1.
2 /√log n), γ ≥ 3
Θ(n
2 ;
3
Θ(n3−γ/ log n), 1 < γ < 3
2 ;
Θ(n2/(log n)2), γ = 1;
3
Θ(n2/ log n), 0 ≤ γ < 1.
2 /√log n), γ > 3
Θ(n
2 ;
2 · √log n), γ = 3
2 ;
Θ(n3−γ), 1 < γ < 3
2 ;
Θ(n
3
Θ(n2/ log n), γ = 1;
Θ(n2), 0 ≤ γ < 1.
Θ(n
3
2 ), γ > 1;
Θ(n
3
2 · log n), 0 ≤ γ ≤ 1.
Θ(n
Θ(n
3
2 ), γ > 5
2 − ϕ;
2 · log n), γ = 5
3
2 − ϕ;
Θ(n4−γ−ϕ), 1 < γ < 5
2 − ϕ;
Θ(n3−ϕ/ log n), γ = 1;
Θ(n3−ϕ), 0 ≤ γ < 1.
Θ(n
2 ), γ ≥ 3
2 ;
3
Θ(n3−γ/ log n), 1 < γ < 3
2 ;
Θ(n2/(log n)2), γ = 1;
Θ(n2/ log n), 0 ≤ γ < 1.
Θ(n
2 ), γ > 3
2 ;
3
3
Θ(n
2 · log n), γ = 3
2 ;
Θ(n3−γ), 1 < γ < 3
2 ;
Θ(n2/ log n), γ = 1;
Θ(n2), 0 ≤ γ < 1.
|
1802.04936 | 1 | 1802 | 2018-02-14T02:53:20 | MemeSequencer: Sparse Matching for Embedding Image Macros | [
"cs.SI",
"cs.CV",
"cs.MM"
] | The analysis of the creation, mutation, and propagation of social media content on the Internet is an essential problem in computational social science, affecting areas ranging from marketing to political mobilization. A first step towards understanding the evolution of images online is the analysis of rapidly modifying and propagating memetic imagery or `memes'. However, a pitfall in proceeding with such an investigation is the current incapability to produce a robust semantic space for such imagery, capable of understanding differences in Image Macros. In this study, we provide a first step in the systematic study of image evolution on the Internet, by proposing an algorithm based on sparse representations and deep learning to decouple various types of content in such images and produce a rich semantic embedding. We demonstrate the benefits of our approach on a variety of tasks pertaining to memes and Image Macros, such as image clustering, image retrieval, topic prediction and virality prediction, surpassing the existing methods on each. In addition to its utility on quantitative tasks, our method opens up the possibility of obtaining the first large-scale understanding of the evolution and propagation of memetic imagery. | cs.SI | cs | MemeSequencer: Sparse Matching for Embedding Image Macros
Abhimanyu Dubey
Massachusetts Institute of Technology
[email protected]
Esteban Moro
Massachusetts Institute of Technology
Universidad Carlos III de Madrid
[email protected]
Massachusetts Institute of Technology
Manuel Cebrian
[email protected]
Iyad Rahwan
Massachusetts Institute of Technology
[email protected]
8
1
0
2
b
e
F
4
1
]
I
S
.
s
c
[
1
v
6
3
9
4
0
.
2
0
8
1
:
v
i
X
r
a
ABSTRACT
The analysis of the creation, mutation, and propagation of social me-
dia content on the Internet is an essential problem in computational
social science, affecting areas ranging from marketing to political
mobilization. A first step towards understanding the evolution of
images online is the analysis of rapidly modifying and propagating
memetic imagery or 'memes'. However, a pitfall in proceeding with
such an investigation is the current incapability to produce a robust
semantic space for such imagery, capable of understanding differ-
ences in Image Macros. In this study, we provide a first step in the
systematic study of image evolution on the Internet, by proposing
an algorithm based on sparse representations and deep learning
to decouple various types of content in such images and produce
a rich semantic embedding. We demonstrate the benefits of our
approach on a variety of tasks pertaining to memes and Image
Macros, such as image clustering, image retrieval, topic prediction
and virality prediction, surpassing the existing methods on each.
In addition to its utility on quantitative tasks, our method opens
up the possibility of obtaining the first large-scale understanding
of the evolution and propagation of memetic imagery.
KEYWORDS
image virality, image macros, feature extraction, sparse representa-
tion, embeddings, social network analysis, content understanding
ACM Reference Format:
Abhimanyu Dubey, Esteban Moro, Manuel Cebrian, and Iyad Rahwan. 2018.
MemeSequencer: Sparse Matching for Embedding Image Macros. In WWW
2018: The 2018 Web Conference, April 23–27, 2018, Lyon, France. ACM, New
York, NY, USA, 11 pages. https://doi.org/https://doi.org/10.1145/3178876.
3186021
1 INTRODUCTION
Social networks have increasingly become an integral part of mod-
ern life. Recent research in computational social science has focused
on detecting the most shared content, the extent and pace of shar-
ing of content, and the most influential content-sharing agents in a
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
WWW 2018, April 23–27, 2018, Lyon, France
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-5639-8.
https://doi.org/https://doi.org/10.1145/3178876.3186021
social network [6–10]. This line of inquiry, based on the study of
predicting and understanding content virality has also risen interest
in computer science [13, 52]. Content diffusion online can be un-
derstood as a product of two intertwined properties: i) the nature
of the content, its evolution and mutations, and ii) the properties
of the social network on which it propagates.
Diffusion of content and cascade prediction have received sub-
stantial attention in this domain. Several lines of recent research
have focused on understanding and predicting cascades [13], the
probabilities of information diffusion in cascades [47], and the recur-
rence of cascades [14]. These cascades are crucial in understanding
the influence of the underlying social network on predicting the
extent of propagation (popularity or virality) and provide strong
insights into the importance of strong community structures in
content propagation [54]. Extensive research has also been done in
understanding the strength and extent of online community struc-
tures and their impact on information diffusion [53, 55].
With increased online big data collection and processing, re-
search has focused on understanding content virality through the
information contained in online imagery or text [5, 17, 26]. Con-
trary to the earlier mentioned research, this line of focus looks at
the impact of content in predicting virality, independently from
the network structure and its constituent effects of social reinforce-
ment, homophily and spreading pattern. Using computer vision
techniques, studies have looked at regions of images that promote
content virality [20, 24].
An interesting combination of these two different lines of re-
search is the study of evolution of information in social networks [3].
Since many memes exist in the social network that persist by mu-
tating constantly [16, 17], understanding the mutations that are
responsible for accelerating or hindering the popularity of a meme
can be influential in content creation and understanding the cul-
tural composition of online communities. An issue, however, with
this line of study is the difficulty in isolating the underlying cultural
meme from its various manifestations in online content [34, 48].
Identifying latent cultural memes from content such as tweets
has been attempted first by Leskovec et al.[37], utilizing topic
modeling, without explicitly considering mutations in content.
Approaches such as n-grams and deep neural representations of
text [23] have also been utilized to some success. When operat-
ing on Twitter data, hashtags provide a grounded and less noisy
representation of a meme, that has been utilized in studying the
propagation of associated content on social networks [42, 46]. The
work of Coscia [16, 17] has studied the nature of competition be-
tween image macros online. The systematic study of mutations,
sparse representation to identify template images from each Im-
age Macro, and then using the obtained template, decouples the
overlaid information from the base template. We then proceed to
extract multimodal features from each image, resulting in a rich,
informative and robust feature representation. Using this feature
representation, we demonstrate remarkable improvements across
several qualitiative and quantitative tasks involving social media
imagery, demonstrating the conceptual and functional superiority
of our approach from other baseline techniques. In cases where the
template set is not known beforehand, we also provide an algorithm
that can recover the template image from a set of sample macros
based on median blending of images.
2 METHOD
Our method is based on a strong underlying assumption – memetic
imagery online contains substantial amounts of Image Macros, that
are constructed from a set of template images by choosing a tem-
plate image and overlaying text and/or additional imagery on it.
This assumption is exploited in our formulation. We begin the al-
gorithmic description with preliminaries:
Target Set: Our target set T is the set of images that we wish
to embed in a semantically-grounded space. In our experiments,
this usually is the dataset that we conduct experiments on, scraped
from websites such as Memegenerator [17] or Quickmeme [16].
We use this set of images to construct the set of template images,
following Algorithm 2, that we then use for Sparse Matching and
feature extraction.
Template Set: The template set S is the set of images with no
overlays that we match each image in the target set with, to obtain
the decoupled Image Macro representation. This template set can
be supplied beforehand, but in case it is not, we construct it from
the Target Set itself using an algorithm involving Sparse Matching
and Median Blending.
Overlay Types: Figure 1 specifies the typical kinds of overlays
on template images to produce Image Macros. The most common
overlay is simple text in a white font (as shown in the section 'text
overlay'). There can be modifications in the color or the addition of
an image, which fall under the category of 'image overlay'. Addi-
tionally, both these things may be present together, images of which
fall in the 'combined overlay' category. We take care of minute vari-
ations in color across images by contrast normalization.
The goal of our Sparse Matching algorithm is to obtain the tem-
plate image any sample Image Macro has been constructed from.
Using this template image, we can then decouple the image over-
lay from the Macro, and process the overlay and corresponding
template separately to decouple the local context (specified by the
overlay) and the global context (specified by the template).
2.1 Algorithm Overview
Our task can be summarized as learning an embedding function
: Rn → Rd that maps images to a low-dimensional embed-
f
ding that preserves semantic content. To create an embedding, our
method follows three distinct subroutines as described below:
(1) Overlay Decoupling: The first step of the algorithm is to
identify and separate the overlaid content from the template image.
To do this we employ global image contrast normalization followed
Figure 1: A sample image macro ("Futurama Fry") with its
most common overlays.
however, still remains elusive under these approaches, and to the
best of our knowledge, there is no work on the evolution of image-
based memes.
In this work, we provide a systematic framework and associated
semantic feature space to study memetic imagery. Unlike the evo-
lution of text, images mutate and evolve in a relatively controlled
manner on the Internet, typical of which is the propagation of Im-
age Macros, the most common type of online visual meme [34]. As
described by Knobel and Lankshear [34], an Image Macro is the
representation of an idea using an image superimposed with text
optional alternative imagery. This form of representing a meme
has been incredibly successful at dissemination, and is extremely
popular on social networks [25].
In their most common form, Image Macros usually possess one
or two lines of text flanking the template image in the center. Ad-
ditionally, they may have altered imagery superimposed on the
template image as well. Their etymology stems from the usage
of the word "macro" in computer science, as a 'rule or a pattern
that maps an input to an output' [38]. This highlights the usage of
the Image Macro as a general purpose meme representation, that
can be altered to fit the context specified by the overlaid text. The
combination of the overarching memetic theme provided by the
instantly-recognizable template image with the subtle contextual
information provided by the overlaid text or imagery creates an
instantly perceivable new meme that is versatile and adapted to the
targeted community, justifying its prevalence in social media.
Scientific inquiry involving the propagation of these Image
Macros can hence provide a stronger signal in understanding the
transformation of cultural memes. The primary problem, which we
focus on in this work, is the creation of a semantic representation
for Image Macros that preserve the semantic information in each
image macro while mapping different instances of image macros
created from the same base template image close together, preserv-
ing the global context (supplied by the image), while additionally
maintaining the individual context provided by each image macro.
The baseline technique to solve a problem such as this would be to
use deep neural network features, which have shown tremendous
capabilities in encapsulating information from images. However,
deep convolutional networks cannot decouple the overlaid imagery
and template imagery, and process the overlay as noise, when the
overlay in fact provides critical contextual information about the
macro itself. This results in a loss of information from the macros,
mapping most of them to the similar representation, which only
amplifies as more overlays are made.
In this study, we create an algorithm that first uses the idea of
templatetextimagecombinedoverlay typesby ℓ1-sparse reconstruction, first introduced in the seminal work
on face recognition by Wright et al. [56].
(2) Image Feature Extraction: Image features learnt through
deep convolutional neural networks (CNNs) for object classifica-
tion have been shown to be tremendously powerful at capturing
semantic information, and have excelled at a variety of inference
tasks [21]. To capture the semantic content of the imagery, we use
deep CNNs trained on image classification, and then finetuned on
our target task.
(3) Textual Feature Extraction: To augment the information
provided by the image features, we additionally extract text present
in the images using optical character recognition (OCR), and aug-
ment our embedding with features extracted from this text data.
To learn these text features, we use a deep recurrent neural net-
work [39], inspired by their immense success in a variety of infer-
ence tasks in the domain of natural language processing [15, 27, 61].
After overlay decoupling and multimodal feature extraction, we
concatenate the obtained text and image features to produce a
powerful embedding for image retrieval and clustering of the tar-
get meme imagery, whose representational strength we verify in
several experiments as described later.
2.2 Decoupling Overlays from Templates
The first subroutine of our method involves decoupling the image
overlay from the template it was produced from. This can be done
using a straightforward pixel-wise subtraction, however, we do
not have the source template of each image a priori, which makes
the first task the identification or matching of the correct template
image from the provided test image. We begin by first normalizing
the color in the image with a global pixel-wise mean normalization,
to remove the slight aberrations in color across images. We then
downsample each image in both the template image set S and
target image set T to a fixed resolution of 48 × 48 pixels. Consider
these downsampled sets as Sd (template set) and Td (target set)
respectively. Given these sets of normalized, downsampled images,
we now describe the sparse representation algorithm.
2.2.1
Sparse Representation. Introduced by Wright et al. [56],
the sparse representation algorithm provides a framework for in-
ference under the assumption that the training samples lie on a
subspace. Hence, each input test point can be written as a sparse
linear combination of the training points. If we consider the train-
ing set to be the set of downsampled template meme images Sd,
and test set to be each image in the target set Td, we can apply
the sparse representation algorithm to match each sample in Td
to a sample in Sd. By this process, we can effectively recover the
original template the macro was created from, and decouple the
template from the overlay.
Matching: Let the total number of images present across all
templates be m, and images in each class i be given by mi. Hence,
i =1 mi = m. Given a set Sd,i of mi images, represented as a matrix
[s1,i , ..., smi,i] ∈ Rn×mi belonging to class i, any new target sample
y ∈ Td ⊂ Rn belonging to template i will approximately lie in the
linear span of the training samples of Sd,i. Hence:
k
y = α1,i s1,i + α2,i s2,i + α3,i s3,i + ... + αmi,i smi,i
(1)
Where αi, j ∈ R. If we consider the set of all classes Sd = ∪k
i (Sd,i),
we can write the matrix for all the mi samples from each of the k
classes as:
A := [Sd,1, Sd,2, ..., Sd,k] = [s1,1, s2,1, ..., smk,k]
(2)
Using this, we can write the linear representation of y over all
training samples as:
y = Ax0 ∈ Rn
, subject to Ax = y
x0 = arg min∥x∥0
(3)
where, x0 = [0, ..., 0, α1,i , α2,i , ..., αmi,i , 0, ..., 0]⊤ ∈ Rm is a coeffi-
cient vector with zero entries except for samples belonging to class
i. As proposed in [56], to obtain the sparsest solution of the above
equation, we have to solve the following ℓ0 optimization problem:
(4)
This corresponds to finding a coefficient vector x0 that contains the
smallest number of non-zero entries. This problem in its current
form is to find the sparsest solution of an underdetermined linear
system, and is NP-hard, and even difficult to approximate [4]. As
proposed in [11, 22, 56], under certain assumptions of sparsity,
the ℓ0 minimization solution is equivalent to the ℓ1 minimization
solution. We therefore solve the following problem:
, subject to Ax = y
(5)
This corresponds to finding a coefficient vector x0 that has the min-
). Using standard linear programming
methods, one can solve this problem in polynomial time [12]. As de-
scribed in detail in [56], this algorithm recovers the correct training
class even in the presence of severe occlusion (as provided by the
overlaid text and/or pictures to an image), and heavy amounts of
random noise. Hence, this method is ideal in our application case.
Our algorithm is described in Algorithm 1. We begin by computing
imum ℓ1-norm (m
x1 = arg min∥x∥1
(i)
i =1 x
i
Algorithm 1: Template Matching via Sparse Representation
:Template Set Sd, Target Set Td, threshold tr , no. of
Input
different templates k
Output:Matched Set Od
1 Set Od ← ∅
2 Compute A ← [s1,1, s2,1, ..., smk,k]
3 for Image ti in Td do
x ← arg min∥x∥1
4
if ∥Ax − ti ∥2 ≤ tr then
5
6
7
Compute zc ←mc
for Class c from 1 to k do
, subject to Ax = ti
j=1 1{xj,c > 0}
end
Set z(i) ← [z1, z2, z3, ..., zk]
Compute z(i) ← arg max(z(i))
Set Od ← Od ∪ {s1, z(i)}
Set Od ← Od ∪ {ti}
8
9
10
11
else
12
13
14
15 end
16 return Od
end
Algorithm 2: Template Set Construction
:Target Set Td, thresholds tr , tb
Input
Output:Template Set Sd
1 Set Sd,t ← ∅, Sd ← ∅
2 for Image ti in Td do
3
4
5
6
7
8
9
10
11
12
13
Set Uti ← ∅
Set cti ← 0
if Sd,t = ∅ then
Set Sd,t ← Sd,t ∪ {ti}
Set Uti ← {ti}
Compute A from Sd (from Algorithm 1 step 2)
x ← arg min∥x∥1
if ∥Ax − ti ∥2 ≤ tr then
Compute sz(i) ∈ Sd (from Algorithm 1)
Set Us z(i) ← Us z(i) ∪ {ti}
if cs z(i) = 0 then
, subject to Ax = ti
else
Set v ← PixelWiseMedianBlending(Us z(i) )
if ∥v − sz(i)∥2 ≤ tb then
Set sz(i) ← v
Set cs z(i) = 1
14
15
16
17
end
end
else
Set Sd ← Sd∪ Augment(si)
Set Sd,t ← Sd,t ∪ {ti}
Set Uti ← {ti}
18
19
20
21
22
23
24 end
25 for Image si in Sd,t do
26
27 end
28 return Sd
pixel is the median of the corresponding pixels in all the images
(referred to as PixelWiseMedianBlending). For every input image,
we proceed in a similar manner until the new obtained median
image is within a small error of the median image in the previous
iteration (we check if ∥v−sz(i)∥2 ≤ tb, if yes, we reach convergence
for image sz(i), and set cs z(i) = 1). After convergence, we do not
alter the template image. Figure 2 describes how the median image
evolves with increasing iterations.
Once we have passed through all images in the target set, we
augment the produced template set by random flips and crops of
each template image (procedure described as 'Augment'). This is
done since several Image Macros are also created from flipped and
cropped versions of the template image, and this method ensures
that every test image is mapped to a template correctly. This algo-
rithm is described in Algorithm 2.
2.3 Image Feature Extraction
Once we have completed the first procedure involving decoupling
the overlay, we are ready to extract features that encapsulate the
semantic visual content present in the imagery. A wide variety of
image features have been experimented with in computer vision
Figure 2: Sample recovery of the template images "Willy Wonka"
and "Success Kid" from the target set examples. We show the ob-
tained template at (a) 0 iterations, (b) 10 iterations, (c) 20 iterations,
(d) 50 iterations and (e) 100 iterations.
our downsampled template and target sets Sd and Td respectively,
and set the output set mathb f Od to the empty set. For each im-
age ti in the target set, we first compute the sparse representation
weights x as described earlier. Using the components of the sparse
representation, we then proceed to evaluate the number of non-zero
weights present for samples of each template class and store it in
variable zc for template class c. Owing to the sparse representation
formulation, we find that only the matched template class possesses
non-zero components. We then assign the template class by choos-
ing the class with the maximum number of non-zero sparse weights,
and assign the blank template image as the corrected set for the
input sample ti. In case no matching template is found (the error in
reconstruction is larger than a threshold tr , that is ∥Ax− ti ∥2 > tr ),
we return the target image itself as the matched template.
Once we have the assigned template image s1, z(i), we can de-
couple the overlay from the template by computing the decoupled
overlay as ti − s1, z(i), which can then help us do decoupled feature
extraction. A caveat of this algorithm is that it requires an exhaus-
tive template set to filter images successfully. However, in practical
cases, we might not have the template set S, in which case the next
algorithm to construct the template image set S from the target
image set T can be used.
Creation of Template Set: To construct a template set auto-
matically from the target set, we describe an algorithm that utilizes
the concept of median blending in image processing [59]. Median
Blending is a commonly used technique in image processing to
obtain a stable image from several noisy images. The central idea
is to iteratively grow the template set and refine the template via
successive median blending.
We begin with an empty pre-augmented template set Sd,t , and
iterate over the target set. For the first iteration, we simply add the
input image itself to Sd,t , since our template set is empty. From here
on, we maintain a set of template images Uti for every template ti
we identify (hence, for the first iteration, we add the first image to
the set Uti ). For every subsequent image, we compute the sparse
coefficients sz(i) using Sd,t , and if the input image matches with a
template (even if a template is garbled, the sparse representation
will ensure a sparse match, which we evaluate via the reconstruc-
tion error ∥Ax − ti ∥2). If a match is found, we add the input image
to the set of images corresponding to the matched template image
(Us z(i) ). We construct the new version of the template by blending
all of the images in the set of matched images corresponding to that
template. This blending is done by creating a new image where each
(a)(b)(c)(d)(e)Figure 3: The central feature extraction pipeline.
literature pertaining to web and social media [20, 24, 32]. An emerg-
ing consensus in computer vision has been the extreme efficiency
of deep neural network features in capturing semantic content for
classification and understanding, as described in Donahue et al. [21].
From this, we continue all image feature extraction using on deep
neural network models.
2.3.1 Convolutional Neural Networks. The immense popularity
of convolutional neural networks across a wide variety of computer
vision tasks have made it our default choice for feature extraction.
Following standard practice in computer vision [20, 24], we consider
neural network models trained on the image classification dataset
ImageNet [19], and additionally consider models first trained on
ImageNet followed by further fine-tuning on virality prediction
datasets.
2.3.2 Decoupled Feature Extraction. For each image ti in the
target set T, we extract features from two separate images. We
first extract features from the matched image from the template set
oi ∈ O, and then compute the difference image di = ti − oi, and
extract features from this image as well, eventually concatenating
the two sets of features to form our final feature vector vi. Hence,
(6)
Here, f () is a function that maps an image to a multidimensional
semantic feature vector, and is obtained from a CNN. Since the
basic overlaying of text or additional imagery would be treated as
noise by the CNN, we separate the two components and extract
features separately. This ensures that images belonging to the same
base template have features that are closer together in semantic
space.
vi = [f (oi), f (ti − oi)]
2.4 Textual Feature Extraction
Since most memetic imagery possess modfications in the form of
overlaid text, we can exploit them to produce stronger represen-
tations by a text extraction pipeline. For this, we first run Optical
Character Recognition(OCR) to obtain the text (if any) contained
in the image. Following this, we extract deep neural network fea-
tures based on standard practices in the field of natural language
processing using deep learning [40, 58, 60].
Optical Character Recognition: We use the Tesseract [51] pack-
age for OCR, and trim excess trailing text.
2.4.1 Word2Vec Pooling. Here we extract word2vec [40] rep-
resentations (following [41, 58, 60]) for each word present in the
sentence, and to produce the final representation, we average over
the individual word2vec representations. The word2vec implemen-
tation used is GenSim [45] with dimensionality 1000.
2.4.2
Skip-Thought Vectors. Kiros et al. [33] introduce Skip-
Thought Vectors, a generic encoding scheme for sentences. The
immense versatility of skip-thought vectors on a wide variety of
sentence classification tasks makes them a good choice for sentence
embedding creation. To extract the skip-thought (ST) features, we
simply supply the extracted text to the skip-thought model, and
extract the penultimate layer features.
If in the OCR phase, we do not find any text present in the
image, we later replace the features with the mean text feature for
that template across all images in the Target Set, in order to min-
imize the impact on nearest neighbor retrieval and classification.
We provide ablation and comparative studies to assess the individ-
ual performance of each of the 2 abovementioned techniques in a
variety of classification tasks, and find impressive results across the
board, as summarized in the experiments section.
Algorithm Summary: After image correction and individual ex-
traction of text and image features, as described in Figure 3, we
obtain an informative and flexible feature representation, that pre-
serves semantic content in the presence of overlaid text and/or
imagery. We analyse the effectiveness of our obtained represen-
tation across a variety of experiments, as described in the next
section.
target macro set (T)template set (S)Sparse Matchingx(cid:7629)matched templatedecoupled overlayOCRImage Feature Extractor (CNN)Text Feature Extractor(RNN or Word2Vec)oh you just graduated? you must know everything.Feature Representationtemplate image featuresoverlay image featuresoverlay text featuresFigure 4: Evaluation of Sparse Matching on Clustering - variation of Silhouette Score (left), and Davies-Bouldin Index (right).
3 EVALUATION
3.1 Experimental Setup
To showcase the effectiveness of our representation for memetic
imagery, we perform a variety of qualitative and quantitative assess-
ments. For all experiments, we use a setup involving NVIDIA TITAN
X GPUs, and our implementation is done using the PyTorch [43]
and TensorFlow [2] frameworks. For each of the individual lan-
guage and vision models, we use their publicly available weights
and implementations (we use GenSim [45] for Word2Vec).
The Sparse Matching technique has two components - the im-
age feature extractor (denoted as I), and the text feature extractor
(denoted as T ), giving us results of the form Sparse Matching(I ,T)
for that particular choice of feature extractors. For each experiment
we conduct, we vary both the feature extractors to create different
variants of the algorithm, which are all compared with (i) baseline
feature extractors, (ii) previous state-of-the-art algorithms on our
target tasks, (iii) each feature extractor individually and (iv) the
naive combination of both feature extractors, providing an exhaus-
tive set of comparative techniques. The CNN feature extractors we
use are AlexNet [35], VGGNet-16 [49], and ResNet-18 [28]. As our
results depict, the more powerful image feature extractors(ResNets
and VGGNet-16) provide consistently higher performance.
The target datasets for our task are datasets pertaining to memetic
imagery, typically scraped from websites such as Memegenerator,
Reddit or Quickmeme. There has been interest from both the com-
puter vision and computational social science communities in un-
derstanding such imagery, and we use the popular datasets used in
these studies, with a total of 5 test splits used:
(1) Viral Images Dataset [20]: Introduced in [20], the Viral Im-
ages Dataset is a set of viral images filtered from the original dataset
collected by Lakkaraju et al. [36] from Reddit over a period of 4
years. The dataset contains 10,078 images along with a metric for
virality from 20 different image categories. This dataset contains 3
testing splits of data - (i)Viral-Complete(VCom), which is a collec-
tion of randomly selected pairs of images, (ii)Viral-Pairs(VPair),
which is a collection image pairs where an image from the top 250
most-viral images is paired with an image from the top 250 least
viral images, and (iii) Viral-RandomPairs(VRPairs), which is a
set of image pairs, where one image is sampled from the top 250
most viral images, and the other is sampled at random. We utilise
the predetermined training, validation and test splits.
(2) Memegenerator Dataset [17]: This dataset is a collection of
meme images scraped from the website Memegenerator, from a
period of June 27th, 2013 to July 6, 2013, accompanied with the
number of upvotes for each meme as well. With a total of 326,181
images, this is the largest meme dataset, of which we use a random
70% for training, 10% images for validation and 20% for testing.
(3) Quickmeme Dataset [16]: Similar to the Memegenerator Dataset,
this dataset is scraped from the website Quickmeme from October
2012. This dataset has a total of 178,801 images, and here as well,
we use an 70-20-10 train-test-val split.
The end product of our algorithm is a versatile and efficient feature
representation which can be potentially useful for several inference
tasks involving online imagery, especially those that are propagated
through social media, such as memes. To evalaute the efficacy of
our proposed algorithm, the most natural initial experiment would
be the image clustering and retrieval. A common task online would
be phrased as "given a certain test image I and image set SI, what
are the images in SI that are most similar (in semantic content) to
the test image I?", and indeed, this is the first target task we design
our algorithm for, and to evaluate our algorithm on this task, we
look at three separate qualitative and quantitative experiments, as
summarized below:
3.2 Image Clustering and Retrieval
Clustering Analysis: A summarizable version of the retrieval task
is the task of image clustering - understanding how our feature
representation embeds the space of images. Considering that these
images form smaller subsets in semantic space, we would expect
distinct clusters being formed in the embedding space. Since we do
not necessarily have labels for classes in most of our datasets, to
assess the quality of clustering we first compare the internal cluster-
ing metrics for our representation with the existing state-of-the-art
and baseline methods. The Silhouette Score [44](SS) and the Davies-
Bouldin Index [18](DBI) are two popular internal metrics used to
quantifiably determine the quality of clustering of a representa-
tion. We proceed by clustering points from the Memegenerator
Dataset [16] and vary the number of desired clusters, to obtain the
clustering indices for each feature extraction algorithm as functions
01020304050607080Number of Clusters0.40.50.60.70.80.91.01.1Mean of Silhouette IndexClustering Analysis via Silhouette IndexResNetAlexNetAlexNet + Word2VecResNet + SkipThoughtSparse Matching(AlexNet, Word2Vec)Sparse Matching(ResNet, SkipThought)01020304050607080Number of Clusters0.40.50.60.70.80.91.01.1Mean of DBI IndexClustering Analysis via DBI IndexResNetAlexNetAlexNet + Word2VecResNet + SkipThoughtSparse Matching(AlexNet, Word2Vec)Sparse Matching(ResNet, SkipThought)of the number of clusters required. Here, we use the clustering algo-
rithm K-means, with an off-the-shelf implementation in Scipy [31].
The desiderata for efficient clustering are separable clusters,
with no significant overlap, and high similarity within clusters. Or,
put succintly, high intra-cluster similarity, and low inter-cluster
similarity. If we consider the Silhouette Score (SS), for clusters that
are balanced in size and fairly separable, we desire a low mean
value of SI across clusters, and a low deviation of SS across clusters
as well - representing the average deviation of cluster items from
the cluster mean. Figure 4a summarizes the results for SS analy-
sis, which demonstrates the distinctive clustering our algorithm
provides. Similarly, for the metric DBI (Figure 4b), we consider the
Euclidean distance as the distance metric, and observe consistently
lower values, consolidating the efficiency of our algorithm in creat-
ing rich feature representations.
Image Retrieval and Visualization: The previous set of re-
sults provide a quantiative summary of the improved clustering
provided by our algorithm, but do not make precise an intuition
to validate our representation. To strengthen the qualitative intu-
ition behind the performance of our algorithm, we visualize using
a nearest neighbor retrieval.
We provide a set of example image retrieval queries, and com-
pare the retrieved images for the nearest neighbours of the query
in feature space. As summarized in Figure 5, the sparse matching
algorithm is robust to changes in text information, and by decou-
pling the text, base template and overlaid imagery, we see a richer
embedding that preserves these changes in semantic space, whereas
other algorithms simply treat an aberration or overlaid text as noise,
providing poorer retrieval results. Just simply using image features
retrieves visually similar images, yet, their text content is dissimilar.
Using simply text features proceeds with the reverse effect, with
various imagery being returned. Our method, however, returns a
semantically aligned set of images.
Observing the robustness of our representation and the quali-
tiative improvements in image retrieval, a natural extension would
be understanding the performance of the feature representation on
more complex tasks involving online imagery, such as inferring the
popularity, content and timeline of an image. These quantitative
evaluation tasks are motivated by several observations on online
imagery and online content itself. It has long been established in
social science literature that memetic content on the internet is
ephemeral and rapidly evolving [20, 24, 36], which makes the chal-
lenge of predicting the nature of content and the timeline of its
existence an interesting problem. Building on this line of thought,
we now describe the quantitative experiments we perform to assess
our algorithm.
3.3 Quantitative Evaluation
We perform a series of varied inference tasks to assess the quality
of representations generated by our algorithm. The general frame-
work for evaluation in these experiments is as follows - (i) we first
select a CNN-based image feature extractor from the set of CNNs
described earlier, and select one of two text feature extractors, (ii)
the CNN feature extractor is fine-tuned naively on the target task
using the assigned training set, and (iii) we extract both image
features and text features from the designated neural networks,
Accuracy(%)
Algorithm
SVM + Image Features [20]
SVM + 2x2 Dense HOG Features
Finetuned AlexNet [35]
Finetuned VGGNet16 [49]
Finetuned ResNet18[49]
SVM + Word2VecPooling [40]
SVM + SkipThought Features [33]
SVM + ResNet18 + Word2VecPooling [40]
SVM + ResNet18 + SkipThought Features [33]
Xiao and Lee [57]
Singh and Lee [50]
Dubey and Agarwal [24]
Sparse Matching (AlexNet, Word2VecPooling)
Sparse Matching (VGGNet16, Word2VecPooling)
Sparse Matching (ResNet18, Word2VecPooling)
Sparse Matching (AlexNet, SkipThought)
Sparse Matching (VGGNet16, SkipThought)
Sparse Matching (ResNet18, SkipThought)
Table 1: On both tasks of topic and timeline prediction, we
observe that Sparse Matching provides substantial improve-
ments in performance.
Topic Timeline
41.09
43.08
53.89
57.21
58.17
55.19
58.81
65.35
69.18
70.57
71.85
75.57
72.18
76.08
77.85
74.23
78.98
80.69
24.14
25.18
32.15
33.02
35.16
18.07
19.15
32.15
34.06
38.18
37.09
40.17
37.15
39.57
40.88
43.44
45.78
46.91
following the Sparse Matching algorithm. Finally, once the features
are obtained, we train a multiclass SVM classifier [29] for each
of the following inference tasks. If the task is a ranking task (as
Virality Prediction), we train a RankSVM [30] instead.
Topic Prediction: The Viral Images Dataset [20] is constructed
of images scraped from Reddit [1], along with the subreddits these
images were posted to. The subreddits are curated lists belonging
to a particular genre or topic of content, and example subreddits are
/r/funny, /r/aww, /r/wtf, /r/gaming and /r/atheism, and
the resulting inference task is that of predicting the correct topic
or subreddit the image was posted to.
The task is challenging primarily owing to the overlap in im-
agery across categories, and the overlap in context as well. For
example, several categories may contain images of different an-
imals or people, as well as a significant overlap in the template
images that might be used. We compare our performance on this
task with several benchmark and preivous state-of-the-art methods
on this task, summarized in Table 1. Since there are 20 different
categories, random chance performs at 5%. Due to the immense
overlap in content, naive algorithms perform poorly, with less than
50% prediction accuracy.
By just considering the text content itself, we see a slight increase
in performance, which increases further still when both feature
modalities are combined (image CNN is fine-tuned). However, as
hypothesized, these features are corrupted by the coupling of text
and image content, and hence perform averagely. Approaches that
take context into account, such as the work of Singh and Lee [50],
and Dubey and Agarwal [24] perform much better, however, they
face challenges in decoupling text information. Finally, we see that
Sparse Matching performs substantially better, with a maximum
gain (with ResNet18 visual features and Skip Thought language
features), of 5.12% in performance.
Timeline Prediction: The results of the preivous experiment
provide us with evidence regarding the representational power
Algorithm
RankSVM + Image Features [20]
RankSVM + 2x2 Dense HOG Features
RankSVM + AlexNet fc7 Features [35]
RankSVM + VGGNet-16 fc7 Features [49]
RankSVM + Word2VecPooling [40]
RankSVM + SkipThought [33]
RankSVM + ResNet18 + Word2VecPooling [40]
RankSVM + ResNet18 + SkipThought [33]
Xiao and Lee [57]
Singh and Lee [50]
Dubey and Agarwal [24]
Sparse Matching (AlexNet, Word2VecPooling)
Sparse Matching (VGGNet16, Word2VecPooling)
Sparse Matching (ResNet18, Word2VecPooling)
Sparse Matching (AlexNet, SkipThought)
Sparse Matching (VGGNet, SkipThought)
Sparse Matching (ResNet18, SkipThought)
53.40
52.75
54.41
55.18
60.11
63.06
66.05
69.36
63.25
65.87
68.09
70.02
70.93
71.87
70.86
71.54
73.03
61.60
58.81
61.93
63.01
61.78
64.12
70.98
74.51
75.23
76.20
78.38
82.21
83.03
84.19
83.05
83.98
85.15
58.49
56.92
58.58
59.15
59.94
60.23
70.33
72.09
73.22
74.38
76.95
80.04
81.15
81.96
81.29
82.34
82.62
VCom[20] VPairs[20] VRPairs[20] MemeGenerator[16] QuickMeme[17]
Percentage Accuracy on Dataset
59.12
58.87
59.91
60.12
61.49
65.57
71.06
75.53
70.11
72.25
74.43
79.53
79.94
80.01
80.25
81.16
81.80
57.05
55.56
58.03
61.12
62.02
64.28
69.45
73.81
71.21
70.08
74.51
79.95
80.22
80.27
80.16
80.87
80.91
Table 2: Comparison of performance on the task of virality prediction. We observe that with our feature representation performance is
unmatched compared to the existing state-of-the-art, by a significant margin.
of our method. An extension of the first experiment would be to
predict, along with the topic of the content, the time period it was
posted in. Applications of such a task are present in content cre-
ation, and prediction of popularity trends in social media. Since
content on viral image websites and memes are continually evolv-
ing, we see that the content alone can be a strong indicator of the
time period it represents, as displayed by our prediction results in
Column 2 of Table 1.
We observe that naive baselines for both basic image features and
text features fail miserably at this task, capturing very little in-
formation about the context of an image, crucial for a task like
timeline prediction. Deep image features perform slightly better,
and a combination of deep image features and text features provides
good performance, which is ousted by previous virality prediction
techniques, and Sparse Matching. The decoupled context provides
a signficant boost over the previous state-of-the-art, with an im-
provement of 6.74%.
Virality Prediction: With the impressive increase in perfor-
mance on timeline prediction, we have evidence supporting the
improved ability of our method to identify temporal distinctions in
memetic imagery. This demonstration leads us to our final quantita-
tive experiment, virality prediction. As summarized by recent work
on detection of viral content and cascades in social networks [36],
capturing virality is a difficult problem, with challenges arising from
the presence short-lived content, rapidly evolving diverse imagery.
With our model, however, we hypothesize that predicting virality
would be possible with greater efficiency owing to the stronger,
robust representation.
Hence, we evaluate the prediction performance on the primary
inference task of virality prediction, following the methodology
introduced in [24]. Here, the prediction of virality is taken to be a
pairwise classification task, where given an input pair of images,
the algorithm needs to predict the more viral image of the two.
This evaluation scheme has been shown to be robust to network
effects [24], and is representative of evaluation of the image vi-
rality based on the content alone. We follow the same procedure,
replacing our SVM classifier with a Ranking SVM [30] classifier to
learn a function that provides pairwise predictions. We evaluate
our algorithm on 5 different datasets - the 3 test splits of the Viral
Images Dataset [20] - (i) Viral-Complete, (ii) Viral Pairs, and (iii)
Viral-RandomPairs, and the Memegenerator [16] and Quickmeme
datasets [17]. For all experiments where a train-test split is not pre-
defined, we use a 70-20-10 (train-test-val) split, following standard
protocol.
Our experiment is summarized in Table 2. Note here that since
this is a pairwise prediction task, random chance performs at 50%.
Again, as seen in the previous experiments, naive image-based al-
gorithms perform only slightly better than random chance, with
accuracies around 50-60%. Operating only on extracted text data
gives us slightly better performance, but it fails to generalize since a
lot of imagery do not possess any relevant text at all, which provides
the algorithms with only noise. Sparse Matching provides large
improvements, as high as 7.37% in some cases. Even the weakest
versions of Sparse Matching perform 3.8% better than the previous
state-of-the-art.
Finally, we attempt to analyse the durability of our method in
virality prediction. Since the nature of viral content changes rapidly
over time, we would want to learn a classifier that can perform well
for longer periods of time, given an input training set taken at any
prior time. We would not want to keep re-training our algorithm
often as new data keeps coming in, and reduce the time spent up-
dating our model. To ascertain the invariance of methods in such a
manner, we devise a final quantitative experiment.
Temporal Robustness Analysis: To examine the resilience of
our algorithm to evolving data, we devise the following experiment:
The Memegenerator dataset [16] contains images from 13 different
time periods, as described earlier. We select data from the ith time
period as our training data, and test the trained algorithm on the
4 DISCUSSION AND FUTURE WORK
In this work, we introduced the task of understanding the creation,
mutation and propagation of image macros online as a represen-
tation for the growth and evolution of a meme. We introduced a
method that succesfully maps any arbitrary image macro to the
template it was created from, and then embeds it into a powerful
semantic space. We demonstrated the robustness and richness of
the semantic embedding space via a variety of relevant experiments
on online imagery - image retrieval, clustering, content analysis,
popularity analysis and temporal evolution, all with remarkable
performance.
Our work is the first of its kind in the domain of web con-
tent analysis that looks at the virality prediction problem through
the lens of the Image Macro structure, and successfully exploits it.
While prior work in the domain of virality prediction from content
has focused on the originality of memes [17], popularity-promoting
regions within meme images [24], relative attributes and category
analysis [20], our approach provides a technique to systematically
study the evolution of ideas and memes online.
As a demonstration of this technique, we provide a sample phy-
logenetic tree constructed from the pairwise distances between
different image macros, obtained using our algorithm (see Figure 6).
This tree displays the mutation of memes from a popular tem-
plate, created using MATLAB's seqlinkage command (the figure
displays selected nodes). We see that our embedding is powerful
enough to capture subtle evolutionary patterns in the mutation of
the meme, with children being semantically linked either through
imagery (note the subtree with the hat overlay), or through text
(subtree with pokemon text). With large amounts of time-series
meme imagery, our embedding technique paves way for the study
of systematic evolution of ideas on the Internet.
All previous efforts in the study of image virality have been
futile at extracting these subtle variations in memes, and creating
evolutionary trees such as the one displayed, despite having success
at the task of predicting virality [20, 24]. Our contribution through
this work enables the large-scale study and analysis of such evo-
lutionary trends online, with numerous applications in combining
Figure 6: Pruned phylogenetic tree constructed from 1
meme template and its neighbours using distances gener-
ated by Sparse Matching.
Figure 5: 4-Nearest neighbour image retrieval results for two
sample queries.
Accuracy(%)
Algorithm
SVM + Image Features [20]
SVM + 2x2 Dense HOG Features
Finetuned AlexNet [35]
Finetuned VGGNet16 [49]
Finetuned ResNet18 [49]
SVM + Word2VecPooling [40]
SVM + SkipThought Features [33]
SVM + Finetuned ResNet18 + Word2VecPooling [40]
SVM + Finetuned ResNet18 + SkipThought Features [33]
Xiao and Lee [57]
Singh and Lee [50]
Dubey and Agarwal [24]
Sparse Matching (AlexNet, Word2VecPooling)
Sparse Matching (VGGNet16, Word2VecPooling)
Sparse Matching (ResNet18, Word2VecPooling)
Sparse Matching (AlexNet, SkipThought)
Sparse Matching (VGGNet16, SkipThought)
Sparse Matching (ResNet18, SkipThought)
Table 3: Evaluation of Sparse Matching on the Temporal Ro-
bustness task.
51.02
51.18
51.75
51.56
51.97
52.02
52.95
55.68
56.35
62.67
61.98
62.83
61.78
61.97
63.49
64.07
64.18
65.12
k−1
k − i sets of test images from subsequent time periods. We perform
i =1 (k − i) = k(k−1)
total experiments, which in our case is 78.
We report the average obtained performance for each algorithm,
summarized in Table 3.
It is vital to understand the difficulty of this task compared to
the previous virality prediction experiment. For each time period,
we have (on average) only 7% of the previously available training
data, which provides a very sparse signal. This is consistent with
the observation that most methods (including naive deep learning
algorithms) perform very close to random chance, given the lower
correlation between the observed training data and the test data.
We still observe, however, that specialized methods perform much
better than random chance, and Sparse Matching provides the best
performance, showcasing again the richness and versatility of the
method in capturing context.
2
Query ImageImage FeaturesText FeaturesSparse Matchingthe effects of content and network structure in understanding infor-
mation diffusion and evolution. Such a study can be influential in
creating methods for identifying original content and their sources,
and creating a robust science for understanding how multimedia
propagates on the Internet.
REFERENCES
[1] [n. d.]. reddit: the front page of the internet. http://www.reddit.com/. ([n. d.]).
Accessed: 2017-09-30.
[2] Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey
Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al.
[n. d.]. TensorFlow: A System for Large-Scale Machine Learning.
[3] Lada A Adamic, Thomas M Lento, Eytan Adar, and Pauline C Ng. 2016. Informa-
tion evolution in social networks. In Proceedings of the Ninth ACM International
Conference on Web Search and Data Mining. ACM, 473–482.
[4] Edoardo Amaldi and Viggo Kann. 1998. On the approximability of minimizing
nonzero variables or unsatisfied relations in linear systems. Theoretical Computer
Science 209, 1-2 (1998), 237–260.
[5] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012. The role
of social networks in information diffusion. In Proceedings of the 21st international
conference on World Wide Web. ACM, 519–528.
[6] Albert-László Barabási. 2016. Network science. Cambridge university press.
[7] Jonah Berger and Katherine L Milkman. 2012. What makes online content viral?
Journal of marketing research 49, 2 (2012), 192–205.
[8] Jonah Berger and Eric M Schwartz. 2011. What drives immediate and ongoing
word of mouth? Journal of Marketing Research 48, 5 (2011), 869–880.
[9] Vincent Buskens and Jeroen Weesie. 2000. Cooperation via social networks.
Analyse & Kritik 22, 1 (2000), 44–74.
[10] Vincent Buskens and Kazuo Yamaguchi. 1999. A new model for information
diffusion in heterogeneous social networks. Sociological methodology 29, 1 (1999),
281–325.
[11] Emmanuel J Candes, Justin K Romberg, and Terence Tao. 2006. Stable signal
recovery from incomplete and inaccurate measurements. Communications on
pure and applied mathematics 59, 8 (2006), 1207–1223.
[12] Scott Shaobing Chen, David L Donoho, and Michael A Saunders. 2001. Atomic
decomposition by basis pursuit. SIAM review 43, 1 (2001), 129–159.
[13] Justin Cheng, Lada Adamic, P Alex Dow, Jon Michael Kleinberg, and Jure
Leskovec. 2014. Can cascades be predicted?. In Proceedings of the 23rd inter-
national conference on World wide web. ACM, 925–936.
[14] Justin Cheng, Lada A Adamic, Jon M Kleinberg, and Jure Leskovec. 2016. Do
Cascades Recur?. In Proceedings of the 25th International Conference on World
Wide Web. International World Wide Web Conferences Steering Committee,
671–681.
[15] Ronan Collobert and Jason Weston. 2008. A unified architecture for natural lan-
guage processing: Deep neural networks with multitask learning. In Proceedings
of the 25th international conference on Machine learning. ACM, 160–167.
[16] Michele Coscia. 2013. Competition and Success in the Meme Pool: A Case Study
[17] Michele Coscia. 2014. Average is boring: How similarity kills a meme's success.
on Quickmeme. com.
Scientific reports 4 (2014), 6477.
[18] David L Davies and Donald W Bouldin. 1979. A cluster separation measure. IEEE
transactions on pattern analysis and machine intelligence 2 (1979), 224–227.
[19] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Ima-
genet: A large-scale hierarchical image database. In Computer Vision and Pattern
Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 248–255.
[20] Arturo Deza and Devi Parikh. 2015. Understanding image virality. In Proceedings
of the IEEE Conference on Computer Vision and Pattern Recognition. 1818–1826.
[21] Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric
Tzeng, and Trevor Darrell. 2014. Decaf: A deep convolutional activation feature
for generic visual recognition. In International conference on machine learning.
647–655.
[22] David L Donoho. 2006. For most large underdetermined systems of linear equa-
tions the minimal ÃřÂİÂŞÂĄ1-norm solution is also the sparsest solution. Com-
munications on pure and applied mathematics 59, 6 (2006), 797–829.
[23] Cícero Nogueira Dos Santos and Maira Gatti. 2014. Deep Convolutional Neural
Networks for Sentiment Analysis of Short Texts.. In COLING. 69–78.
[24] Abhimanyu Dubey and Sumeet Agarwal. 2017. Modeling Image Virality with
Pairwise Spatial Transformer Networks. In Proceedings of the 2017 ACM on Multi-
media Conference, MM 2017, Mountain View, CA, USA, October 23-27, 2017. 663–671.
https://doi.org/10.1145/3123266.3123333
[25] Phil Edwards. [n. d.]. The reason every meme uses that one font. https://www.
vox.com/2015/7/26/9036993/meme-font-impact/. ([n. d.]). Accessed: 2017-09-30.
[26] James P Gleeson, Kevin P OâĂŹSullivan, Raquel A Baños, and Yamir Moreno.
2016. Effects of network structure, competition and memory time on social
spreading phenomena. Physical Review X 6, 2 (2016), 021019.
tions 5 (2001).
[27] Alex Graves and Jurgen Schmidhuber. 2005. Framewise phoneme classification
with bidirectional LSTM and other neural network architectures. Neural Networks
18, 5 (2005), 602–610.
[28] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual
learning for image recognition. In Proceedings of the IEEE conference on computer
vision and pattern recognition. 770–778.
[29] Chih-Wei Hsu and Chih-Jen Lin. 2002. A comparison of methods for multiclass
IEEE transactions on Neural Networks 13, 2 (2002),
support vector machines.
415–425.
[30] Thorsten Joachims. 2002. Optimizing search engines using clickthrough data.
In Proceedings of the eighth ACM SIGKDD international conference on Knowledge
discovery and data mining. ACM, 133–142.
[31] Eric Jones, Travis Oliphant, Pearu Peterson, et al. 2001–. SciPy: Open source
scientific tools for Python. (2001–). http://www.scipy.org/ [Online; accessed
9/30/2017].
[32] Aditya Khosla, Atish Das Sarma, and Raffay Hamid. 2014. What makes an image
popular?. In Proceedings of the 23rd international conference on World wide web.
ACM, 867–876.
[33] Ryan Kiros, Yukun Zhu, Ruslan R Salakhutdinov, Richard Zemel, Raquel Urtasun,
Antonio Torralba, and Sanja Fidler. 2015. Skip-thought vectors. In Advances in
neural information processing systems. 3294–3302.
[34] Michele Knobel and Colin Lankshear. [n. d.]. Online memes, affinities, and
cultural production. ([n. d.]).
[35] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classifica-
tion with deep convolutional neural networks. In Advances in neural information
processing systems. 1097–1105.
[36] Himabindu Lakkaraju, Julian J McAuley, and Jure Leskovec. 2013. What's in a
Name? Understanding the Interplay between Titles, Content, and Communities
in Social Media. (2013).
[37] Jure Leskovec, Lars Backstrom, and Jon Kleinberg. 2009. Meme-tracking and the
dynamics of the news cycle. In Proceedings of the 15th ACM SIGKDD international
conference on Knowledge discovery and data mining. ACM, 497–506.
[38] M Douglas McIlroy. 1960. Macro instruction extensions of compiler languages.
Commun. ACM 3, 4 (1960), 214–220.
[39] LR Medsker and LC Jain. 2001. Recurrent neural networks. Design and Applica-
[40] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013.
Distributed representations of words and phrases and their compositionality. In
Advances in neural information processing systems. 3111–3119.
[41] Nasrin Mostafazadeh, Nathanael Chambers, Xiaodong He, Devi Parikh, Dhruv
Batra, Lucy Vanderwende, Pushmeet Kohli, and James Allen. 2016. A corpus and
evaluation framework for deeper understanding of commonsense stories. arXiv
preprint arXiv:1604.01696 (2016).
[42] Ruth Page. 2012. The linguistics of self-branding and micro-celebrity in Twitter:
The role of hashtags. Discourse & communication 6, 2 (2012), 181–201.
[43] Adam Paszke, Sam Gross, and Soumith Chintala. 2017. PyTorch. (2017).
[44] Slobodan Petrovic. 2006. A comparison between the silhouette index and the
davies-bouldin index in labelling ids clusters. In Proceedings of the 11th Nordic
Workshop of Secure IT Systems. 53–64.
[45] R Rehurek and P Sojka. 2011. Gensim–python framework for vector space
modelling. NLP Centre, Faculty of Informatics, Masaryk University, Brno, Czech
Republic 3, 2 (2011).
[46] Daniel M Romero, Brendan Meeder, and Jon Kleinberg. 2011. Differences in the
mechanics of information diffusion across topics: idioms, political hashtags, and
complex contagion on twitter. In Proceedings of the 20th international conference
on World wide web. ACM, 695–704.
[47] Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. 2008. Prediction of informa-
tion diffusion probabilities for independent cascade model. In Knowledge-based
intelligent information and engineering systems. Springer, 67–75.
[48] Limor Shifman. 2013. Memes in a digital world: Reconciling with a conceptual
troublemaker. Journal of Computer-Mediated Communication 18, 3 (2013), 362–
377.
[49] Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks
for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
[50] Krishna Kumar Singh and Yong Jae Lee. 2016. End-to-end localization and ranking
for relative attributes. In European Conference on Computer Vision. Springer, 753–
769.
[51] Ray Smith. 2007. An overview of the Tesseract OCR engine. In Document Analysis
and Recognition, 2007. ICDAR 2007. Ninth International Conference on, Vol. 2. IEEE,
629–633.
[52] Thomas W Valente. 1995. Network models of the diffusion of innovations. (1995).
[53] Lilian Weng and Filippo Menczer. 2015. Topicality and impact in social media:
diverse messages, focused messengers. PloS one 10, 2 (2015), e0118410.
[54] Lilian Weng, Filipspo Menczer, and Yong-Yeol Ahn. 2013. Virality prediction and
community structure in social networks. Scientific reports 3 (2013), 2522.
[55] Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. 2014. Predicting Successful
Memes Using Network and Community Structure.. In ICWSM.
[56] John Wright, Allen Y Yang, Arvind Ganesh, S Shankar Sastry, and Yi Ma. 2009.
Robust face recognition via sparse representation. IEEE transactions on pattern
analysis and machine intelligence 31, 2 (2009), 210–227.
[57] Fanyi Xiao and Yong Jae Lee. 2015. Discovering the spatial extent of relative
attributes. In Proceedings of the IEEE International Conference on Computer Vision.
1458–1466.
[58] Zichao Yang, Diyi Yang, Chris Dyer, Xiaodong He, Alexander J Smola, and Ed-
uard H Hovy. 2016. Hierarchical Attention Networks for Document Classification..
In HLT-NAACL. 1480–1489.
[59] Chenxi Zhang, Jizhou Gao, Oliver Wang, Pierre Georgel, Ruigang Yang, James
Davis, Jan-Michael Frahm, and Marc Pollefeys. 2014. Personal photograph en-
hancement using internet photo collections. IEEE transactions on visualization
[60] Ye Zhang and Byron Wallace. 2015. A sensitivity analysis of (and practitioners'
guide to) convolutional neural networks for sentence classification. arXiv preprint
arXiv:1510.03820 (2015).
[61] Xiaoqing Zheng, Hanyang Chen, and Tianyu Xu. 2013. Deep Learning for Chinese
and computer graphics 20, 2 (2014), 262–275.
Word Segmentation and POS Tagging.. In EMNLP. 647–657.
|
1705.10512 | 2 | 1705 | 2017-11-17T16:14:58 | Towards Psychometrics-based Friend Recommendations in Social Networking Services | [
"cs.SI"
] | Two of the defining elements of Social Networking Services are the social profile, containing information about the user, and the social graph, containing information about the connections between users. Social Networking Services are used to connect to known people as well as to discover new contacts. Current friend recommendation mechanisms typically utilize the social graph. In this paper, we argue that psychometrics, the field of measuring personality traits, can help make meaningful friend recommendations based on an extended social profile containing collected smartphone sensor data. This will support the development of highly distributed Social Networking Services without central knowledge of the social graph. | cs.SI | cs | IEEE Copyright Notice
Copyright (c) 2017 IEEE
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in
any current or future media, including reprinting/republishing this material for advertising or promotional
purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any
copyrighted component of this work in other works.
Published in: 2017 IEEE International Conference on AI & Mobile Services (IEEE AIMS
2017), June 25-30, 2017
DOI: 10.1109/AIMS.2017.22
Preprint from: https://arxiv.org/abs/1705.10512
Print at: https://doi.org/10.1109/AIMS.2017.22
Cite as:
BibTeX:
7
1
0
2
v
o
N
7
1
]
I
S
.
s
c
[
2
v
2
1
5
0
1
.
5
0
7
1
:
v
i
X
r
a
F. Beierle, K. Grunert, S. Göndör, and V. Schlüter, "Towards Psychometrics-Based Friend Recommendations in Social Networking Services," in 2017 IEEE International Conference on AI & Mobile Services (AIMS). IEEE, 2017, pp. 105–108. @inproceedings{beierle_towards_2017, author = {Beierle, Felix and Grunert, Kai and G{\"o}nd{\"o}r, Sebastian and Schl{\"u}ter, Viktor}, title = {Towards {{Psychometrics}}-{{based Friend Recommendations}} in {{Social Networking Services}}}, booktitle = {2017 {{IEEE International Conference}} on {{AI \& Mobile Services}} ({{AIMS}})}, publisher = {{IEEE}}, year = {2017}, pages = {105--108} } Towards Psychometrics-based Friend
Recommendations in Social Networking Services
Felix Beierle∗, Kai Grunert∗, Sebastian Gondor∗, Viktor Schluter†
∗ Service-centric Networking
Telekom Innovation Laboratories / Technische Universitat Berlin
Berlin, Germany
{beierle, kai.grunert, sebastian.goendoer}@tu-berlin.de
† Technische Universitat Berlin, Berlin, Germany
[email protected]
Abstract-Two of the defining elements of Social Networking
Services are the social profile, containing information about the
user, and the social graph, containing information about the
connections between users. Social Networking Services are used
to connect to known people as well as to discover new contacts.
Current friend recommendation mechanisms typically utilize the
social graph. In this paper, we argue that psychometrics, the
field of measuring personality traits, can help make meaningful
friend recommendations based on an extended social profile
containing collected smartphone sensor data. This will support
the development of highly distributed Social Networking Services
without central knowledge of the social graph.
I. INTRODUCTION
Social Networking Services (SNSs) are one of the most
used services on the World Wide Web [1]. Two typical ele-
ments of a SNS are the social profile, containing information
about a user, for example her interests, and the social graph,
containing information about the connections between users.
In our previous work, we argued that the smartphone is the
optimal social networking device [2]. It typically has only
one user and, with recent developments in smartphone sensor
technologies and available APIs, more and more personal data
– like location traces, most frequently used apps, etc. – is
available that could potentially extend existing social profiles.
One of the typical applications in SNSs are friend rec-
ommendations. When recommending new connections in an
SNS, typically, the social graph is utilized [3]. While doing
so enables the incorporation of graph-based properties like the
number of mutual friends, there are also studies that look into
the similarity of attributes of neighboring nodes, thus incor-
porating the social profile in the recommendation process [4].
The basis for the cited studies about friend recommendations
is the insight that homophily – the tendency for people to
associate themselves with people who are similar to them –
is structuring any type of network [5]. Looking further into
the fields of psychology and social sciences, psychometrics,
the academic field that deals with measuring psychological
personality traits, seems like a promising research area provid-
ing results that could help improve friend recommendations
in SNSs. Recently, the company Cambridge Analytica was
in the media because of their alleged success in utilizing
psychometrics in targeted political campaign advertisements
[6], though their impact on the campaign remains somewhat
unclear [7]. Although the use case is different – targeted
advertising instead of friend recommendation – this shows
the potential of applying psychology research results to other
fields. In this paper, we argue that combining current smart-
phone technologies with findings from psychometrics will
enable meaningful friend recommendations based on social
profiles without requiring knowledge of the social graph. Our
main contributions of this short paper is a thorough analysis
of the theoretical background of psychometrics in relation to
SNSs and mobile devices, including a proposal of how to
integrate the insights into friend recommendations in SNSs.
II. ANALYSIS AND CONCEPT
In this section, we give a detailed analysis of relevant work
related to psychometrics, social networking, and smartphone
usage. In Section II-A, we give a literature review on how
and why people actually connect with each other in (offline)
social networks. We outline the concepts of homophily and
personality from psychology and social sciences. In order to
ensure that the same concepts hold true in SNSs, we look into
existing research on SNSs and personality in Section II-B. In
Section II-C, we investigate the relationship between smart-
phone usage and personality. As we will deal with attributes of
users rather then existing connections between users, we will
look at existing definitions and components of social profiles
in Section II-D.
A. Psychology and Social Sciences
In this section, we want to investigate two concepts from
psychology and social sciences: homophily and personality.
Those two concepts will help us conceptualize the parameters
we need in a system for psychometrics-based friend recom-
mendations. Furthermore, it will answer the questions "When
do people become friends?", i.e., "When do people create
edges in a social graph?", which are necessary to be asked
in social networking.
Homophily is the concept that people tend to associate
themselves with other people that are similar to them. Ac-
cording to McPherson et al., this principle structures network
ties of every type, including friendship, work, or partnership
[5]. Some of the categories in which people have homophilic
contacts are ethnicity, age, education, and gender.
The social profile is representing a user. The personality
of a person influences a multitude of aspects, e.g., job per-
formance, satisfaction, or romantic success [8] and is a "key
determinant for the friendship formation process" [9]. One of
the established ways to talk and research about personality
is the so-called Big Five or Five-Factor model [10], [11].
The five personality factors spell the acronym OCEAN and
are openness to experience, conscientiousness, extraversion,
agreeableness, and neuroticism. In their study, Selfhout et al.
show the importance of homophily for friendship networks
[12]. For three of the five factors (openness to experience,
extraversion, and agreeableness), they conclude that people
tend to select friends with similar levels of those traits.
Additionally to friendship, there are several studies finding
correlations between different aspects of everyday life and the
five factors. Especially interesting for social networking related
questions is the correlations between the five factors and
preferences or interests. [13] and [14] are two of the studies
that find correlations between personality and the music the
persons prefer to listen to. As we will show in Section II-D,
music preference is a typical element for a social profile. It
is the most commonly filled attribute in publicly accessible
Facebook profiles after gender [15].
B. Social Networking Services and Personality
that
Several studies suggest
the findings about (offline)
social networks are also valid when dealing with SNSs. Liu
claims the social profile is a "performance" by the user who
expresses herself by crafting the profile [16]. While this might
be true, various studies show that this does not imply that
this "performance" distorts the personality that is expressed in
the profile. For example, Back et al. conclude in their study
that "Facebook Profiles Reflect Actual Personality, Not Self-
Idealization," as the title of their paper indicates [17]. In their
study, Goldbeck et al. show that Facebook profiles can be
used to predict personality [8]. Another study comes to the
same conclusion and shows "that Facebook-based personality
impressions show some consensus for all Big Five dimen-
sions" [18].
C. Smartphone Usage and Personality
Some studies on pre-smartphone-era cell phones found cor-
relations between personality traits and mobile phone usage.
For example, these are the results of a study done on the
general use of mobile phones (calls, text messages, changing
ringtones and wallpapers) [19], as well as of a study about
using mobile phone games [20]. While these studies were
based on self reports by users, Chittaranjan et al. conducted
two user studies in which they collected usage data on Nokia
N95 phones [21], [22]. In those studies, the authors were
looking at Bluetooth scan data, call
text messages,
calling profiles, and application usage. At the time the study
was conducted, apps were not as common as nowadays with
Android and iOS. The authors state that "features derived from
logs,
the App Logs were sparse due to the low frequency of usage
of some of the applications" [22]. It will be interesting to
compare the results from their study to a new study where
the usage of apps is commonplace. The results of the cited
studies indicate that "several aggregated features obtained
from smartphone usage data can be indicators of the Big-Five
traits" [22].
In a more recent study, Lane and Manner showed relations
between the usage of apps and the five personality dimensions
[23]. Apps were categorized in different application types:
communication, games, multimedia, productivity, travel, and
utilities. Overall, the referenced studies indicate strong cor-
relations between smartphone usage behavior and personality
traits.
D. Social Profiles
The social profile is one of the central elements of SNSs.
In Boyd and Ellison's definition of Social Network Sites, the
"public or semi-public profile within a bounded system" is
the first defining element, and the "backbone" of the SNS
[24]. Typical elements of a social profile are "age, location,
interests, and an 'about me' section," and a photo. In [25],
the social profile is the first defining functionality of an SNS.
Here, the authors call the functionality "identity management,"
as the profile is a "representation of the own person." In a
survey paper about SNSs, the social profile is described as
the "core" of an Online Social Network [26]. Another recent
survey describes the creation and maintenance of user profiles
as the "basic functionality" of SNSs [27]. In [28], several
SNSs from different categories, like general (e.g. Facebook),
business oriented (e.g. LinkedIn) or special purpose (e.g.
Twitter), were analyzed. The social profile is an element that
is present in all of those SNSs. Rohani and Hock state that
the type of information included in social profiles differs
between different SNSs [29]. In their analysis of publicly
disclosed Facebook profile information, Farahbakhsh et al.
distinguish between personal and interest-based attributes [15].
Personal attributes include a friend list, current city, hometown,
gender, birthday, employers, college, and high school. Interest-
based attributes are music, movie, book, television, games,
teams, sports, athletes, activities, interests, and inspirations.
Lampe et al. distinguish between three different
types of
information: referents, interests, and contact [30]. Referents
include verifiable attributes: hometown, high school, residence,
concentration. Contact
information are also verifiable, for
example website, email, address, or birthday. As the authors
indicate, interests are less verifiable. Interests include an 'about
me' section, favorite music, movies, TV shows, books, quotes,
and political views. As the cited studies in Section II-C and
also social networking related studies (e.g., [31]) suggest, more
detailed user data additional to the data typically available in
a social profile can help improve recommendations in SNSs.
III. CONCEPT AND PROTOTYPE
Research in psychology and social sciences indicates that
homophily in age, education, etc., as well as in personality
traits, is a strong indicator for friendship, i.e., for the creation
of an edge in a social graph. Several of the aforementioned
studies conclude with findings about correlations between
smartphone usage and personality traits. Combining those
insights, in order to make meaningful recommendations for
new connections in an SNS, we can recommend users that
show a similar behavioral pattern with their smarthphones. As
the existing studies suggest, this will indicate the similarity of
their personality traits. Doing this, we do not necessarily need
to know which behavior indicates which personality trait.
Such a mechanism for friend recommendations can have
several benefits: (1) By logging information about the smart-
phone usage behavior (a lot of which can be done unobtru-
sively, see [32]), we could automatically set up or update an
existing social profile in an SNS, eliminating or reducing the
tedious task to keep such a profile up to date [30]. (2) When
fully relying on social profile data for friend recommendations,
the social graph is not needed in the recommendation process.
This will enable the development of highly distributed SNSs,
for example in device-to-device scenarios where two randomly
meeting people could determine – without contacting some
centralized server – how similar they are and thus are recom-
mended to be friends. (3) By collecting highly personalized
user data, further studies in the fields of psychometrics could
be possible.
We are implementing an Android prototype. With the
Google Awareness API, Google offers to get the user's current
time, location, nearby places, nearby beacons, headphone state,
activity, and weather.1 Android also enables developers to
retrieve a list of the most frequently used apps. Most music
players broadcast what
the user is listening to, so other
apps can retrieve this information. The available APIs and
mechanisms allow for an unobtrusive collection of user data
on Android smartphones. After collecting the mentioned data,
in order to estimate their similarity, two users can share their
data in a device-to-device manner by utilizing appropriate data
structures and technologies like Bluetooth, Wi-Fi Direct, or
Wi-Fi Aware.
IV. RELATED WORK
In this section, we review related work on smartphone
sensor data collection (Section IV-A) and on link prediction
in SNSs (Section IV-B).
A. Smartphone Data Collection
In [33], the authors survey the state of the art of "Antic-
ipatory Mobile Computing," describing how the advances in
mobile technology will enable predicting future contexts and
acting on it. This field has some similarities to our work,
especially with respect to collecting and using sensor data,
but it does not focus on social networking.
In [34], the authors present a framework called "BaranC"
for monitoring and analyzing digital interaction of users with
their smartphones. The architecture uses cloud technologies
1https://developers.google.com/awareness/
to analyze data and thus raises privacy concerns. The goal
of BaranC is not social networking but offering personalized
services. In another work by the same authors, an application
utilizing their framework is presented [35], predicting the next
application a user will use.
Wang et al. present a system that collects a multitude of
sensor data from mobile devices and queries the users with
questionnaires. The collected data is then used to accurately
predict the GPA of the undergraduate students who partici-
pated [36]. Xiong et al. present a system for social sciences
studies that collects sensor data and enables researchers to
create surveys for study participants [37]. Again,
in both
those cases, the developed concepts did not focus on social
networking.
B. Link Prediction
One of the common ways to research about links in social
networks is link prediction. The key difference to our work is
that here, the social graph is used to calculate the prediction or
recommendation, while our approach is also feasible in device-
to-device mobile SNS scenarios where the social graph is not
known. Yin et al. analyzed links in social networks based on
"intuition-based" aspects: homophily (shared attributes), rarity
(matching uncommon attributes), social influence (more likely
to link to person that shares attributes with existing friends),
common friendship (mutual friends), social closeness (being
close to each other in the social graph), preferential attachment
(more likely to link to a popular person) [3]. Most aspects
focus on the social graph or global knowledge about attribute
distribution (in the case of rarity). In the work by Mohajureen
et al., the authors use the attributes of neighboring nodes in
the friend recommendation process [4]. For this algorithm to
work, the social graph as well as the features of each user
have to be available.
A somewhat special case of link prediction or friend rec-
ommendation is described in WhozThat? [38]. Here, the idea
is to retrieve information about another person you just met.
Via Bluetooth, user handles from an SNS are exchanged and
data about the other person can be retrieved from that SNS.
As described in Section III, by following our concept, the
same scenario can be realized in a distributed manner without
contacting existing centralized SNS.
V. CONCLUSION AND FUTURE WORK
In this paper, we proposed the extension of social profiles
with smartphone sensor data. We showed that research results
from the field of psychometrics suggest that we then can
calculate relevant friend recommendations based on those
profiles, without utilizing the social graph. This will enable
recommendations in highly distributed SNSs.
Future work includes conducting a user study with our pro-
totype to confirm our conclusions. Furthermore, in the device-
to-device SNS scenario, the issue of privacy-awareness will
be further investigated so that similarity estimations between
users are possible without sharing all the collected sensitive
sensor data.
ACKNOWLEDGMENT
This work has received funding from the European Union's
Horizon 2020 research and innovation program under grant
agreement No 645342, project reTHINK and from project
DYNAMIC2 (grant No 01IS12056), which is funded as part
of the Software Campus initiative by the German Federal
Ministry of Education and Research (BMBF).
REFERENCES
[1] S. Greenwood, A. Perrin, and M. Duggan.
(2016, Nov.) So-
cial Media Update 2016. http://www.pewinternet.org/2016/11/11/
social-media-update-2016/.
[2] F. Beierle, S. Gondor, and A. Kupper, "Towards a Three-tiered Social
Graph in Decentralized Online Social Networks," in Proc. 7th Interna-
tional Workshop on Hot Topics in Planet-Scale mObile Computing and
Online Social neTworking (HotPOST). ACM, Jun. 2015, pp. 1–6.
[3] Z. Yin, M. Gupta, T. Weninger, and J. Han, "A Unified Framework for
Link Recommendation Using Random Walks," in Proc. 2010 Interna-
tional Conference on Advances in Social Networks Analysis and Mining
(ASONAM).
IEEE, Aug. 2010, pp. 152–159.
[4] M. Mohajireen, C. Ellepola, M. Perera, I. Kahanda, and U. Kanewala,
"Relational Similarity Model for Suggesting Friends in Online Social
Networks," in Proc. 2011 6th International Conference on Industrial
and Information Systems (ICIIS).
IEEE, Aug. 2011, pp. 334–339.
[5] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a Feather:
Homophily in Social Networks," Annual Review of Sociology, vol. 27,
pp. 415–444, 2001.
[6] R. Blakely.
(2016, Sep.) Data
new
trump-calls-in-brexit-experts-to-target-voters-pf0hwcts9.
Trump.
voters
for
20 million
scientists
http://www.thetimes.co.uk/article/
target
[7] N. Confessore and D. Hakim. (2017, Mar.) Data Firm Says 'Secret
Sauce' Aided Trump; Many Scoff. https://www.nytimes.com/2017/03/
06/us/politics/cambridge-analytica.html.
[8] J. Golbeck, C. Robles, and K. Turner, "Predicting Personality with Social
Media," in Proc. CHI '11 Extended Abstracts on Human Factors in
Computing Systems (CHI EA). ACM, May 2011, pp. 253–262.
[9] S. Burgess, E. Sanderson, and M. Umana-Aponte, School Ties: An
Analysis of Homophily in an Adolescent Friendship Network, ser. CMPO
Working Paper Series.
Centre for Market and Public Organisation,
2011, no. 11/267.
[10] E. C. Tupes and R. E. Christal, "Recurrent Personality Factors Based
on Trait Ratings," Journal of Personality, vol. 60, no. 2, pp. 225–251,
Jun. 1992.
[11] R. R. McCrae and O. P. John, "An Introduction to the Five-Factor Model
and Its Applications," Journal of Personality, vol. 60, no. 2, pp. 175–215,
1992.
[12] M. Selfhout, W. Burk, S. Branje, J. Denissen, M. Van Aken, and
W. Meeus, "Emerging Late Adolescent Friendship Networks and Big
Five Personality Traits: A Social Network Approach," Journal of Per-
sonality, vol. 78, no. 2, pp. 509–538, Apr. 2010.
[13] D. Rawlings and V. Ciancarelli, "Music Preference and the Five-Factor
Model of the NEO Personality Inventory," Psychology of Music, vol. 25,
no. 2, pp. 120–132, Oct. 1997.
[14] P. J. Rentfrow and S. D. Gosling, "The Do Re Mi's of Everyday Life:
The Structure and Personality Correlates of Music Preferences." Journal
of Personality and Social Psychology, vol. 84, no. 6, pp. 1236–1256,
2003.
[15] R. Farahbakhsh, X. Han, A. Cuevas, and N. Crespi, "Analysis of publicly
disclosed information in Facebook profiles," in Proc. 2013 IEEE/ACM
International Conference on Advances in Social Networks Analysis and
Mining (ASONAM). ACM, Aug. 2013, pp. 699–705.
[16] H. Liu, "Social Network Profiles as Taste Performances," Journal of
Computer-Mediated Communication, vol. 13, no. 1, pp. 252–275, Oct.
2007.
[17] M. D. Back, J. M. Stopfer, S. Vazire, S. Gaddis, S. C. Schmukle,
B. Egloff, and S. D. Gosling, "Facebook Profiles Reflect Actual Per-
sonality, Not Self-Idealization," Psychological Science, vol. 21, no. 3,
pp. 372–374, Jan. 2010.
2http://www.dynamic-project.de
[18] S. D. Gosling, S. Gaddis, and S. Vazire, "Personality Impressions
Based on Facebook Profiles," in Proc. International AAAI Conference
on Weblogs and Social Media (ICWSM). AAAI, 2007, pp. 1–4.
[19] S. Butt and J. G. Phillips, "Personality and self reported mobile phone
use," Computers in Human Behavior, vol. 24, no. 2, pp. 346–360, Mar.
2008.
[20] J. G. Phillips, S. Butt, and A. Blaszczynski, "Personality and Self-
Reported Use of Mobile Phones for Games," CyberPsychology &
Behavior, vol. 9, no. 6, pp. 753–758, Dec. 2006.
[21] G. Chittaranjan, J. Blom, and D. Gatica-Perez, "Who's Who with Big-
Five: Analyzing and Classifying Personality Traits with Smartphones,"
in Proc. 2011 15th Annual International Symposium on Wearable
Computers (ISWC).
IEEE, Jun. 2011, pp. 29–36.
[22] --, "Mining large-scale smartphone data for personality studies,"
Personal and Ubiquitous Computing, vol. 17, no. 3, pp. 433–450, Mar.
2013.
[23] W. Lane and C. Manner, "The influence of personality traits on mobile
phone application preferences," Journal of Economics & Behavioral
Studies, vol. 4, no. 5, pp. 252–260, 2012.
[24] D. M. Boyd and N. B. Ellison, "Social Network Sites: Definition, His-
tory, and Scholarship," Journal of Computer-Mediated Communication,
vol. 13, no. 1, pp. 210–230, Oct. 2007.
[25] A. Richter and M. Koch, "Functions of Social Networking Services,"
in Proc. 8th International Conference on the Design of Cooperative
Systems (COOP), May 2008, pp. 87–98.
[26] J. Heidemann, M. Klier, and F. Probst, "Online social networks: A survey
of a global phenomenon," Computer Networks, vol. 56, no. 18, pp. 3866–
3878, Dec. 2012.
[27] T. Paul, A. Famulari, and T. Strufe, "A survey on decentralized Online
Social Networks," Computer Networks, vol. 75, Part A, pp. 437–452,
Dec. 2014.
[28] S. Gondor, F. Beierle, S. Sharhan, H. Hebbo, E. Kucukbayraktar, and
A. Kupper, "SONIC: Bridging the Gap between Different Online Social
Network Platforms," in Proc. 2015 IEEE International Conference on
Smart City/SocialCom/SustainCom (SmartCity).
IEEE, Dec. 2015, pp.
399–406.
[29] V. A. Rohani and O. S. Hock, "On Social Network Web Sites: Defini-
tion, Features, Architectures and Analysis Tools," Journal of Computer
Engineering, vol. 1, pp. 3–11, 2009.
[30] C. A. Lampe, N. Ellison, and C. Steinfield, "A Familiar Face(Book):
Profile Elements As Signals in an Online Social Network," in Proc.
SIGCHI Conference on Human Factors in Computing Systems (CHI).
ACM, Apr. 2007, pp. 435–444.
[31] J. Bao, Y. Zheng, D. Wilkie, and M. Mokbel, "Recommendations in
Location-based Social Networks: A Survey," Geoinformatica, vol. 19,
no. 3, pp. 525–565, 2015.
[32] F. Beierle, K. Grunert, S. Gondor, and A. Kupper, "Privacy-aware
Social Music Playlist Generation," in Proc. 2016 IEEE International
Conference on Communications (ICC).
IEEE, May 2016, pp. 5650–
5656.
[33] V. Pejovic and M. Musolesi, "Anticipatory Mobile Computing: A Survey
of the State of the Art and Research Challenges," ACM Computing
Surveys, vol. 47, no. 3, pp. 1–29, Apr. 2015.
[34] M. Hashemi and J. Herbert, "User Interaction Monitoring and Analysis
Framework," in Proc. 2016 IEEE/ACM International Conference on
Mobile Software Engineering and Systems (MobileSoft). ACM, 2016,
pp. 7–8.
[35] --, "A Next Application Prediction Service Using the BaranC Frame-
work," in Proc. 2016 IEEE 40th Annual Computer Software and
Applications Conference (COMPSAC).
IEEE, Jun. 2016, pp. 519–523.
[36] R. Wang, G. Harari, P. Hao, X. Zhou, and A. T. Campbell, "SmartGPA:
How Smartphones Can Assess and Predict Academic Performance of
College Students," in Proc. 2015 ACM International Joint Conference
on Pervasive and Ubiquitous Computing (UbiComp). ACM, Sep. 2015,
pp. 295–306.
[37] H. Xiong, Y. Huang, L. E. Barnes, and M. S. Gerber, "Sensus: A Cross-
platform, General-purpose System for Mobile Crowdsensing in Human-
subject Studies," in Proc. 2016 ACM International Joint Conference on
Pervasive and Ubiquitous Computing (UbiComp). ACM, Sep. 2016,
pp. 415–426.
[38] A. Beach, M. Gartrell, S. Akkala, J. Elston, J. Kelley, K. Nishimoto,
B. Ray, S. Razgulin, K. Sundaresan, B. Surendar, M. Terada, and R. Han,
"WhozThat? Evolving an Ecosystem for Context-Aware Mobile Social
Networks," IEEE Network, vol. 22, no. 4, pp. 50–55, 2008.
|
1806.07955 | 1 | 1806 | 2018-06-11T11:36:43 | Growing Better Graphs With Latent-Variable Probabilistic Graph Grammars | [
"cs.SI",
"cs.AI"
] | Recent work in graph models has found that probabilistic hyperedge replacement grammars (HRGs) can be extracted from graphs and used to generate new random graphs with graph properties and substructures close to the original. In this paper, we show how to add latent variables to the model, trained using Expectation-Maximization, to generate still better graphs, that is, ones that generalize better to the test data. We evaluate the new method by separating training and test graphs, building the model on the former and measuring the likelihood of the latter, as a more stringent test of how well the model can generalize to new graphs. On this metric, we find that our latent-variable HRGs consistently outperform several existing graph models and provide interesting insights into the building blocks of real world networks. | cs.SI | cs | Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic
Graph Grammars
8
1
0
2
n
u
J
1
1
]
I
S
.
s
c
[
1
v
5
5
9
7
0
.
6
0
8
1
:
v
i
X
r
a
Xinyi Wang
Carnegie Mellon University
Pi(cid:138)sburgh, PA 15213
[email protected]
Tim Weninger
University of Notre Dame
Notre Dame, IN 46556
[email protected]
ABSTRACT
Recent work in graph models has found that probabilistic hyper-
edge replacement grammars (HRGs) can be extracted from graphs
and used to generate new random graphs with graph properties
and substructures close to the original. In this paper, we show how
to add latent variables to the model, trained using Expectation-
Maximization, to generate still be(cid:138)er graphs, that is, ones that
generalize be(cid:138)er to the test data. We evaluate the new method by
separating training and test graphs, building the model on the for-
mer and measuring the likelihood of the la(cid:138)er, as a more stringent
test of how well the model can generalize to new graphs. On this
metric, we (cid:128)nd that our latent-variable HRGs consistently outper-
form several existing graph models and provide interesting insights
into the building blocks of real world networks.
ACM Reference format:
Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang. 2016.
Growing Be(cid:138)er Graphs With Latent-Variable Probabilistic Graph Grammars.
In Proceedings of KDD, London, UK, August 2018 (KDD'18), 9 pages.
DOI: 10.1145/nnnnnnn.nnnnnnn
1 INTRODUCTION
Detecting, interpreting and comparing structures and properties of
network data about social interactions and complex physical phe-
nomena is critically important to a variety of problems. However,
this is a di(cid:129)cult task because comparisons between two or more
networks can involve checking for graph or subgraph isomorphism,
for which no tractable solution is known. Instead, various network
properties (e.g., degree distribution, centrality distributions) have
been used to describe and compare networks.
Another approach is to consider a network's global structure as a
by-product of a graph's local substructures [22]. More sophisticated
graph statistics are based on counting the number of small motifs
[16] or graphlets [4] present in the graph and comparing their
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a
fee. Request permissions from [email protected].
KDD'18, London, UK
© 2016 ACM. 978-x-xxxx-xxxx-x/YY/MM...$15.00
DOI: 10.1145/nnnnnnn.nnnnnnn
Salvador Aguinaga
University of Notre Dame
Notre Dame, IN 46556
[email protected]
David Chiang
University of Notre Dame
Notre Dame, IN 46556
[email protected]
distributions [23]. Unfortunately, graphlet counting presupposes
that all possible graphlets be enumerated ahead of time. Because
the number of unique graphlets increases exponentially with the
number of nodes in the graphlet, previous work has been limited
to graphlets of at most (cid:128)ve nodes.
An alternative to developing sophisticated graph statistics is
to learn graph generation models that encode properties of the
graph in various ways. Graph generators like the Exponential Ran-
dom Graph Model (ERGM) [20], the Chung-Lu Edge Con(cid:128)guration
Model (CL) [8], the Stochastic Kronecker Graph (SKG) [12], and
the Block Two-Level Erdos-R´enyi Model (BTER) [21] can be (cid:128)(cid:138)ed
to real-world graphs.
Recent work has found that many social and information net-
works have a more-or-less tree-like structure, which implies that de-
tailed topological properties can be identi(cid:128)ed and extracted from a
graph's tree decomposition [1]. Based on these (cid:128)ndings, Aguinaga et al. de-
scribed a method to turn a graph's tree decomposition into a Hyper-
edge Replacement Grammar (HRG) [2]. (cid:140)e HRG model can then
generate new graphs with properties similar to the original.
One limitation of the HRG model is that the instructions for
reassembling the building blocks, i.e., the graph grammar, encode
only enough information to ensure that the result is well-formed.
HRG production rules are extracted directly from the tree decom-
position; some rules from the top of the tree, some from the middle
of the tree, and some from the bo(cid:138)om of the tree. (cid:140)en, to generate
an new graph that is similar to the original graph, we would expect
that rules from the top of the tree decomposition are applied (cid:128)rst,
rules from the middle next, and rules from the leaves of the tree
are applied last. However, when generating a new graph the HRG
model applies rules probabilistically; where a rule's probability rel-
ative to its frequency in the grammar. However, when generating a
new graph, the rules in HRG models have no context on when they
should (cid:128)re. HRG models are in need of a mechanism that corrects
for this problem by providing context to the rules.
In the present work, we make three contributions:
(1) We improve the HRG model by encoding context in latent
variables.
(2) We propose a methodology for evaluating our model that
enforces a strict separation between training and test data,
in order to guard against over(cid:128)(cid:138)ing.
(3) We test our model on 6 train/test pairs of graphs and (cid:128)nd
that it discovers a be(cid:138)er model, that is, one that generalizes
KDD'18, August 2018, London, UK
Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang
1
Graph
2
3
5
4
6
Tree Decomposition
η0
3,4,5
⇒
η1
4,5
4,5,6
η2
η21
3,4,5
2,3,4,5
2,5
1,2,5
Tree Decomposition
η0
3,4,5
η1
4,5
4,5,6
η2
η21
3,4,5
2,3,4,5
2,5
1,2,5
Rule
N2
N3 →
2
3
5
4
Figure 1: An example graph and its tree decomposition. (cid:135)e
width of this tree decomposition is 3, i.e., the size of the
largest bag minus 1. (cid:135)e sepset between each bag and its
parent is labeled in blue. Bags are labeled (η0, etc.) for illus-
tration purposes only.
Figure 2: Extraction of an HRG production rule from η2 con-
taining graph vertices {2,3,4,5}. (cid:135)e LHS of the production
rule corresponds to the sepset of the bag and its parent. (cid:135)e
RHS of the production rule contains nodes from the bag, ter-
minal edges induced from the original graph, and nontermi-
nal edges from the sepset between the bag and its children.
be(cid:138)er to the test data, than the original HRG model as well
as Kronecker and Chung-Lu models.
2 BACKGROUND
Before we introduce our model, we (cid:128)rst provide an overview and
examples of the HRG model.
2.1 Hyperedge Replacement Grammars
Like a context free string grammar (CFG), an HRG has a set of
production rules A → R, where A is called the le(cid:137)-hand side (LHS)
and R is called the right-hand side (RHS). In an HRG, a rule's RHS is
a graph (or hypergraph) with zero or more external nodes. Applying
the rule replaces a hyperedge labeled A with the graph R; the nodes
formerly joined by the hyperedge are merged with the external
nodes of R. (cid:140)e HRG generates a graph by starting with the start
nonterminal, S, and applying rules until no more nonterminal-
labeled hyperedges remain.
2.2 Tree Decomposition
Given a graph H = (V , E), a tree decomposition is a tree whose
nodes, called bags, are labeled with subsets of V , in such a way that
the following properties are satis(cid:128)ed:
• For each node v ∈ V , there is a bag η that contains v.
• For each edge (u, v) ∈ E, there is a bag η that contains u
• If bags η and η(cid:48) contain v, then all the bags on the path
and v.
from η to η(cid:48) also contain v.
If η(cid:48) is the parent of η, de(cid:128)ne ¯η = η(cid:48)∩η (also known as the sepset
between η(cid:48) and η). If η is the root, then ¯η = ∅.
All graphs can be decomposed (though not uniquely) into a
tree decomposition, as shown in Fig. 1. In simple terms, a tree
decomposition of a graph organizes its nodes into overlapping bags
that form a tree. (cid:140)e width of the tree decomposition, which is
related to the size of the largest bag, measures how tree-like the
graph is. Finding optimal tree decompositions is NP-hard, but there
is signi(cid:128)cant interest in (cid:128)nding fast approximations because many
computationally di(cid:129)cult problems can be solved e(cid:129)ciently when
the data is constrained to be a tree-like structure.
2.3 Grammar Extraction
Aguinaga et al. [2] extract HRG rules from a graph, guided by a
tree decomposition of the graph. For example, Figure 2 illustrates
how one HRG rule is extracted from a tree decomposition.
If we assume that the tree decomposition is rooted, then every
bag η of the tree decomposition corresponds to an edge-induced
subgraph, which we write Gη, de(cid:128)ned as follows: For each edge
(u, v) ∈ E, if every bag η(cid:48) containing u, v is either equal to η or a
descendant of η, then (u, v) ∈ Hη. For example, in Figure 1, the bag
η2 = {2, 3, 4, 5} corresponds to the subgraph Hη2 whose edges are
1–2, 1–5, 2–3, 2–4, and 3–5.
If H = (V , E) is a graph and H(cid:48) = (V (cid:48), E(cid:48)) is an edge-induced
subgraph of H, we de(cid:128)ne an external node of H(cid:48) to be any node
of H(cid:48) that has a neighbor not in H(cid:48). (cid:140)en, de(cid:128)ne the operation of
replacing H(cid:48) with a hyperedge to be:
• Remove all edges in E(cid:48).
• Remove all nodes in V (cid:48) except for the external nodes.
• Add a hyperedge joining the external nodes.
Every bag η also induces a HRG rule N ¯η → R, where R is
constructed as follows.
• Make a copy of Hη.
• Label the nodes in ¯η as external nodes.
• For each child ηi of η, replace Hηi
N ¯ηi .
with a hyperedge labeled
For example, in Figure 2, the bag η2 induces the rule shown at
right. (cid:140)e LHS is N3 because the sepset between η2 and its parent
has three nodes (3, 4, 5); in the RHS, these three nodes are marked
as external. (cid:140)e node numbers are for illustration purposes only;
they are not actually stored with the production rules. (cid:140)e RHS
has two terminal edges (2–3, 2–4) from the original graph and one
nonterminal edge (2–5) corresponding to the sepset between η2
and its one child.
A(cid:137)er an HRG is extracted from the tree decomposition, its pro-
duction rules are gathered into a set, merging identical rules and
assigning to each unique rule (A → R) a probability P(A → R) =
P(R A) proportional to how many times it was encountered during
extraction. (cid:140)is grammar can then be used to randomly generate
new graphs, or compute the probability of another graph.
Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars
KDD'18, August 2018, London, UK
η, Xi
η, Xi
η, Xi
η, Xi
η1, Yj
η2, Zk
η1, Yj
η2, Zk
Figure 3: Inside and outside probabilities. Here, a hyper-
edge labeled Xi with three external nodes has generated a
subgraph η. (cid:135)e inside probability (le(cid:133)) of η, Xi is the prob-
ability of all the subderivations that generate subgraph η
from Xi. (cid:135)e outside probability (right) is the probability
of all the partial derivations that generate the complement
of subgraph η, with a hyperedge labeled Xi in place of the
subgraph.
Figure 4: Computation of inside and outside probabilities.
Here, a hyperedge labeled Xi has been rewritten with a rule
rhs with two hyperedges labeled Yj and Zk . At le(cid:133), the inside
probability of η, Xi is incremented by the product of the rule
and the inside probabilities of η1, Yj and η2, Zk . At right, the
outside probability of η1, Yj is incremented by the product
of the outside probability of η, Xi, the rule, and the inside
probability of η2, Zk .
3 LATENT VARIABLE PROBABILISTIC
HYPEREDGE REPLACEMENT GRAMMARS
Here, we improve upon the HRG model by encoding more context
into the model via latent variables, in a process that is analogous to
how a (cid:128)rst-order Markov chain can simulate a higher-order Markov
chain by expanding the state space.
In this section, we adopt a notational shortcut. In an HRG pro-
duction A → R, the RHS R is a hypergraph fragment containing
zero or more hyperedges with nonterminal labels Y1, . . . , Yr . We
suppress the graph structure of R and write the rule simply as
X → Y1 · · · Yr .
3.1 Nonterminal Splitting
Following previous work on probabilistic CFGs [15, 17], we in-
crease the context-sensitivity of the grammar by spli(cid:138)ing each
nonterminal symbol X in the grammar into n di(cid:130)erent subsymbols,
Xi , . . . , Xn, which could potentially represent di(cid:130)erent contexts
that the rule is used in. (cid:140)us, each rule in the original grammar is
replaced with several subrules that use all possible combinations of
the subsymbols of its nonterminal symbols.
For example, if n = 2, the rule N2 → would be split into
1 → and N2
N2
In general, a rule with r nonterminal symbols on its right-hand
side is split into nr +1 subrules.
2 → .
3.2 Learning
A(cid:137)er obtaining an n-split grammar from the training graphs, we
want to learn probabilities for the subrules that maximize the likeli-
hood of the training graphs and their tree decompositions. Here we
use Expectation-Maximization (EM) [9]. In the E (Expectation) step,
we use the Inside-Outside algorithm [11] to compute the expected
count of each subrule given the training data, and in the M (Maxi-
mization) step, we update the subrule probabilities by normalizing
their expected counts.
(cid:140)ese expected counts can be computed e(cid:129)ciently using dy-
namic programming. Given a tree decomposition T , consider a
bag η and its corresponding subgraph Hη. (cid:140)e grammar extrac-
tion method of Background Section 2.3 assigns Hη a nonterminal
symbol, which we write X. Let Xi be a subsymbol of X. (cid:140)e inside
probability of Hη with label Xi, wri(cid:138)en as Pin(η, Xi), is the total
probability of all derivations starting from Xi and ending in Hη.
(cid:140)e outside probability of Hη with label Xi, wri(cid:138)en as Pout(η, Xi),
is the total probability of all derivations starting from S and ending
in H with Hη replaced with a hyperedge labeled Xi. See Figure 3.
(cid:140)e inside probabilities can be calculated recursively, from smaller
subgraphs to larger subgraphs. We assume that bag η has at most
two children, which follows if T is in Chomsky Normal Form [7].
If η has two children, let η1 and η2 be the children, let Y and Z be
the labels of Hη1 and Hη2, and let Yj be and Zk be subsymbols of
Y and Z. (cid:140)en the inside probability of Hη with subsymbol Xi is
de(cid:128)ned by:
P(Xi → YjZk) Pin(η1, Yj) Pin(η2, Zk)
(cid:140)e outside probabilities are calculated top-down. If a bag η
has two children, then the outside probabilities of its children are
de(cid:128)ned by:
P(Xi → YjZk) Pout(η, Xi) Pin(η2, Zk)
P(Xi → YjZk) Pout(η, Xi) Pin(η1, Yk).
and similarly if η has only one child:
P(Xi → Yj) Pin(η1, Yj)
j
or no children:
Pin(η, Xi) = P(Xi → ).
Pin(η, Xi) =
Pin(η, Xi) =
j,k
Pout(η1, Yj) =
Pout(η2, Zk) =
i,k
i, j
KDD'18, August 2018, London, UK
Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang
See Figure 4 for an illustration of this computation. Similarly, if η
has only one child:
Pout(η1, Yj) =
i
P(Xi → Yj) Pout(η, Xi).
In the Expectation step, we compute the posterior probability of
each subrule at each bag of each training tree decomposition T :
P(η, Xi → YjZk T) =
P(η, Xi → Yj T) =
P(η, Xi → T) =
1
P(T) Pout(η, Xi)P(Xi → YjZk) ·
Pin(η1, Yj)Pin(η2, Zk)
1
P(T) Pout(η, Xi)P(Xi → Yj)Pin(η1, Yj)
1
P(T) Pout(η, Xi)P(Xi → )
where P(T) = Pin(η0, S) and η0 is the root bag of T . (cid:140)e expected
count of each subrule is calculated by summing over the posterior
probability of the rule over all nodes of all training trees:
P(η, Xi → α T)
E[c(Xi → α)] =
trees T
where α is any right-hand side.
η∈T
In the Maximization step, we use the expected counts calculated
above to update the rule probabilities:
P(Xi → α) :=
E[c(Xi → α)]
α(cid:48) E[c(Xi → α(cid:48))] .
(cid:140)ese probabilities are then used to repeat the E step. (cid:140)e method
is guaranteed to converge to a local maximum of the likelihood
function, but not necessarily to a global maximum.
4 EVALUATION
Current research in graph modelling and graph generation evaluate
their results by comparing the generated graphs with the original
graph by aggregate properties like degree distribution, clustering
coe(cid:129)cients, or diameter [2, 3, 5, 12, 13, 21]. (cid:140)ere are two potential
problems with such metrics. First, these metrics do not test how
well the model generalizes to model other graphs that represent
similar data. Second, they are heuristics from which a generated
graph's "goodness" is di(cid:129)cult to de(cid:128)ne or standardize. We discuss
and address both of these problems in this section.
4.1 Train/Test Data
Comparing generated graphs with the original graph cannot test
how well the model generalizes to other graphs that represent
similar data or di(cid:130)erent versions of the same network phenomena.
To see why, consider the extreme case, in which a model simply
memorizes the entire original graph. (cid:140)en, the generated graphs
are all identical to the original graph and therefore score perfectly
according to these metrics. (cid:140)is is akin to over(cid:128)(cid:138)ing a machine
learning classi(cid:128)er on training data and then testing it on the same
data, which would not reveal whether the model is able to generalize
to unseen instances.
In standard data mining and machine learning tasks, the over(cid:128)t-
ting problem is typically addressed through cross-validation or by
evaluating on heldout test data sets. In the present work, we adapt
the idea of using heldout test data to evaluate graph grammars.
In experiments on synthetic graphs, this means that we generate
two random graphs using the same model and parameters; we des-
ignate one as the training graph and the other as the test graph.
In experiments on real world graphs, we identify two graphs that
represent the same phenomenon, e.g., citations or collaborations,
and we mark one as the training graph and one as the test graph.
In reality, we might not be able to (cid:128)nd test graphs that have sim-
ilar properties as the training graph. Fortunately, cross-validation
can also be adapted to cases where no test graph is available by
using disjoint subgraph samples from a single graph.
4.2 Likelihood
In addition to the possibility of over(cid:128)(cid:138)ing, high-level aggregations
of graph properties may not always be good comparators of two
or more graphs.
Indeed, examples abound in related literature
showing how vastly di(cid:130)erent graphs can share similar aggregate
statistics [23]. We propose, as an additional metric, to evaluate
models by using them to measure the likelihood of a test graph
or graphs. Intuitively, this measures how well a model extracted
from the training graph generalizes to a test graph. If the model
simply memorizes the entire training graph, then it will have zero
likelihood (the worst possible) on the test graph. If the model is
be(cid:138)er able to generalize to new graphs, then it will have higher
likelihood on the test graph.
Unfortunately, it is not always computationally feasible to com-
pute the likelihood of graphs under previous models. But with
HRGs, it can be computed in linear time given a tree decomposition.
(It would also be possible, but slower, to sum the probabilities of all
possible tree decompositions [6].) (cid:140)e likelihood on a test graph
is simply Pin(η0, S), where η0 is the root of the tree decomposition.
Note that the model probabilities are estimated from the training
graphs, even when computing likelihood on test graphs. As this
number is usually very small, it's common to take logs and deal
with log-likelihoods.
4.3 Smoothing
A problem arises, however, if the test graph uses a rule that does
not exist in the grammar extracted from the training graph. (cid:140)en
the inside probability will be zero (or a log-probability of −∞). (cid:140)is
is because an HRG missing any necessary rules to construct the
test graph cannot generate the test graph exactly, and therefore
results in a zero probability.
In this case, we would still like to perform meaningful com-
parisons between models, if possible. So we apply smoothing as
follows. To test an HRG H on a test graph, we (cid:128)rst extract an HRG,
H(cid:48), from the test graph using the latent-variable HRG method. De-
(cid:128)ne an unknown rule to be a rule in H(cid:48) but not in H. (cid:140)en for
each unknown rule, we add the rule to H with a probability of .
We can then compute the log likelihood on the test graph under
the augmented grammar H ∪ H(cid:48). (cid:140)e (cid:128)nal test log likelihood is
calculated as
L = LH∪H(cid:48) − c(H
(cid:48) \ H) · log
where LH∪H(cid:48) is the log likelihood of the test graph under the aug-
mented grammar, c(H(cid:48) \ H) is the number of times that unknown
rules are used in the test graph, and is the probability of each
unknown rule. Note that as long as is much smaller than the
Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars
KDD'18, August 2018, London, UK
Table 1: Datasets used in experiments
Synth
Real
Citation
Type
Name
Barabasi-Albert train-ba
test-ba
Wa(cid:138)s-Strogatz train-ws
test-ws
train-cit-Hep(cid:140)
test-cit-HepPh
train-as-topo
test-as-733
train-amazon0312
test-amazon0302
train-wiki-vote
test-wiki-talk
Wikipedia
Purchase
Internet
Nodes
30,000
30,000
30,000
30,000
27,770
34,546
34,761
6,474
Edges
59,996
59,996
60,000
60,000
352,807
421,578
171,403
13,895
400,727 3,200,440
262,111 1,234,877
103,689
2,394,385 5,021,410
7,115
probability of any known rule, its value is irrelevant because L does
not depend on it.
Ideally, we would like the number of unknown rules to be zero.
In our experiments, we (cid:128)nd that increasing the number of train-
ing graphs and/or decreasing the size of the training graphs can
bring this number to zero or close to zero. Note that if two HRGs
have di(cid:130)ering sets of unknown rules, then it is not meaningful to
compare their log-likelihood on test graphs. But if two HRGs have
identical sets of unknown rules, then their log-likelihoods can be
meaningfully compared. We will exploit this fact when evaluating
models with latent variables in the next section.
5 EXPERIMENTS
In this section we test the ability of the latent-variable HRG (laHRG)
to generate graphs using the train-test framework described above.
We vary n, the number of subsymbols that each nonterminal symbol
is split into, from 1 to 4. Note that the 1-split laHRG model is
identical to the original HRG method. By varying the number
of splits, we will be able to (cid:128)nd the value that optimizes the test
likelihood. We have provided all of the source code and data analysis
scripts at h(cid:138)ps://github.com/cindyxinyiwang/laHRG.
5.1 Setup
Given a training graph, we extract and train a latent-variable HRG
from the graph. (cid:140)en we evaluate the goodness of the grammar by
calculating the log likelihood that the test graph could be generated
from the grammar.
For evaluation, we need to make sure that the test graph is
disjoint from the training graph to guard against over(cid:128)(cid:138)ing. Here
we introduce two techniques to achieve that: 1. we partition a single
graph into two disjoint parts so that they do not have overlapping
vertices. (cid:140)en we train laHRG from one part of the graph, and
calculate the log likelihood of the other disjoint part; 2. we choose
2 graphs of the same type, and use one for training and the other
for evaluation.
We evaluate laHRG with log likelihood metric for both evalua-
tion methods mentioned above on 6 types of graphs: 2 synthetic
graphs (generated from random graph generators), and 4 real world
graphs. For the (cid:128)rst evaluation method, we use 1 graph, each from
6 di(cid:130)erent types of graphs, and partition the graph for training
and testing purpose. For the second evaluation method, we do not
partition the training graph, but choose 1 additional graph from
each type of graphs for testing. (cid:140)e graphs were obtained from the
SNAP1 and KONECT2 graph repositories and are listed in Table 1.
Many of these graphs are too large for a tree decomposition to
be calculated. Instead, we randomly sampled a set of (cid:128)xed-size
subgraphs from the training graph and a set of (cid:128)xed-size subgraphs
from the test graph. Besides the concern from the calculation of
large tree decompositions, sampling multiple graphs is also impor-
tant for the extraction of a broad set of rules. Recall that if a single
rule required to generate the test graph is not found within the
training graph, then the likelihood will be 0. (cid:140)erefore, large test
graphs would require many more training graphs in order to reduce
(or hopefully eliminate) the need for smoothing.
In all experiments, we extract 500 samples of size-25 subgraphs
from the training graph. We extract an HRG from each size-25
subgraph, perform nonterminal spli(cid:138)ing and EM training. (cid:140)e 500
HRGs are then combined and their weights are normalized to create
the (cid:128)nal laHRG model. We also take 4 samples of size-25 subgraphs
from the test graph, calculate the log-likelihood of each under the
laHRG model, and report the mean log-likelihood and con(cid:128)dence
interval.
We chose these parameters empirically such that there is no
need for smoothing. If we were to increase the subgraph size for
the test graphs, then we would also need to increase the number of
training graph samples or rely on smoothing to ensure non-zero
likelihood.
To compute tree decompositions, we used a reimplementation of
the (cid:139)ickBB algorithm [10], with only the "simplicial" and "almost-
simplicial" heuristics.
5.2 Log-Likelihood Results
(cid:140)is section explains the performance of laHRG in terms of log-
likelihood metric on test graph for two di(cid:130)erent train-test split
methods mentioned in the previous section. We mainly analyze
the results for the second method: train on one graph and test on
another graph of the same type. (cid:140)e (cid:128)rst method has similar results,
and we include them here to show that our evaluation method also
works for graphs that are di(cid:129)cult to (cid:128)nd di(cid:130)erent test graphs of
the same type.
5.2.1 Validate on Di(cid:128)erent Graph of Same Type. We (cid:128)rst show
the log-likelihood results on synthetic datasets. (cid:140)e two random
graph models, the Barabasi-Albert graph and Wa(cid:138)s-Strogatz graph,
generate very di(cid:130)erent graph types. (cid:140)e four panels in Fig. 5 show
the log-likelihood results of four combinations of training graphs
and test graphs. Higher is be(cid:138)er.
As a sanity check, we also trained an laHRG model on a Barabasi-
Albert graph and tested it against a Wa(cid:138)s-Strogatz graph and vice
versa. We expect to see much lower log-liklihood scores because
the laHRG trained on one type of graph should be di(cid:130)erent than
another type of graph. (cid:140)e top-right and bo(cid:138)om-le(cid:137) panels in Fig. 5
1h(cid:138)ps://snap.stanford.edu/data
2h(cid:138)p://konect.uni-koblenz.de
KDD'18, August 2018, London, UK
Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang
ba-train
ws-train
Barabasi-Albert
Wa(cid:138)s-Strogatz
)
L
(
d
o
o
h
i
l
e
k
i
l
g
o
l
)
L
(
d
o
o
h
i
l
e
k
i
l
g
o
l
)
L
(
d
o
o
h
i
l
e
k
i
l
g
o
l
−200
−300
−400
−200
−300
−400
−200
−300
−400
Citation
Internet
Purchase
Wikipedia
1
2
3
4
1
2
3
4
# of splits (n)
# of splits (n)
Figure 7: Loglikelihood on subgraphs that are disjoint from
training graphs. Trends similar to Fig. 6 and Fig. 5 can be ob-
served with this method. Error bars indicate 95% con(cid:128)dence
intervals. Higher is better.
over(cid:128)(cid:138)ing. (cid:140)e increase in node-spli(cid:138)ing allows laHRG to (cid:128)ne-
tune the rule probabilities to the training graph, which we (cid:128)nd does
not always generalize to the test graph.
5.2.2 Validate on Disjoint Subgraph. If it is di(cid:129)cult to (cid:128)nd a test
graph of the same type with the training graph, it is still possible
to evaluate laHRG with the log likelihood metric. We can partition
the graph into two disjoint parts, and use one for training and the
other for testing. Fig. 7 shows the log likelihood of the test sub-
graphs that are disjoint from the training graphs. Again, spli(cid:138)ing
nonterminal symbols increase the log likelihood on the test graph,
but as the number of splits (n) increases, log likelihood decreases
due to over(cid:128)(cid:138)ing.
5.3 Comparing against other Graph Generators
(cid:140)e log-likelihood metric is a principled approach to calculating
the performance of a graph generator. Unfortunately, other graph
generators are not capable of performing this type of likelihood
calculation. In order to compare the laHRG graph model to other
state of the art graph generators including the Kronecker [12] and
Chung-Lu [8] models, we revert to traditional graph metrics to
compare a generated graph to a test graph(not against the original
graph).
Among the many choices for heuristic graph comparison metrics,
we chose the degree distribution and graphlet correlation distance
(GCD).
Recall that the sampling of 25-node subgraphs was necessary
to ensure a non-zero probability for the log likelihood evaluation.
No such requirement exists for evaluation on GCD. Nevertheless,
−100
−200
−300
−400
−100
−200
−300
−400
t
s
e
t
-
a
b
)
L
(
d
o
o
h
i
l
e
k
i
l
-
g
o
l
t
s
e
t
-
s
w
)
L
(
d
o
o
h
i
l
e
k
i
l
-
g
o
l
1
(none)
2
3
4
1
2
3
4
(none)
# of splits (n)
# of splits (n)
Figure 5: On synthetic graphs, splitting nonterminal sym-
bols (n ≥ 2) always improves log-likelihood on the test
graph, as compared to no splitting (n = 1). We did not ob-
serve over(cid:128)tting up to n = 4. Le(cid:133)/right column: train on
Barabasi-Albert (ba) or Watts-Strogatz (ws). Top/bottom row:
test on ba/ws.
−200
−300
−400
)
L
(
d
o
o
h
i
l
e
k
i
l
g
o
l
Citation
Internet
Purchase
Wikipedia
2
1
(none)
3
4
# of splits (n)
Figure 6: On real-world graphs, splitting nonterminal sym-
bols (n ≥ 2) always improves log-likelihood on the test
graph, as compared to no splitting (n = 1), peaking at 2 or
3 splits and then dropping due to over(cid:128)tting. Error bars in-
dicate 95% con(cid:128)dence intervals. Higher is better.
show that this is indeed the case; the log-likelihood measure and
the laHRG model pass the sanity check.
Next we extracted and tested the laHRG model on real world
graphs. (cid:140)e log-likelihood results are illustrated in Fig. 6 for laHRG
models of up to 4-splits. We (cid:128)nd that the log-likelihood scores peak
at n = 2 or 3 and then decreases when n = 4.
Recall that laHRG is the same as HRG [2] when n = 1. Based on
the results from Fig. 6, we (cid:128)nd that spli(cid:138)ing does indeed increase
HRG's ability to generate the test graph. However, as increasing n
shows diminishing returns and sometimes decreases performance.
(cid:140)e decrease in log likelihood when n > 2 is caused by model
Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars
KDD'18, August 2018, London, UK
to maintain an apples to apples comparison, we performed similar
graph sampling methods for degree distribution distance and GCD:
we trained Kronecker and Chung-Lu models on a 25-node subgraph
from the training graph, generated a 25-node graph, compared the
generated graph against a 25-node subgraph of the test graph, and
repeated this process 500 times.
As a baseline, we also compared the training and test graph
directly to get a basic sense of their similarity. So, we directly
compared 25-node subgraphs from the training graph to 25-node
subgraphs of the test graph without any model. We repeated this
direct comparison 500 times and report the mean and 95% con(cid:128)-
dence interval. We call this the "Direct" comparison because it does
not involve any graph generation.
5.3.1 Degree Distribution Distance. In the present work we ap-
ply the degree distribution distance of Przulj [18] to compare two
or more degree distributions. Lower degree distribution distance
between two graphs means they are more similar.
which is de(cid:128)ned as follows. Given a graph H, we (cid:128)rst scale and
normalize the degree distribution of H:
SH(k) = dH(k)
k
SH(k)
NH(k) = SH(k)
∞
TH =
k =1
in order to reduce the e(cid:130)ect of higher degree nodes, where dH(K) is
the number of nodes in H that have a degree of k. (cid:140)en we calculate
the distance between two degree distributions D (dH , dH(cid:48)) as:
TH
(cid:118)(cid:117)(cid:116) ∞
k =1
D (dH , dH(cid:48)) =
1√2
(NH(k) − NH(cid:48)(k))2
,
which is essentially a normalized sum of squares between the two
distributions. We call this metric the degree distribution distance.
Because this is a "distance" metric low values indicate high similar-
ity.
Figure 8 illustrates the results of the degree distribution distance.
Recall that the laHRG is identical to HRG [2] when n = 1. (cid:140)e
Kronecker and Chung-Lu do not have an n parameter, so their plots
are (cid:131)at. All points represent the mean of 500 repetitions; each
point contains error bars indicating the 95% con(cid:128)dence intervals –
although many error bars are too small to be seen.
(cid:140)e laHRG model generates graphs that more closely follow
the degree distribution of the test graph than graphs generated by
Kronecker and Chung-Lu models. Higher nonterminal spli(cid:138)ing,
i.e., n > 1, shows li(cid:138)le change on the degree distribution distance.
It is expected that the Direct baseline outperforms all graph
models, because the Direct baseline simply compares two graphs
generated from the exact same generation process, which rewards
an over(cid:128)t model.
Here, the HRG models predict the test graph's degree distribu-
tion be(cid:138)er than the Direct baseline does; whether this is because
they generalize be(cid:138)er, or due to chance, or some other reason,
would need further analysis to determine. In any case, nonterminal
spli(cid:138)ing (n ≥ 2) has only a slight e(cid:130)ect on the model, generally
0.8
0.6
0.4
0.2
0
0.8
0.6
0.4
0.2
0
0.8
0.6
0.4
0.2
0
e
c
n
a
t
s
i
d
e
e
r
g
e
d
e
c
n
a
t
s
i
d
e
e
r
g
e
d
e
c
n
a
t
s
i
d
e
e
r
g
e
d
Barabasi-Albert
Wa(cid:138)s-Strogatz
Citation
Internet
Purchase
Wikipedia
1
2
3
4
1
2
3
4
(none)
(none)
# of splits (n)
# of splits (n)
laHRG
Kron
Chung-Lu
Direct
Figure 8: HRG models are shown to generate graphs with
lower (= better) degree distribution distance to the test graph
when compared to other models. Splitting nonterminals
(n ≥ 2) sometimes decreases degree distance but sometimes
increases it.
a(cid:138)racting the degree distribution toward the training graph's and
away from the test graph's.
Interestingly, the Direct baseline has similar or be(cid:138)er perfor-
mance than the Kronecker and Chung-Lu methods. It is unlikely
that these results can be completely explained by over(cid:128)(cid:138)ing. In-
stead, Kronecker or Chung-Lu methods may perform poorly due to
under(cid:128)(cid:138)ing, wherein these models do not model the training graph
well enough. More work is needed to understand these results.
5.3.2 Graphlet Correlation Distance. Although the degree dis-
tribution is the most well known and widely adopted graph com-
parison metric, it is far from complete. (cid:140)e degree distribution
can be easily mimicked by two very large and di(cid:130)erent networks.
For example, previous work has shown that it is easy to construct
two or more networks with exactly the same degree distribution
but substantially di(cid:130)erent structure and function [14, 19]. (cid:140)ere is
mounting evidence which argues that the graphlet comparisons are
a be(cid:138)er way to measure the similarity between two graphs [18, 22].
Recent work from systems biology has identi(cid:128)ed a metric called
the Graphlet Correlation Distance (GCD). (cid:140)e GCD computes the
distance between two graphlet correlation matrices – one matrix
for each graph [24]. Because the GCD is a distance metric, low val-
ues indicate high similarity where the GCD is 0 i(cid:130) the two graphs
are isomorphic.
KDD'18, August 2018, London, UK
Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang
Barabasi-Albert
Wa(cid:138)s-Strogatz
Table 2: Number of rules/parameters in grammars extracted
from training graphs
D
C
G
D
C
G
D
C
G
6
4
2
0
6
4
2
0
6
4
2
0
Citation
Internet
Purchase
Wikipedia
1
2
3
4
1
2
3
4
Train
Citation
Internet
Purchase
Wikipedia
Barabasi-Albert
Wa(cid:138)s-Strogatz
1
1,156
1,005
969
1,065
48
60
n
3
19,885
14,057
18,237
20,891
930
1,023
2
7,193
5,686
6,196
6,891
298
346
4
44,410
29,247
38,186
42,841
2,126
2,380
particular graph property, but directly measures the ability of the
graph generator to generate the test graph.
6 GRAMMAR ANALYSIS
Recall that the HRG models merges two production rules if they
are identical. Spli(cid:138)ing rules produces subrules that have the same
structure, but di(cid:130)erent symbols, so they cannot be merged; spli(cid:138)ing
nonterminal nodes will therefore increase the size of the grammar.
In the worst case, the blowup could be cubic in n. Table 2 shows the
sizes of all the grammars used in the experiments. Because rules
with probability zero are excluded, the blowup is slightly less than
cubic.
Here we see a trade-o(cid:130) between model size and performance.
(cid:140)e larger the grammar gets, the be(cid:138)er it is able to (cid:128)t the training
graph. On the other hand, we prefer smaller models to mitigate the
possibility of over(cid:128)(cid:138)ing. If we had not used separate training and
test graphs, it would not be clear how to manage this trade-o(cid:130), but
our evaluation is able to demonstrate that larger grammars (up to
a point) are indeed able to generalize to new data.
What do the HRG grammars look like? (cid:140)e models learned by
unsupervised methods like EM can o(cid:137)en be di(cid:129)cult to interpret,
especially when the number of splits is high and the grammar is
large. Figure 10 shows selected 2-split rules extracted from the
as-topo training graph, namely, those with probability at least 0.1
and with at most two external nodes.
We can see that the subsymbols behave quite di(cid:130)erently from
each other. For example, the N2
1 rule adds a connection between its
two external nodes (via a third node), whereas none of the N2
2 rules
adds a connection (perhaps because, as can be seen in the RHS of
the N0 rule, they are already neighbors).
What can we learn from these graph grammars? (cid:140)is is an open
question. If we assume that the tree decomposition provides a
meaningful representation of the original graph, then we may be
able to interrogate and assign meaning to these rules depending on
their context. But we save this as a ma(cid:138)er for future work.
7 CONCLUSION
(cid:140)is present work identi(cid:128)es and addresses two problems in applying
Hyperedge Replacement Grammars (HRGs) to network data [2]
by adding latent variables in order to make production rules more
sensitive to context and by introducing a principled evaluation
(none)
(none)
# of splits (n)
# of splits (n)
laHRG
Kron
Chung-Lu
Direct
Figure 9: HRG models are shown to generate graphs with
lower (= better) graphlet correlation di(cid:130)erence (GCD) to the
test graph, when compared with other models. Splitting
nonterminals (n ≥ 2) sometimes inproves GCD and some-
times decreases it.
Figure 9 illustrates the results of the GCD. Recall that the laHRG
is identical to HRG [10] when n = 1. (cid:140)e Kronecker and Chung-
Lu do not have an n parameter, so their plots are (cid:131)at. All points
represent the mean of 500 repetitions; each point contains error
bars indicating the 95 con(cid:128)dence intervals (cid:128)(cid:147) although many error
bars are too small to be seen.
(cid:140)e Direct baseline illustrates how similar the training and test
graphs are. As expected, we (cid:128)nd that the Direct comparison is best
on the random Wa(cid:138)s-Strogatz graphs. But laHRG outperforms it
on all of the real-world graphs.
5.4 Comparison with Log Likelihood Metric
GCD and Degree Distribution metrics indicate that laHRG is a
be(cid:138)er graph generator than other options like Kron and Chung-
Lu graph generators, but our experiments seem to suggest that
spli(cid:138)ing nonterminals in HRG does not have much e(cid:130)ect in terms of
GCD and Degree Distribution. However, nonterminal spli(cid:138)ing does
increase log likelihood of the test graph, as explained in Section 5.2.
(cid:140)is discrepancy is probably because log likelihood metric is able to
capture more general structure and properties of a graph than GCD
and Degree Distribution. Both GCD and Degree Distribution only
focus on a speci(cid:128)c graph property, which might not be perfectly
correlated with overall structure of a graph. On the other hand,
the log likelihood metric we propose does not overemphasize a
Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars
KDD'18, August 2018, London, UK
[12]
[13]
[2] Salvador Aguinaga, Rodrigo Palacios, David Chiang, and Tim Weninger. 2016.
Growing Graphs from Hyperedge Replacement Graph Grammars. In Proc. CIKM.
469–478.
[3] Salvador Aguinaga and Tim Weninger. 2016. (cid:140)e in(cid:128)nity mirror test for analyzing
the robustness of graph generators. (2016). arXiv preprint arXiv:1606.04412.
[4] Nesreen K Ahmed, Jennifer Neville, Ryan A Rossi, and Nick Du(cid:129)eld. 2015.
[5] Deepayan Chakrabarti and Christos Faloutsos. 2006. Graph mining: Laws,
E(cid:129)cient graphlet counting for large networks. In Proc. ICDM. 1–10.
generators, and algorithms. Comput. Surveys 38, 1 (2006), 2.
[6] David Chiang, Jacob Andreas, Daniel Bauer, Karl Moritz Hermann, Bevan Jones,
and Kevin Knight. 2013. Parsing Graphs with Hyperedge Replacement Gram-
mars.. In Proc. ACL. 924–932.
[7] Noam Chomsky. 1959. On certain formal properties of grammars. Information
and control 2, 2 (1959), 137–167.
[8] Fan Chung and Linyuan Lu. 2002. Connected Components in Random Graphs
with Given Expected Degree Sequences. Annals of Combinatorics 6, 2 (2002),
125(cid:128)(cid:147)145.
[9] A. P. Dempster, N. M. Laird, and D. B. Rubin. 1977. Maximum likelihood from
incomplete data via the EM algorithm. Journal of the Royal Statistical Society,
Series B 39, 1 (1977), 1–38.
[10] Vibhav Gogate and Rina Dechter. 2004. A Complete Anytime Algorithm for
Treewidth. In Uncertainty in Arti(cid:128)cial Intelligence (UAI). 201–208.
[11] K. Lari and S. J. Young. 1990. (cid:140)e estimation of stochastic context-free grammars
using the Inside-Outside algorithm. Computer Speech and Language 4 (1990),
35–56.
Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, Christos Faloutsos, and
Zoubin Ghahramani. 2010. Kronecker graphs: An approach to modeling net-
works. Journal of Machine Learning Research 11 (2010), 985–1042.
Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2005. Graphs over time:
densi(cid:128)cation laws, shrinking diameters and possible explanations. In Proc. KDD.
177–187.
[14] Lun Li, David Alderson, John C Doyle, and Walter Willinger. 2005. Towards a
theory of scale-free graphs: De(cid:128)nition, properties, and implications. Internet
Mathematics 2, 4 (2005), 431–523.
[15] Takuya Matsuzaki, Yusuke Miyao, and Jun'ichi Tsujii. 2005. Probabilistic CFG
with Latent Annotations. In Proceedings of the 43rd Annual Meeting of the Associ-
ation for Computational Linguistics (ACL '05). Ann Arbor, Michigan, 75–82.
[16] Ron Milo, Shai Shen-Orr, Shalev Itzkovitz, Nadav Kashtan, Dmitri Chklovskii,
and Uri Alon. 2002. Network motifs: simple building blocks of complex networks.
Science 298, 5594 (2002), 824–827.
[17] Slav Petrov, Leon Barre(cid:138), Romain (cid:140)ibaux, and Dan Klein. 2006. Learning
Accurate, Compact, and Interpretable Tree Annotation. In Proceedings of the 21st
International Conference on Computational Linguistics and 44th Annual Meeting
of the ACL. 433(cid:128)(cid:147)440.
[18] Natasa Przulj. 2007. Biological network comparison using graphlet degree
distribution. Bioinformatics 23, 2 (2007), e177–e183.
scale-free or geometric? Bioinformatics 20, 18 (2004), 3508–3515.
[20] Garry Robins, Pip Pa(cid:138)ison, Yuval Kalish, and Dean Lusher. 2007. An introduction
to exponential random graph (p*) models for social networks. Social Networks
29, 2 (2007), 173(cid:128)(cid:147)191.
[21] Comandur Seshadhri, Tamara G Kolda, and Ali Pinar. 2012. Community structure
and scale-free collections of Erdos-R´enyi graphs. Physical Review E 85, 5 (2012),
056109.
Johan Ugander, Lars Backstrom, and Jon Kleinberg. 2013. Subgraph frequencies:
Mapping the empirical and extremal geography of large graph collections. In
Proc. WWW. 1307–1318.
Omer Nebil Yaveroglu, Noel Malod-Dognin, Darren Davis, Zoran Levnajic, Vuk
Janjic, Rasa Karapandza, Aleksandar Stojmirovic, and Natasa Przulj. 2014. Re-
vealing the hidden language of complex networks. Scienti(cid:128)c Reports 4 (2014),
4547.
Omer Nebil Yaveroglu, Tijana Milenkovi´c, and Natasa Przulj. 2015. Proper
evaluation of alignment-free network comparison methods. Bioinformatics 31,
16 (2015), 2697–2704.
[19] Natasa Przulj, Derek G Corneil, and Igor Jurisica. 2004. Modeling interactome:
[23]
[22]
[24]
N2
2
N1
1
N0 0.22−−−→
N1
1
0.88−−−→
N1
2
0.64−−−→
N2
1
0.70−−−→
N2
2
0.60−−−→
N2
2
0.18−−−→
N2
2
0.14−−−→
N2
2
N1
1
N1
1 N1
1
N1
2
Figure 10: Rules extracted from as-topo, 2-split nontermi-
nals, showing only those with probability at least 0.1 and
with at most two external nodes.
methodology that computes the log likelihood that an HRG model
generates a graph.
To guard against the possibility of the new model over(cid:128)(cid:138)ing
the original graph, we enforced a separation between the original
graph from which the model is trained and a di(cid:130)erent graph on
which the model is tested. (cid:140)is methodology should be be(cid:138)er at
selecting models that generalize well to new data. We con(cid:128)rmed
Aguinaga et al.'s original (cid:128)nding that HRGs perform be(cid:138)er than
the widely-used Kronecker and Chung-Lu models, and showed that
adding latent variables usually improves performance further.
Furthermore, we evaluated our method against the original HRG
model by directly measuring the log-likelihood of the test graphs
under all models. (cid:140)is metric is more principled than aggregation of
statistics of select graph properties. Under this metric, our method
improves over the original in all cases, peaking at either n = 2 or 3
splits.
HRGs extracted from tree decompositions are large. Spli(cid:138)ing
nonterminals grows the model even more. But our (cid:128)nding that 2- or
3-split grammars still generalize be(cid:138)er to unseen graphs suggests
that these models are not unreasonably large.
It remains for future work to test this claim by evaluating other
generative graph models on test graphs distinct from training
graphs. It should also be possible to simplify the HRG and laHRG
models by trying to prune low-probability rules while maintaining
high performance. Finally, more analysis is needed to provide an
interpretation for the pa(cid:138)erns automatically discovered by laHRGs.
REFERENCES
[1] Aaron B. Adcock, Blair D. Sullivan, and Michael W. Mahoney. 2016. Tree decom-
positions and social graphs. Internet Mathematics 12, 5 (2016), 315–361.
|
1612.08447 | 1 | 1612 | 2016-12-26T21:50:42 | Higher-order organization of complex networks | [
"cs.SI",
"cs.DM",
"physics.soc-ph"
] | Networks are a fundamental tool for understanding and modeling complex systems in physics, biology, neuroscience, engineering, and social science. Many networks are known to exhibit rich, lower-order connectivity patterns that can be captured at the level of individual nodes and edges. However, higher-order organization of complex networks---at the level of small network subgraphs---remains largely unknown. Here we develop a generalized framework for clustering networks based on higher-order connectivity patterns. This framework provides mathematical guarantees on the optimality of obtained clusters and scales to networks with billions of edges. The framework reveals higher-order organization in a number of networks including information propagation units in neuronal networks and hub structure in transportation networks. Results show that networks exhibit rich higher-order organizational structures that are exposed by clustering based on higher-order connectivity patterns. | cs.SI | cs |
Higher-order organization of complex networks
Austin R. Benson,1 David F. Gleich,2 Jure Leskovec3∗
1Institute for Computational and Mathematical Engineering, Stanford University
2Department of Computer Science, Purdue University
3Computer Science Department, Stanford University
∗To whom correspondence should be addressed;
E-mail: [email protected]
Networks are a fundamental tool for understanding and modeling complex
systems in physics, biology, neuroscience, engineering, and social science. Many
networks are known to exhibit rich, lower-order connectivity patterns that can
be captured at the level of individual nodes and edges. However, higher-order
organization of complex networks-at the level of small network subgraphs-
remains largely unknown. Here we develop a generalized framework for clus-
tering networks based on higher-order connectivity patterns. This framework
provides mathematical guarantees on the optimality of obtained clusters and
scales to networks with billions of edges. The framework reveals higher-order
organization in a number of networks including information propagation units
in neuronal networks and hub structure in transportation networks. Results
show that networks exhibit rich higher-order organizational structures that
are exposed by clustering based on higher-order connectivity patterns.
1
Networks are a standard representation of data throughout the sciences, and higher-order
connectivity patterns are essential to understanding the fundamental structures that control and
mediate the behavior of many complex systems (1–7). The most common higher-order struc-
tures are small network subgraphs, which we refer to as network motifs (Figure 1A). Network
motifs are considered building blocks for complex networks (1, 8). For example, feedforward
loops (Figure 1A M5) have proven fundamental to understanding transcriptional regulation net-
works (9), triangular motifs (Figure 1A M1–M7) are crucial for social networks (4), open bidi-
rectional wedges (Figure 1A M13) are key to structural hubs in the brain (10), and two-hop
paths (Figure 1A M8–M13) are essential to understanding air traffic patterns (5). While network
motifs have been recognized as fundamental units of networks, the higher-order organization
of networks at the level of network motifs largely remains an open question.
Here we use higher-order network structures to gain new insights into the organization of
complex systems. We develop a framework that identifies clusters of network motifs. For each
network motif (Figure 1A), a different higher-order clustering may be revealed (Figure 1B),
which means that different organizational patterns are exposed depending on the chosen motif.
Conceptually, given a network motif M, our framework searches for a cluster of nodes S
with two goals. First, the nodes in S should participate in many instances of M. Second, the set
S should avoid cutting instances of M, which occurs when only a subset of the nodes from a
motif are in the set S (Figure 1B). More precisely, given a motif M, the higher-order clustering
framework aims to find a cluster (defined by a set of nodes S) that minimizes the following
ratio:
φM (S) = cutM (S, ¯S)/ min(volM (S), volM ( ¯S)),
(1)
where ¯S denotes the remainder of the nodes (the complement of S), cutM (S, ¯S) is the number
of instances of motif M with at least one node in S and one in ¯S, and volM (S) is the number
of nodes in instances of M that reside in S. Equation 1 is a generalization of the conductance
2
metric in spectral graph theory, one of the most useful graph partitioning scores (11). We refer
to φM (S) as the motif conductance of S with respect to M.
Finding the exact set of nodes S that minimizes the motif conductance is computation-
ally infeasible (12). To approximately minimize Equation 1 and hence identify higher-order
clusters, we develop an optimization framework that provably finds near-optimal clusters (Sup-
plementary Materials (13)). We extend the spectral graph clustering methodology, which is
based on the eigenvalues and eigenvectors of matrices associated with the graph (11), to ac-
count for higher-order structures in networks. The resulting method maintains the properties
of traditional spectral graph clustering: computational efficiency, ease of implementation, and
mathematical guarantees on the near-optimality of obtained clusters. Specifically, the clusters
identified by our higher-order clustering framework satisfy the motif Cheeger inequality (14),
which means that our optimization framework finds clusters that are at most a quadratic factor
away from optimal.
The algorithm (illustrated in Figure 1C) efficiently identifies a cluster of nodes S as follows:
• Step 1: Given a network and a motif M of interest, form the motif adjacency matrix WM
whose entries (i, j) are the co-occurrence counts of nodes i and j in the motif M:
(WM )ij = number of instances of M that contain nodes i and j.
(2)
• Step 2: Compute the spectral ordering σ of the nodes from the normalized motif Laplacian
matrix constructed via WM (15).
• Step 3: Find the prefix set of σ with the smallest motif conductance, formally: S :=
arg minr φM (Sr), where Sr = {σ1, . . . , σr}.
For triangular motifs, the algorithm scales to networks with billions of edges and typically
only takes several hours to process graphs of such size. On smaller networks with hundreds
3
of thousands of edges, the algorithm can process motifs up to size 9 (13). While the worst-
case computational complexity of the algorithm for triangular motifs is Θ(m1.5) , where m is
the number of edges in the network, in practice the algorithm is much faster. By analyzing
16 real-world networks where the number of edges m ranges from 159,000 to 2 billion we
found the computational complexity to scale as Θ(m1.2). Moreover, the algorithm can easily be
parallelized and sampling techniques can be used to further improve performance (16).
The framework can be applied to directed, undirected, and weighted networks as well as
motifs (13). Moreover, it can also be applied to networks with positive and negative signs on
the edges, which are common in social networks (friend vs. foe or trust vs. distrust edges) and
metabolic networks (edges signifying activation vs. inhibition) (13). The framework can be
used to identify higher-order structure in networks where domain knowledge suggests the motif
of interest. In the Supplementary Material (13) we also show that when domain-specific higher-
order pattern is not known in advance, the framework can also serve to identify which motifs
are important for the modular organization of a given network (13). Such a general framework
allows for a study of complex higher-order organizational structures in a number of different
networks using individual motifs and sets of motifs. The framework and mathematical theory
immediately extend to other spectral methods such as localized algorithms that find clusters
around a seed node (17) and algorithms for finding overlapping clusters (18). To find several
clusters, one can use embeddings from multiple eigenvectors and k-means clustering (13,19) or
apply recursive bi-partitioning (13, 20).
The framework can serve to identify higher-order modular organization of networks. We
apply the higher-order clustering framework to the C. elegans neuronal network, where the four-
node "bi-fan" motif (Figure 2A) is over-expressed (1). The higher-order clustering framework
then reveals the organization of the motif within the C. elegans neuronal network. We find
a cluster of 20 neurons in the frontal section with low bi-fan motif conductance (Figure 2B).
4
The cluster shows a way that nictation is controlled. Within the cluster, ring motor neurons
(RMEL/V/R), proposed pioneers of the nerve ring (21), propagate information to IL2 neurons,
regulators of nictation (22), through the neuron RIH and several inner labial sensory neurons
(Figure 2C). Our framework contextualizes the sifnifance of the bi-fan motif in this control
mechanism.
The framework also provides new insights into network organization beyond the clustering
of nodes based only on edges. Results on a transportation reachability network (23) demonstrate
how it finds the essential hub interconnection airports (Figure 3). These appear as extrema on
the primary spectral direction (Figure 3C) when two-hop motifs (Figure 3A) are used to capture
highly connected nodes and non-hubs. (The first spectral coordinate of the normalized motif
Laplacian embedding was positively correlated with the airport city's metropolitan population
with Pearson correlation 99% confidence interval [0.33, 0.53]). The secondary spectral direc-
tion identified the West-East geography in the North American flight network (it was negatively
correlated with the airport city's longitude with Pearson correlation 99% confidence interval
[-0.66, -0.50]). On the other hand, edge-based methods conflate geography and hub structure.
For example, Atlanta, a large hub, is embedded next to Salina, a non-hub, with an edge-based
method (Figure 3D).
Our higher-order network clustering framework unifies motif analysis and network partitioning-
two fundamental tools in network science-and reveals new organizational patterns and mod-
ules in complex systems. Prior efforts along these lines do not provide worst-case perfor-
mance guarantees on the obtained clustering (24), do not reveal which motifs organize the
network (25), or rely on expanding the size of the network (26, 27). Theoretical results in
the Supplementary Material (13) also explain why classes of hypergraph partitioning methods
are more general than previously assumed and how motif-based clustering provides a rigorous
framework for the special case of partitioning directed graphs. Finally, the higher-order net-
5
work clustering framework is generally applicable to a wide range of networks types, including
directed, undirected, weighted, and signed networks.
6
Figure 1: Higher-order network structures and the higher-order network clustering
framework. A: Higher-order structures are captured by network motifs. For example, all
13 connected three-node directed motifs are shown here. B: Clustering of a network based on
motif M7. For a given motif M, our framework aims to find a set of nodes S that minimizes
motif conductance, φM (S), which we define as the ratio of the number of motifs cut (filled
triangles cut) to the minimum number of nodes in instances of the motif in either S or ¯S (13).
In this case, there is one motif cut. C: The higher-order network clustering framework. Given a
graph and a motif of interest (in this case, M7), the framework forms a motif adjacency matrix
(WM) by counting the number of times two nodes co-occur in an instance of the motif. An
eigenvector of a Laplacian transformation of the motif adjacency matrix is then computed. The
ordering σ of the nodes provided by the components of the eigenvector (15) produces nested sets
Sr = {σ1, . . . , σr} of increasing size r. We prove that the set Sr with the smallest motif-based
conductance, φM (Sr), is a near-optimal higher-order cluster (13).
7
ABCFigure 2: Higher-order cluster in the C. elegans neuronal network (28). A: The 4-node
"bi-fan" motif, which is over-expressed in neuronal networks (1). Intuitively, this motif de-
scribes a cooperative propagation of information from the nodes on the left to the nodes on
the right. B: The best higher-order cluster in the C. elegans frontal neuronal network based on
the motif in (A). The cluster contains three ring motor neurons (RMEL/V/R; cyan) with many
outgoing connections, serving as the source of information; six inner labial sensory neurons
(IL2DL/VR/R/DR/VL; orange) with many incoming connections, serving as the destination of
information; and four URA neurons (purple) acting as intermediaries. These RME neurons
have been proposed as pioneers for the nerve ring (21), while the IL2 neurons are known reg-
ulators of nictation (22), and the higher-order cluster exposes their organization. The cluster
also reveals that RIH serves as a critical intermediary of information processing. This neuron
has incoming links from all three RME neurons, outgoing connections to five of the six IL2
neurons, and the largest total number of connections of any neuron in the cluster. C: Illustration
of the higher-order cluster in the context of the entire network. Node locations are the true two-
dimensional spatial embedding of the neurons. Most information flows from left to right, and
we see that RME/V/R/L and RIH serve as sources of information to the neurons on the right.
8
Figure 3: Higher-order spectral analysis of a network of airports in Canada and the United
States (23). A: The three higher-order structures used in our analysis. Each motif is "an-
chored" by the blue nodes i and j, which means our framework only seeks to cluster together
the blue nodes. Specifically, the motif adjacency matrix adds weight to the (i, j) edge based
on the number of third intermediary nodes (green squares). The first two motifs correspond
to highly-connected cities and the motif on the right connects non-hubs to non-hubs. B: The
top 50 most populous cities in the United States which correspond to nodes in the network.
The edge thickness is proportional to the weight in the motif adjacency matrix WM. The thick,
dark lines indicate that large weights correspond to popular mainline routes. C: Embedding of
nodes provided by their corresponding components of the first two non-trivial eigenvectors of
the normalized Laplacian for WM. The marked cities are eight large U.S. hubs (green), three
West coast non-hubs (red), and three East coast non-hubs (purple). The primary spectral coor-
dinate (left to right) reveals how much of a hub the city is, and the second spectral coordinate
(top to bottom) captures West-East geography (13). D: Embedding of nodes provided by their
corresponding components in the first two non-trivial eigenvectors of the standard, edge-based
(non-higher-order) normalized Laplacian. This method does not capture the hub and geography
found by the higher-order method. For example, Atlanta, the largest hub, is in the center of the
embedding, next to Salina, a non-hub.
9
S1 Derivation and analysis of the motif-based spectral clus-
tering method
We now cover the background and theory for deriving and understanding the method presented
in the main text. We will start by reviewing the graph Laplacian and cut and volume measures
for sets of vertices in a graph. We then define network motifs in Section S1.2 and generalizes the
notions of cut and volume to motifs. Our new theory is presented in Section S1.6 and then we
summarize some extensions of the method. Finally, we relate our method to existing methods
for directed graph clustering and hypergraph partitioning.
S1.1 Review of the graph Laplacian for weighted, undirected graphs
Consider a weighted, undirected graph G = (V, E), with V = n. Further assume that G has no
isolated nodes. Let W encode the weights, of the graph, i.e., Wij = Wji = weight of edge (i, j).
The diagonal degree matrix D is defined as Dii =(cid:80)n
j=1 Wij, and the graph Laplacian is defined
as L = D − W . We now relate these matrices to the conductance of a set S, φ(G)(S):
φ(G)(S) = cut(G)(S, ¯S)/ min(vol(G)(S), vol(G)( ¯S)),
(S3)
(S4)
(S5)
(cid:88)
(cid:88)
i∈S, j∈ ¯S
Wij,
cut(G)(S, ¯S) =
vol(G)(S) =
Dii
i∈S
Here, ¯S = V \S. (Note that conductance is a symmetric measure in S and ¯S, i.e., φ(G)(S) =
φ(G)( ¯S).) Conceptually, the cut and volume measures are defined as follows:
cut(G)(S, ¯S) = weighted sum of weights of edges that are cut
vol(G)(S) = weighted number of edge end points in S
(S6)
(S7)
Since we have assumed G has no isolated nodes, vol(G)(S) > 0. If G is disconnected, then
for any connected component C, φ(G)(C) = 0. Thus, we usually consider breaking G into
S10
connected components as a pre-processing step for algorithms that try to find low-conductance
sets.
We now relate the cut metric to a quadratic form on L. Later, we will derive a similar form
for a motif cut measure. Note that for any vector y ∈ Rn,
(cid:88)
(i,j)∈E
yT Ly =
wij(yi − yj)2.
(S8)
Now, define x to be an indicator vector for a set of nodes S i.e., xi = 1 if node i is in S and
xi = 0 if node i is in ¯S. Note that if an edge (i, j) is cut, then xi and xj take different values
and (xi − xj)2 = 1; otherwise, (xi − xj)2 = 0. Thus,
xT Lx = cut(G)(S, ¯S).
(S9)
S1.2 Definition of network motifs
We now define network motifs as used in our work. We note that there are alternative definitions
in the literature (1). We consider motifs to be a pattern of edges on a small number of nodes (see
Figure S4). Formally, we define a motif on k nodes by a tuple (B,A), where B is a k× k binary
matrix and A ⊂ {1, 2, . . . , k} is a set of anchor nodes. The matrix B encodes the edge pattern
between the k nodes, and A labels a relevant subset of nodes for defining motif conductance.
In many cases, A is the entire set of nodes. Let χA be a selection function that takes the subset
of a k-tuple indexed by A, and let set(·) be the operator that takes an (ordered) tuple to an
(unordered) set. Specifically,
set((v1, v2, . . . , vk)) = {v1, v2, . . . , vk}.
The set of motifs in an unweighted (possibly directed) graph with adjacency matrix A, denoted
M (B,A), is defined by
M (B,A) = {(set(v), set(χA(v))) v ∈ V k,
v1, . . . , vk distinct, Av = B},
(S10)
S11
Figure S4: A: Illustration of network motifs used throughout the main text and supplementary
material. The motif Medge is used to represent equivalence to undirected the graph. B: Diagram
of motif definitions. The motif is defined by a binary matrix B and an anchor set of nodes.
The figure shows an anchored version of motif M2 with anchors on the nodes that form the
bi-directional edge. There are two instances of the motif in the graph on the right. Note that
({a, b, d},{a, b}) is not included in the set of motif instances because the induced subgraph on
the nodes a, b, and d is not isomorphic to the graph defined by B.
where Av is the k × k adjacency matrix on the subgraph induced by the k nodes of the ordered
vector v. Figure S4 illustrates these definitions. The set operator is a convenient way to avoid
duplicates when defining M (B,A) for motifs exhibiting symmetries. Henceforth, we will just
use (v, χA(v)) to denote (set(v), set(χA(v))) when discussing elements of M (B,A). Further-
more, we call any (v, χA(v)) ∈ M (B,A) a motif instance. When B and A are arbitrary or
clear from context, we will simply denote the motif set by M.
We call motifs where χA(v) = v simple motifs and motifs where χA(v) (cid:54)= v anchored
motifs. Motif analysis in the literature has mostly analyzed simple motifs (29). However, the
anchored motif provides us with a more general framework, and we use an anchored motif for
S12
M3M5M4M1M2M8M7M6M9M10M11M12M13MbifanMedge+edcbaM2ABthe analysis of the transportation reachability network.
Often, a distinction is made between a functional and a structural motif (30) (or a subgraph
and an induced subgraph (31)) to distinguish whether a motif specifies simply the existence
of a set of edges (functional motif or subgraph) or the existence and non-existence of edges
(structural motif or induced subgraph). By the definition in Equation S10, we refer to structural
motifs in this work. Note that functional motifs consist of a set of structural motifs. Our cluster-
ing framework allows for the simultaneous consideration of several motifs (see Section S1.9),
so we have not lost any generality in our definitions.
S1.3 Definition of motif conductance
Recall that the key definitions for defining conductance are the notions of cut and volume. For
an unweighted graph, these are
φ(G)(S, ¯S) = cut(G)(S, ¯S)/ min(vol(G)(S), vol(G)( ¯S)),
cut(G)(S, ¯S) = number of edges cut,
vol(G)(S) = number of edge end points in S.
(S11)
(S12)
(S13)
Our conceptual definition of motif conductance simply replaces an edge with a motif instance
of type M:
M (S) = cut(G)
φ(G)
M ( ¯S)),
M (S, ¯S)/ min(vol(G)
M (S), vol(G)
cut(G)
M (S, ¯S) = number of motif instances cut,
vol(G)
M (S) = number of motif instance end points in S.
(S14)
(S15)
(S16)
We say that a motif instance is cut if there is at least one anchor node in S and at least one
S13
anchor node in ¯S. We can formalize this when given a motif set M as in Equation S10:
cut(G)
M (S, ¯S) =
vol(G)
M (S) =
(cid:88)
(cid:88)
(v,χA(v))∈M
(v,χA(v))∈M
i∈χA(v)
1(∃ i, j ∈ χA(v) i ∈ S, j ∈ ¯S),
(cid:88)
1(i ∈ S),
(S17)
(S18)
where 1(s) is the truth-value indicator function on s, i.e., 1(s) takes the value 1 if the statement
s is true and 0 otherwise. Note that Equation S17 makes explicit use of the anchor set A. The
motif cut measure only counts an instance of a motif as cut if the anchor nodes are separated,
and the motif volume counts the number of anchored nodes in the set. However, two nodes
in an achor set may a part of several motif instances. Specifically, following the definition in
Equation S10, there may be many different v with the same χA(v), and the nodes in χA(v) still
get counted proportional to the number of motif instances.
S1.4 Definition of the motif adjacency matrix and motif Laplacian
Given an unweighted, directed graph and a motif set M, we conceptually define the motif
adjacency matrix by
(WM )ij = number of motif instances in M where i and j participate in the motif.
(S19)
Or, formally,
(WM )ij =
(cid:88)
(v,χA(v))∈M
1({i, j} ⊂ χA(v)),
(S20)
for i (cid:54)= j. Note that weight is added to (WM )ij only if i and j appear in the anchor set.
This is important for the transportation reachability network analyzed in the main text and in
Section S6, where weight is added between cities i and j based on the number of intermediary
cities that can be traversed between them.
Next, we define the motif diagonal degree matrix by (DM )ii = (cid:80)n
j=1(WM )ij and the
motif Laplacian as LM = DM − WM. Finally, the normalized motif Laplacian is LM =
S14
M = I − D
−1/2
−1/2
D
M LM D
forms LM and derive the main clustering method that uses an eigenvector of LM.
−1/2
M . The theory in the next section will examine quadratic
−1/2
M WM D
S1.5 Algorithm for finding a single cluster
We are now ready to describe the algorithm for finding a single cluster in a graph. The algorithm
finds a partition of the nodes into S and ¯S. The motif conductance is symmetric in the sense
M ( ¯S), so either set of nodes (S or ¯S) could be interpreted as a cluster. How-
ever, in practice, it is common that one set is substantially smaller than the other. We consider
M (S) = φ(G)
that φ(G)
this smaller set to represent a module in the network. The algorithm is based on the Fiedler
partition (32) of the motif weighted adjacency matrix and is presented below in Algorithm 1.1
Algorithm 1: Motif-based clustering algorithm for finding a single cluster.
DM ← diagonal matrix with (DM )ii =(cid:80)
Input: Directed, unweighted graph G and motif M
Output: Motif-based cluster (subset of nodes in G)
(WM )ij ← number of instances of M that contain nodes i and j.
GM ← weighted graph induced WM
z ← eigenvector of second smallest eigenvalue for LM = I − D
σi ← to be index of D
−1/2
M z with ith smallest value
/* Sweep over all prefixes of σ
S ← arg minl φ(GM )(Sl), where Sl = {σ1, . . . , σl}
if S < ¯S then
j(WM )ij
−1/2
M WM D
−1/2
M
*/
else
return S
return ¯S
It is often informative to look at all conductance values found from the sweep procedure.
We refer to a plot of φ(GM )(Sl) versus l as a sweep profile plot. In the following subection, we
show that when the motif has three nodes, φ(GM )(Sl) = φ(G)
M (Sl). In this case, the sweep profile
shows how motif conductance varies with the size of the sets in Algorithm 1.
In the following subsection, we show that when the motif M has three nodes, the cluster
1An implementation of Algorithm 1 is available in SNAP. See http://snap.stanford.edu/
higher-order/.
S15
satisfies φ(G)
√
M (S) ≤ 4
φ∗, where φ∗ is the smallest motif conductance over all sets of nodes. In
other words, the cluster is nearly optimal. Later, we extend this algorithm to allow for signed,
colored, and weighted motifs and to simultaneously finding multiple clusters.
S1.6 Motif Cheeger inequality for network motifs with three nodes
We now derive the motif Cheeger inequality for simple three-node motifs, or, in general, motifs
with three anchor nodes. The crux of this result is deriving a relationship between the motif con-
ductance function and the weighted motif adjacency matrix, from which the Cheeger inequality
is essentially a corollary. For the rest of this section, we will use the following notation. Given
an unweighted, directed G and a motif M, the corresponding weighted graph defined by Equa-
tion S20 is denoted by GM.
The following Lemma relates the motif volume to the volume in the weighted graph. This
lemma applies to any anchor set A consisting of at least two nodes. For our main result, we will
apply the lemma assuming A = 3. However, we will apply the lemma more generally when
discussing four node motifs in Section S1.7.
Lemma 1. Let G = (V, E) be a directed, unweighted graph and let GM be the weighted graph
for a motif on k nodes and A ≥ 2 anchor nodes. Then for any S ⊂ V ,
vol(G)
M (S) =
1
A − 1
vol(GM )(S)
Proof. Consider an instance (v, χA(v)) of a motif. Let (u1, . . . , uA) = χA(v). By Equa-
tion S20, (WM )u1,j is incremented by one for j = u2, . . . , uA. Since (DM )u1,u1 =(cid:80)
j (WM )u1,j,
the motif end point u1 is counted A − 1 times.
S16
Figure S5: Illustrations of the quadratic forms on indicator functions for set assignment. Here,
the blue nodes have assignment to set S and the green nodes have assignment to set ¯S. The
quadratic function gives the penalty for cutting that motif. A: Illustration of Equation S21. The
quadratic form is proportional to the indicator on whether or not the motif is cut. B: Illustration
of Equation S22. The quadratic form is equal to zero when all nodes are in the same set.
However, the form penalizes 2/2 splits more than 3/1 splits.
The following lemma states that the truth value for determining whether three binary vari-
ables in {−1, 1} are not all equal is a quadratic function of the variables (see Figure S5). Be-
cause this function is quadratic, we will be able to relate motif cuts on three nodes to a quadratic
form on the motif Laplacian.
S17
xi2 + xj2 + xk2 - xixj - xjxk -xkxi =xi = 1xj = 1xk = 1ijkxi = -1xj = -1xk = -1ijkxi = 1xj = 1xk = -1ijkxi = 1xj = -1xk = -1ijk0044iikjlxj = 1xk = 1xi = 1xl = 1iikjlxj = -1xk = -1xi = -1xl = -1iikjlxj = 1xk = -1xi = 1xl = 1iikjlxj = -1xk = -1xi = 1xl = -1iikjlxj = 1xk = -1xi = 1xl = -1006686 - xixj - xixk - xixl - xjxk - xjxl - xkxl =BALemma 2. Let xi, xj, xk ∈ {−1, 1}. Then
4 · 1(xi, xj, xk not all the same) = x2
k − xixj − xjxk − xkxi.
i + x2
j + x2
It will be easier to derive our results with binary indicator variables taking values in {−1, 1}.
However, in terms of the quadratic form on the Laplacian, we have already seen how indicator
vectors taking values in {0, 1} relate to the cut value (Equation S9). The following lemma
shows that the {0, 1} and {−1, 1} indicator vectors are equivalent, up to a constant, for defining
the cut measure in terms of the Laplacian.
Lemma 3. Let z ∈ {0, 1}n and define x by xi = 1 if zi = 1 and xi = −1 if zi = 0. Then for
any graph Laplacian L = D − W , 4zT Lz = xT Lx.
Proof.
(cid:88)
(i,j)∈E
xT Lx =
Wij(xi − xj)2 =
(cid:88)
(i,j)∈E
Wij4(zi − zj)2 = 4zT Lz.
The next lemma contains the essential result that relates motif cuts in the original graph
G to weighted edge cuts in GM. In particular, the lemma shows that the motif cut measure
is proportional to the cut on the weighted graph defined in Equation S19 when there are three
anchor nodes.
Lemma 4. Let G = (V, E) be a directed, unweighted graph and let GM be the weighted graph
for a motif with A = 3. Then for any S ⊂ V ,
cut(G)
M (S, ¯S) =
1
2
cut(GM )(S, ¯S)
S18
Proof. Let x ∈ {−1, 1}n be an indicator vector of the node set S.
(cid:88)
(cid:88)
(v,{i,j,k})∈M
4 · cut(G)
M (S, ¯S) =
=
=
4 · 1(xi, xj, xk not all the same)
(cid:1) − (xixj + xjxk + xkxi)
(cid:0)x2
i + x2
j + x2
k
xT WM x
(v,{i,j,k})∈M
xT DM x − 1
1
2
2
1
2
xT LM x
=
= 2 · cut(GM )(S, ¯S).
The first equality follows from the definition of cut motifs (Equation S17). The second equality
follows from Lemma 2. The third equality follows from Lemma 1 and Equation S20. The fourth
equality follows from the definition of LM. The fifth equality follows from Lemma 3.
We are now ready to prove our main result, namely that motif conductance on the orig-
inal graph G is equivalent to conductance on the weighted graph GM when there are three
anchor nodes. The result is a consequence of the volume and cut relationships provided by
Lemmas 1 and 4.
Theorem 5. Let G = (V, E) be a directed, unweighted graph and let WM be the weighted
adjacency matrix for any motif with A = 3. Then for any S ⊂ V ,
φ(G)
M (S) = φ(GM )(S)
In other words, when the number of anchor nodes is 3, the motif conductance is equal to the
conductance on the weighted graph defined by Equation S19.
Proof. When A = 3, the motif cut and motif volume are both equal to half the motif cut and
motif volume measures by Lemmas 1 and 4.
S19
For any motif with three anchor nodes, conductance on the weighted graph is equal to the
motif conductance. Because of this, we can use results from spectral graph theory for weighted
graphs (32) and re-interpret the results in terms of motif conductance. In particular, we get the
following "motif Cheeger inequality".
Theorem 6. Motif Cheeger Inequality. Suppose we use Algorithm 1 to find a low-motif con-
M (S(cid:48)) be the optimal motif conductance over any set of nodes
ductance set S. Let φ∗ = minS(cid:48) φ(G)
S(cid:48). Then
1. φ(G)
√
M (S) ≤ 4
φ∗ and
2. φ∗ ≥ λ2/2
Proof. The result follows from Theorem 5 and the standard Cheeger ineqaulity (32).
The first part of the result says that the set of nodes S is within a quadratic factor of optimal.
This provides the mathematical guarantees that our procedure finds a good cluster in a graph,
if one exists. The second result provides a lower bound on the optimal motif conductance in
terms of the eigenvalue. We use this bound in our analysis of a food web (see Section S7.1) to
show that certain motifs do not provide good clusters, regardless of the procedure to select S.
S1.7 Discussion of motif Cheeger inequality for network motifs with four
or more nodes
Analogs of the indicator function in Lemma 2 for four or more variables are not quadratic.
Subsequently, for motifs with A > 3, we no longer get the motif Cheeger inequalities guaran-
teed by Theorem 6. That being said, solutions found by motif-based partitioning approximate a
related value of conductance. We now provide the details.
We begin with a lemma that shows a functional form for four binary variables taking values
in {−1, 1} to not all be equal. We see that it is quartic, not quadratic.
S20
Lemma 7. Let xi, xj, xk, xl ∈ {−1, 1}. Then the indicator function on all four elements not
being equal is
8 · 1(xi, xj, xk, xl not all the same)
(S21)
= (7 − xixj − xixk − xixl − xjxk − xjxl − xkxl − xixjxkxl) .
We almost have a quadratic form, if not for the quartic term xixjxkxl. However, we could
use the following related quadratic form:
6 − xixj − xixk − xixl − xjxk − xjxl − xkxl
0 xi, xj, xk, xl are all the same
6 exactly three of xi, xj, xk, xl are the same
8 exactly two of xi, xj, xk, xl are −1.
=
(S22)
The quadratic still takes value 0 if all four entries are the same, and takes a non-zero value
otherwise. However, the quadratic takes a larger value if exactly two of the entries are −1.
Figure S5 illustrates this idea. From this, we can provide an analogous statement to Lemma 4
for motifs with A = 4.
Lemma 8. Let G = (V, E) be a directed, unweighted graph and let GM be the weighted graph
for a motif with A = 4. Then for any S ⊂ V ,
cut(G)
M (S, ¯S) =
1
3
cut(GM )(S, ¯S) − (cid:88)
(v,{i,j,k,l})∈M
· 1(exactly two of i, j, k, l in S)
1
3
S21
Proof. Let x ∈ {−1, 1}n be an indicator vector of the node set S.
6 · cut(G)
M (S, ¯S) +
2 · 1(exactly two of i, j, k, l in S)
6 − xixj − xixk − xixl − xjxk − xjxl − xkxl
(cid:1) − (xixj + xixk + xixl + xjxk + xjxl + xkxl)
(cid:88)
(v,{i,j,k,l})∈M
i + x2
j + x2
k + x2
l
xT WM x
(cid:88)
(cid:88)
(cid:0)x2
=
=
=
(v,{i,j,k,l})∈M
3
2
(v,{i,j,k,l})∈M
xT DM x − 1
1
2
2
1
2
xT LM x
=
= 2 · cut(GM )(S, ¯S).
The first equality follows from Equations S17 and S22. The third equality follows from Lemma 1.
The fourth equality follows from the definition of LM. The fifth equality follows from Lemma 3.
With four anchor nodes, the motif cut in G is slightly different than the weighted cut in the
weighted graph GM. However, Lemma 1 says that the motif volume in G is still the same as the
weighted volume in GM. We use this to derive the following result.
Theorem 9. Let G = (V, E) be a directed, unweighted graph and let WM be the weighted
adjacency matrix for any motif with A = 4. Then for any S ⊂ V ,
(cid:80)
M (S) = φ(GM )(S) −
φ(G)
(v,{i,j,k,l})∈M 1(exactly two of i, j, k, l in S)
vol(GM )(S)
In other words, when there are four anchor nodes, the weighting scheme in Equation S19 models
the exact conductance with an additional penalty for splitting the four anchor nodes into two
groups of two.
Proof. This follows from Lemmas 1 and 8.
S22
To summarize, we still get a Cheeger inequality from the weighted graph, but it is in terms
of a penalized version of the motif conductance φ(G)
M (S). However, the penalty makes sense-if
the group of four nodes is "more split" (2 and 2 as opposed to 3 and 1), the penalty is larger.
When A > 4, we can derive similar penalized approximations to φ(G)
M (S).
S1.8 Methods for simultaneously finding multiple clusters
For clustering a network into k > 2 clusters based on motifs, we could recursively cut the graph
using the sweep procedure with some stopping criterion (20). For example, we could continue
to cut the largest remaining cluster until the graph is partitioned into some pre-specified number
of clusters. We refer to this method as recursive bi-partitioning.
In addition, we can use the following method of Ng et al. (19).
Algorithm 2: Motif-based clustering algorithm for finding several clusters.
DM ← diagonal matrix with (DM )ii =(cid:80)
Input: Directed, unweighted graph G, motif M, number of clusters k
Output: k disjoint motif-based clusters
(WM )ij ← number of instances of M that contain nodes i and j.
z1, . . . , zk ← eigenvectors of k smallest eigenvalues for LM = I − D
Yij ← zij/
Embed node i into Rk by taking the ith row of the matrix Y
Run k-means clustering on the embedded nodes
This method does not have the same Cheeger-like guarantee on quality. However, recent
(cid:113)(cid:80)k
j(WM )ij
j=1 z2
ij
−1/2
M WM D
−1/2
M
theory shows that by replacing k-means with a different clustering algorithm, there is a perfor-
mance guarantee (33). While this provides motivation, we use k-means for its simplicity and
empirical success.
S1.9 Extensions of the method for simultaneously analyzing several net-
work motifs
All of our results carry through when considering several motifs simultaneously. In particular,
suppose we are interested in clustering based on motif sets M1, . . . , Mq for q different motifs.
S23
Further suppose that we want to weight the impact of some motifs more than other motifs. Let
WMj be the weighted adjacency matrix for motif Mj, j = 1, . . . , q, and let αj ≥ 0 be the weight
of motif Mj, then we can form the weighted adjacency matrix
WM =
αjWMj .
(S23)
Now, the cut and volume measures are simply weighted sums by linearity. Suppose that the
j=1
Mj all have three anchor nodes and let GM be the weighted graph corresponding to WM. Then
q(cid:88)
q(cid:88)
cut(GM )(S, ¯S) =
αjcut(G)
Mj
(S, ¯S),
vol(GM )(S) =
αjvol(G)
Mj
(S),
j=1
j=1
and Theorem 6 applies to a weighted motif conductance equal to
(cid:80)q
(cid:16)(cid:80)q
j=1 αjcut(G)
Mj
(S),(cid:80)q
(S, ¯S)
j=1 αjvol(G)
Mj
j=1 αjvol(G)
Mj
( ¯S)
min
q(cid:88)
(cid:17).
S1.10 Extensions of the method to signed, colored, and weighted motifs
Our results easily generalize for signed networks. We only have to generalize Equation S10
by allowing the adjacency matrix B to be signed. Extending the method for motifs where the
edges or nodes are "colored" or "labeled" is similar. If the edges are colored, then we again just
allow the adjacency matrix B to capture this information. If the nodes in the motif are colored,
we only count motif instances with the specified pattern.
We can also generalize the notions of motif cut and motif volume for "weighted motifs",
i.e., each motif has an associated nonnegative weight. Let ω(v,χA(v)) be the weight of a motif
instance. Our cut and volume metrics are then
(cid:88)
(cid:88)
(v,χA(v))∈M
cut(G)
M (S, ¯S) =
vol(G)
M (S) =
ω(v,χA(v)) 1(∃ i, j ∈ χA(v) i ∈ S, j ∈ ¯S),
(cid:88)
1(i ∈ S).
(v,χA(v))∈M
i∈χA(v)
ω(v,χA(v))
S24
Subsequently, we adjust the motif adjacency matrix as follows:
(cid:88)
(WM )ij =
(v,χA(v))∈M
ω(v,χA(v)) 1({i, j} ⊂ χA(v))
(S24)
S1.11 Connections to directed graph partitioning
Our framework also provides a way to analyze methods for clustering directed graphs. Exist-
ing principled generalizations of undirected graph partitioning to directed graph partitioning
proceed from graph circulations (34) or random walks (35) and are difficult to interpret. Our
motif-based clustering framework provides a simple, rigorous framework for directed graph
partitioning. For example, consider the common heuristic of clustering the symmetrized graph
W = A + AT , where A is the (directed) adjacency matrix (36). Following Theorem 5,
conductance-minimizing methods for partitioning W are actually trying to minimize a weighted
sum of motif-based conductances for the directed edge motif and the bi-directional edge motif:
(cid:20)0 1
(cid:21)
0 0
(cid:20)0 1
(cid:21)
1 0
,
B1 =
, B2 =
where both motifs are simple (A = {1, 2}). If W1 and W2 are the motif adjacency matrices for
B1 and B2, then A + AT = W = W1 + 2W2. This weighting scheme gives a weight of two to
bi-directional edges in the original graph and a weight of one to uni-directional edges.
An alternative strategy for clustering a directed graph is to simply remove the direction on
all edges, treating bi-directional and uni-directional edges the same. The resulting adjacency
matrix is equivalent to the motif adjacency matrix for the bi-directional and uni-directional
edges (without any relative weighting). Formally, W = W1 + W2. We refer to this "motif" as
Medge (Figure S4), which will later provide a convenient notation when discussing both motif-
based clustering and edge-based clustering.
S25
S1.12 Connections to hypergraph partitioning
Finally, we contextualize our method in the context of existing literature on hypergraph par-
titioning. The problem of partitioning a graph based on relationships between more than two
nodes has been studied in hypergraph partitioning (37), and we can interpret motifs as hy-
peredges in a graph. In contrast to existing hypergraph partitioning problems, we induce the
hyperedges from motifs rather than take the hyperedges as given a priori. The goal with our
analysis of the Florida Bay food web, for example, was to find which hyperedge sets (induced
by a motif) provide a good clustering of the network (see Section S7.1).
In general, our motif-based spectral clustering methodology falls into the area of encoding
a hypergraph partitioning problem by a graph partitioning problem (38, 39). With simple mo-
tifs on k nodes, the motif Laplacian LM formed from WM (Equation S20) is a special case
of the Rodr´ıguez Laplacian (38, 40) for k-regular hypergraphs. The motif Cheeger inequality
we proved (Theorem 6) explains why this Laplacian is appropriate for 3-regular hypergraphs.
Specifically, it respects the standard cut and volume metrics for graph partitioning.
S2 Computational complexity and scalability of the method
We now analyze the computation of the higher-order clustering method. We first provide a
theoretical analysis of the computational complexity, which depends on motif. After, we empir-
ically analyze the time to find clusters for triangular motifs on a variety of real-world networks,
ranging in size from a few hundred thousand edges to nearly two billion edges. Finally, we
show that we can practically compute the motif adjacency matrix for motifs up to size 9 on a
number of real-world networks.
S26
S2.1 Analysis of computational complexity
We now analyze the computational complexity of the algorithm presented in Theorem 6. Over-
all, the complexity of the algorithm is governed by the computations of the motif adjacency
matrix WM, an eigenvector, and the sweep cut procedure. For simplicity, we assume that we
can access edges in a graph in O(1) time and access and modify matrix entries in O(1) time.
Let m and n denote the number of edges in the graph. Theoretically, the eigenvector can be
computed in O((m + n)(log n)O(1)) time using fast Laplacian solvers (41). For the sweep cut,
it takes O(n log n) to sort the indices given the eigenvector using a standard sorting algorithm
such is merge sort. Computing motif conductance for each set Sr in the sweep also takes linear
term. In pratice, the sweep cut step takes a small fraction of the total running time of the al-
gorithm. For the remainder of the analysis, we consider the more nuanced issue of the time to
compute WM.
The computational time to form WM is bounded by the time to find all instances of the motif
in the graph. Naively, for a motif on k nodes, we can compute WM in Θ(nk) time by checking
each k-tuple of nodes. Furthermore, there are cases where there are Θ(nk) motif instances in
the graph, e.g., there are Θ(n3) triangles in a complete graph. However, since most real-world
networks are sparse, we instead focus on the complexity of algorithms in terms of the number of
edges and the maximum degree in the graph. For this case, there are several efficient practical
algorithms for real networks with available software (42–46).
Theoretically, motif counting is efficient. Here we consider four classes of motifs: (1)
triangles, (2) wedges (connected, non-triangle three-node motifs), (3) four-node motifs, and (4)
k-cliques. Let m be the number of edges in a graph. Latapy analyzed a number of algorithms
for listing all triangles in an undirected network, including an algorithm that has computational
complexity Θ(m1.5) (47). For a directed graph G, we can use the following algorithm: (1) form
a new graph Gundir by removing the direction from all edges in G (2) find all triangles in Gundir,
S27
(3) for every triangle in Gundir, check which directed triangle motif it is in G. Since step 1 is
linear and we can perform the check in step 3 in O(1) time, the same Θ(m1.5) complexity holds
for directed networks. This analysis holds regardless of the structure of the networks. However,
additional properties of the network can lead to improved algorithms. For example, in networks
with a power law degree sequence with exponent greater than 7/2, Berry et al. provide a
randomized algorithm with expected running time Θ(m) (48). In the case of a bounded degree
graph, enumerating over all nodes and checking all pairs of neighbors takes time Θ(nd2
max),
where dmax is the maximum degree in the graph. We note that with triangular motifs, the
number of non-zeros in WM is less than the number of non-zeros in the original adjacency
matrix. Thus, we do not have to worry about additional storage requirements.
Next, we consider wedges (open triangles). We can list all wedges by looking at every pair
of neighbors of every node. This algorithm has Θ(nd2
max) computational complexity, where n is
the number of nodes and dmax is again the maximum degree in the graph (a more precise bound
j d2
j ), where dj is the degree of node j.) If the graph is sparse, the motif adjacency
matrix will have more non-zeros than the original adjacency matrix, so additional storage is
is Θ((cid:80)
has O((cid:80)
required. Specifically, there is fill-in for all two-hop neighbors, so the motif adjacency matrix
j d2
j ) non-zeros. This is impractical for large real-world networks but manageable for
modestly sized networks.
Marcus and Shavitt present an algorithm for listing all four-node motifs in an undirected
graph in O(m2) time (49). We can employ the same edge direction check as for triangles to
extend this result to directed graphs. Chiba and Nishizeki develop an algorithm for finding
a representation of all quadrangles (motif on four nodes that contains a four-node cycle as a
subgraph) in O(am) time and O(m) space, where a is the arboricity of the graph (50). The ar-
boricity of any connected graph is bounded by O(m1/2), so this algorithm runs in time O(m3/2).
Chiba and Nishizeki present an algorithms for k-clique enumeration that also depends on
S28
the arboricity of the graph. Specifically, they provide an algorithm for enumerating all k-cliques
in O(kak−2m) time, where a is the arboricity of the graph. This algorithm achieves the Θ(m3/2)
bound for arbitrary graphs. (We note that the triangle listing sub-case is similar in spirit to the
algorithm proposed by Schank and Wagner (51)). For four-node cliques, the algorithm runs in
time O(m2) time, which matches the complexity of Marcus and Shavitt (49).
We note that we could also employ approximation algorithms to estimate the weights in the
motif adjacency matrix (52). Such methods balance computation time and accuracy. Finally,
we note that the computation of WM and the computation of the eigenvector are suitable for
parallel computation. There are already distributed algorithms for triangle enumeration (53),
and the (parallel) eigenvector computation of a sparse matrix is a classical problem in scientific
computing (54, 55).
S2.2 Experimental results on triangular motifs
In this section, we demonstrate that our method scales to real-world networks with billions
of edges. We tested the scalability of our method on 16 large directed graphs from a va-
riety of real-world applications. These networks range from a couple hundred thousand to
two billion edges and from 10 thousand to over 50 million nodes. Table S1 lists short de-
scriptions of these networks. The wiki-RfA, email-EuAll, cit-HepPh, web-NotreDame, ama-
zon0601, wiki-Talk, ego-Gplus, soc-Pokec, and soc-LiveJournal1 networks were downloaded
from the SNAP collection at http://snap.stanford.edu/data/ (56). The uk-2014-
tpd, uk-2014-host, enwiki-2013, uk-2002, arabic-2005, twitter-2010, and sk-2005 networks
were downloaded from the Laboratory for Web Algorithmics collection at http://law.di.
unimi.it/datasets.php (57–60). Links to all datasets are available on our project web-
site: http://snap.stanford.edu/higher-order/.
Recall that Algorithm 1 consists of two major computational components:
S29
1. Form the weighted graph WM.
2. Compute the eigenvector z of second smallest eigenvalue of the matrix LM.
After computing the eigenvector, we sort the vertices and loop over prefix sets to find the lowest
motif conductance set. We consider these final steps as part of the eigenvector computation for
our performance experiments.
For each network in Table S1, we ran the method for all directed triangular motifs (M1–
M7). To compute WM, we used a standard algorithm that meets the O(m3/2) bound (47, 51)
with some additional pre-processing based on the motif. Specifically, the algorithm is:
1. Take motif type M and graph G as input.
2. (Pre-processing.) If M is M1 or M5, remove all bi-directional edges in G since these
motifs only contain uni-directional edges. If M is M4, remove all uni-directional edges
in G as this motif only contains bi-directional edges.
3. Form the undirected graph Gundir by removing the direction of all edges in G.
4. Let du be the degree of node u in Gundir. Order the nodes in Gundir by increasing degree,
breaking ties arbitrarily. Denote this ordering by ψ.
5. For every edge undirected edge {u, v} in Gundir, if ψu < ψv, add directed edge (u, v) to
Gdir; otherwise, add directed edge (v, u) to Gdir.
6. For every node in u in Gdir and every pair of directed edges (u, v) and (u, w), check to
see if u, v, and w form motif M in G. If they do, check if the triangle forms motif M in
G and update WM accordingly.
The algorithm runs in time Θ(m3/2) time in the worst case, and is also known as an effective
heuristic for real-world networks (48). After, we find the largest connected component of the
S30
graph corresponding to the motif adjacency matrix WM, form the motif normalized Laplacian
LM of the largest component, and compute the eigenvector of second smallest eigenvalue of
LM. To compute the eigenvector, we use MATLAB's eigs routine with tolerance 1e-4 and the
"smallest algebraic" option for the eigenvalue type.
Table S2 lists the time to compute WM and the time to compute the eigenvector for each
network. We omitted the time to read the graph from disk because this time strongly depends
on how the graph is compressed. All experiments ran on a 40-core server with four 2.4 GHz
Intel Xeon E7-4870 processors. All computations of WM were in serial and the computations
of the eigenvectors were in parallel.
Over all networks and all motifs, the longest computation of WM (including pre-processing
time) was for M2 on the sk-2005 network and took roughly 52.8 hours. The longest eigenvector
computation was for M6 on the sk-2005 network, and took about 1.62 hours. We note that WM
only needs to be computed once per network, regardless of the eventual number of clusters that
are extracted. Also, the computation of WM can easily be accelerated by parallel computing (the
enumeration of motifs can be done in parallel over nodes, for example) or by more sophisticated
algorithms (48). In this work, we perform the computation of WM in serial in order to better
understand the scalability.
In theory, the triangle enumeration time is O(m1.5). We fit a linear regression of the log of
the computation time of the last step of the enumeration algorithm to the regressor log(m) and
a constant term:
log(time) ∼ a log(m) + b
(S25)
If the computations truly took cm1.5 for some constant c, then the regression coefficient for
log(m) would be 1.5. Because of the pre-processing of the algorithm, the number of edges
m depends on the motif. For example, with motifs M1 and M5, we only count the number of
uni-directional edges. The pre-processing time, which is linear in the total number of edges,
S31
is not included in the time. The regression coefficient for log(m) (a in Equation S25) was
found to be smaller 1.5 for each motif (Table S3). The largest regression coefficient was 1.31
for M3 (with 95% confidence interval 1.31 ± 0.19). We also performed a regression over the
aggregate times of the motifs, and the regression coefficient was 1.17 (with 95% confidence
interval 1.17 ± 0.09). We conclude that on real-world datasets, the algorithm for computing
WM performs much better than the worst-case guarantees.
Table S1: Summary of networks used in scalability experiments with triangular motifs. The
total number of edges is the sum of the number of unidirectional edges and twice the number of
bidirectional edges.
Name
description
Adminship voting on Wikipedia
Emails in a research institution
Citations for papers on arXiv HEP-PH
wiki-RfA
email-EuAll
cit-HepPh
web-NotreDame Hyperlinks on nd.edu domain
Product co-purchasing on Amazon
amazon0601
Wikipedia users interactions
wiki-Talk
Circles on Google+
ego-Gplus
top private domain links on .uk web
uk-2014-tpd
Pokec friendships
soc-Pokec
uk-2014-host
Host links on .uk web
soc-LiveJournal1 LiveJournal friendships
enwiki-2013
uk-2002
arabic-2005
twitter-2010
sk-2005
Hyperlinks on English Wikipedia
Hyperlinks on .uk web
Hyperlinks on arabic-language web pages
Twitter followers
Hyperlinks on .sk web
# nodes
10.8K
265K
34.5K
326K
403K
2.39M
108K
1.77M
1.63M
4.77M
4.85M
4.21M
18.5M
22.7M
41.7M
50.6M
unidir.
# edges
total
bidir.
189K 175K 7.00K
419K 310K 54.5K
422K 420K
657
1.47M 711K 380K
3.39M 1.50M 944K
5.02M 4.30M 362K
13.7M 10.8M 1.44M
16.9M 13.7M 1.58M
30.6M 14.0M 8.32M
46.8M 33.7M 6.55M
68.5M 17.2M 25.6M
101M 82.6M 9.37M
292M 231M 30.5M
631M 477M 77.3M
1.47B 937M 266M
1.93B 1.69B 120M
S32
Table S2: Time to compute the motif adjacency matrix WM and the second eigenvector of the
motif normalized Laplacian LM in seconds for each directed triangular motif.
Network
wiki-RfA
email-EuAll
cit-HepPh
web-NotreDame
amazon0601
wiki-Talk
ego-Gplus
uk-2014-tpd
soc-Pokec
uk-2014-host
soc-LiveJournal1
enwiki-2013
uk-2002
arabic-2005
twitter-2010
sk-2005
Motif adjacency matrix WM
M3
M1
1.71e+00
1.19e+00
4.74e-01
6.26e-01
2.73e+00
7.65e+00
2.33e+01
9.42e-01
6.91e+00
2.35e+00
2.20e+01
1.07e+01
1.73e+03
8.55e+02
4.07e+02
8.10e+01
4.17e+01
1.21e+02
2.76e+03
9.98e+02
6.24e+02
9.08e+01
7.09e+02
8.36e+02
5.17e+03
1.47e+03
6.05e+04
6.51e+03
1.21e+04
1.31e+05
1.29e+05
5.52e+04
M2
2.67e+00
8.29e-01
3.36e+00
2.39e+01
8.66e+00
3.00e+01
2.42e+03
5.31e+02
1.34e+02
4.68e+03
7.66e+02
9.62e+02
8.59e+03
7.64e+04
1.38e+05
1.63e+05
M7
M6
5.40e-01
M5
M4
1.79e+00 2.42e+00 2.35e+00
2.06e-02
5.02e-01
5.41e-01
2.46e-01
6.22e+00 8.20e+00 3.29e+00 3.35e+00
2.30e+00 1.17e+00 8.29e+00 8.40e+00
1.82e+00 2.94e+00 5.47e+00 5.73e+00
3.11e+00 1.35e+01 2.09e+01 2.10e+01
2.08e+01 1.63e+03 2.07e+03 2.17e+03
2.56e+01 1.15e+02 3.04e+02 2.85e+02
3.04e+01 4.88e+01 1.00e+02 1.04e+02
8.90e+01 1.32e+03 2.89e+03 2.99e+03
1.24e+02 1.24e+02 4.41e+02 4.49e+02
3.13e+01 9.77e+02 8.19e+02 8.38e+02
2.45e+02 1.73e+03 4.53e+03 5.29e+03
6.08e+03 8.39e+03 3.59e+04 3.69e+04
3.33e+04 1.99e+04 8.03e+04 7.65e+04
1.55e+04 5.23e+04 9.64e+04 8.42e+04
3.62e-01
6.96e-01
M2
2.12e-01
1.62e-01
M4
2.12e-01
1.62e-01
5.97e-01
3.62e-01
4.62e+00 6.96e-01
Second eigenvector of LM
M5
M3
M1
2.12e-01
1.22e-01
1.14e-01
1.62e-01
2.29e-01
2.43e-01
2.11e+00 2.10e+00 2.11e+00 2.10e+00 2.10e+00
3.62e-01
1.86e-01
1.23e-01
6.96e-01
1.28e+00 2.40e+00 2.51e+00 2.40e+00 2.40e+00
4.42e+00 1.68e+01 2.11e+01 1.68e+01 1.68e+01
3.59e+00 9.66e+00 9.92e+00 4.35e+00 9.66e+00
1.96e+00 1.75e+01 3.91e+01 1.75e+01 1.75e+01
1.81e+01 4.38e+01 6.80e+01 2.04e+01 4.38e+01
2.32e+00 2.20e+01 1.06e+02 2.20e+01 2.20e+01
2.18e+01 7.58e+01 8.45e+01 7.58e+01 7.58e+01
1.66e+01 8.65e+01 2.52e+02 8.65e+01 8.65e+01
1.98e+01 1.64e+02 4.80e+02 3.26e+02 1.64e+02
2.23e+02 1.23e+03 1.95e+03 1.23e+03 1.23e+03
5.73e+01 2.94e+02 7.98e+02 2.94e+02 2.94e+02
M7
M6
2.93e-01
2.94e-01
1.92e-01
2.35e-01
2.24e+00 2.30e+00
2.06e+00
9.61e-01
4.97e+00
4.53e+00
2.54e+00 4.52e+00
2.57e+01 4.42e+01
2.10e+01
2.16e+01
2.39e+01 2.45e+01
8.28e+01
8.73e+01
4.49e+01 6.13e+01
2.14e+02
1.48e+02
7.87e+02 5.32e+02
1.95e+03
1.40e+03
2.22e+03 2.18e+03
5.83e+03 3.81e+03
Table S3: The 95% confidence interval (CI) for the regression coefficient of the regressor
log(m) in a linear model for predicting the time to compute WM, based on the computational
results for the networks in Table S1. The algorithm runs is guranteed to run in time O(m3/2).
"Combined" refers to the regression coefficient when considering all of the times.
Motif
M1
1.20 ± 0.19
95% CI
M2
1.30 ± 0.20
M3
1.31 ± 0.19
M4
0.90 ± 0.31
M5
1.20 ± 0.20
M6
1.27 ± 1.21
M7
1.27 ± 0.21
Combined
1.17 ± 0.09
S33
S2.3 Experimental results on k-cliques
On smaller graphs, we can compute larger motifs. To illustrate the computation time, we formed
the motif adjacency matrix W based on the k-cliques motif for k = 4, . . . , 9. We implemented
the k-clique enumeration algorithm by Chiba and Nishizeki with the additional pre-processing
of computing the (k − 1)-core of the graph. (This pre-processing improves the running time
in practice but does not affect the asymptotic complexity.) The motif adjacency matrices for
k-cliques are sparser than the adjacency matrix of the original graph. Thus, we do not worry
about spatial complexity for these motifs.
We ran the algorithm on nine real-world networks, ranging from roughly four thousande
nodes and 88 thousand edges to over two million nodes and around five million edges (see
Table S4.) Each network contained at least one 9-clique and hence at least one k-clique for k <
9. All networks were downloaded from the SNAP collection at http://snap.stanford.
edu/data/ (56). All computations ran on the same server as for the triangular motifs and
again there was no parallelism. We terminated computations after two hours. For five of the nine
networks, the time to compute WM for the k-clique motif was under two hours for k = 4, . . . , 9
(Table S5). And for each network, the computation finished within two hours for k = 4, 5, 6.
The smallest network (in terms of number of nodes and number of edges) was the Facebook
ego network, where it took just under two hours to comptue WM for the 6-clique motif and over
two hours for the 7-clique motif. This network has around 80,000 edges. On the other hand, for
the YouTube network, which contains nearly 3 million edges, we could compute WM for the
9-clique motif in under a minute.
We conclude that it is possible to use our frameworks with motifs much larger than the
three-node motifs on which we performed many of our experiments. However, the number of
edges is not that correlated with the running time to compute WM. This makes sense becuse the
Chiba and Nishizeki algorithm complexity is O(ak−2m), where a is the arboricity of the graph.
S34
Hence, the dependence on the number of edges is always linear.
Table S4: Summary of networks used in scalability experiments with k-clique motifs. For each
graph, we consider all edges as undirected.
description
Facebook friendships
Adminship voting on Wikipedia
author co-authorship
Emails in a research institution
paper citations
Network
ego-Facebook
wiki-RfA
ca-AstroPh
email-EuAll
cit-HepPh
soc-Slashdot0811 Slashdot user interactions
com-DBLP
com-Youtube
wiki-Talk
author co-authorship
User friendships
Wikipedia users interactions
# nodes # edges
88.2K
4.04K
10.8K
182K
198K
18.8K
364K
265K
421K
34.5K
77.4K
469K
317K
1.05M
1.13M 2.99M
2.39M 4.66M
Table S5: Time to compute WM for k-clique motifs (seconds). Only computations that finished
within two hours are listed.
Network
ego-Facebook
wiki-RfA
ca-AstroPh
email-EuAll
cit-HepPh
soc-Slashdot0811
com-DBLP
com-Youtube
wiki-Talk
Number of nodes in clique (k)
4
14
6
5
1
3
3
9
12
64
5
317
22
35
2
6
12
129
17
466
6
6816
63
285
4
11
55
3234
25
2898
7
–
134
2164
5
18
282
–
33
–
8
–
218
–
6
30
1018
–
35
–
9
–
286
–
6
36
2836
–
33
–
S35
S3 Matrix-based interpretation of the motif-weighted adja-
cency matrix
For several motifs, the motif adjacency matrix WM (Equation S19) has a simple formula in
terms of the adjacency matrix of the original, directed, unweighted graph, G. Let A be the
adjacency matrix for G and let U and B be the adjacency matrix of the unidirectional and
bidirectional links of G. Formally, B = A◦ AT and U = A− B, where ◦ denotes the Hadamard
(entry-wise) product. Table S6 lists the formula of WM for motifs M1, M2, M3, M4, M5, M6,
and M7 (see Figure S4) in terms of the matrices U and B. The central computational kernel in
these computations is (X · Y ) ◦ Z. When X, Y , and Z are sparse, efficient parallel algorithms
have been developed and analyzed (61). If the adjacency matrix is sparse, then computing WM
for these motifs falls into this framework.
Table S6: Matrix-based formulations of the weighted motif adjacency matrix WM (Equa-
tion S19) for all triangular three-node simple motifs. P ◦ Q denotes the Hadamard (entry-wise)
products of matrices P and Q. If A is the adjacency matrix of a directed, unweighted graph G,
then B = A ◦ AT and U = A − B. Note that in all cases, WM is symmetric.
Motif
M1
M2
M3
M4
M5
M6
M7
Matrix computations
C = (U · U ) ◦ U T
C = (B · U ) ◦ U T + (U · B) ◦ U T + (U · U ) ◦ B
C = (B · B) ◦ U + (B · U ) ◦ B + (U · B) ◦ B
C = (B · B) ◦ B
C = (U · U ) ◦ U + (U · U T ) ◦ U + (U T · U ) ◦ U
C = (U · B) ◦ U + (B · U T ) ◦ U T + (U T · U ) ◦ B
C = (U T · B) ◦ U T + (B · U ) ◦ U + (U · U T ) ◦ B
WM =
C + C T
C + C T
C + C T
C
C + C T
C
C
With these matrix formulations, implementing the motif-based spectral partitioning algo-
rithm for modestly sized graphs is straightforward. However, these computations become
slower than standard fast triangle enumeration algorithms when the networks are large and
sparse. Nevertheless, the matrix formulations provide a simple and elegant computational
S36
c o n d u c t a n c e s ] = M o t i f S p e c t r a l P a r t i t i o n M 6 (A)
f u n c t i o n [ S , Sbar ,
1
2 % S p e c t r a l p a r t i t i o n i n g f o r m o t i f M 6
3
4 B = s p o n e s (A & A ' ) ; % b i d i r e c t i o n a l
5 U = A − B ;
% u n i d i r e c t i o n a l
l i n k s
l i n k s
6
7 % Form m o t i f a d j a c e n c y m a t r i x f o r m o t i f M 6 .
8 % For d i f f e r e n t m o t i f s ,
9 W = (B ∗ U' )
.∗ U + (U' ∗ U)
.∗ U' + (U ∗ B)
r e p l a c e
t h i s
.∗ B ;
l i n e w i t h a n o t h e r m a t r i x f o r m u l a t i o n .
10
11 % Compute e i g e n v e c t o r o f m o t i f n o r m a l i z e d L a p l a c i a n
12 D s q r t = f u l l ( sum (W, 2 ) ) ;
13 D s q r t ( D s q r t
= 0 ) = 1 . /
14
15 Ln = s p a r s e ( I ,
16
17 % Matlab ' s e i g s
18
J , −V .∗ ( D s q r t ( I )
' s a ' ) ;
e i g o r d e r ] = s o r t ( d i a g ( lambdas ) ) ;
lambdas ] = e i g s ( Ln , 2 ,
sometimes o u t o f o r d e r
.∗ D s q r t ( J ) ) ,
J , V] = f i n d (W) ;
s q r t ( D s q r t ( D s q r t
= 0 ) ) ;
[ I ,
[ Z ,
e i g o r d e r ( end ) ) ;
[ ,
y = D s q r t
19
i s
.∗ Z ( : ,
s i z e (A, 1 ) ,
s i z e (A, 2 ) ) ;
t i m e sweep p r o c e d u r e
20
21 % L i n e a r
[ , o r d e r ] = s o r t ( y ) ;
22
23 C = W( o r d e r , o r d e r ) ;
24 C sums = f u l l ( sum (C , 2 ) ) ;
volumes = cumsum ( C sums ) ;
25
v o l u m e s o t h e r = f u l l ( sum ( sum (W) ) ) ∗ ones ( l e n g t h ( o r d e r ) , 1 ) − volumes ;
c o n d u c t a n c e s = cumsum ( C sums − 2 ∗ sum ( t r i l (C ) , 2 ) )
[ ,
s p l i t ] = min ( c o n d u c t a n c e s ) ;
26
27
28
29 S = o r d e r ( 1 : s p l i t ) ;
30
Sbar = o r d e r ( ( s p l i t + 1 ) : end ) ;
. / min ( volumes , v o l u m e s o t h e r ) ;
Figure S6: MATLAB implementation of the motif-based spectral partitioning algorithm for
motif M6. For other motifs, line 9 can be replaced with the formulations from Table S6.
method for the motif adjacency matrix WM. To demonstrate, Figure S6 provides a complete
MATLAB implementation of Algorithm 1 for M6 (Figure S4). The entire algorithm including
comments comrpises 28 lines of code.
An alternative matrix formulation comes from a motif-node adjacency matrix. Let M (B,A)
be a motif set and number the instances of the motif 1, . . . ,M, so that (vi, χA(vi)) is the ith
motif. Define the M× n motif-node adjacency matrix AM by (AM )ij = 1(j ∈ χA(vi)). Then
S37
(WM )ij = (AT
M AM )ij,
i (cid:54)= j.
(S26)
This provides a convenient algebraic formulation for defining the weighted motif adjacency
matrix. However, in practice, we do not use this formulation for any computations.
S4 Alternative clustering algorithms for evaluation
For our experiments, we compare our spectral motif-based custering to the following methods:
• Standard, edge-based spectral clustering, which is a special case of motif-based cluster-
ing. In particular, the motifs
B1 =
(cid:20)0 1
(cid:21)
1 0
, B2 =
(cid:20)0 1
(cid:21)
0 0
, A = {1, 2}
(S27)
correspond to removing directionality from a directed graph. We refer to the union of
these two motifs as Medge.
• Infomap, which is based on the map equation (62). Software for Infomap was down-
loaded from http://mapequation.org/code.html. We run the algorithm the
algorithm for directed links when the network under consideration is directed.
• The Louvain method (63). Software for the Louvain method was downloaded from
https://perso.uclouvain.be/vincent.blondel/research/louvain.
html We use the "oriented" version of the Louvain method for directed graphs.
Infomap and the Louvain method are purely clustering methods in the sense that they take
as input the graph and produce as output a set of labels for the nodes in the graph. In contrast
to the spectral methods, we do not have control over the number of clusters. Also, only the
spectral methods provide embeddings of the nodes into euclidean space, which is useful for
S38
visualization. Thus, for our analysis of the transportation reachiability network in Section S6,
we only compare spectral methods.
S5 Details and comparison against existing methods for the
C. elegans network
We now provide more details on the cluster found for the C. elegans network of frontal neu-
rons (28).
In this network, the nodes are neurons and the edges are synapses. The net-
work data was downloaded from http://www.biological-networks.org/pubs/
suppl/celegans131.zip.
S5.1 Connected components of the motif adjacency matrices
We again first onsider the connected components of the motif adjacency matrices as a pre-
processing step. For our analysis, we consider use Mbifan, M8, and Medge (Figure S4). The
original network has 131 nodes and 764 edges. The largest connected component of the motif
adjacency matrix for motif Mbifan contains 112 nodes. The remaining 19 nodes are isolated
and correspond to the neurons AFDL, AIAR, AINR, ASGL/R, ASIL/R, ASJL/R, ASKL/R,
AVL, AWAL, AWCR, RID, RMFL, SIADR, and SIBDL/R. The largest connected component
of the motif adjacency matrix for motif M8 contains 127 nodes. The remaining 4 nodes are
isolated and correspond to the neurons ASJL/R and SIBDL/R. The original network is weakly
connected, so the motif adjacency matrix for Medge is connected.
S5.2 Comparison of bi-fan motif cluster to clusters found by existing meth-
ods
We found the motif-based clusters for motifs Mbifan, M8, and Medge by running Algorithm 1 on
the largest connected component of the motif adjacency matrix. Sweep profile plots (φM (S) as
S39
Figure S7: Sweep profile plot (φM (S) as a function of S from the sweep in Algorithm 1) for
Mbifan (green) M8 (dark blue), and Medge (light blue).
a function of S from the sweep in Algorithm 1) are shown in Figure S7 and show that the size
of the Mbifan returned by Algorithm 1 cluster is smaller than the clusters for M8 and Medge. In
fact, the motif-based clusters for M8 and Medge essentially bisect the graph, containing 63 of
127 and 64 of 131 nodes, respectively. Of the 63 nodes in the M8-based cluster, only 2 are in
the edge-based cluster, so these partitions give roughly the same information.
Next, we compare the clusters found by existing methods to the Mbifan-based cluster found
by Algorithm 1. We will show that existing methods do not find the same group of nodes.
Let Sbifan be the Mbifan-based cluster, which consists of 20 nodes. The nodes correspond to the
following neurons: IL1DL/VL, IL2DL/DR/VL/VR/L/R, OLQDL/R, RIH, RIPL/R, RMEL/R/V,
and URADL/DR/VL/VR. The partitions based on M8 and Medge provide two sets of nodes each.
For the subsequent analysis, we consider the set with the largest number of overlapping nodes
with Sbifan. Call these sets SM8 and Sedge. We also consider the cluster found by Infomap and
the Louvain method with the largest overlap with Sbifan. Call these sets SI and SL.
To compare the most similar clusters found by other methods to Sbifan, we look at two
metrics. First, how many neurons in Sbifan are in a cluster found by existing methods (in other
S40
1001011020.10.20.30.40.50.60.70.80.9Motif conductanceSets Srwords, the overlap). A cluster consisting of all nodes in the graph would trivially have 100%
overlap with Sbifan but loses all precision in the cluster identification. Thus, we also consider the
sizes of the clusters. These metrics are summarized as follows:
Sbifan ∩ SM8 = 20,
Sbifan ∩ Sedge = 20,
Sbifan ∩ SL = 13,
Sbifan ∩ SI = 19,
SM8 = 68
Sedge = 64
SL = 27
SI = 114
We see that Sbifan is a subset of SM8 and Sedge and has substantial overlap with SI. However,
Sbifan is by far the smallest of all of these sets. We conclude that existing methods do not capture
the same information as motif Mbifan.
To further investigate the structure found by existing methods, we show the clusters Sedge
and SM8 in Figure S8. From the figure, we see that spectral clustering based on edges or motif
M8 simply finds a spatially coherent cluster, rather than the control structure formed by the
nodes in Sbifan.
S41
Figure S8: Illustration of motif-based clusters with true two-dimensional spatial dimensions of
the frontal neurons of C. elegans. A: The Mbifan-based cluster consists of the labeled dark blue
nodes. B: Partitioning the graph based on motif M8, where the labeled dark blue nodes are
the nodes on the side of the partition with largest overlap of the nodes in A. C: Partitioning
the graph based on edges, where the labeled dark blue nodes are the nodes on the side of the
partition with largest overlap of the nodes in A. Note that the partitions in Figures B and C
capture the cluster in Figure A, but also contain many other nodes. Essentially, the partitions in
B and C are just capturing spatial information.
S42
S6 Details and comparison against existing methods for the
transportation reachability network
The nodes in the transportation reachability network are airports in the United States and
Canada. There is an edge from city i to city j if the estimated travel time from i to j is less than
some threshold (23). The network is not symmetric. The network with estimated travel times
was downloaded from
http://www.psi.toronto.edu/affinitypropagation/TravelRouting.mat
and http://www.psi.toronto.edu/affinitypropagation/TravelRoutingCityNames.
txt. We collected the latitude, longitude, and metropolitan populations of the cities using
WolframAlpha and Wikipedia. All of the data is available on our project web page: http:
//snap.stanford.edu/higher-order/.
S6.1 Methods for spectral embeddings
We compared the motif-based spectral embedding of the transportation reachability network to
spectral embeddings from other connectivity matrices. For this analysis, we ignore the travel
times times and only consider the topology of the network. The two-dimensional spectral em-
bedding for a graph defined by a (weighted) adjacency matrix W ∈ Rn×n comes from Algo-
rithm 2:
1. Form the normalized Laplacian L = I − D−1/2W D−1/2, where D is the diagonal degree
matrix with Dii =(cid:80)
j Wij.
2. Compute the first 3 eigenvectors z1, z2, z3 of smallest eigenvalues for L (z1 has the small-
est eigenvalue).
3. Form the normalized matrix Y ∈ Rn×3 by Yij = zij/
ij.
j=1 z2
(cid:113)(cid:80)3
S43
4. Define the primary and secondary spectral coordinates of node i to be Yi2 and Yi3, respec-
tively.
We consider the following three matrices W .
1. Motif: The sum of the motif adjacency matrix (Equation S20) for three different anchored
motifs:
B1 =
0 1 1
1 0 1
1 1 0
, B2 =
0 1 1
1 0 1
0 1 0
, B3 =
0 1 0
1 0 1
0 1 0
, A = {1, 3}.
(S28)
If S is the matrix of bidirectional links in the graph (Sij = 1 if and only if Aij = Aji = 1),
then the motif adjacency matrix for these motifs is WM = S2. The resulting embedding
is shown in Figure 4C of the main text.
2. Undirected: The adjacency matrix is formed by ignoring edge direction. This is the
standard spectral embedding. The resulting embedding is shown in Figure 4D of the
main text.
3. Undirected complement: The adjacency matrix is formed by taking the complement of
the undirected adjacency matrix. This matrix tends to connect non-hubs to each other.
The networks represented by each adjacency matrices are all connected.
S6.2 Comparison of motif-based embedding to other embeddings
We computed 99% confidence intervals for the Pearson correlation of the primary spectral co-
ordinate with the metropolitan population of the city using the Pearson correlation coefficient.
Table S7 lists the confidence intervals. (Since eigenvectors are only unique up to sign, the con-
fidence intervals are symmetric about 0. We list the interval with the largest positive end point
S44
Table S7: Summary of Pearson correlations for spectral embeddings of the transportation reach-
ability network. We list the 99% confidence interval for the Pearson correlation coefficient.
Embedding
Motif
Undirected
Undirected complement
Primary spectral coordinate
and metropolitan population
99% confidence interval
0.43 ± 0.09
0.11 ± 0.12
0.31 ± 0.11
Secondary spectral coordinate
and longitude
99% confidence interval
0.59 ± 0.08
0.39 ± 0.11
0.10 ± 0.12
under this permutation to be consistent across embeddings.) The motif-based primary spectral
coordinate has the strongest correlation with the city populations.
We repeated the computations for the correlation between the secondary spectral coordinate
and the longitude of the city. Again, the motif-based clustering has the strongest correlation.
Furthermore, the lower end of the confidence interval for the motif-based embedding was above
the higher end of the confidence interval for the other three embeddings.
Finally, in order to visualize these relationships, we computed Loess regressions of city
metropolitan population and longitude against the primary and secondary spectral coordinates
for each of the embeddings (Figure S9). The sign of the eigenvector used in each regression
was chosen to match correlation shown in Figures 3C and 3D in the main text (primary spectral
coordinate positively correlated with population and secondary spectral coordinate negatively
correlated with longitude). The Loess regressions visualize the stronger correlation of the motif-
based spectral coordinates with the metropolitan popuatlion and longitude.
We conclude that the embedding provided by the motif adjacency matrix more strongly
captures the hub nature of airports and West-East geography of the network. To gain further in-
sight into the relationship of the primary spectral coordinate's relationship with the hub airports,
we visualize the adjacency matrix in Figure S10, where the nodes are ordered by the spectral
ordering. We see a clear relationship between the spectral ordering and the connectivity.
S45
Figure S9: Loess regressions of city metropolitan population against the primary spectral co-
ordinate (top) and longitude against secondary spectral coordinate (bottom) for the motif (left),
undirected (middle), and undirected complement (right) adjacency matrices.
Figure S10: Visualization of transportation reachability network. Nodes are ordered by the
spectral ordering provided by the motif adjacency matrix. A black dot means no edge exists in
the network. For the edges in the network, lighter colors mean longer estimated travel times.
S46
S7 Additional case studies
We next use motif-based clustering to analyze several additional networks. Our main goal is to
show that motif-based clusters find markedly different structures in many real-world networks
compared to edge-based clusters. For the case of a transcription regulation network of yeast,
we also show that motif-based clustering more accurately finds known functional modules com-
pared to existing methods. On the English Wikipedia article network and the Twitter network,
we identify motifs that find anomalous clusters. On the Stanford web graph and in collabora-
tion networks, we use motifs that have previously been studied in the literature and see how
they reveal organizational structure in the networks.
S7.1 Motif M6 in the Florida Bay food web
We now apply the higher-order clustering framework on the Florida Bay ecosystem food web (64).
The dataset was downloaded from http://vlado.fmf.uni-lj.si/pub/networks/
data/bio/foodweb/Florida.paj. In this network, the nodes are compartments (roughly,
organisms and species) and the edges represent directed carbon exchange (in many cases, this
means that species j eats species i). Motifs model energy flow patterns between several species.
S7.1.1
Identifying higher-order modular organization
In this case study, we use the framework to identify higher-order modular organization of net-
works. We focus on three motifs: M5 corresponds to a hierarchical flow of energy where species
i and j are energy sources (prey) for species k, and i is also an energy source for j; M6 models
two species that prey on each other and then compete to feed on a common third species; and
M8 describes a single species serving as an energy source for two non-interacting species. Mo-
tif M5 is considered a building block for food webs (65, 66), and the prevalence of motif M6 is
predicted by a certain niche model (67).
S47
The framework reveals that low motif conductance (high-quality) clusters only exist for mo-
tif M6 (motif conductance 0.12), whereas clusters based on motifs M5 or M8 have high motif
conductance (see Figure S11). In fact, the motif Cheeger inequality (Theorem 6) guarantees
that clustering based on motif M5 or M8 will always have larger motif conductance that cluster-
ing based on M6. The inequality says that the motif conductance for any cluster in a connected
motif adjacency matrix is at least half of the second smallest eigenvalue of the motif-normalized
Laplacian. However, finding the cluster with optimal conductance is still computationally in-
feasible in general (68).
The lower bounds using the largest connected component of the motif adjacency matrix
for motifs M5, M6, and M8 were 0.2195, 0.0335, and 0.2191, and the clusters found by the
Algorithm 1 had motif conductances of 0.4414, 0.1200, and 0.4145. Thus, the cluster S found
by the algorithm for M6 has smaller motif M6-conductance (0.12) than any possible cluster's
motif-M5 or motif-M8 conductance. To state this formally, let C be the cluster found by the
algorithm for motif M6 and let HM be the largest connected component of motif adjacency
matrix for motif M. Then
φM6(HM6, C) ≤ min
(cid:110)
min
S
φM5(HM5, S), min
S
φM8(HM8, S)
(cid:111)
.
(S29)
This means that, in terms of motif conductance, any cluster based on motifs M5 or M8 is worse
than the cluser found by the algorithm in Theorem 6 for motif M6. We note that the same
conclusions hold for edge-based clustering. For motif Medge, the lower bound on conductance
was 0.2194 and the cluster found by the algorithm had conductance 0.4083.
S7.1.2 Analysis of higher-order modular organization
Subsequently, we used motif M6 to cluster the food web, revealing four clusters (Figure S11).
Three represent well-known aquatic layers: (i) the pelagic system; (ii) the benthic predators
of eels, toadfish, and crabs; (iii) the sea-floor ecosystem of macroinvertebrates. The fourth
S48
cluster identifies microfauna supported by particulate organic carbon in water and free bacteria.
Table S9 lists the nodes in each cluster.
We also measured how well the motif-based clusters correlate to known ground truth system
subgroup classifications of the nodes (64). These classes are microbial, zooplankton, and sedi-
ment organism microfauna; detritus; pelagic, demersal, and benthic fishes; demseral, seagrass,
and algae producers; and macroinvertebrates (Table S9).2 We also consider a set of labels which
does not include the subclassification for microfauna and producers. In this case, the labels are
microfauna; detritus; pelagic, demersal, and benthic fishes; producers; and macroinvertebrates.
To quantify how well the clusters found by motif-based clustering reflect the ground truth
labels, we used several standard evaluation criteria: adjusted rand index, F1 score, normal-
ized mutual information, and purity (69). We compared these results to the clusters of several
methods using the same evaluation criteria. In total, we evaluated six methods:
1. Motif-based clustering with the embedding + k-means algorithm (Algorithm 2) with 500
iterations of k-means.
2. Motif-based clustering with recursive bi-partitioning (repeated application of Algorithm 1
on the largest remaining compoennt). The process continues to cut the largest cluster until
there are 4 total.
3. Edge-based clustering with the embedding + k-means algorithm, again with 500 iterations
of k-means.
4. Edge-based clustering with recursive bi-partitioning with the same partitioning process.
5. The Infomap algorithm.
2The classifications are also available on our project web page: http://snap.stanford.edu/
higher-order/.
S49
6. The Louvain method.
For the first four algorithms, we control the number of clusters, which we set to 4. For the
last two algorithms, we cannot control the number of clusters. However, both methods found 4
clusters.
Table S10 shows that the motif-based clustering by embedding + k-means had the best
performance for each classification criterion on both classifications. We conclude that the or-
ganization of compartments in the Florida Bay foodweb are better described motif M6 than by
edges.
S7.1.3 Connected components of the motif adjacency matrices
Finally, we discuss the discuss the preprocessing step of our method, where we compute com-
puted connected components of the motif adjacency matrices. The original network has 128
nodes and 2106 edges. The largest connected component of the motif adjacency matrix for mo-
tif M5 contains 127 of the 128 nodes. The node corresponding to the compartment of "roots"
is the only node not in the largest connected component. The two largest connected compo-
nents of the motif adjacency matrix for motif M6 contain 12 and 50 nodes. The remaining 66
nodes are isolated. Table S8 lists the nodes in each component. We note that the group of 12
nodes corresponds to the green cluster in Figure S11. The motif adjacency matrix for M8 is
connected. The original network is weakly connected, so the motif adjacency matrix for Medge
is also connected.
S50
Figure S11: Higher-order organization of the Florida Bay food web. A: Sweep profile
plot (φ(G)
M (S) as a function of S from the sweep in Algorithm 1) for different motifs on the
Florida Bay ecosystem food web (64). A priori it is not clear whether the network is organized
based on a given motif. For example, motifs M5 (green) and M8 (blue) do not reveal any
higher-order organization (motif conductance has high values). However, the downward spikes
of the red curve show that M6 reveals rich higher-order modular structure (7). Ecologically,
motif M6 corresponds to two species mutually feeding on each other and also preying on a
common third species. B: Clustering of the food web based on motif M6. (For illustration,
edges not participating in at least one instance of the motif are omitted.) The clustering reveals
three known aquatic layers: pelagic fishes (yellow), benthic fishes and crabs (red), and sea-floor
macroinvertebrates (blue) as well as a cluster of microfauna and detritus (green). Our framework
identifies these modules with higher accuracy (61%) than existing methods (48–53%). C: A
higher-order cluster (yellow nodes in (B)) shows how motif M6 occurs in the pelagic layer. The
needlefish and other pelagic fishes eat each other while several other fishes are prey for these
two species. D: Another higher-order cluster (green nodes in (B)) shows how motif M6 occurs
between microorganisms. Here, several microfauna decompose into Particulate Organic Carbon
in the water (water POC) but also consume water POC. Free bacteria serves as an energy source
for both the microfauna and water POC.
S51
Table S8: Connected components of the Florida Bay foodweb motif adjacency matrix for motif
M6. There are 50 nodes in component 1, 12 nodes in component 2, and 66 isolated nodes.
Two largest components
Compartment (node)
Benthic Phytoplankton
Thalassia
Halodule
Syringodium
Drift Algae
Epiphytes
Predatory Gastropods
Detritivorous Polychaetes
Predatory Polychaetes
Suspension Feeding Polych
Macrobenthos
Benthic Crustaceans
Detritivorous Amphipods
Herbivorous Amphipods
Isopods
Herbivorous Shrimp
Predatory Shrimp
Pink Shrimp
Benthic Flagellates
Benthic Ciliates
Meiofauna
Other Cnidaridae
Silverside
Echinoderma
Bivalves
Detritivorous Gastropods
Detritivorous Crabs
Omnivorous Crabs
Predatory Crabs
Callinectes sapidus (blue crab)
Mullet
Blennies
Code Goby
Clown Goby
Flatfish
Sardines
Anchovy
Bay Anchovy
Lizardfish
Catfish
Eels
Toadfish
Brotalus
Halfbeaks
Needlefish
Goldspotted killifish
Rainwater killifish
Other Pelagic Fishes
Other Demersal Fishes
Benthic Particulate Organic Carbon (Benthic POC)
Free Bacteria
Water Flagellates
Water Cilitaes
Acartia Tonsa
Oithona nana
Paracalanus
Other Copepoda
Meroplankton
Other Zooplankton
Sponges
Water Particulate Organic Carbon (Water POC)
Input
Component index
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
2
2
2
2
2
2
2
2
2
2
2
2
S52
Isolated nodes
Compartment (node)
Barracuda
2 µm Spherical Phytoplankt
Synedococcus
Oscillatoria
Small Diatoms (<20 µm)
Big Diatoms (>20 µm)
Dinoflagellates
Other Phytoplankton
Roots
Coral
Epiphytic Gastropods
Thor Floridanus
Lobster
Stone Crab
Sharks
Rays
Tarpon
Bonefish
Other Killifish
Snook
Sailfin Molly
Hawksbill Turtle
Dolphin
Other Horsefish
Gulf Pipefish
Dwarf Seahorse
Grouper
Jacks
Pompano
Other Snapper
Gray Snapper
Mojarra
Grunt
Porgy
Pinfish
Scianids
Spotted Seatrout
Red Drum
Spadefish
Parrotfish
Mackerel
Filefishes
Puffer
Loon
Greeb
Pelican
Comorant
Big Herons and Egrets
Small Herons and Egrets
Ibis
Roseate Spoonbill
Herbivorous Ducks
Omnivorous Ducks
Predatory Ducks
Raptors
Gruiformes
Small Shorebirds
Gulls and Terns
Kingfisher
Crocodiles
Loggerhead Turtle
Green Turtle
Manatee
Dissolved Organic Carbon (DOC)
Output
Respiration
Table S9: Ecological classification of nodes in the Florida Bay foodweb. Colors correspond to
the colors in the clustering of Figure S11.
Classification 1
Compartment (node)
Microbial microfauna
Free Bacteria
Microbial microfauna
Water Flagellates
Microbial microfauna
Water Cilitaes
Zooplankton microfauna
Acartia Tonsa
Zooplankton microfauna
Oithona nana
Zooplankton microfauna
Paracalanus
Zooplankton microfauna
Other Copepoda
Zooplankton microfauna
Meroplankton
Zooplankton microfauna
Other Zooplankton
Macroinvertebrates
Sponges
Detritus
Water POC
Detritus
Input
Pelagic Fishes
Sardines
Pelagic Fishes
Anchovy
Pelagic Fishes
Bay Anchovy
Pelagic Fishes
Halfbeaks
Pelagic Fishes
Needlefish
Fishes Demersal
Goldspotted killifish
Fishes Demersal
Rainwater killifish
Pelagic Fishes
Silverside
Pelagic Fishes
Other Pelagic Fishes
Macroinvertebrates
Detritivorous Crabs
Macroinvertebrates
Predatory Crabs
Macroinvertebrates
Callinectus sapidus
Benthic Fishes
Lizardfish
Fishes Demersal
Eels
Benthic Fishes
Code Goby
Benthic Fishes
Clown Goby
Macroinvertebrates
Herbivorous Shrimp
Producer Demersal
Benthic Phytoplankton
Producer Seagrass
Thalassia
Producer Seagrass
Halodule
Producer Seagrass
Syringodium
Producer Algae
Drift Algae
Producer Algae
Epiphytes
Sediment Organism microfauna Microfauna
Benthic Flagellates
Sediment Organism microfauna Microfauna
Benthic Ciliates
Sediment Organism microfauna Microfauna
Meiofauna
Macroinvertebrates
Other Cnidaridae
Macroinvertebrates
Echinoderma
Macroinvertebrates
Bivalves
Macroinvertebrates
Detritivorous Gastropods
Predatory Gastropods
Macroinvertebrates
Detritivorous Polychaetes Macroinvertebrates
Predatory Polychaetes
Macroinvertebrates
Suspension Feeding Polych Macroinvertebrates
Macroinvertebrates
Macrobenthos
Benthic Crustaceans
Macroinvertebrates
Macroinvertebrates
Detritivorous Amphipods
Macroinvertebrates
Herbivorous Amphipods
Macroinvertebrates
Isopods
Macroinvertebrates
Predatory Shrimp
Pink Shrimp
Macroinvertebrates
Macroinvertebrates
Omnivorous Crabs
Benthic Fishes
Catfish
Pelagic Fishes
Mullet
Detritus
Benthic POC
Benthic Fishes
Toadfish
Brotalus
Fishes Demersal
Benthic Fishes
Blennies
Benthic Fishes
Flatfish
Other Demersal Fishes
Fishes Demersal
Assignment
Classification 2
Green
Microfauna
Green
Microfauna
Green
Microfauna
Green
Microfauna
Green
Microfauna
Green
Microfauna
Green
Microfauna
Green
Microfauna
Microfauna
Green
Macroinvertebrates Green
Green
Detritus
Green
Detritus
Yellow
Pelagic Fishes
Pelagic Fishes
Yellow
Yellow
Pelagic Fishes
Yellow
Pelagic Fishes
Yellow
Pelagic Fishes
Yellow
Fishes Demersal
Yellow
Fishes Demersal
Pelagic Fishes
Yellow
Pelagic Fishes
Yellow
Macroinvertebrates Red
Macroinvertebrates Red
Macroinvertebrates Red
Benthic Fishes
Red
Red
Fishes Demersal
Red
Benthic Fishes
Benthic Fishes
Red
Macroinvertebrates Red
Blue
Producer
Producer
Blue
Blue
Producer
Blue
Producer
Blue
Producer
Blue
Producer
Blue
Blue
Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Macroinvertebrates Blue
Blue
Benthic Fishes
Blue
Pelagic Fishes
Blue
Detritus
Blue
Benthic Fishes
Fishes Demersal
Blue
Blue
Benthic Fishes
Blue
Benthic Fishes
Fishes Demersal
Blue
S53
Table S10: Comparison of motif-based algorithms against other methods in finding ground truth
structure in the Florida Bay food web (64). Performance for identifying the two classifications
provided in Table S9 was evaluated based on Adjusted Rand Index (ARI), F1 score, Normalized
Mutual Information (NMI), and Purity. In all cases, the motif-based methods have the best
performance.
Evaluation Motif embedding Motif recursive Edge embedding Edge recursive
bi-partitioning
bi-partitioning
+ k-means
+ k-means
1
n
o
i
t
a
c
fi
i
s
s
a
l
C
2
n
o
i
t
a
c
fi
i
s
s
a
l
C
ARI
F1
NMI
Purity
ARI
F1
NMI
Purity
0.3005
0.4437
0.5040
0.5645
0.3265
0.4802
0.4822
0.6129
0.2156
0.3853
0.4468
0.5323
0.2356
0.4214
0.4185
0.5806
0.1564
0.3180
0.4112
0.4032
0.1814
0.3550
0.3533
0.4839
0.1226
0.2888
0.3879
0.4194
0.1190
0.3035
0.3034
0.4355
Infomap
Louvain
0.1423
0.3100
0.4035
0.4194
0.1592
0.3416
0.3471
0.4677
0.2207
0.4068
0.4220
0.5323
0.2207
0.4068
0.4220
0.5323
S7.2 Coherent feedforward loops in the S. cerevisiae transcriptional reg-
ulation network
In this network, each node is an operon (a group of genes in a mRNA molecule), and a directed
edge from operon i to operon j means that i is regulated by a transcriptional factor encoded by
j (29). Edges are directed and signed. A positive sign represents activation and a negative sign
represents repression. The network data was downloaded from http://www.weizmann.
ac.il/mcb/UriAlon/sites/mcb.UriAlon/files/uploads/NMpaper/yeastdata.
mat and http://www.weizmann.ac.il/mcb/UriAlon/sites/mcb.UriAlon/files/
uploads/DownloadableData/list_of_ffls.pdf.
For this case study, we examine the coherent feedforward loop motif (see Figure S12), which
act as sign-sensitive delay elements in transcriptional regulation networks (2, 9). Formally, the
feedforward loop is represented by the following signed motifs
0 + +
0 0 +
0
0 0
, B2 =
0 − −
0 0 +
0
0 0
, B3 =
0 + −
0 0 −
0
0 0
, B4 =
0 − +
0 0 −
0
0 0
.
(S30)
B1 =
S54
Table S11: Connected components of size greater than one for the motif adjacency matrix in
the S. cerevisiae network for the coherent feedforward loop.
Size
18
9
9
6
6
5
3
3
3
operons
ALPHA1, CLN1, CLN2, GAL11, HO, MCM1, MFALPHA1, PHO5, SIN3,
SPT16, STA1, STA2, STE3, STE6, SWI1, SWI4/SWI6, TUP1, SNF2/SWI1
HXT11, HXT9, IPT1, PDR1, PDR3, PDR5, SNQ2, YOR1, YRR1
GCN4, ILV1, ILV2, ILV5, LEU3, LEU4, MET16, MET17, MET4
CHO1, CHO2, INO2, INO2/INO4, OPI3, UME6
DAL80, DAL80/GZF3, GAP1, GAT1, GLN1, GLN3
CYC1, GAL1, GAL4, MIG1, HAP2/3/4/5
ADH2, CCR4, SPT6
CDC19, RAP1, REB1
DIT1, IME1, RIM101
These motifs have the same edge pattern and only differ in sign. All of the motifs are simple
(A = {1, 2, 3}). For our analysis, we consider all coherent feedforward loops that are subgraphs
on the induced subgraph of any three nodes. However, there is only one instance where the
coherent feedforward loop itself is a subgraph but not an induced subgraph on three nodes.
Specifically, the induced subgraph by DAL80, GAT1, and GLN3 contains a bi-directional edge
between DAL80 and GAT1, unidirectional edges from DAL80 and GAT1 to GLN3.
S7.2.1 Connected components of the adjacency matrices
Again, we analyze the component structure of the motif adjacency matrix as a pre-processing
step. The original network consists of 690 nodes and 1082 edges, and its largest weakly con-
nected component consists of 664 nodes and 1066 edges. Every coherent feedforward loop in
the network resides in the largest weakly connected component, so we subsequently consider
this sub-network in the following analysis. Of the 664 nodes in the network, only 62 participate
in a coherent feedforward loop. Forming the motif adjacency matrix results in nine connected
components, of sizes 18, 9, 9, 6, 6, 5, 3, 3, and 3. The operons for the connected components
consisting of more than one node is listed in Table S11.
S55
S7.2.2 Comparison against existing methods
We note that, although the original network is connected, the motif adjacency matrix corre-
sponds to a disconnected graph. This already reveals much of the structure in the network
(Figure S12). Indeed, this "shattering" of the graph into components for the feedforward loop
has previously been observed in transcriptional regulation networks (70). We additionally used
Algorithm 1 to partition the largest connected component of the motif adjacency matrix (con-
sisting of 18 nodes). This revealed the cluster {CLN2, CLN1, SWI4/SWI6, SPT16, HO}, which
contains three coherent feedforward loops (Figure S12). All three instances of the motif cor-
respond to the function "cell cycle and mating type switch". The motifs in this cluster are the
only feedforward loops for which the function is described in Reference (9). Using the same
procedure on the undirected version of the induced subgraph of the 18 nodes (i.e., using mo-
tif Medge) results in the cluster {CLN1, CLN2, SPT16, SWI4/SWI6 }. This cluster breaks the
coherent feedforward loop formed by HO, SWI4/SWI6, and SPT16.
We also evaluated our method based on the classification of motif functionality (9).3 In total,
there are 12 different functionalities and 29 instances of labeled coherent feedforward loops. We
considered the motif-based clustering of the graph to be the connected components of the motif
adjacency matrix with the additional partition of the largest connected component. To form an
edge-based clustering, we used the embedding + k-means algorithm on the undirected graph
(i.e., motif Medge) with k = 12 clusters. We also clustered the graph using Infomap and the
Louvain method. Table S12 summarizes the results. We see that the motif-based clustering
coherently labels all 29 motifs in the sense that the three nodes in every instance of a labeled
motif is placed in the same cluster. The edge-based spectral, Infomap, and Louvain clustering
coherently labeled 25, 23, and 23 motifs, respectively.
3The functionalities may be downloaded from our project web page: http://snap.stanford.edu/
higher-order/.
S56
We measured the accuracy of each clustering method as the rand index (69) on the coher-
ently labeled motifs, multiplied by the fraction of coherently labeled motifs. The motif-based
clustering had the highest accuracy. We conclude that motif-based clustering provides an advan-
tage over edge-based clustering methods in identifying functionalities of coherent feedforward
loops in the the S. cerevisiae transcriptional regulation network.
S57
Figure S12: Higher-order organization of the S. cerevisiae transcriptional regulation network.
A: The four higher-order structures used by our higher-order clustering method, which can
model signed motifs. These are coherent feedfoward loop motifs, which act as sign-sensitive
delay elements in transcriptional regulation networks (2). The edge signs refer to activation
(positive) or repression (negative). B: Six higher-order clusters revealed by the motifs in (A).
Clusters show functional modules consisting of several motifs (coherent feedforward loops),
which were previously studied individually (9). The higher-order clustering framework identi-
fies the functional modules with higher accuracy (97%) than existing methods (68–82%). C–D:
Two higher-order clusters from (B). In these clusters, all edges have positive sign. The func-
tionality of the motifs in the modules correspond to drug resistance (C) or cell cycle and mating
type match (D). The clustering suggests that coherent feedforward loops function together as a
single processing unit rather than as independent elements.
S58
Table S12: Classification of coherent feedforward loop motifs by several clustering methods.
In a given motif instance, we say that it is coherently labeled if the nodes comprising the motif
are in the same cluster. If a motif is not coherently labeled, a "-1" is listed. The accuracy is the
rand index on the labels and motif functionality on coherently labeled motifs, multiplied by the
fraction of coherently labeled motifs.
Motif nodes
Function
Motif-based Edge-based Infomap Louvain
Class label
pheromone response
Metionine biosynthesis
Metionine biosynthesis
Leucine and branched amino acid biosynthesis
Leucine and branched amino acid biosynthesis
Leucine and branched amino acid biosynthesis
Leucine and branched amino acid biosynthesis
Nitrogen utilization
Nitrogen utilization
GAL11 ALPHA1
GCN4
GCN4
GCN4
GCN4
GCN4
GCN4
GLN3
GLN3
GLN3
GLN3
MIG1
MIG1
PDR1
PDR1
PDR1
PDR1
PDR1
PDR1
PDR1
PDR1
RIM101
SPT16
SPT16
SPT16
TUP1
UME6
UME6
UME6
MFALPHA1
MET16
MET4
MET17
MET4
ILV1
LEU3
ILV2
LEU3
ILV5
LEU3
LEU4
LEU3
GAP1
GAT1
DAL80
GAT1
DAL80/GZF3 Glutamate synthetase
GAT1
Glutamate synthetase
GAT1
GLN1
formation of apocytochromes
HAP2/3/4/5 CYC1
Galactokinase
GAL1
GAL4
Drug resistance
SNQ2
YRR1
Drug resistance
YOR1
YRR1
PDR3
HXT11
Drug resistance
Drug resistance
HXT9
PDR3
Drug resistance
PDR5
PDR3
Drug resistance
IPT1
PDR3
Drug resistance
SNQ2
PDR3
Drug resistance
PDR3
YOR1
IME1
DIT1
sporulation-specific
Cell cycle and mating type switch
SWI4/SWI6 CLN1
Cell cycle and mating type switch
SWI4/SWI6 CLN2
SWI4/SWI6 HO
Cell cycle and mating type switch
ALPHA1
INO2/INO4 CHO1
INO2/INO4 CHO2
INO2/INO4 OPI3
MFALPHA1 Mating factor alpha
Phospholipid biosynthesis
Phospholipid biosynthesis
Phospholipid biosynthesis
1
2
2
2
2
2
2
3
3
3
3
4
4
5
5
5
5
5
5
5
5
6
7
7
7
1
8
8
8
1
2
2
2
2
2
2
3
3
3
3
4
-1
5
5
5
5
5
5
5
5
6
-1
-1
-1
1
6
6
6
-1
1
1
1
1
1
1
1
1
1
1
-1
-1
2
2
2
2
2
2
2
2
3
4
-1
-1
-1
5
5
5
-1
-1
-1
1
1
1
1
2
2
2
2
-1
-1
3
3
3
3
3
3
3
3
4
5
5
-1
5
4
4
4
Frac. coherently labeled
Accuracy
29 / 29
0.97
25 / 29
0.82
23 / 29
0.68
23 / 29
0.76
S7.3 Motif M6 in the English Wikipedia article network
The English Wikipedia network (57–59) consists of 4.21 million nodes (representing articles)
and 101.31 million edges, where an edge from node i to node j means that there is a hyperlink
from the ith article to the jth article. The network data was downloaded from http://law.
di.unimi.it/webdata/enwiki-2013/.
We used Algorithm 1 to find a motif-based cluster for motif M6 and Medge (the algorithm
was run on the largest connected component of the motif adjacency matrix). The clusters are
shown in Figure S13. The nodes in the motif-based cluster are cities and barangays (small
S59
administrative divisions) in the Philippines. The cluster has a set of nodes with many outgoing
links that form the source node in motif M6. In total, the cluster consists of 22 nodes and 338
edges. The linking pattern appears anomalous and suggests that perhaps the pages uplinking
should receive reciprocated links. On the other hand, the edge-based cluster is much larger
cluster and does not have too much structure. The cluster consists of several high-degree nodes
and their neighbors.
S60
Figure S13: Clusters from the English Wikipedia hyperlink network (57–59). A–C: Motif-
based cluster (A) for motif M6 (B). The cluster consists of cities and small administrative di-
visions in the Philippines. The green nodes have many bi-direction links with each other and
many incoming links from orange nodes at the bottom of the figure. The spy plot illustrates this
network structure (C). D–F: Cluster (D) for undirected edges (E). The cluster has a few very
high-degree nodes, as evidenced by the spy plot (F).
S61
S7.4 Motif M6 in the Twitter follower network
We also analyzed the complete 2010 Twitter follower graph (58, 59, 71). The graph consists
41.65 million nodes (users) and 1.47 billion edges, where an edge from node i to node j signifies
that user i is followed by user j on the social network. The network data was downloaded from
http://law.di.unimi.it/webdata/twitter-2010/.
We used Algorithm 1 to find a motif-based cluster for motif M6 (the algorithm was run
on the largest connected component of the motif adjacency matrix). The cluster contains 151
nodes and consists of two disconnected components. Here, we consider the smaller of the two
components, which consists of 38 nodes. We also found an edge-based cluster on the undirected
graph (using Algorithm 1 with motif Medge). This cluster consists of 44 nodes.
Figure S14 illustrates the motif-based and edge-based clusters. Both clusters capture anoma-
lies in the graph. The motif-based cluster consists of holding accounts for a photography com-
pany. The nodes that form bi-directional links have completed profiles (contain a profile pic-
ture) while several nodes with incomplete profiles (without a profile picture) are followed by
the completed accounts. The edge-based cluster is a near clique, where the user screen names
all begin with "LC ". We suspect that the similar usernames are either true social communities,
holding accounts, or bots. (For the most part, their tweets are protected, so we could not verify
if any of these scenarios are true). Interestingly, both M6 and Medge find anomalous clusters.
However, their structures are quite different. We conclude that M6 can lead to the detection of
new anomalous clusters in social networks.
S62
Figure S14: Clusters in the 2010 Twitter follower network (58, 59, 71). A–C: Motif-based
cluster (A) for motif M6 (B). All accounts are holding accounts for a photography company.
The green nodes correspond to accounts that have completed profiles, while the orange accounts
have incomplete profiles. The spy plot illustrates how the cluster is formed around this motif
(C). D–F: Cluster (D) for edge-based clustering (E). The cluster consists of a near-clique (F)
where all users have the prefix "LC ".
S63
S7.5 Motif M7 in the Stanford web graph
The Stanford web graph (7, 56) consists of 281,903 nodes and 2,312,497 edges, where an edge
from node i to node j means that there is a hyperlink from the ith web page to the jth web page.
Here, all of the web pages come from the Stanford domain. The network data was downloaded
from http://snap.stanford.edu/data/web-Stanford.html.
We used Algorithm 1 to find a motif-based cluster for motif M7, a motif that is over-
expressed in web graphs (1). An illustration of the cluster and an edge-based cluster (i.e.,
using Algorithm 1 with Medge) are in Figure S15. Interestingly, both clusters exhibits a core-
periphery structure, albeit markedly different ones. The motif-based cluster contains several
core nodes with large in-degree. Such core nodes comprise the sink node in motif M7. On the
periphery are several clusters within which are many bi-directional links (as illustrated by the
spy plot in Figure S15). The nodes in these clusters then up-link to the core nodes. This type
of organizational unit suggests an explanation for why motif M7 is over-expressed: clusters of
similar pages tend to uplink to more central pages. The edge-based cluster also has a few nodes
with large in-degree, serving as a small core. On the periphery are the neighbors of these nodes,
which themselves tend not to be connected (as illustrated by the spy plot).
S64
Figure S15: Clusters in the Stanford web graph (7). A–C: Motif-based cluster (A) for motif M7
(B). The cluster has a core group of nodes with many incoming links (serving as the sink node
in M7; shown in orange) and several periphery groups that are tied together (the bi-directional
link in M7; shown in green) and also up-link to the core. This is evident from the spy plot (C).
D–F: Cluster (C) for undirected edges (B). The cluster contains a few high-degree nodes and
their neighbors, and the neighbors tend to not be connected, as illustrated by the splot (F).
S65
S7.6 Semi-cliques in collaboration networks
We used Algorithm 1 to identify clusters of a four-node motif (the semi-clique) that has been
studied in conjunction with researcher productivity in collaboration networks (72) (see Fig-
ure S16). We found a motif-based cluster in two different collaboration networks. Each one is
derived from co-authorship in papers submitted to the arXiv under a certain category; here, we
analyze the "High Energy Physics–Theory" (HepTh) and "Condensed Matter Physics" (Cond-
Mat) categories (56,73). The HepTh network has 23,133 nodes and 93,497 edges and the Cond-
Mat network has 9,877 nodes and 25,998 edges. The HepTh network data was downloaded
from http://snap.stanford.edu/data/ca-HepTh.html and the CondMat net-
work data was downloaded from http://snap.stanford.edu/data/ca-CondMat.
html.
Figure S16 shows the two clusters for each of the collaboration networks. In both networks,
the motif-based cluster consists of a core group of nodes and similarly-sized groups on the
periphery. The core group of nodes correspond to the nodes of degree 3 in the motif and the pe-
riphery group nodes correspond to the nodes of degree 2. One explanation for this organization
is that there is a small small group of authors that writes papers with different research groups.
Alternatively, the co-authorship could come from a single research group, where senior authors
are included on all of the papers and junior authors on a subset of the papers.
On the other hand, the edge-based clusters (i.e., result of Algorithm 1 for Medge) are a clique
in the HepTh netowork and a clique with a few dangling nodes in the CondMat network. The
dense clusters are quite different from the sparser clusters based on the semi-clique. Such dense
clusters are not that surprising. For example, a clique could arise from a single paper published
by a group of authors.
S66
Figure S16: Clusters in co-authorship networks (73). A–E: Best motif-based cluster for the
semi-clique motif (E) in the High Energy Physics–Theory collaboration network (A) and the
Condensed Matter Physics collaboration network (C). Corresponding spy plots are shown in
(B) and (D). F–I: Best edge-based (I) cluster in the High Energy Physics–Theory collaboration
network (F) and the Condensed Matter Physics collaboration network (H). Corresponding spy
plots are shown in (G) and (I).
S67
S8 Data availability
All data is available at our project web site at http://snap.stanford.edu/higher-order/.
The web site includes links to datasets used for experiments throughout the supplementary ma-
terial (7, 56, 58–60, 74–83).
S68
References and Notes
1. R. Milo, et al., Science 298, 824 (2002).
2. S. Mangan, A. Zaslaver, U. Alon, Journal of molecular biology 334, 197 (2003).
3. J. Yang, J. Leskovec, Proceedings of the IEEE 102, 1892 (2014).
4. P. W. Holland, S. Leinhardt, American Journal of Sociology pp. 492–513 (1970).
5. M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West, R. Lambiotte, Nature communi-
cations 5 (2014).
6. N. Przulj, D. G. Corneil, I. Jurisica, Bioinformatics 20, 3508 (2004).
7. J. Leskovec, K. J. Lang, A. Dasgupta, M. W. Mahoney, Internet Mathematics 6, 29 (2009).
8.
O. N. Yaveroglu, et al., Scientific reports 4 (2014).
9. S. Mangan, U. Alon, Proceedings of the National Academy of Sciences 100, 11980 (2003).
10. C. J. Honey, R. Kotter, M. Breakspear, O. Sporns, Proceedings of the National Academy of
Sciences 104, 10240 (2007).
11. S. E. Schaeffer, Computer Science Review 1, 27 (2007).
12. Minimizing φM (S) is NP-hard, which follows from the NP-hardness of the traditional def-
inition of conductance (68).
13. See the Supplementary Material.
4(cid:112)φ∗
14. Formally, when the motif has three nodes, the selected cluster S satisfies φM (S) ≤
M is the smallest motif conductance of any possible node set S.
M ≤ 1, where φ∗
This inequality is proved in the Supplementary Material.
S69
agonal matrix with the row-sums of WM on the diagonal (Dii =(cid:80)
15. The normalized motif Laplacian matrix is LM = D−1/2(D − WM )D−1/2, where D is a di-
j(WM )ij), and D−1/2 is
−1/2
the same matrix with the inverse square-roots on the diagonal (D
j(WM )ij).
ii = 1/
The spectral ordering σ is the by-value ordering of D−1/2z, where z is the eigenvector cor-
responding to the second smallest eigenvalue of LM, i.e., σi is the index of D−1/2z with the
ith smallest value.
(cid:113)(cid:80)
16. C. Seshadhri, A. Pinar, T. G. Kolda, Statistical Analysis and Data Mining: The ASA Data
Science Journal 7, 294 (2014).
17. R. Andersen, F. Chung, K. Lang, Proceedings of the 47th Annual IEEE Symposium on
Foundations of Computer Science (2006), pp. 475–486.
18. J. J. Whang, I. S. Dhillon, D. F. Gleich, SIAM Data Mining (2015).
19. A. Y. Ng, M. I. Jordan, Y. Weiss, Advances in Neural Information Processing Systems 14
(2002), pp. 849–856.
20. D. Boley, Data Mining and Knowledge Discovery 2, 325 (1998).
21. D. L. Riddle, T. Blumenthal, B. J. Meyer, et al., eds., C. elegans II (Cold Spring Harbor
Laboratory Press, 1997), second edn.
22. H. Lee, et al., Nature neuroscience 15, 107 (2012).
23. B. J. Frey, D. Dueck, Science 315, 972 (2007).
24. B. Serrour, A. Arenas, S. G´omez, Computer Communications 34, 629 (2011).
25. T. Michoel, A. Joshi, B. Nachtergaele, Y. Van de Peer, Molecular BioSystems 7, 2769
(2011).
S70
26. A. R. Benson, D. F. Gleich, J. Leskovec, SIAM Data Mining (2015).
27. F. Krzakala, et al., Proceedings of the National Academy of Sciences 110, 20935 (2013).
28. M. Kaiser, C. C. Hilgetag, PLoS Computational Biology 2, e95 (2006).
29. U. Alon, Nature Reviews Genetics 8, 450 (2007).
30. O. Sporns, R. Kotter, PLoS Biology 2, e369 (2004).
31. A. Inokuchi, T. Washio, H. Motoda, Principles of Data Mining and Knowledge Discovery
(Springer, 2000), pp. 13–23.
32. F. R. Chung, Proceedings of ICCM (Citeseer, 2007), vol. 2, p. 378.
33. J. R. Lee, S. O. Gharan, L. Trevisan, Journal of the ACM 61, 37 (2014).
34. F. Chung, Annals of Combinatorics 9, 1 (2005).
35. D. Boley, G. Ranjan, Z.-L. Zhang, Linear Algebra and its Applications 435, 224 (2011).
36. F. D. Malliaros, M. Vazirgiannis, Physics Reports 533, 95 (2013).
37. G. Karypis, R. Aggarwal, V. Kumar, S. Shekhar, Very Large Scale Integration (VLSI) Sys-
tems, IEEE Transactions on 7, 69 (1999).
38. S. Agarwal, K. Branson, S. Belongie, Proceedings of the 23rd International Conference on
Machine Learning (ACM, 2006), pp. 17–24.
39. D. Zhou, J. Huang, B. Scholkopf, Advances in Neural Information Processing Systems 19
(MIT Press, 2006), pp. 1601–1608.
40. J. Rodr´ıguez, Linear and Multilinear Algebra 50, 1 (2002).
S71
41. L. Trevisan, Lecture notes on expansion, sparsest cut, and spectral graph theory, http://
www.eecs.berkeley.edu/luca/books/expanders.pdf. Accessed June 28,
2015.
42. S. Demeyer, et al., PloS ONE 8, e61183 (2013).
43. M. Houbraken, et al., PLoS ONE 9, e97896 (2014).
44. S. Wernicke, IEEE/ACM Transactions on Computational Biology and Bioinformatics 3,
347 (2006).
45. S. Wernicke, F. Rasche, Bioinformatics 22, 1152 (2006).
46. C. R. Aberger, A. Notzli, K. Olukotun, C. R´e, arXiv preprint arXiv:1503.02368 (2015).
47. M. Latapy, Theoretical Computer Science 407, 458 (2008).
48. J. W. Berry, et al., Proceedings of the 5th Conference on Innovations in Theoretical Com-
puter Science (ACM, New York, NY, USA, 2014), pp. 225–234.
49. D. Marcus, Y. Shavitt, IEEE 30th International Conference on Distributed Computing Sys-
tems Workshops (2010), pp. 92–98.
50. N. Chiba, T. Nishizeki, SIAM Journal on Computing 14, 210 (1985).
51. T. Schank, D. Wagner, Experimental and Efficient Algorithms (Springer, 2005), pp. 606–
609.
52. L. Becchetti, P. Boldi, C. Castillo, A. Gionis, Proceedings of the 14th ACM SIGKDD inter-
national conference on Knowledge discovery and data mining (ACM, 2008), pp. 16–24.
53. J. Cohen, Computing in Science & Engineering 11, 29 (2009).
S72
54. B. N. Parlett, The Symmetric Eigenvalue Problem, vol. 7 (SIAM, 1980).
55. K. J. Maschhoff, D. C. Sorensen, Applied Parallel Computing Industrial Computation and
Optimization (Springer, 1996), pp. 478–486.
56. J. Leskovec, A. Krevl, SNAP Datasets: Stanford large network dataset collection, http:
//snap.stanford.edu/data (2014).
57. P. Boldi, B. Codenotti, M. Santini, S. Vigna, Software: Practice and Experience 34, 711
(2004).
58. P. Boldi, S. Vigna, Proceedings of the 13th International Conference on World Wide Web
(ACM, 2004), pp. 595–602.
59. P. Boldi, M. Rosa, M. Santini, S. Vigna, Proceedings of the 20th International Conference
on World Wide Web (ACM, 2011), pp. 587–596.
60. P. Boldi, A. Marino, M. Santini, S. Vigna, Proceedings of the companion publication of the
23rd international conference on World wide web companion (International World Wide
Web Conferences Steering Committee, 2014), pp. 227–228.
61. A. Azad, A. Buluc¸, J. R. Gilbert, Proceedings of the IPDPSW, Workshop on Graph Algo-
rithm Building Blocks (GABB) (2015), pp. 804–811.
62. M. Rosvall, C. T. Bergstrom, Proceedings of the National Academy of Sciences 105, 1118
(2008).
63. V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Journal of statistical mechanics:
theory and experiment 2008, P10008 (2008).
S73
64. R. E. Ulanowicz, C. Bondavalli, M. S. Egnotovich, Trophic Dynamics in South Florida
Ecosystem, FY 97: The Florida Bay Ecosystem, Tech. Rep. CBL 98-123, Chesapeake Bio-
logical Laboratory, Solomons, MD (1998).
65. J. Bascompte, C. J. Meli´an, E. Sala, Proceedings of the National Academy of Sciences of
the United States of America 102, 5443 (2005).
66. J. Bascompte, et al., Science 325, 416 (2009).
67. D. B. Stouffer, J. Camacho, W. Jiang, L. A. N. Amaral, Proceedings of the Royal Society of
London B: Biological Sciences 274, 1931 (2007).
68. D. Wagner, F. Wagner, Proceedings of the 18th International Symposium on Mathematical
Foundations of Computer Science (1993), pp. 744–750.
69. C. D. Manning, P. Raghavan, H. Schutze, et al., Introduction to Information Retrieval,
vol. 1 (Cambridge university press Cambridge, 2008).
70. R. Dobrin, Q. K. Beg, A.-L. Barab´asi, Z. N. Oltvai, BMC bioinformatics 5, 10 (2004).
71. H. Kwak, C. Lee, H. Park, S. Moon, Proceedings of the 19th International Conference on
World Wide Web (ACM, 2010), pp. 591–600.
72. T. Chakraborty, N. Ganguly, A. Mukherjee, Advances in Social Networks Analysis and
Mining (ASONAM), 2014 IEEE/ACM International Conference on (IEEE, 2014), pp. 130–
137.
73. J. Leskovec, J. Kleinberg, C. Faloutsos, ACM Transactions on Knowledge Discovery from
Data (TKDD) 1, 2 (2007).
S74
74. R. West, H. S. Paskov, J. Leskovec, C. Potts, Transactions of the Association for Computa-
tional Linguistics 2, 297 (2014).
75. J. Leskovec, J. Kleinberg, C. Faloutsos, Proceedings of the eleventh ACM SIGKDD inter-
national conference on Knowledge discovery in data mining (ACM, 2005), pp. 177–187.
76. J. Gehrke, P. Ginsparg, J. Kleinberg, ACM SIGKDD Explorations Newsletter 5, 149 (2003).
77. R. Albert, H. Jeong, A.-L. Barab´asi, Nature 401, 130 (1999).
78. J. Leskovec, L. A. Adamic, B. A. Huberman, ACM Transactions on the Web (TWEB) 1, 5
(2007).
79. J. Leskovec, D. P. Huttenlocher, J. M. Kleinberg, ICWSM (2010).
80. J. Leskovec, J. J. Mcauley, Advances in neural information processing systems (2012), pp.
539–547.
81. L. Takac, M. Zabovsky, International Scientific Conference and International Workshop
Present Day Trends of Innovations (2012), pp. 1–6.
82. L. Backstrom, D. Huttenlocher, J. Kleinberg, X. Lan, Proceedings of the 12th ACM
SIGKDD international conference on Knowledge discovery and data mining (ACM, 2006),
pp. 44–54.
83. J. Yang, J. Leskovec, 2012 IEEE 12th International Conference on Data Mining (IEEE,
2012), pp. 745–754.
S75
Authors would like to thank Rok Sosic for insightful comments. ARB acknowledges the
support of a Stanford Graduate Fellowship. DFG acknowledges the support of NSF CCF-
1149756 and IIS-1422918 and DARPA SIMPLEX. JL acknowledges the support of NSF IIS-
1149837 and CNS-1010921, NIH BD2K, DARPA XDATA and SIMPLEX, Boeing, Lightspeed,
and Volkswagen.
S76
|
1506.04571 | 1 | 1506 | 2015-06-15T12:43:45 | A community role approach to assess social capitalists visibility in the Twitter network | [
"cs.SI",
"physics.soc-ph"
] | In the context of Twitter, social capitalists are specific users trying to increase their number of followers and interactions by any means. These users are not healthy for the service, because they are either spammers or real users flawing the notions of influence and visibility. Studying their behavior and understanding their position in Twit-ter is thus of important interest. It is also necessary to analyze how these methods effectively affect user visibility. Based on a recently proposed method allowing to identify social capitalists, we tackle both points by studying how they are organized, and how their links spread across the Twitter follower-followee network. To that aim, we consider their position in the network w.r.t. its community structure. We use the concept of community role of a node, which describes its position in a network depending on its connectiv-ity at the community level. However, the topological measures originally defined to characterize these roles consider only certain aspects of the community-related connectivity, and rely on a set of empirically fixed thresholds. We first show the limitations of these measures, before extending and generalizing them. Moreover, we use an unsupervised approach to identify the roles, in order to provide more flexibility relatively to the studied system. We then apply our method to the case of social capitalists and show they are highly visible on Twitter, due to the specific roles they hold. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
A Community Role Approach To
Assess Social Capitalists Visibility
in the Twitter Network
Nicolas Dugu´e · Vincent
Labatut · Anthony Perez
5
1
0
2
n
u
J
5
1
]
I
S
.
s
c
[
1
v
1
7
5
4
0
.
6
0
5
1
:
v
i
X
r
a
the date of receipt and acceptance should be inserted later
Abstract In the context of Twitter, social capitalists are
specific users trying to increase their number of followers
and interactions by any means. These users are not healthy
for the service, because they are either spammers or real
users flawing the notions of influence and visibility. Study-
ing their behavior and understanding their position in Twit-
ter is thus of important interest. It is also necessary to an-
alyze how these methods effectively affect user visibility.
Based on a recently proposed method allowing to identify
social capitalists, we tackle both points by studying how
they are organized, and how their links spread across the
Twitter follower-followee network. To that aim, we consider
their position in the network w.r.t. its community structure.
We use the concept of community role of a node, which de-
scribes its position in a network depending on its connectiv-
ity at the community level. However, the topological mea-
sures originally defined to characterize these roles consider
only certain aspects of the community-related connectivity,
and rely on a set of empirically fixed thresholds. We first
show the limitations of these measures, before extending
and generalizing them. Moreover, we use an unsupervised
approach to identify the roles, in order to provide more flex-
ibility relatively to the studied system. We then apply our
method to the case of social capitalists and show they are
highly visible on Twitter, due to the specific roles they hold.
Keywords Twitter, Social network, Social capitalism,
influence, community roles
Nicolas Dugu´e, Anthony Perez
Universit´e d'Orl´eans, LIFO EA 4022, F-45067 Orl´eans, France
E-mail: {anthony.perez}{nicolas.dugue}@univ-orleans.fr
Vincent Labatut
Universit´e d'Avignon, LIA EA 4128, F-84911 Avignon, France
E-mail: [email protected]
1 Introduction
The last decade has been marked by an increase in both the
number of online social networking services and the number
of users of such services. This observation is particularly
relevant when considering Twitter, which had 200 million
accounts in April 2011 [3] and reached 500 millions in Oc-
tober 2012 [14]. Twitter is mostly used to share, seek and de-
bate some information, or to let the world know about daily
events [15]. The amount of information shared on Twitter is
considerable: there are about 1 billion tweets posted every
two and a half days [24]. While focusing on microblogging,
Twitter can be considered as a social networking service,
since it includes social features. Indeed, to see the messages
of other users, a Twitter user has to follow them (i.e. make
a subscription). Furthermore, a user can retweet [26] other
users' tweets, for instance when he finds them interesting
and wants to share them with his followers 1. Besides, users
can mention other users to draw their attention by adding
@UserName in their message.
Some Twitter users are trying to use these particular
properties to spread efficiently some information [11]. One
of the simplest way to reach this objective is to gain as
many followers as possible, since this gives a higher visi-
bility to the user's tweets when using the network search en-
gines [11]. These specific users are called social capitalists.
They have been recently pointed out by Ghosh et al. [11]
in a study related to link-farming in Twitter. They noticed
in particular that users responding the most to the solicita-
tion of spammers are in fact real, active users. To increase
their number of followers, social capitalists use several tech-
niques [7,11], the most common one being to follow a lot of
users regardless of their content, just hoping to be followed
back.
Because of this lack of interest in the content produced
by the users they follow, social capitalists are not healthy for
a service such as Twitter. Indeed, this behavior helps spam-
mers gaining influence [11], and more generally makes the
task of finding relevant information harder for regular users.
Identifying them and studying their behavior in Twitter are
therefore two very important tasks to improve the service,
since they can allow designing better search engines or func-
tioning rules. In a recent article, Dugu´e & Perez [7] have
designed a method to efficiently detect social capitalists. In
order to better understand how they are organized, how re-
ally visible they are, and how their links spread across the
network, we propose to characterize the position of social
capitalists relatively to the community structure of the net-
work [8].
In its simplest form, the community structure of a com-
plex network can be defined as a partition of its node set,
1 For a given user, a followee (or friend in the Twitter API) is a user
he subscribed to, and a follower is a user that subscribed to him.
2
Nicolas Dugu´e et al.
each part corresponding to a community. Community detec-
tion methods generally try to perform this partition in order
to obtain densely connected groups of nodes, relatively to
the rest of the network [23]. Hundreds of such algorithms
have been defined in the last ten years, see [9] for a very de-
tailed review of the domain. The notion of community struc-
ture is particularly interesting because it allows studying the
network at an intermediate level, compared to the more clas-
sic global (whole network) and local (node neighborhood)
approaches.
The concept of community role is a good illustration of
this characteristic. It consists in describing a node depending
on the position it holds in its own community. We base our
work on the Guimer`a & Amaral approach of the community
role [12]. After having applied a standard community de-
tection method, Guimer`a & Amaral characterize each node
according to two ad hoc measures, each one describing a
specific aspect of the community-related connectivity. The
node role is then selected among 7 predefined ones by com-
paring the two values to some empirically fixed thresholds
assumed as universal.
In this paper, we study the community roles of so-
cial capitalists within a freely-available Twitter follower-
followee network provided by Cha et al. [5]. In a first place,
we highlight two important limitations of the community
role approach described by Guimer`a & Amaral [12]. We
show that the existing measures used to characterize the
node's position do not take into account all aspects of the
community-related external connectivity of a node. More-
over, we object the assumption of universality of the thresh-
olds applied to the measures in order to distinguish the dif-
ferent node roles. The dataset we use constitutes a counter-
example showing the original thresholds are not relevant for
all systems. We then explain how to tackle these limitations.
We first introduce three new measures to characterize the ex-
ternal connectivity of a node in a more complete and detailed
way. We then describe an unsupervised approach aiming at
identifying the node roles without using fixed thresholds. Fi-
nally, we apply our method on the Twitter network to deter-
mine the position of social capitalists, and show they occupy
specific roles in the network. In particular, most of them are
well connected to their community, and overall a large part
of them spread their links outside their community very effi-
ciently. This gives meaningful insights regarding the actual
visibility of these users. Indeed, they occupy roles leading
to a high visibility in Twitter.
We first present the concept of social capitalists in Twit-
ter in more details (Section 2). Next, we describe the method
proposed by Guimer`a & Amaral [12] to identify the commu-
nity roles of nodes (Section 3.1) and provide some elements
regarding its limitation (Section 3.2.1). We then describe
the solutions we propose to tackle these limitations (Sec-
tion 3.3.1) and apply our method to study the roles of so-
cial capitalists in Twitter (Section 4). Finally, we discuss the
works related to the notion of community role (Section 5).
2 Social capitalists
2.1 Definition
Similarly to what is observed on the Web, where site admin-
istrators perform links exchange in order to increase their
visibility, some social network users seek to maximize their
number of virtual relationships. Because microblogging net-
works are focused on sharing information, not on develop-
ing friendship links, Twitter is particularly well-suited to ob-
serve and study this kind of behavior. Such users are called
social capitalists in [7,11] or friends infiltrators in [18].
In the rest of paper, we call these users social capital-
ists. These users exploit two relatively straightforward tech-
niques, based on the reciprocation of the follow link:
-- FMIFY (Follow Me and I Follow You): the user ensures
its potential followers that he will follow them back;
-- IFYFM (I Follow You, Follow Me): on the contrary, the
user systematically follows other users, hoping to be fol-
lowed back.
Social capitalists are not healthy for a social networking
service, since their methods to gain visibility and influence
are not based on the production of relevant content and on
getting a higher credibility. From this point of view, their
high number of followers can be considered as undeserved,
and biases all services based on the assumption that visible
users produce or fetch interesting content (e.g. search or rec-
ommendation engines).
Social capitalists were introduced by Ghosh et al [11] in
a paper studying spam on Twitter. They noticed that users
responding the most to the solicitations of spammers are
real (i.e. neither bots nor fake accounts), active and even
sometimes popular users. These users are engaged in a link
exchange process such as the two described above. Using
this observation, Ghosh et al. manually constituted a list of
100000 social capitalists -- namely the most responsive ones
to the solicitations of spammers. Social capitalists were also
mentioned as a subset of spammers in [18,19] where authors
succeed in building a robust classifier to detect spammers
from regular users. In both these papers, social capitalists
(called friends infiltrators by the authors) are not specifically
studied. Furthermore, these papers neither studied the actual
visibility of social capitalists nor the topological properties
of their corresponding positions in the network.
In [7], Dugu´e & Perez proposed an automatic method
to detect social capitalists. In this article, our work is based
on a list of social capitalists identified through this method,
which is why it is presented in detail in the next section.
A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network
3
Based on this list, we could compare the position and visibil-
ity of regular users and social capitalists through the notion
of community role.
2.2 Measures
The set of followees and the set of followers of a given user
largely intersect when the said user applies social capitalism
techniques. Based on this observation, Dugu´e & Perez [7]
designed an automatic method to detect efficiently these
users. It relies on three purely topological measures, i.e.
it does not consider any content. The first measure, called
overlap index and introduced in [10], enables to detect po-
tential social capitalists. The second, called ratio, allows to
determine if a given social capitalist uses the FMIFY or
IFYFM principle. The third is simply the incoming degree,
and indicates if the social capitalist was successful in apply-
ing these principles. All of them are defined on the follower-
followee network, which is a directed graph G = (V,A)
whose nodes V represent users and links A correspond to
follower-to-followee relationships. In this network, the in-
neighborhood Nin(u) = {v ∈ V : (v,u) ∈ A} of a node u
corresponds to the followers of the user represented by u,
whereas his out-neighborhood Nout (u) ={v∈V : (u,v)∈ A}
corresponds to his followees.
The overlap index O(u) of a node u is given by:
O(u) =
Nin(u)∩ Nout (u)
min{Nin(u),Nout (u)}
(1)
This measure is processed for all nodes, allowing to iden-
tify social capitalists. Indeed, an overlap index close to 1
indicates the intersection of followers and followees is quite
high, and so we can conclude the considered user applied
either the FMIFY or IFYFM principle. On the contrary, a
value close to 0 means he is not a social capitalist.
The ratio r(u) of a node u is defined as:
r(u) =
Nin(u)
Nout (u)
(2)
This measure is processed for all social capitalists too, and
allows to classify them more precisely. According to Dugu´e
& Perez [7], social capitalists following the IFYFM princi-
ple have a ratio greater than 1 (i.e. more followees than fol-
lowers), whereas those using FMIFY have a ratio smaller
than 1. In both cases, the ratio is expected to be close to
1. However, the analysis conducted in [7] highlighted a
third behavior, called passive. Unlike other social capital-
ists (called active), these passive users consider they have
reached a sufficient level of influence, and therefore do not
need to increase their number of followers. At this point,
they stop applying the aforementioned principles, but still
get more and more followers due to their high visibility.
Consequently, their ratio is much smaller than 1.
By processing the cardinalities of the incoming and out-
going neighborhoods, we obtain the in- and out-degrees,
noted din(u) = Nin(u) and dout (u) = Nout (u), respec-
tively. The former, which corresponds to the number of fol-
lowers, is used by Dugu´e & Perez [7] as a third criterion, in
order to determine if a social capitalist was successful in the
application of the FMIFY and IFYFM principles. They de-
fine low in-degree social capitalists as social capitalists hav-
ing between less than 10000 followers, and high in-degree
social capitalists as those having more than 10000 follow-
ers. The latter are efficiently gaining followers, and are con-
sidered successful, whereas the former are still less popular.
2.3 Detection
In [7], Dugu´e & Perez applied their method to the 2009 data
collected by Cha et al. [5]. They empirically determined that
a threshold of 0.74 for the overlap index allows a high accu-
racy detection. They also added two constraints: the first is
to consider only users with more than 500 followers, in or-
der to focus on successful social capitalists, i.e. ones having
effectively gained followers. This means low degree social
capitalists have an in-degree between 500 and 10,000. The
second constraint sets up a minimum of 500 followees, in
order to avoid detecting users whose high overlap index is
due only to a very small number of followees.
Dugu´e & Perez detected approximately 160000 social
capitalists. Table 1 shows how they are distributed over the
various types of identified behaviors. It is interesting to no-
tice that in this network, most users with more than 10000
followers are social capitalists (70%). Moreover, users with
such a number of followers constitute less than 0.1% of the
network.
din(u)
> 500
dout (u)
Number
> 500
161424
> 10000
> 500
5743
r(u)
> 1
[0.7;1]
> 1
[0.7;1]
< 0.7
%
68%
25%
66%
25%
9%
Table 1 Social capitalists detected on the entire Cha et al. [5] network,
with O(u) > 0.74.
In the experimental part of this work, we decided to use
the same method to identify social capitalists in the stud-
ied data, instead of the list manually curated by Ghosh et
al. [11]. The reason for this is that the latter is less exhaus-
tive, since it excludes users not following spammers, and
does not contain spammers nor bots. Dugu´e & Perez de-
tected approximately 160.000 social capitalists when Ghosh
et al. [11] detected 100000 users. Furthermore, some of
4
Nicolas Dugu´e et al.
the listed social capitalists have only a few followers, or
only a few reciprocal followers-followee links. Finally, the
method proposed by Dugu´e and Perez [7] detected 80% of
the 100000 social capitalists listed by Ghosh et al.
3 Identifying Community Roles
We now present in more details the concept of community
role in a complex network. Our work relies on the method
proposed by Guimer`a & Amaral [12].We first introduce the
original measures of Guimer`a & Amaral, then highlight
their limitations, and finally propose some solutions to these
problems.
3.1 Original approach
In order to characterize the roles of nodes relatively to com-
munities, Guimer`a & Amaral [12] defined two complemen-
tary measures which allow them to place each node in a 2D
role space. Then, they proposed several thresholds to dis-
cretize this space, each resulting subspace corresponding to
a specific role. In this section, we first describe the measures,
then the method used to identify the roles. We then propose
a trivial extension to directed networks.
3.1.1 Role Measures
Both measures are related to the internal and external con-
nectivity of the node with respect to its community. In other
words, they deal with how a node is connected with other
nodes inside and outside of its own community, respectively.
The first measure, called within-module degree, is based on
the notion of z-score. Since the z-score will be used again
afterwards, we define it here in a generic manner. Let f (u)
be any function defined on the vertices, that is f associates
a numerical value to any vertex u of the considered graph.
The z-score Z f (u) w.r.t. the community of u is defined by:
(cid:16) di(u)
(cid:17)2
i
The second measure, called participation coefficient, is
(4)
d(u)
defined as follows:
P(u) = 1−∑
where d(u) denotes the total degree of the node (i.e. the
number of links it has with any other nodes), and di(u) the
community degree of u (i.e. the number of links it has with
nodes of community Ci). Note that when Ci corresponds to
the community of u, then di(u) = dint (u). Roughly speaking,
the participation coefficient evaluates the connectivity of a
node to the community structure in general. If it is close to
0, then the node is connected to one community only (likely
its own). On the contrary, if it is close to 1, then the node is
uniformly linked to a large number of communities.
3.1.2 Community Roles
Both measures are used to characterize the role of a node
within its community. Guimer`a & Amaral [12] defined 7 dif-
ferent roles by discretizing the 2D space formed by z and P
using empirically determined thresholds.
They first used a threshold on the within-module degree,
which allowed them to distinguish hubs (that is, nodes with
z (cid:62) 2.5) from other nodes, called non-hubs. Such hubs are
considered as highly linked to their community, when com-
pared to other nodes of the same community. Note that the
word hub usually refers to a node with a central position in
the whole network, whereas here, the focus is on the com-
munity. In other words, in the rest of this article, hub implic-
itly means community hub.
z
≥ 2.5
< 2.5
Hub
Non-
Hub
Community role
P
≤ 0.30
Provincial
]0.30;0.75]
Connector
Kinless
> 0.75
Ultra-peripheral ≤ 0.05
Peripheral
Connector
Kinless
]0.05;0.62]
]0.62;0.80]
> 0.80
External
connectivity
Low
Strong
Very strong
Very low
Low
Strong
Very strong
Z f (u) =
f (u)− µi( f )
σi( f )
,u ∈ Ci
(3)
Table 2 Guimer`a & Amaral's roles and the corresponding z and P
thresholds [12].
where Ci stands for community number i, and µi( f ) and
σi( f ) respectively denote the mean and standard deviation
of f over the nodes belonging to community Ci.
Now, let dint (u) be the internal degree of a node u, i.e.
the number of links u has with nodes belonging to its own
community. Then, the within-module degree of a node u,
noted z(u) by Guimer`a & Amaral [12], corresponds to the
z-score of its internal degree. Note that z evaluates the con-
nectivity of a node with its own community, with respect to
that of the other nodes of the same community.
Those two categories are then subdivided using several
thresholds defined on the participation coefficient, as shown
in Table 2. By order of increasing P, we have: provincial
or (ultra-)peripheral, connector and kinless nodes. The two
first roles correspond to nodes essentially connected to their
community and very (or even completely) isolated from the
rest of the network. The third one concerns nodes connected
to a number of nodes outside their community. Nodes hold-
ing the fourth role are connected to many different commu-
A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network
5
nities. Note this is independent from the density of their in-
ternal connections: a node can be very well connected in its
own community, but not to the rest of the network, in which
case it is an ultra-peripheral hub.
3.1.3 Directed Variants
Many networks representing real-world systems, such as the
Twitter follower-followee network we study here, are di-
rected. Of course, it is possible to analyze them through the
undirected method, but this would result in a loss of informa-
tion. Yet, extending these measures is quite straightforward:
the standard way of proceeding consists in distinguishing in-
coming and outgoing links. In our case, this results in using
4 measures instead of 2: in- and out- versions of both the
within-module degree and participation coefficient.
First, based on the in-degree introduced in section 2.2
and the internal degree from section 3.1.1, let us define the
internal in-degree of a node, noted din
int. It corresponds to the
number of incoming links the node has inside its commu-
nity. By processing the z-score of this value, one can derive
the within-module in-degree, noted zin. Similarly, let us note
din
the community in-degree, i.e. the number of incoming
i
links a node has from nodes in community Ci. We can now
define the incoming participation coefficient, noted Pin, by
substituting din to d and din
to di in Equation (4). With the
i
same approach, we define zout and Pout, using the outgoing
counterparts dout, dout
int and dout
In the rest of the article, we call this set of measures the
directed variants, by opposition to the original measures of
Guimer`a & Amaral [12].
.
i
3.2 Limitations of this approach
We identify two limitations in the approach of Guimer`a &
Amaral [12]. The first concerns the way the participation co-
efficient represents the nodes external connectivity, whereas
the second is related to the threshold used for the within-
module degree.
3.2.1 External Connectivity
We claim that the external connectivity of a given node, i.e.
the way it is connected to communities other than its own,
can be precisely described in three ways: first, by consider-
ing its diversity, i.e. the number of concerned communities
; second, in terms of intensity, i.e. the number of external
links ; and third, relatively to its heterogeneity, i.e. the distri-
bution of external links over communities. The participation
coefficient combines several of these aspects, mainly focus-
ing on heterogeneity, which lowers its discriminant power.
This is illustrated in Figure 1: the external connectivity of
the central node is very different in each one of the presented
situations. However, P is the same in all cases.
Fig. 1 Each color represents a community. In each case, the participa-
tion coefficient P of the central node is 0.58.
In order to be more illustrative, let us consider two users
from our data, which have the same community role accord-
ing to the original measures. We select two nodes both hav-
ing a z greater than 2.5 and a P close to 0.25. So accord-
ing to Guimer`a & Amaral [12] (see Table 2), they both are
provincial hubs, and should have a similar behavior w.r.t.
the community structure of the network. However, let us
now point out that the first user is connected to 50 nodes
outside its community, whereas the second one has 200000
connections. This means they actually play different roles
in the community structure, either because the second one
is connected to much more communities than the first one,
or because its number of links with external communities is
much larger than for the first user. Similar observations can
be made for the directed variants of the participation coeffi-
cient. The measures used to define the external connectivity
should take this difference into account and assign different
roles to these nodes.
3.2.2 Fixed Thresholds
As indicated in the supplementary discussion of [12], the
thresholds originally used to identify the roles were obtained
empirically. Guimer`a & Amaral first processed P and z for
different types of data: metabolic, proteome, transportation,
collaboration, computer and random networks. Then, they
detected basins of attraction, corresponding to regularities
observed over all the studied networks. Each role mentioned
earlier corresponds to one of these basins, and the thresholds
were obtained by estimating their boundaries.
Implicitly, these thresholds are supposed to be univer-
sal, but this can be criticized. First, Guimer`a & Amaral used
only one community detection method. A different commu-
nity detection method can lead to a different community
structure, and therefore possibly different basins of attrac-
tion. Furthermore, z is not normalized, in the sense it has no
fixed boundaries. There is no guarantee the threshold origi-
nally defined for this measure will stay meaningful on other
networks. As a matter of fact, the values obtained for z in
our experiments are far higher for some nodes than the ones
6
Nicolas Dugu´e et al.
observed by Guimer`a & Amaral. We also observe that the
proportion of nodes considered as hubs (i.e. z ≥ 2.5) by
Guimer`a & Amaral is much smaller in our network than
in the networks they consider: 0.35% in ours versus 2% in
theirs. These thresholds seem to be at least sensitive either
to the size of the data, the structure of the network, or to the
community detection method.
It is therefore necessary to process new thresholds, more
appropriate to the considered data. However, the method
used by Guimer`a & Amaral [12] itself is difficult to apply, it
requires a lot of data. Furthermore, this method assumes that
thresholds are universal, which is disproved by our data.
3.3 Proposed Approach
In this section, we propose some solutions to overcome the
limitations of the original approach. First, the participation
coefficient mixes several aspects of the external connectiv-
ity, which lowers its discriminant power: we introduce sev-
eral measures to represent these aspects separately. Second,
the thresholds used to define the roles do not necessarily
hold for all systems: we show how to apply an unsupervised
method instead.
3.3.1 Generalized Measures
In place of the single participation coefficient, we propose 3
new measures aiming at representing separately the aspects
of external connectivity: diversity, intensity and heterogene-
ity. A fourth measure equivalent to the within-degree coeffi-
cient is used to describe the internal connectivity.
Because we deal with directed links, each one of these
measures exists in two versions: incoming and outgoing (as
explained in section 3.1.3), effectively resulting in 8 mea-
sures. However, for simplicity matters, we ignore link direc-
tions when presenting them in the rest of this section.
All our measures are expressed as z-scores (cf. Equation
(3)). We know community sizes are generally power-law-
distributed, as described in [17], which means their sizes are
heterogeneous. Our community-based z-scores allow to nor-
malize the measures relatively to the community size, and
therefore to take this heterogeneity into account.
Diversity. The diversity D(u) evaluates the number of
communities to which a node u is connected (other than its
own), w.r.t. the other nodes of its community. This measure
does not take into account the number of links u has to each
community. Let ε(u) be the number of external communities
to which u is connected. The diversity is defined as the z-
score of ε w.r.t. the community of u. It is thus obtained by
substituting ε to f in Equation (3).
External intensity. The external intensity Iext (u) of a
node u measures the amount of links u has with communities
other than its own, w.r.t. the other nodes of its community.
Let dext (u) be the external degree of u, that is the number
of links u has with nodes belonging to another community
than its own. The external intensity is defined as the z-score
of the external degree, i.e. we obtain it by substituting dext
to f in Equation (3).
Heterogeneity. The heterogeneity H(u) of a node u
measures the variation of the number of links a node u has,
from one community to another. To that aim, we compute
the standard deviation of the number of links u has to each
community. We note this value δ (u). The heterogeneity is
thus the z-score of δ w.r.t. the community of u. As previ-
ously, it can be obtained by substituting δ to f in Equa-
tion (3).
Internal intensity. In order to represent the internal con-
nectivity of the node u, we use the z measure of Guimer`a &
Amaral [12]. Indeed, it is based on the notion of z-score, and
is thus consistent with our other measures. Moreover, we do
not need to add measures such as diversity or heterogeneity,
since we consider one node can belong only to one commu-
nity. Due to the symmetry of this measure with the external
intensity, we refer to z as the internal intensity, and note it
Iint (u).
3.3.2 Unsupervised Role Identification
Our second modification concerns the way roles are defined.
As mentioned before, the thresholds defined by Guimer`a &
Amaral [12] are not necessarily valid for all data. More-
over, the consideration of link directions and our general-
ization of the measures invalidate the existing thresholds,
since we now have 8 distinct measures, all different from
the original ones. We could try estimating more appropri-
ate thresholds, but as explained in section 3.2.2, the method
originally used by Guimer`a & Amaral [12] to estimate their
thresholds is impractical since it requires a certain amount
of data. The fact our measures are all z-scores also weakens
the possibility to get thresholds applicable to all systems,
which means the estimation process should potentially be
performed again for each studied system.
To overcome these problems, we propose to apply an
automatic method instead, by using unsupervised classifica-
tion. First, we process all the measures for the considered
data. Then, a cluster analysis method is applied. Each one of
the clusters identified in the 8-dimensional role space is con-
sidered as a community role. This method is not affected by
the number of measures used, and allows to adjust thresh-
olds to the studied system. If the number of roles is known
in advance, for instance because of some properties of the
studied system, then one can use an appropriate clustering
method such as k-means, which allows specifying the num-
ber k of clusters to find. Otherwise, it is possible to use clus-
ter quality measures to determine which k is the most appro-
A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network
7
priate ; or to apply directly a method able to estimate at the
same time the optimal number of clusters and the clusters
themselves.
4 Community Roles of Social Capitalists
In this section, we present the results we obtained on a Twit-
ter network using the methods presented in Section 3. We
first introduce the data and tools we used, then the roles we
identified. We then focus social capitalists and the roles they
hold.
4.1 Data and Tools
We analyze a freely-available anonymized Twitter follower-
followee network, collected in 2009 by Cha et al. [5]. It con-
tains about 55 million nodes representing Twitter users, and
almost 2 billion directed links corresponding to follower-
followee relationships. We had to consider the size of these
data when choosing our analysis tools.
For community detection, we selected the Louvain
method [2], because it is widespread and proved to be very
efficient when dealing with large networks. We retrieved the
C++ source code published by its authors, and adapted it
in order to optimize the directed version of the modularity
measure, as defined by Leicht and Newman [20]. Empirical
benchmarks show that our adapted version performs better
than the original one on directed network. All the role mea-
sures, that is Guimer`a & Amaral's original measures, their
directed variants (section 3.1) and our new measures (sec-
tion 3.3), were computed using the community structure de-
tected through these means. We also implemented them in
C++, using the same sparse matrix data structure than the
one used in the Louvain method.
All resulting values were normalized, in order to avoid
scale difference problems when conducting the cluster anal-
ysis. The clustering was performed using an open source im-
plementation of a distributed version of k-means [21]. Since
we do not know the expected number of roles, we applied
this algorithm for k ranging from 2 to 15, and selected the
best partition in terms of Davies-Bouldin index [6]. We se-
lected this index because it is a good compromise between
the reliability of the estimated quality of the clusters, and
the computing time it requires. All pre- and post-processing
scripts related to the cluster analysis were implemented in
R. The whole source code is freely available online2. Be-
cause we are dealing with 55 millions of objects and only
8 attributes, we know that a lot of local maximums exist
while minimizing the within-cluster sum of squares with the
k-means algorithm. In this paper, we are specifically looking
2 https://github.com/CompNet/Orleans
for assessing the social capitalists visibility in the Twitter
network. To achieve this goal, we do not necessarily need
to get the best partition of the role space. We are actually
looking for a partition in which clusters are well separated
and interpretable according to Guimer`a & Amaral's termi-
nology. With such a partition, it is possible to look at the
specific roles held by social capitalists in these clusters and
to determine their actual visibility.
4.2 Roles Expected for Social Capitalists
We expect the degree of social capitalists to play an impor-
tant role considering their position (see Section 2). High in-
degree social capitalists (namely greater than 10000) should
be well connected to their communities -hubs- or to the other
communities -connectors, or both. Being connectors would
indicate they obtained a high visibility on the whole network
and not only in their own communities.
Furthermore, because we take the direction of links into
account in our measures, we expect social capitalists to be
discriminated according to their ratio, i.e. the number of out-
going links divided by the number of incoming links. We es-
pecially expect high in-degree social capitalists with a small
ratio (so-called passive social capitalists according to [7]) to
be highly connected to their communities and to the rest of
the graph. Considering low degree social capitalists, it is not
possible to predict their roles without any further informa-
tion. The study will thus be of great interest to characterize
their visibility.
4.3 Detected Roles
For the sake of completeness, we first used the directed mea-
sures (section 3.1) of Guimer`a & Amaral [12]. As mentioned
in Section 3.2.2, the threshold they defined for z is irrelevant
for our data. Furthermore, this threshold was determined for
an undirected version. So we adopted here the unsupervised
role identification method we proposed (section 3.3.2).
4.3.1 Directed Variants
A correlation study shows zout and zin are slightly correlated
(with a correlation coefficient ρ < 0.3), whereas the cor-
relation is zero for all other pairs of measures. This seems
to confirm the interest of considering link directions in the
role measures. When doing the cluster analysis, the most
separated clusters are obtained for k = 6. An ANOVA fol-
lowed by post hoc tests (t-test with Bonferroni's correction)
showed significant differences exist between all clusters and
for all measures.
An analysis of the distribution of high in-degree social
capitalists in these clusters shows that a few of these users
8
Nicolas Dugu´e et al.
occupy a connector hub role. This is quite expected as said in
section 4.2. However, most of the high in-degree social cap-
italists are considered as non-hubs and peripheral or ultra-
peripheral nodes. More than 60% of the users with a high
ratio are classified as ultra-peripheral nodes for both incom-
ing and outgoing directions, which is rather surprising since
they have a really high degree. However, they are classi-
fied in a cluster with low z and P (both in- and out- ver-
sions). The low z indicates these users are not much con-
nected to their community (relatively to the other nodes of
the same community), and must thus be more connected to
other communities. Still, P does not highlight this aspect of
their community-related connectivity, and they appear as pe-
ripheral. This inconsistency of the detected roles confirms
the limitations of P described in section 3.2.1.
4.3.2 Generalized Measures
The correlation between the generalized measures is very
low overall, ranging from almost 0 to 0.4. In particular, both
versions of the same measure (incoming vs. outgoing) are
only slightly correlated, which is another confirmation of the
interest of considering link directions. Only three measures
are strongly correlated: internal and external intensities and
heterogeneity (ρ ranging from 0.78 to 0.92). The relation
between both intensities seems to indicate that variations on
the total degree globally affect similarly internal and exter-
nal degrees. The very strong correlation observed between
heterogeneity and intensity means only nodes with low in-
tensity are homogeneously connected to external communi-
ties, whereas nodes with many links are connected hetero-
geneously.
Similarly to the directed measures, the most separated
clusters are obtained with k = 6. These 6 clusters are given
in Table 3 with their sizes and roles. However, the correspon-
dance with the original nomenclature is rougher, since these
measures are farther from the original ones. The average of
each measure per cluster is showed in Table 4. Like before,
ANOVA and post hoc tests showed significant differences
between all clusters and for all measures. We now conduct a
detailed analysis of the different roles we obtain.
C
1
2
3
4
5
6
Size
24543667
304
303674
11929722
10828599
4973717
Role
Proportion
Ultra-peripheral non-hubs
46.68%
Kinless hubs
< 0.01%
0.58%
Connector hubs
22.69% Incoming Peripheral non-hubs
20.59% Outgoing Peripheral non-hubs
Connector non-hubs
9.46%
Table 3 Clusters detected with the generalized measures: cluster num-
ber C used in the paper, sizes in terms of node count and proportion of
the whole network, and roles according to the Guimer`a & Amaral [12]
nomenclature.
Cluster 1. Because both internal intensity versions (equiva-
lent to z) are negative, nodes in this cluster cannot be hubs.
The negative external measures indicate these nodes are
not connectors either. We can thus consider them as ultra-
peripheral non-hubs. This cluster is the largest one, with
47% of the network nodes. This confirms the matching with
this role, whose nodes constitute generally most of the net-
work.
Clusters 4 and 5. Cluster 4 is very similar to Cluster 1.
However, its incoming diversity is 0.69. These nodes are
again peripheral, because the external intensity is negative.
Still, incoming links come from a larger number of commu-
nities. Cluster 5 is also similar to Cluster 1. However, both
versions of diversity are positive for this cluster, with an out-
going diversity of 0.60. External links are thus connected to
a larger number of communities. Clusters 4 and 5 are the
second (23%) and third (21%) largest ones, respectively. By
gathering all the peripheral and ultra-peripheral nodes, we
obtain 91% nodes of the network.
Cluster 6. The internal intensity is still close to 0 but posi-
tive. Thus, these nodes are non-hubs, even if they are more
connected to their community than those of the previous
clusters. Like the other external measures, the external in-
tensity is low but still positive. These nodes are relatively
well-connected to other communities, and we can therefore
consider them as connectors. Both versions of the diversity
are relatively high, which indicates these nodes are not only
more connected to their community as well as others, but
also to a larger number of distinct communities.
Cluster 3. The high internal intensity allows us to state that
these nodes are hubs. Furthermore, the high external mea-
sures indicate these nodes are connected to a high number of
nodes from a lot of other communities, and thus are connec-
tor hubs. Notice outgoing measures are higher. This cluster
represents only 0.6% of the network, meaning this role is
very uncommon.
Cluster 2. This observation is even more valid for Cluster 2,
which represents much less than 1% of the nodes. For this
cluster, all measures are really high. The incoming versions
are always higher than their outgoing counterparts. We call
these users kinless hubs according to Guimer`a & Amaral's
nomenclature.
It is worth noticing that, whatever the considered mea-
sures, some of the roles defined by Guimer`a & Amaral [12]
are not represented in the studied network. This is consistent
with the remarks previously made for other data by Guimer`a
& Amaral [12], and confirms the necessity of having an un-
supervised approach to define roles in function of measures.
It is also consistent with the strong correlation observed be-
tween internal and external intensities: missing roles would
be nodes possessing a high internal intensity but a low ex-
ternal one, or vice-versa. However, those are very infrequent
in our network.
A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network
9
Cluster
1
2
3
4
5
6
Cluster
1
2
3
4
5
6
Iout
int
−0.12
94.22
5.52
−0.04
−0.03
0.48
Iout
ext
−0.09
113.87
5.28
−0.07
−0.03
0.35
Iin
int
Dout
Din
−0.03 −0.55 −0.80
88.40
7.18
311.27
3.10
1.40
5.60
0.00 −0.37
0.69
−0.01
0.19
0.60
0.12
1.96
1.70
Iin
ext
−0.04
283.79
1.43
0.00
−0.02
0.12
Hout
−0.12
112.79
6.76
−0.10
−0.04
0.53
Hin
−0.06
285.57
2.34
−0.01
−0.02
0.19
Table 4 Average generalized measures obtained for the 6 detected
clusters .
4.4 Relations between clusters
We now discuss how the nodes are connected depending on
the role they hold. Figure 2 is a simplified representation of
this interconnection pattern.
The outgoing links of ultra-peripheral (Cluster 1) and
peripheral (Clusters 4 and 5) nodes target mainly kinless
hubs (Cluster 2) and connectors (Clusters 3 and 6), repre-
senting 74% (Cluster 1), 82% (Cluster 4), and 74% (Clus-
ter 5) of their connections. These (ultra-)peripheral nodes,
which are the most frequent in the network, thus mainly fol-
low very connected users, probably the most influent and
relevant ones. This seems consistant: they follow only a few
users, and so choose the most visible ones.
Connector nodes (Clusters 3 and 6) are mainly linked to
other connectors nodes. They have the tightest connection,
since their arcs amounts to a total of 43% of the network
links. This is worth noticing, because these clusters are far
from being the largest ones. They are also largely connected
to the rest of the clusters too, especially with outgoing links.
Connectors follow massively users of all clusters, so we sup-
pose they constitute the backbone of the network.
Kinless hubs (Cluster 2) are massively followed by non-
hubs, representing 38% (Cluster 1), 43% (Cluster 4), 19%
(Cluster 5) and 8% (Cluster 6) of these Clusters' outgoing
links. And interestingly, the links coming from kinless hubs
target the same clusters: 9% go to Cluster 1, 20% to Clus-
ter 4, 22% to Cluster 5 and 41% to Cluster 6. This means
the most visible and popular nodes of the network mostly
follow and are followed by much less popular users. One
could have expected the network to be hierarchically orga-
nized around roles, with more peripheral nodes connected to
less peripheral nodes. But this is clearly not the case. First,
(ultra-)peripheral nodes are marginally connected to other
nodes holding the same role, they prefer to follow connec-
tors and/or hubs. Second, kinless and connector hubs, al-
Fig. 2 Interconnection between clusters. A vertex Ci corresponds to
Cluster i from Table 3. An arc (i, j) represents the set of links connect-
ing nodes from Cluster i to nodes from Cluster j, labeled with 3 values.
Each value describes which proportion of links the arc represents, rela-
tively to 3 distinct sets: first relatively to all links starting from Cluster
i, second relatively to all links in the whole network, and third rela-
tively to all links ending in Cluster j. The arc thickness is proportional
to the second value, the vertex size to the number of nodes the corre-
sponding cluster contains. For matters of readability, arcs representing
less than 1% of the network links and 10% of the cluster links are not
displayed.
though well connected to connector non-hubs, do not have
direct links, i.e. these users do not follow each other.
4.5 Position of Social Capitalists
As stated previously, we use a list of approximately 160000
social capitalists detected by Dugu´e & Perez [7]. In the fol-
lowing, we analyze how social capitalists are distributed am-
ongst the detected roles. As explained in Section 2, we split
social capitalists according to their in-degree (number of fol-
lowers). Recall that low in-degree social capitalists have an
in-degree between 500 and 10000, and high in-degree so-
cial capitalists an in-degree greater than 10000. These social
capitalists are known for having especially well succeeded
in their goal of gaining visibility.
The tables in this section describe how the various types
of social capitalists are distributed over the clusters. In each
cell, the first row is the proportion of social capitalists be-
longing to the corresponding cluster, and the second one is
the proportion of cluster nodes which are social capitalists.
Values of interest are indicated in bold and discussed in the
text.
(41%) 10% (29%)C1C2C3C4C5C6(20%) 1% (5%)(11%) 1% (5%)(16%) 1% (2%)(20%) <1% (1%)(22%) <1% (1%)(41%) <1% (<1%)(11%) 3% (51%)(15%) 4% (19%)(16%) 4% (31%)(16%) 4% (35%)(43%) 4% (31%)(22%) 2% (10%)(17%) 2% (4%)(19%) 3% (22%)(25%) 4% (17%)(11%) 2% (13%)(30%) 4% (13%)(4%) 2% (33%)(8%) 4% (29%)(23%) 10% (49%)(13%) 6% (45%)(12%) 5% (44%)(40%) 18% (51%)(11%) 2% (13%)(38%) 2% (16%)10
Nicolas Dugu´e et al.
4.5.1 Low in-degree social capitalists
4.5.2 High in-degree social capitalists
Low in-degree social capitalists are mostly assigned to three
clusters: 3, 5 and 6 (see Table 5). Most of them belong to
Cluster 6, which contains non-hub connector nodes. These
nodes, which have only slightly more external connections
than the others, are nevertheless connected to far more com-
munities. Social capitalists in this cluster seem to have ap-
plied a specific strategy consisting in creating links with
many communities. This strategy is still not completely
working, though, as shown by the relatively low external in-
coming intensity (meaning they do not have that many fol-
lowers).
Nodes from Cluster 3 are connector hubs, who follow
more users than the others. Because IFYFM social capital-
ists have a ratio greater than 1 and thus more followees than
followers, it is quite intuitive to observe that they are twice
as many than the other users in this cluster. The high outgo-
ing diversity of Cluster 3 tells us that these social capitalists
follow users from a large variety of communities, not only
theirs (to which they are well connected). The high external
outgoing intensity shows that these users massively engage
in the IFYFM process, but did not yet receive a lot of fol-
lowing back, as shown by their low external incoming in-
tensity. Finally, roughly 20% of social capitalists with ratio
r < 1 belong to Cluster 5, which contains non-hub peripheral
nodes. This shows that a non-neglictible share of social cap-
italists are isolated relatively to both their community and
the other ones.
Most of the high in-degree social capitalists are gathered in
Cluster 3 (see Table 6), corresponding to connector hubs.
This is consistent with the fact these users have a high de-
gree. Users of Cluster 3 have a high outgoing diversity and a
high outgoing external intensity: this shows they practice the
IFYFM strategy actively, by following a lot of users from a
wide range of communities. The rest of these users is con-
tained in Cluster 2. Nodes in these clusters are kinless hubs
and can thus be considered as successful users. Indeed, they
are massively followed by a very high number of users from
an extremely large variety of communities. Only high in-
degree social capitalists with a ratio smaller than 0.7 and a
few with a ratio smaller than 1 are classified in this cluster.
This is consistent with the roles one could expect for social
capitalists (Section 4.2).
Ratio
r ≤ 0.7
0.7 < r ≤ 1
r > 1
Ratio
r ≤ 0.7
0.7 < r ≤ 1
r > 1
Cluster 1
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
Cluster 4
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
Cluster 2
12.14%
21.05%
1.55%
7.24%
0.03%
0.33%
Cluster 5
0.00%
0.00%
0.00%
0.00%
0.00%
0.00%
Cluster 3
87.29%
0.15%
95.64%
0.45%
97.99%
1.22%
Cluster 6
0.57%
< 0.01%
2.81%
< 0.01%
1.98%
< 0.01%
Ratio
r ≤ 1
r > 1
Ratio
r ≤ 1
r > 1
Cluster 1
0.01%
< 0.01%
0.03%
< 0.01%
Cluster 4
3.42%
0.14%
0.48%
< 0.01%
Cluster 2
0.00%
0.00%
0.00%
0.00%
Cluster 5
18.28%
0.08%
14.31%
0.14%
Cluster 3
23.10%
3.71%
18.78%
6.61%
Cluster 6
55.19%
0.54%
66.40%
1.43%
Table 6 Distribution of high in-degree social capitalists over clusters
obtained from the generalized measures.
These observations mean that most of these users are
well connected in their communities but also with the rest of
the network. This shows the efficiency of these users strate-
gies. Indeed, most of the users are linked to a wide range of
communities, and thus reach a high visibility in a large part
of the network.
Table 5 Distribution of low in-degree social capitalists over clusters
obtained from the generalized measures.
5 Related Works
These observations show that most of these users are
deeply engaged in a process of soliciting users from other
communities, not only theirs. Some of them are even mas-
sively following users from a wide diversity of communities.
This tends to show that these users may obtain an actual visi-
bility across many communities of the network by spreading
their links efficiently.
The notion of role in network science first appeared in the
seventies. Two nodes are considered as holding the same
roles if they are structurally equivalent [22], namely if they
share the same neighbors in the graph representing their re-
lations [4]. This notion also appears in block models, where
networks are partitioned as groups sharing the same patterns
of relations [13]. In both cases, the concept of role is defined
globally, i.e. relatively to the whole network.
A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network
11
More recently, Guimer`a & Amaral introduced the con-
cept of community role to study metabolic networks [12],
by considering node connectivity at the level of the com-
munity structure, i.e. an intermediate level. As explained in
Section 3.1, they fist apply a standard community detection
method, and then characterize each node according to two
ad hoc measures, each one describing a specific aspect of
the community-related connectivity. The first expresses the
intensity of its connections to the rest of its own community,
whereas the second quantifies how uniformly it is connected
to all communities. The node role is then selected among 7
predefined ones by comparing the two values to some empir-
ically fixed thresholds. Guimer`a & Amaral showed certain
systems possess a role invariance property: when several in-
stances of the system are considered, nodes are different but
roles are similarly distributed.
Scripps et al. [25], apparently unaware of Guimer`a &
Amaral's work, later adopted a similar approach, but this
time for influence maximization and link-based classifica-
tion purposes. They also use two measures: first the degree,
to assess the intensity of the general node connectivity, and
second an ad hoc measure, to reflect the number of com-
munities to which it is connected. They then use arbitrary
thresholds to define 4 distinct roles.
Even more recently, Klimm et al.
[16] criticized
Guimer`a & Amaral's approach, and proposed a modifica-
tion based on two different measures. They first defined the
hubness index, which compares the degree of a node u with
the probability for this node to have the same number of
links in a subgraph with fixed density and size. Their local
hubness index is a variant using the density and size of the
community containing u while their global hubness index
uses the whole network density and size. They claim nor-
malizing the internal degree with this method (using density
and size) leads to better results than with the z-score used by
Guimer`a & Amaral. However, the expected improvement is
not clearly shown in the article. The second measure is a
modification of the participation coefficient, taking the form
of a normalized vector representing the participation of a
node to each community of the network. They also intro-
duced a dispersion index that is a normalized vector repre-
senting the participation of a node to each community he is
connected to. The limitations we highlighted for the origi-
nal participation coefficient are also valid for these two vari-
ants: none of them is able to model all aspects of the external
connectivity of a node. The first measure still encapsulates
all aspects of the external connectivity, while the second one
deals simultaneously with its heterogeneity and diversity (cf.
Section 3.2.1). Furthermore, Klimm et al. do not propose a
method to assign roles to nodes according to their measures,
even empirically, they only analyze a few small biological
networks.
6 Conclusion
In this article, our goal is to characterize the position of so-
cial capitalists in Twitter. For this purpose, we propose an
extension of the method defined by Guimer`a & Amaral [12]
to characterize the community role of nodes in complex net-
works. We first define directed variants of the original mea-
sures, and extend them further in order to take into account
the different aspects of node connectivity. Then, we propose
an unsupervised method to determine roles based on these
measures. It has the advantage of being independant from
the studied system. Finally, we apply our tools to a follower-
followee Twitter network. We find out the different kinds of
social capitalists occupy very specific roles. Those of low
in-degree are mostly connectors non-hubs. This shows they
are engaged in a process of spreading links across the whole
network, and not only their own community. Those of high
in-degree are classified as kinless or connectors hubs, de-
pending on their ratio r. This shows the efficiency of their
strategies, which lead to a high visibility for a vast part of
the network, not only for their own community.
The most direct perspective for our work is to assess its
robustness. In particular, it is important to know how the sta-
bility of the detected communities and clusters affects the
identified roles. In this study, our aim was to assess the so-
cial capitalist visibility, which is independant of this goal.
Furthermore, the very large size of the data prevented us to
do so efficiently. On a related note, we want to apply our
method to other smaller systems, in order to check for its
general relevance. The method itself can also be extended
in two ways. First, it would be relatively straightforward to
take link weights into account (although this was not needed
for this work). Second, and more interestingly, it is also pos-
sible to adapt it to overlapping communities (by opposition
to the mutually exclusive communities considered in this
work) in a very natural way, by introducing additional in-
ternal measures symmetrical to the existing external ones.
This could be a very useful modification when studying so-
cial networks, since those are supposed to possess this kind
of community structures, in which a node can belong to sev-
eral communities at once [1].
References
1. S. Arora, R. Ge, S. Sachdeva, and G. Schoenebeck. Finding over-
lapping communities in social networks: Toward a rigorous ap-
proach. In EC'12, 2012.
2. V. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast
J. Stat. Mech.,
unfolding of communities in large networks.
10:P10008, 2008.
3. B. Bosker. Twitter: We now have over 200 million accounts, 2011.
4. Ronald S. Burt. Detecting role equivalence. Social Networks,
12(1):83 -- 97, 1990.
5. Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and Kr-
ishna P. Gummadi. Measuring User Influence in Twitter: The Mil-
12
Nicolas Dugu´e et al.
lion Follower Fallacy. In ICWSM '10: Proc. of int. AAAI Confer-
ence on Weblogs and Social, 2010.
6. D. Davies and D. Bouldin. A cluster separation measure. IEEE
Trans. Pattern Anal. Mach. Intell., 1(2):224 -- 227, 1979.
7. N. Dugu´e and A. Perez. Social capitalists on Twitter: detection,
evolution and behavioral analysis. Social Network Analysis and
Mining, 4(1):1 -- 15, 2014.
8. Nicolas Dugu, Vincent Labatut, and Anthony Perez. Identifying
the community roles of social capitalists in the twitter network. In
IEEE/ACM International Conference on Advances in Social Net-
work Analysis and Mining (ASONAM), pages 371 -- 374, Beijing,
CN, 2014.
9. S. Fortunato. Community detection in graphs. Phys. Rep., 486(3-
5):75 -- 174, Feb 2010.
10. G. Gaylord Simpson. Mammals and the nature of continents. Am.
J. of Science, (241):1 -- 41, 1943.
11. S. Ghosh, B. Viswanath, F. Kooti, N. Sharma, G. Korlam, F. Ben-
evenuto, N. Ganguly, and K. Gummadi. Understanding and com-
bating link farming in the twitter social network. In WWW, pages
61 -- 70, 2012.
12. R. Guimer`a and L. Amaral. Functional cartography of complex
metabolic networks. Nature, 433:895 -- 900, 2005.
13. Paul W. Holland, Kathryn Blackmond Laskey, and Samuel Lein-
Social Networks,
hardt. Stochastic blockmodels: First steps.
5(2):109 -- 137, 1983.
14. R. Holt. Twitter in numbers, 2013.
15. Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. Why
we twitter: understanding microblogging usage and communities.
In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 work-
shop on Web mining and social network analysis, WebKDD/SNA-
KDD '07, pages 56 -- 65, 2007.
16. Florian Klimm, Javier Borge-Holthoefer, Niels Wessel, Jrgen
Kurths, and Gorka Zamora-Lpez.
Individual nodes contribution
to the mesoscale of complex networks. New Journal of Physics,
16(12):125006, 2014.
17. A. Lancichinetti, M. Kivela, J. Saramaki, and S. Fortunato. Char-
acterizing the community structure of complex networks. PLoS
ONE, 5(8):e11976, 2010.
18. Kyumin Lee, James Caverlee, and Steve Webb. Uncovering social
spammers: Social honeypots + machine learning. In Proceedings
of the 33rd International ACM SIGIR Conference on Research and
Development in Information Retrieval, SIGIR '10, pages 435 -- 442,
New York, NY, USA, 2010. ACM.
19. Kyumin Lee, Brian Eoff, and James Caverlee. Seven months with
the devils: A long-term study of content polluters on twitter. In In-
ternational AAAI Conference on Weblogs and Social Media, 2011.
20. E. A. Leicht and M. E. J. Newman. Community structure in di-
rected networks. Phys. Rev. Lett., 100(11):118703, 2008.
21. W.-K. Liao. Parallel k-means data clustering, Oct 2009.
22. Franois Lorrain and Harrison C. White. Structural equivalence
of individuals in social networks. The Journal of Mathematical
Sociology, 1(1):49 -- 80, 1971.
23. M. E. J. Newman and M. Girvan. Finding and evaluating commu-
nity structure in networks. Phys. Rev. E, 69(2):026113, 2004.
24. S. Rodgers. Behind the numbers: how to understand big moments
on Twitter, August 2013.
25. J. Scripps, P.-N. Tan, and A.-H. Esfahanian. Node roles and com-
munity structure in networks. In WebKDD/SNAKDD, pages 26 --
35, 2007.
26. B. Suh, L. Hong, P. Pirolli, and E. H. Chi. Want to be retweeted?
large scale analytics on factors impacting retweet in twitter net-
work. In SCA'10, pages 177 -- 184, 2010.
|
1605.01895 | 1 | 1605 | 2016-05-06T11:29:30 | Sentiment-enhanced Multidimensional Analysis of Online Social Networks: Perception of the Mediterranean Refugees Crisis | [
"cs.SI"
] | We propose an analytical framework able to investigate discussions about polarized topics in online social networks from many different angles. The framework supports the analysis of social networks along several dimensions: time, space and sentiment. We show that the proposed analytical framework and the methodology can be used to mine knowledge about the perception of complex social phenomena. We selected the refugee crisis discussions over Twitter as the case study. This difficult and controversial topic is an increasingly important issue for the EU. The raw stream of tweets is enriched with space information (user and mentioned locations), and sentiment (positive vs. negative) w.r.t. refugees. Our study shows differences in positive and negative sentiment in EU countries, in particular in UK, and by matching events, locations and perception it underlines opinion dynamics and common prejudices regarding the refugees. | cs.SI | cs |
Sentiment-enhanced Multidimensional Analysis of Online Social Networks:
Perception of the Mediterranean Refugees Crisis
[UNDER REVIEW]
Mauro Coletto∗†, Claudio Lucchese†, Cristina Ioana Muntean†,
Franco Maria Nardini†, Andrea Esuli†, Chiara Renso†, Raffaele Perego†
∗ IMT School for Advanced Studies Lucca
† ISTI - CNR Pisa
email: {name.surname}@isti.cnr.it
Abstract-We propose an analytical framework able to in-
vestigate discussions about polarized topics in online social
networks from many different angles. The framework supports
the analysis of social networks along several dimensions: time,
space and sentiment. We show that the proposed analyti-
cal framework and the methodology can be used to mine
knowledge about the perception of complex social phenomena.
We selected the refugee crisis discussions over Twitter as
the case study. This difficult and controversial topic is an
increasingly important issue for the EU. The raw stream of
tweets is enriched with space information (user and mentioned
locations), and sentiment (positive vs. negative) w.r.t. refugees.
Our study shows differences in positive and negative sentiment
in EU countries, in particular in UK, and by matching events,
locations and perception it underlines opinion dynamics and
common prejudices regarding the refugees.
1. Introduction
Figure 1: The routes to European countries (source Business
Insider - Europol, Reuters, Washington Post, AFP, ICMPD).
We are recently witnessing one of the largest movement
of migrants and refugees from Asian, African and Middle-
east countries towards Europe. The United Nations High
Commissioner for Refugees (UNHCR) estimates one mil-
lion of refugees arrived to the Mediterranean coasts in 2015
mainly from Syria (49%), Afghanistan (21%) and Iraq (8%).
Figure 1 reports main routes to EU coasts and to northern
Europe. The largest wave of arrivals started in August 2015
following a main route through Turkey, Greece, Macedonia,
Hungary and Austria to Germany, France, UK and other
northern European countries. Since then, this phenomenon
has been in spotlight of the media, which have reported an
increasing number of events related to migrants, such as the
additional border controls established by Hungary, Austria
and Germany, the several incidents happened to refugees, or
the touching photo of the young Syrian boy found dead on
the seashore in Turkey in September 2015.
The implications of this refugee crisis are several and
complex. The whole phenomenon is nowadays object of a
heated and polarized debate. Understanding how the debate
is framed between governmental organizations, media and
citizens may help to better handle this emergency. Through
the analysis of the Twitter online social network, we address
the following questions: "How is the European population
perceiving this phenomenon? What is the general opinion
of each country? How is perception influenced by events?
What is the impact on public opinion of news related to
refugees? How does perception evolve in time in different
European countries?"
Social media may help in answering these relevant ques-
tions but the volume of messages exchanged is massive
and the extraction of sentiment is challenging. Basic anal-
yses of the phenomenon through Twitter have been already
performed by media in a simplistic way, mainly through
manual analysis of content, news and hashtags for small
samples of tweets. For instance, the usage of terms refugees
and migrants have been compared1 in offline and online
media. The former indicates someone forced to leave her
country to avoid war or imprisonment, the latter is instead
someone moving from his/her country searching for better
1. https://storify.com/ImagineEurope/what-is-associated-with-europe
living conditions. Additional basic quantitative analyses on
Twitter hashtags about refugees have been performed, i.e.
the #welcome refugees and #germany hashtags are used
mainly from outside Germany2. These are a few examples
on simple analyses performed. However a more comprehen-
sive work trying to analyze the perception of users about
these events, shaped across places and time, is still missing.
In this work we propose an analytical framework to
interpret social trends from large tweet collections by ex-
tracting and crossing information about the following three
dimensions: time, location and sentiment. We describe the
methodology to: 1) extract relevant spatial information, 2)
enrich data with the sentiment of the message and of the user
(retrieved in an automatic iterative way through Machine
Learning), 3) perform multidimensional analyses consider-
ing content and locations in time. The approach is general
and can be easily adapted to any topic of interest involving
multiple dimensions. It is scalable due to the automatic
enrichment procedure. For the scope of this paper we use
our framework to outline the European perception of the
refugee crisis.
2. Related Work
There is a significant increase of interest in collecting
and analysing geo-located data from online social networks
(OSNs). Several works study different aspects of the geo-
graphical dimension of OSNs, a broad study on this argu-
ment is reported in [1]. The authors propose a framework
to compare social networks based on two new measures:
one captures the geographical closeness of a node with its
network neighborhood and a clustering coefficient weighted
on the geographical distance between nodes. Twitter geo-
located posts are studied in [2] to understand how Twit-
ter social ties are affected by distance. Linked users are
identified as "egos" and "alters" and the distance between
them is analyzed by considering the correlation with the
air travel connection distance and with national borders and
languages. An analogous objective is the focus of [3] where
the authors infer the location of 12 million Twitter users in
a world-wide dataset. Differently from the previous paper,
they study the correlation between the Twitter population
and the socio-economic status of a country, suggesting
that high developed countries are characterized by a larger
Twitter usage. The geographical properties of Twitter are
also useful to study the movements of people and migration
phenomena. A study of mobility using geo-located Twit-
ter messages is presented in [4]. The authors introduce a
detailed study aimed at estimating international travelers
based on the country of residence. They identify a number of
characteristics including radius of gyration and mobility rate
to describe the traveling phenomena thorough the Twitter
lens. Authors in [5] show how the analysis of 500,000
geo-located Twitter users may help to predict the migration
turning points and to better understand migration in OECD
2. http://orientalreview.org/2015/09/21/who-is-twitter-luring-refugees-to-
germany/
countries. The authors estimate the migration rate of users
moving from one "home" country to another country. The
reported results depict some interesting trends such as the
decrease of migration from Mexico to US, consistent with
official estimations.
Twitter
is also exploited to better understand how
the communication flows during political movements and
events [6]. This work studies Twitter data covering the birth
and maturation of the American anti-capitalist movement
Occupy Wall Street. The authors analyze the geo-spatial
dimension of tweets in combination with the communication
dimension building a geographic profile for the communi-
cation activity of the movement. An extensive analysis of
these data produced many interesting results. For example,
it appears that proximity to events plays a major role in
determining which content receives the most attention in
contrast to the stream of domestic political communication.
Using Twitter for opinion mining and user polarization is
a vast subject [7]. The sentiment analysis methods proposed
are many, mainly based on dictionaries and on learning tech-
niques through unsupervised [8] and supervised methods
(lexicon-based method [9]) and combinations [10]. Opinion
mining techniques are widely used in particular in the polit-
ical context [11] and in particular on Twitter [12]. Recently
new approaches based on polarization, controversy and topic
tracking in time have been proposed [13], [14]. The idea of
these approaches is to polarize users of a social network
in groups based on their opinion on a particular topic and
tracking their behavior over time. These approaches are
based on network measures and clustering [13] or hashtag
classification through probabilistic models [14] with no use
of dictionary-based techniques.
The novelty of our proposal compared to the state-of-
the-art approaches is mainly the fact that we propose an
analytical framework to study a mass event from Twitter
messages as a combination of three dimensions: time, space
and sentiment. The sentiment analysis method adopted is
efficient in track polarization over Twitter w.r.t. other more
generic methods. Differently from many approaches study-
ing migration, we do not base our analyses on the change of
location of Twitter users to measure the flow of individuals
through space, but rather we aim at understanding the impact
on the EU citizens perception of migrants movements.
3. The Analytical Framework
In this section we introduce the analytical framework
detailing the data collection phase and the analytical dimen-
sions, namely the spatial, temporal and sentiment dimension.
The final multi-dimensional dataset can be analyzed and
queried along these axes and, more interestingly, on combi-
nations between them. The main datasets and the notation
used is summarized in Table 1.
We used the Twitter streaming API to collect English
tweets data under the Gardenhose agreement (10% of all
tweets in Twitter) in period from mid August to mid Sept
2015, noted with G, out of which we selected the tweets
related to the refugee crisis topic, called the relevant tweets
TABLE 1: Notation summary.
Symbol
G
T
Tc+
Tc−
TM L
TU L
U
Uc+
Uc−
UL
Description
Collected English tweets
Tweets related to the refugee crisis
Positive sentiment tweets
Negative sentiment tweets
Tweets with mentioned location
Tweets with user location
Users
Users with positive sentiment
Users with negative sentiment
Users with country location
# Total
97,693,321
1,238,921
459,544
387,374
421,512
101,765
480,660
213,920
104,126
47,824
(denoted as T ). We did this by manually choosing a subset
of 200 hashtags frequently used and specifically related to
refugees in the period of analysis. From T we extracted
information about three main dimensions: spatial, tempo-
ral, and sentiment-based, resulting in the set of users and
tweets as reported in Table 1.
3.1. Spatial and Temporal Dimensions
For each tweet we extract two kinds of spatial infor-
mation if present: the user location of the person posting
the message and the mentioned locations within the tweet
text. The user location is structured in two levels, the city (if
present) and the country. The user city is identified from the
GPS coordinates or place field when available. Since GPS
and place data are quite rare (about 3.5K in all dataset)
we used the free-text user location field to enrich location
metadata. We identified locations in the user generated field
based on location data from the Geonames3 dictionary which
fed a parsing and matching heuristic procedure. This tech-
nique provides high-resolution, high-quality geo-location in
presence of meaningful user location data [15]. The user
country is collected in a similar way and when not explicitly
present we infer from the city. The mentioned locations in
the text are also represented at city and country level, and
they are extracted from tweets' text with the same heuristic
procedure as for user location.
We limit our analysis to the perception and sentiment
of European citizens. For the mentioned locations we are
also interested to the countries involved in the migration
crisis. The numbers of tweets with user location TU L and
mentioned locations TM L are reported in Table 1.
Finally, we extracted the publishing time of each tweet
and the period of time when each user was active. This in-
formation is necessary to study the evolution of the migrant
crisis phenomenon and users' perception over time.
3.2. Sentiment Dimension
We are interested in understanding if the user has a pos-
itive feeling in welcoming the migrants or if he/she mainly
expresses negative feelings (fear, worry, hate). Therefore,
the dataset is enriched with information about the sentiment
for both of tweets and users.
3. http://www.geonames.org/
Algorithm 1 P T R Algorithm
Require: a set of users U, their tweets T with hashtags H,
a set of hashtags H 0
c for each class c ∈ C
Ensure: Classification of users Uc and hashtags Hc
1: procedure P T R( {H 0
2:
3:
c}c∈C )
c }c∈C ← TWCLASS(cid:0){H τ
c }c∈C ← USCLASS(cid:0){T τ
c }c∈C ,T(cid:1)
c }c∈C ,U(cid:1)
4:
5:
(cid:46) Classify tweets on the basis of the used hashtags
(cid:46) Classify users on the basis of the written tweets
τ ← 0
repeat
{T τ
{U τ
{H τ +1
τ ← τ + 1
c
(cid:46) Find better hashtags on the basis of U τ
c
}c∈C ← HTCLASS({U τ
c }c∈C)
6:
7:
until convergence
8:
return {U τ
9:
10: end procedure
c }c∈C,{T τ
c }c∈C,{H τ
c }c∈C
We consider two polarized classes c ∈ C: pro refugees
(c+) and against refugees (c−). We implemented and mod-
ified the algorithm P T R [14] to assign a class to each
polarized tweet and to each polarized user in an iterative way
by considering his/her tweets and the hashtags contained.
The approach proposed in [14] is suitable to track polarized
users according to a specific topic which is in our case the
"refugees phenomenon".
gorithm receives an initial set of polarized hastags (cid:8)H 0
The Alg. 1 illustrates the procedure. As input the al-
(initial seed) for each class c and the collection of relevant
tweets T . The initial seeds have been selected by analyzing
the most frequent among about 95 K unique hashtags:
(cid:9)
c
H 0
c+
= #refugeeswelcome #refugeesnotmigrants
#welcomerefugees
H 0
c− = #refugeesnotwelcome #migrantsnotwelcome
#norefugees
The initial seed H 0
c+ is used in 36K tweets, whereas
hashtags in class c− are used in only 2K tweets. One of
the benefits of P T R is that after only a few iterations the
results are less dependent on the size of the original seed,
correcting the unbalanced number of occurrences of the seed
by class c in the data.
The internal functions of Alg. 1 are defined as follows:
• TWCLASS: a tweet is polarized to one class c only if it
contains only hashtags of one class {Hc}c∈C.
• USCLASS: a user is polarized to one class c only if his
polarized tweets of class c are at least twice the number
of his polarized tweets of any other class.
• HTCLASS: an hashtag h is assigned to one class c if
Sc(h) > β · Sc(cid:48)(h) ∀c(cid:48) (cid:54)= c, where Sc(h) is the conjunct
probability of observing h in tweets polarized to class
c, and not observing h in the tweets polarized to other
classes. (For our experiments β = 0.005 was chosen after
empirical evaluation.)
The procedure adds information about polarization of the
users by polarized hashtags extension through the analysis
of all
the tweets written by an already polarized users
and not only the polarized tweets. The iterative procedure
has been run 4 times until convergence has been reached.
:
We excluded from the hashtags retrieved by P T R all the
hashtags which directly mention a city or a country. This is
to keep the sentiment value independent by the location in
computing of the polarization. The combination of location
and sentiment is done by crossing the space and sentiment.
Alg. 1 extracts new hashtags at each iteration. We report
the most relevant retrieved hashtags in addition to seed ones
after the final iteration of the algorithm for each class c:
H τ =f inal
c+
#campliberty #health #humanrights
#marchofhope #migrantmarch #refugee #refugeecrisis
#refugeemarch #refugeescrisis #sharehumanity
#solidarity #syriacrisis #trainofhope
H τ =f inal
c−
:
#alqaeda #guns #illegalimmigration
#illegals #invasion #isis #islamicstate #justice
#migrant #migrantcrisis #muslimcrimes #muslims
#no2eu #noamnesty #nomoremigrants #nomorerefugees
#patriot #quran #stoptheeu #taliban #terrorism
From the analysis of the extracted hashtags we can
see that people with a positive sentiment prefer to use the
term refugees, while people with a negative sentiment refer
to them as migrants, thus minimizing the fact that they
are escaping war and persecution. Users with a negative
sentiment frequently use refugees and the Islamic religion
together, somehow correlating, in a prejudicial way, refugees
with Islam and terrorism. Finally, we observe that individ-
uals with negative sentiment are often patriotic and not pro
Europe.
Note that the algorithm, may classify both users and
tweets as non polarized, thus favoring accuracy of truly
polarized content. The polarization algorithm was able to
assign the sentiment to 68% of the tweets and to 66% of
the users in our dataset. Regarding EU-geolocated tweets
and users, the algorithm assigned the sentiment to 73% of
tweets and to 71% of the users.
4. Refugees Crisis Perception Analysis
Our study is driven by the analytical questions below:
AQ1: Is it possible to capture the dynamic of the
refugees migration?
AQ2: What is the sentiment of users across Europe in
relation to the refugee crisis? What is the evolution of the
perception in countries affected by the phenomenon?
AQ3: Are users more polarized in countries most im-
pacted by the migration flow?
4.1. Spatial and temporal analysis
We navigate our multidimensional dataset by first
analysing the spatial and temporal dimensions to answer
AQ1. These analysis can quantify the volumes of relevant
Twitter messages based on the countries of the users and the
country mentions, since these volumes are strong indicators
of real-world events [16]. Figure 2 depicts the total number
of tweets for the 20 most active countries.
Since the dataset
is in English most of the tweets
(56.1%) come from users located in United Kingdom (UK),
Figure 2: TU L per top-20 countries in log scale.
Figure 3: T per day and top pieces of news.
therefore in Section 4.2.3 we focus our analysis on UK.
Nevertheless, a significant fraction of the data come from
other countries, e.g., France (FR) accounts for 6.9% of the
tweets and Germany (DE) accounts for 5.9%. Without loss
of generality, our methodology can be extended to other
languages by simply extending the seed hashtags used in
the sentiment dimension construction. As far as the mention
location is concerned, we see that users from 51 countries
mention 154 countries Europe, Asia and Africa. This is
analyzed in further detail in Section 4.2.3.
Figure 3 illustrates tweets volumes along the temporal
dimension, therefore relating volumes to events, summarized
in Table 2. This clearly includes all the tweets in T and not
only the geo-located ones. We observed significant volume
peaks in days August 19, September 4 and September 19. As
we can see from the table, these days match the major events
since the UK and France security deal signed on the 18 of
August regarding Calais, the drowned Syrian boy found in
a beach, Hungary takes refugees to Austrian border by bus
in days 2 to 4 September, and migrants breaking through
Hungarian border on September 16.
Next, we analyze location mention to a country related
to the refugee migration. Figure 4 reports the volumes of
tweets mentioning the EU countries most impacted by the
GBFRDEIENLESBEITSETRGRCHDKALFINOATRUHUPT102103104Number of tweetsNumber of tweets per country08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17020000400006000080000100000120000140000160000Number of tweetsUK & FR Calais security dealDeath of Alan Kurdi & refugees cross AT-HU borderMigrants break HU border facing arrestsTABLE 2: Major events during the observation period as
reported by UK Newspapers
18.08
UK and France to sign Calais security deal.
20-21.08 Macedonian police teargas thousands of refugees crossing from
Greece and declares state of emergency over surge in migrants &
refugees.
71 dead refugees found dead in truck in Austria.
Angela Merkel: Europe as a whole must help with refugees.
Hungary closes main Budapest station to refugees.
Alan Kurdi drowned off the shores of Turkey.
27-28.08
31.08
1.09
2.09
4-6.09 Migrants are allowed to cross the Austro-Hungarian border;
8.09
14.09
15.09
16.09
17.09
Refugees welcomed warmly in Germany.
Hungarian Journalist appears to kick and trip fleeing refugees.
Austria followed Germany's suit and instituted border controls;
Refugee boat sinking: dozens including children drown off Greek
island.
Croatia started to experience the first major waves of refugees;
Hungary announced it would start arresting people crossing the
border illegally.
Refugee crisis escalates as people break through Hungarian border;
Hungary had detained 519 people and pressed criminal charges
against 46 for trespassing,
leading to pursue alternative routes
through Croatia from Serbia.
Croatia decided to close its border with Serbia.
refugees route, namely Austria, Germany, Croatia, Mace-
donia, Hungary, Serbia, Greece. We see that there is an
interesting correspondence between the peaks of mentions
and the events timeline. An evident peak for Germany, Aus-
tria and Hungary is the first week of September, probably
related to the issues of borders being opened to refugees. We
also notice a peak of mentions of Croatia corresponding to
the close of borders with Serbia. Macedonia also sees and
important increase of mentions around the 20 of August,
probably in relation to the Macedonian Police using gas
towards refugees.
Similarly, Figure 5 focuses on the mention of relevant
non European countries. The number of tweets mentioning
Syria increases dramatically after the aforementioned facts
of September 4, Turkey has a peak the day 4 of September
due probably to the young kid found on the beach. We also
observe how the mentions to other countries remains more
or less stable along this period to witness the fact that they
were not directly related to the events reported by the media
in that period and that involved mainly the Syrian refugees.
From a content standpoint we tracked how hashtags
Figure 5: Non-EU country mentions per day in log scale.
usage is closely related to the relevant events. We have
counted the frequency of each hashtag in each day, then
performed a two-pass normalization. First we normalized the
frequencies of hashtags on each day so as to avoid that days
with lower recorded traffic are given less importance. Then
we normalized each hashtag over the observed period, so
that the values are comparable among different hashtags. We
then measured the variance of the normalized frequencies,
considering that hashtags with higher variance are those with
a more unbalanced distribution among days. The hypothesis
is that the unbalanced distribution is due to a close relation
of the hashtag with a specific temporal event (usually one
or two days). Figure 6 shows the resulting twenty highest-
variance hashtags. The plot shows how this simple method
allowed us to quickly spot hot topic in the observed stream
of tweets and to correctly place them in time.
4.2. Sentiment Analysis
To answer the analytical question AQ2, we analyze
the perception of the refugee crisis phenomenon by the
European countries by exploiting the sentiment and location
Figure 4: EU country mentions per day in log scale.
Figure 6: Highest-variance hashtags per day; intense red
represents higher relative freq.
08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17100101102103104105Number of tweetsCroatiaHungaryAustriaGermanySerbiaMacedoniaGreece08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17101102103104105106Number of tweetsSyriaNigeriaIvory CoastIsraelTurkeyLybiaIraqIranHashtag / Day20150805…20150817201508192015082020150821201508222015082320150824201508252015082620150828201508292015083020150831201509012015090420150906201509092015091020150911201509122015091320150914201509152015091620150917#AshrafMassacre#bbcqt#CNNDebate#WorldHumanitarianDay#MigrantMarch#IStandWithAhmed#Aylan#AhmedMohamed#Remember911#syrianchild#HumanityWashedAshore#NeverForget911#AylanKurdi#BorderForce#WHD2015#FreeThe7#StopSilence#Ahmadiyya#BreathingChemicals#ChemicalAssad(a) Global perception
(b) Internal perception
(c) External perception
Figure 7: Index ρ across European countries: red corresponds to a higher predominance of positive sentiment, yellow
indicates lower ρ. (a) Refers to the whole dataset. (b) Is limited to users when mentioning locations in the their own
country. (c) Is limited to users otherwise.
dimensions of the Twitter users in our dataset. To simplify
the notation in the following we refer to UL simply by U.
Let us define ρ the ratio between the number of polarized
users pro refugees and the number of users against refugees:
ρ =
Uc+
Uc−
The index ρ gives a compact indication of the sentiment of
a group of users.
We first analyze the sentiment across the various coun-
tries, and we then differentiate between discussion about
internal and external locations.
4.2.1. Sentiment by country. Figure 7(a) shows the value
of ρ for users belonging to the different European countries.
We observe that Eastern countries in general are less positive
than Western countries. In particular, Russia and Turkey
have a low sentiment index probably because they are highly
affected by the flow of arrivals. On the contrary, countries
like Germany and Austria are more positive and this can be
confirmed by the news reporting their decision of opening
borders to migrants. Among western countries, France, UK,
Italy and Netherlands have a low ρ index. In Italy the large
amount of refugees arrived mainly through the sea directly
from Lybia or Tunisia and the tone of the discussion is often
characterized by negative notes. In France the sentiment
confirms all worries about, probably, the situation of the
Calais jungle. The situation in Greece appears very different.
The sentiment is positive even though this country remains
by far the largest single entry point for new sea arrivals
in the Mediterranean, followed by Italy. Greece captured
the attention of humanitarian organizations. Countries like
Ireland, Norway or Portugal are less interested by the phe-
nomenon and therefore their perception might result more
positive. Even for Spain ρ is not particularly low since the
problem of refugees coming from Western Mediterranean
was limited in number of people compared to central and
eastern countries.
4.2.2. Internal and external country perception of the
refugees crisis. In the following we study the perceived
sentiment in relation to the user country. We denote as
internal perception the sentiment of a user when mentioning
his/her own country (or a city in his/her country). External
perception refers to polarized tweets with no internal refer-
ences.
Figure 7(b) shows the sentiment ratio ρ by country
considering the internal perception, thus tweets mentioning
the country itself. The ρ computation is this case refers to
the users of a country who mentioned in their tweets the
country itself (or indirectly a city in the country). We report
only the countries for which we have a minimum amount
of data. We can see that Russia, France and Turkey have
a really low ρ index. We conjecture that the sentiment of
a person, when the problem involves directly his/her own
country, could be more negative since we are generally more
critical when issues are closer to ourselves.
The external perception ratio is depicted in Figure 7(b).
Comparing the two maps, we see that internal and external
perception is stable for UK and Sweden. Other countries
have a much lower internal sentiment ρ than external, and
this is the case of France, Russia and Turkey. All these
countries were indeed facing many critical problems due to
the arrival of refugees to their borders. The case of Calais
is one of the most significant examples which could explain
the case of the low ratio in France. Germany, Hungary and
Greece, on the contrary, have a better internal perception
which might be due to the decision of Germany to open
borders to allow many people to transit from Hungary to
Germany, releasing the extremely difficult situation at the
national borders.
4.2.3. Sentiment Analysis: the UK case. In this section
we focus on the sentiment analysis of UK citizens, as UK
is the most represented country in our dataset and therefore
a more detailed sentiment analyses can be done. Indeed, for
UK we detail the results at the granularity of the city level.
Figure 8 (left) shows the number of polarized users UL in
Figure 8: Positive and negative users for different cities in UK in all period (left) before (center) and after (right) September
4. In the infographic the pies/bars show the number of polarized positive and negative users by city and the heat map in
background indicates the value of ρ for the cities considered in the legend. For some cities the tweets are not sufficient to
compute polarization, therefore when the heat degrades to 0 it indicates no data.
the most represented cities of the country, with at least 100
polarized users in the dataset. We can see from the heatmap
that there is a gradient of polarization from south to north in
the sentiment. This could be due to the fact that the cities in
the south, and London in particular, were more involved in
the welcoming process of refugees and this might have gen-
erated more discontent even though the general perception is
quite positive. From the time series of ρ for UK users we see
an increase in the general sentiment ratio of the country after
September 4. We find news4 regarding that period from BBC
and we think that the increase in the sentiment polarization
could be be due mainly to the decision of the Prime Minister
Cameron of acting with "head and heart" to help refugees.
He allocated substantial amounts of money to humanitarian
aid becoming, at that time, the second largest bilateral donor
of aid to the Syrian conflict (after the US). Figure 8 (middle)
and (right), shows the comparison of the opinion in UK
before and after September 4, respectively. We highlight
again a gradient of polarization from north to south in both
cases even though the sentiment ratio ρ before and after
that day is completely overturned. After September 4 the
spreading of positive news in UK increases the sentiment
and the volume of relevant tweets in all the country and
probably government position reflects the sentiment of a
vast majority of users which show support to refugees in
their digital statements.
4.3. Mentioned Location Analysis
The last analysis we conducted aims at answering AQ3
by studying the sentiment of the tweets when mentioning
specific countries. We show how events impact differently
the volume of tweets with positive or negative sentiment.
Furthermore, we relate the sentiment changes to events.
Figure 9 (a-c) shows the sentiment of tweets when
mentioning three of the countries most impacted by the
4. Sept, 04: http://www.bbc.com/news/uk-34148913 – Sept, 16: http://
www.bbc.com/news/uk-34268604
refugees routes: Hungary, Austria and Croatia. We highlight
an overall low number of mentions to these countries until
the beginning of September. In the case of Hungary and
Austria there is a sudden increase at
the beginning of
September in the overall number of mentions, predominantly
for c+ with a relative increase in c−. This is mostly due to
the overall positive sentiment towards the events from the
previous days (the death of Alan Kurdi, the young boy found
he drowned), but also due to the good news of migrants
being allowed to cross the Austro-Hungarian border. The
negative sentiment starts to appear, and continues to grow,
until
the middle of September when the negative class
tends to increase more than the positive one. Here we have
tweets expressing negative feelings towards border controls
on behalf of Austria (13-15 Sept) and Hungary arresting
refugees crossing the border illegally (15-17 Sept). Croatia
comes into play towards the end of our observation period
when on the September 16th becomes a valid alternative
to Hungary which closed its borders with Serbia. A similar
analysis has been done for Greece, Macedonia and Serbia,
all countries facing critical moments, but due to lack of
space we are omitting here.
In Figure 9 (d-f) we look at the sentiment in relation
to the mentions of UK, France and Germany. Both UK and
Germany are rather balanced between positive and negative
tweets. Germany presents exceptions on certain days when
a positive feeling arises in support to the sad incidents
related to refugees. We notice that the official media news
at the end of August reported that Germany was welcoming
refugees, while UK started showing a positive sentiment
after the dramatic facts of Alan Kurdi and the announcement
of taking in 20,000 refugees by 2020. France seems to
have more negative feelings, probably due to the difficult
situation in Calais and news about victims trying to across
to UK while a positive peak appears in correspondence to
the young victim found.
(a) Tweet sentiment for Hungary
(b) Tweet sentiment for Austria
(c) Tweet sentiment for Croatia
(d) Tweet sentiment for UK
(e) Tweet sentiment for France
(f) Tweet sentiment for Germany
Figure 9: Tweet sentiment for country mentions per day.
5. Conclusions and Future Work
We proposed an adaptive and scalable multidimensional
framework to analyze the spatial, temporal and sentiment
aspects of a polarized topic discussed in an online social
network. As a case study we used a Twitter dataset related to
the Mediterrean refugee crisis. Besides enriching tweets with
spatial and temporal information, a contribution of this paper
is the sentiment enrichment able to identify the polarity of
users and tweets. The combination of the sentiment aspects
with the temporal and spatial dimension is an added value
that allows us to infer interesting insights. Our analysis
revealed that European users are sensitive to major events
and mostly express positive sentiments for the refugees, but
in some cases this attitude suddenly changes when countries
are exposed more closely to the migration flow. As a future
work we intend to adapt
the framework to a real-time
streaming scenario and to add more dimensions such as the
type of user and the network relationships in the Twitter
user graph.
Acknowledgments. This work was partially supported by
the EC H2020 Program INFRAIA-1-2014-2015 SoBigData: Social
Mining & Big Data Ecosystem (654024).
References
[1]
S. Scellato, C. Mascolo, M. Musolesi, and V. Latora, "Distance
matters: Geo-social metrics for online social networks," in Conference
on Online Social Networks, ser. WOSN'10, 2010.
[3]
[2] Y. Takhteyev, A. Gruzd, and B. Wellman, "Geography of Twitter
networks," Social Networks, vol. 34, no. 1, pp. 73 – 81, 2012.
J. Kulshrestha, F. Kooti, A. Nikravesh, and K. P. Gummadi, "Geo-
graphic dissection of the Twitter network," in Proceedings of the Sixth
International AAAI Conference on Weblogs and Social Media, 2012.
[4] B. Hawelka, I. Sitko, E. Beinat, S. Sobolevsky, P. Kazakopoulos, and
C. Ratti, "Geo-located Twitter as proxy for global mobility patterns,"
Cartography and Geographic Information Science, vol. 41, no. 3, pp.
260–271, 2014.
[5] E. Zagheni, V. R. K. Garimella, I. Weber, and B. State, "Inferring
international and internal migration patterns from Twitter data," in
WWW Conference, ser. WWW'14 Companion, 2014.
[6] M. D. Conover, C. Davis, E. Ferrara, K. McKelvey, F. Menczer, and
A. Flammini, "The geospatial characteristics of a social movement
communication network," PloS one, vol. 8, no. 3, 2013.
[7] B. Pang and L. Lee, "Opinion mining and sentiment analysis,"
Foundations and trends in information retrieval, vol. 2, no. 1-2, pp.
1–135, 2008.
[8] A. Pak and P. Paroubek, "Twitter as a corpus for sentiment analysis
and opinion mining." in LREc, vol. 10, 2010, pp. 1320–1326.
[9] M. Taboada, J. Brooke, M. Tofiloski, K. Voll, and M. Stede, "Lexicon-
based methods for sentiment analysis," Computational linguistics,
vol. 37, no. 2, pp. 267–307, 2011.
[10] O. Kolchyna, T. T. Souza, P. Treleaven, and T. Aste, "Twitter senti-
ment analysis: Lexicon method, machine learning method and their
combination," arXiv preprint arXiv:1507.00955, 2015.
[11] L. A. Adamic and N. Glance, "The political blogosphere and the 2004
us election: divided they blog," in Proceedings of the 3rd international
workshop on Link discovery. ACM, 2005, pp. 36–43.
[12] M. Coletto, C. Lucchese, S. Orlando, and R. Perego, "Electoral
predictions with twitter: a machine-learning approach," in IIR 2015,
Cagliari, Italy, 2015.
[13] K. Garimella, G. De Francisci Morales, A. Gionis, and M. Math-
ioudakis, "Quantifying controversy in social media," in ACM Inter-
national Conference on Web Search and Data Mining, ser. WSDM
'16, 2016, pp. 33–42.
[14] M. Coletto, C. Lucchese, S. Orlando, and R. Perego, "Polarized user
and topic tracking in twitter," in SIGIR 2016, Pisa, Italy, 2016.
[15] J.-P. Onnela, S. Arbesman, M. C. Gonz´alez, A.-L. Barab´asi, and N. A.
Christakis, "Geographic constraints on social network groups," PLoS
one, vol. 6, no. 4, p. e16939, 2011.
[16] J. Weng and B.-S. Lee, "Event detection in twitter." ICWSM, vol. 11,
pp. 401–408, 2011.
08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17050010001500200025003000Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-1702004006008001000120014001600Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2408-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-170100200300400500600Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-1705001000150020002500Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17050100150200250Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17020040060080010001200Number of tweetsNegativePositive |
1508.06143 | 1 | 1508 | 2015-08-25T13:26:16 | Pedestrian Static Trajectory Analysis of a Hypermarket | [
"cs.SI",
"physics.soc-ph"
] | In this paper, we propose a combination of pedestrian data collection and analysis and modeling that may yield higher competitive advantage in the business environment. The data collection is only based on simple inventory and questionnaire surveys on a hypermarket to obtain trajectory path of pedestrian movement. Though the data has limitation by using static trajectories, our techniques showed that it is possible to obtain aggregation of flow pattern and alley attractiveness similar to the result of aggregation using dynamic trajectory. A case study of a real hypermarket demonstrates that daily necessity products are closely related to higher flow pattern. Using the proposed method, we are also able to quantify pedestrian behavior that shoppers tend to walk about 7 times higher than the ideal shortest path | cs.SI | cs | Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
Pedestrian Static Trajectory Analysis of a Hypermarket
Kardi TEKNOMO
Associate Professor
Information Systems and Computer Science
Ateneo de Manila University
Loyola Heights, Quezon City
Philippines
Fax: +63-2-426-6071
E-mail: [email protected]
Gloria P. GERILLA
Assistant Professor
Department of Civil Engineering
De LaSalle University
Taft Avenue, Manila
Philippines
Fax: +63-2-635-2693
E-mail: [email protected]
Abstract: In this paper, we propose a combination of pedestrian data collection and analysis
and modeling that may yield higher competitive advantage in the business environment. The
data collection is only based on simple inventory and questionnaire surveys on a hypermarket
to obtain trajectory path of pedestrian movement. Though the data has limitation by using
static trajectories, our techniques showed that it is possible to obtain aggregation of flow
pattern and alley attractiveness similar to the result of aggregation using dynamic trajectory. A
case study of a real hypermarket demonstrates that daily necessity products are closely related
to higher flow pattern. Using the proposed method, we are also able to quantify pedestrian
behavior that shoppers tend to walk about 7 times higher than the ideal shortest path.
Key Words: alley attractiveness index, static trajectory, flow pattern, questionnaire
1. INTRODUCTION
With the growth of a city into larger regions and new urban city centers are repositioned,
traditional markets have been transformed gradually into groceries stores, supermarkets, and
hypermarket. As business becomes more competitive, new strategies to improve shopping
experience as well as competing in price and product and service quality and lifestyle are
necessary. For a shopping center to stay with competitive advantage, it needs better
knowledge on shopping behavior and more accurate measurement on shoppers (i.e.
pedestrian) behavior.
While traditional demand on the shopping center are derived from counting the number of
people coming in the shopping center, new types of gadgets allow shopping centers’ owners
to track each pedestrian traveling around the shops over time and space. The result of such
gadget is a pedestrian trajectory which is an abstraction of path taken by a pedestrian in a
system from the time a pedestrian enters the system until pedestrian goes out of the system.
Dynamic pedestrian trajectory can be obtained through pedestrian tracking technology such
as such as GPS, Wireless (mobile phone and PDA) as well as RFID and multiple view of
video camera are used for both indoor and outdoor business environment (Teknomo 2006).
Such trajectory contains dynamic data along the path that the shoppers passed in the mall. The
aggregation of dynamic trajectory analysis over time produces flow pattern which represents
attractiveness of alleys based on the frequency of trajectory in the alley.
For many practical applications, especially in developing countries where the labor cost is
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
much cheaper than electronic devices, however, such pedestrian tracking technologies and
gadgets are still very much costly and require advanced knowledge on its utilization. A more
straightforward technique is needed to gain flow pattern resulting from the trajectory analysis.
In this paper, we propose a simple technique to obtain trajectory data merely using
questionnaire survey. Compared to advanced pedestrian tracking technology, our technique
has limitation to obtain only static data. Thus, we give name to such pedestrian path as static
trajectory. However, in this paper we will show that such limitation does not hinder us to
obtain similar results as dynamic trajectory analysis in terms of flow pattern and measurement
of alley attractiveness.
Using static trajectory analysis, the objective of this paper is to answer several important
questions such as which alleys on the stores get more flow than the others and which product-
items are preferable than the others. To be precise, our goal in trajectory analysis is to find
flow pattern and finally to derive alley attractiveness. To the best of our knowledge, this is the
first paper to describe about static trajectory from questionnaire survey to analyze pedestrian
and shopper’s behavior.
The future applications of static trajectory analysis, however, are much farther beyond what is
addressed in this paper. For example, the static trajectory analysis has potential applications
like the following:
• Evaluation of marketing strategy: Panel data before and after marketing strategy
(e.g. discount, promotion, bargain sales, etc.) could show how well the marketing
strategy is.
• Understanding shopper behavior: Knowing pedestrian flow data is also useful to
learn the behavior of shoppers. Weekend visitors, for example, have different shopping
behavior characteristics than weekday visitors, lunch time visitors mostly coming for
food rather than to buy clothes. Pedestrian flow data over time explain the cyclical
demand and trend of number of visitors. Business needs to know when the peak and
lowest number of visitors is such that all the marketing strategy can be targeted to
more appropriate customers.
• Provide best design for best rental prices: to make almost all alleys have pedestrian
flow beyond a minimum threshold level. Bad design if certain alleys receives only
very few pedestrian flow. Flow pattern may also reveal relative shop prices (or rental
fee) based on alley attractiveness. Higher flow pattern goes through the alley must be
higher demand, therefore higher price per floor area.
• Finding best shop location: for shop owner who would like to find a place where the
pedestrian flow is the highest (but still under certain threshold of crowd level) or
within some specified preferable range
• Best design of shop layout: Trajectory analysis (from both real data and pedestrian
simulation) may reveal preference map: which alleys on the stores get more flow than
the others.
The remainder of the paper is organized as follows. The next section, we describe how the
data collection was done based on inventory survey and questionnaire survey, then network
analysis of inventory survey is described in Section 3. In Section 4 and 5, we explain the
analysis of trajectory based on combination of the questionnaire survey and inventory survey.
Section 4 describes the behavioral inference of shoppers’ walking distance while Section 5
emphasizes the flow pattern and alley attractiveness indices that are important for business
application. The analysis of the two surveys is combined in Section 5. Finally conclusions are
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
drawn in the last section.
2. DATA COLLECTION
To proof our concept on static trajectory analysis, we utilize the data that have been gathered
by Siahaan in a hypermarket in Surabaya as mere case study. This section explains only the
data collection process in relation to our concept. Readers who are interested to read further
about the questionnaire data can refer to (Siahaan, 2007). Two types of data collection were
done. The first data collection is an inventory of the hypermarket layout configuration and
products sellable along all the alleys by category. The second data collection was done using
questionnaire survey.
The inventory data collection was performed with the aid of an architectural layout sketch of
the hypermarket where the geometrical measurement has been posted. Adjustment of the
geometry (length and width in top view) was observed and noted as the surveyor walks along
the alleys. Figure 1 illustrates the results of inventory survey. The hypermarket is divided into
several sections such as groceries, clothing, electronics, home furnishing and so on. There is
only a single main entry which is also utilized as an exit point and there is a single main exit.
There are also several peripheral shops located between the two main gates. For our study, the
main focus is only pedestrian behavior inside the hypermarket and ignores the trajectories
toward the peripheral shops.
Figure 1. Results of the inventory survey
To quantify our proposed trajectory analysis above, a questionnaire survey with in depth
interview was done in Giant Hypermarket Surabaya, Indonesia. The questions in the survey
consist of two main parts:
1. Trajectory of each shopper in the hypermarket
2. Shopping behavior which consists of socio economic data (gender, net income,
education level, type of work and age), activities in the mall (such as shopping
purpose, duration, number of companions and total spending) and shopping trip
characteristics such as shopping frequency.
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
For the scope of this paper, however, our focus will be on the analysis of first part of the
questionnaire survey. The statistical analysis of the second parts of the questionnaire is
omitted because it has been reported elsewhere (Siahaan, 2007).
Figure 2. Example questionnaires and a static trajectory drawn by a shopper #160
To obtain pedestrian static trajectory via questionnaire survey, each respondent were
requested to draw their route on provided floor plan or map of the shops. Figure 1 shows the
example of a trajectory path drawn by a respondent. The interview was done after the
respondents went out of the cashiers, thus they have completed their shopping journey inside
the hypermarket. We call the trajectory static trajectory because the time information is
missing.
At preliminary survey, time stamp data and shopping items that they picked along the route
were also included. The attempt to include time stamp along the path was done with much
difficulties as most respondents have forgotten it. We also found out that the shopping items
data along the route were not so accurate compared to their actual list of shopping items,
therefore we disregard these data and retain only the route or static trajectories because of its
high accuracy.
Each interview took about 10 to 20 minutes during weekdays. As the time is not part of
equation, the survey can be done even during off peak. Total respondents were 204 with only
188 respondents considered as complete and valid. The invalid data were mostly due to
incomplete trajectories or their trajectories are not readable.
2. NETWORK ANALYSIS
From the inventory survey and architectural layout plan, we select a position in the middle of
the alleys to be the nodes of the network graph while each alley is represented by a link.
Figure 3 illustrates the network graph of walkway along the hypermarket. The coding of the
nodes is arbitrary but we prefer to be represented in alphabetical order from A-Z, AA-BZ and
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
1a-1j. In total we employ 88 nodes and 139 links. Some link such as BX-BZ consists of three
actual nodes of the graph representation but for the analysis we only employ 2 nodes for
simplicity without losing generality. Except the links that pass through the cashiers which is
only one way, all the other links are two ways because the pedestrians can walk in two
directions.
Figure 3. Graph model of alleys in the hypermarket and sample of nodes coordinates
The coordinates of each node were measured directly from the map (see example on Figure 3
right) and adjacency matrix A to represent the structure of the network was derived. Distance
matrix D indicates the length of each link was computed based on Euclidean distance
between coordinates of two nodes. The value of each element in a distance matrix represents
length of the link (connected nodes). Unconnected vertices are represented by infinity
distance.
The distance matrix and the adjacency matrices are sparse matrix with most of the entries
located near the diagonal elements but the diagonal elements themselves are zero. As the
matrix size is rather large (88 by 88), it is valuable to scale the matrix values into a color map
of an image to see the pattern. The left hand side of Figure 4 shows the distance matrix that is
mapped into an image with a color scale that indicates the brighter color with a higher value.
Unsymmetrical on the middle left of the image is due to one way links passing through the
cashiers. The actual values of the top-left part of the distance matrix are shown on the right of
Figure 4 together with the coding of the nodes.
Figure 4. Mapping of distance matrix (left) and top left corner of the distance matrix (right)
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
The geometric arrangement of the alleys inside a hypermarket can be measured indirectly
through statistical indices of the distribution of shortest path distances between all pairs of
nodes. The shortest path distance was computed using the Floyd-Warshall algorithm (Cormen
et al, 2001), which finds shortest paths between all pairs of nodes in the network graph.
Figure 5 left shows the mapping of all-pairs shortest-path distance matrix into heating color
map. Higher distance has heating red color and lower distance value is indicated by a cool
blue color. The figure clearly shows that the shortest path distance matrix values are not only
on the surrounding diagonal elements as the distance matrix. The diagonal elements are all
zeros. The value of each element in the shortest distance matrix represents shortest path
length between any two nodes on the network graph. The right Figure 5 illustrates the top left
values of the all pair shortest path distance matrix. Comparing these values to the distance
matrix in Figure 4 right, we can see that the non-infinity values of the distance matrix are
actually embedded inside the shortest path distance matrix.
Figure 5. Mapping of all shortest path distance matrix and top left corner of the matrix
The distribution of all non-zero pairs with the shortest path distance is skewed to the right as
shown in Figure 6. The mean of the distribution is 38.87 meters (95% confidence interval is
between 38.87 to 38.88 meters) while the median is 36.5 meters and mode of 27.5. The
maximum shortest path distance can reach up to 123.1 meters with standard deviation of 21.4
meters and inter quartile range of 30.5 meters. The Box plot on the bottom of Figure 6
indicates skewness of 0.5573 and distance above 98.75 meters can be considered as outliers.
We will compare these figures later with the results of trajectories analysis in Section 4.
Figure 6. Distribution of all pairs shortest path distance matrix and its box plot
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
4. STATIC TRAJECTORY ANALYSIS
In this and the next sections we describe the analysis results of the questionnaire survey on
trajectory path of the shopper and combine them with the results of inventory survey that has
been explained in the previous section.
Pedestrian trajectory can be represented as an NTXY database (first proposed by Teknomo et
al 2000) which consists of a pedestrian ID number, time slice when the data is recorded from
the top view 2 dimensional coordinate based on some local reference coordinate system.
Notation N indicates pedestrian number, T represents time stamp where the trajectory are
recorded along each coordinate (X, Y). The tracking is performed for each pedestrian over
time and space. A static trajectory is a reduction of pedestrian trajectory to include only space
list of coordinates for each pedestrian (i.e. only NXY).
From the questionnaire survey, pedestrian trajectory is drawn by the respondent to indicate his
or her journey inside the hypermarket. The trajectory drawing is then mapped into the nearest
links and nodes of the network graph and coded as node sequence. For example, for a shopper
with code number 160 where its trajectory was drawn in Figure 2, has nodes sequence of 1a-
A-B-D-F-H-J-I-K-L-N-M-K-X-AA-AD-AG-AJ-AM-AL-AO-AP-AS-AR-AU-AV-AY-BB-
BE-BH-BK-BL-BO-BN-BQ-BR-BO-BL-BI-BF-BC-AZ-1d-1c-1b as illustrated in Figure 7.
Figure 7. Mapping of trajectory of a shopper into network graph produces nodes sequence.
Once the mapping of the trajectories drawn by the respondents was done for all 188 samples,
our static trajectories become a set of node sequences. As the coordinates of each node is
known, we can easily compute the walking distance of each pedestrian inside the hypermarket
from the node sequence as cumulative of length of the links along the trajectory path of the
shopper. We must give note, however, that the walking distance computed is not the actual
walking distance but only approximation of the walking distance because the real pedestrian
trajectories has been transformed twice from actual behavior into the respondent’s drawing
pad and then mapped into the network graph.
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
Figure 8. Distribution and box plot of link walking distance
Figure 8 exhibits the distribution of link walking distance for all 188 shoppers in the sample.
The mean of the distribution of walking distance is 265.14 meters (95% confidence interval is
between 264.40 to 265.88) while the median is 267.8 meters and mode of 152 meters. The
maximum link-walking distance is about 430 meters with standard deviation of 70.82 meters
and interquartile range of 95 meters.
The Box plot on the bottom of Figure 8 indicates skewness of -0.15 close to symmetric
distribution and walking distance below 77.8 meters or above 457.8 meters can be considered
as outliers. It would be remarkable to compare this outlier boundary value to the central
tendency of all the pairs with shortest path distance because more than 95% of the
distribution of shortest path distance is under the lower bound outlier threshold value of the
link walking distance.
Based on the above finding, we propose a simple index to compare the distribution of the
walking distance and the distribution of non-zero all pairs shortest path distance. Our
indicator is simply a median ratio
λ=
median link walking distance
median all pair shortest path distance
(1)
We use median instead of mean because the skewness of the two distributions are not equal
and median is more robust central tendency than mean. The value of our indicator of median
ratioλ is always higher than one because we compare the aggregation of actual walking
distance to the ideal shortest path walking distance for all cases. Nearer the value of λ to
unity may indicate simplicity of the layout arrangement that the shoppers can go
straightforward almost similar to the shortest path from any points.
. It means that the actual walking distance is 7
In our case study, we have
times longer than the ideal shortest path. In other words, shoppers do not walk in the shortest
path which is probably a well known common sense. However, our indicator and our case
study are able to yield a quantitative verification of this common sense.
36.5 7.34
=
λ=
267.8
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
5. FLOW PATTERN AND ALLEY ATTRACTIVENESS
The main objective of trajectory analysis is to find flow pattern and finally to derive alley
attractiveness. In this section, we will describe how we will obtain the alley attractiveness
from static trajectory analysis. The alley attractiveness is useful to answer several important
business questions such as which alleys on the stores get more flow than the others and which
product-items are preferable than the others. First, we will clarify the terminologies and
assumptions, and then we will detail the computation and results of the analysis.
Using static trajectory analysis, the frequency of trajectories passing through each alley is
aggregated to represent flow pattern. We called it ‘flow’ rather than ‘density’ because they
come from frequency aggregation of trajectories over a time period of the study rather than
within an instant of time. Some critical readers may argue that the static trajectory come from
questionnaire samples which do not represent true flow or density. However, flow pattern is
not equal to the flow rate in traffic engineering sense. Flow pattern is an index based on flow
to show which alley has higher visitors compared to the other alleys. To distinguish from the
term ‘flow rate’ that is normally used in traffic engineering studies; we give a name ‘flow
pattern’ because it does indeed represent the pattern of the flow over different alleys in a
business environment.
The flow pattern on each alley represents demand to that particular alley as the people pass
through the alley and see the display or the product items, there is a higher chance that the
product items would be picked up and put into their shopping baskets. For the designer or
owner of shopping center and business environment, flow patterns give very useful
information on which part of stores have higher flow than the others parts. Higher pedestrian
flow pattern is highly correlated to the rental fee of the stores.
When the flow pattern is derived from dynamic trajectories (that can be obtained through
tracking devices such as RFID and GPS), the trajectories are aggregated as frequency of
passing the alley over small time interval (e.g. 5 minutes or 15 minutes) and finally
aggregated again by averaging them over the time interval of the study period or over the
number of the flow. This final aggregation is basically static that it does not contain any
information regarding time (except the study period). Assuming the same amount of total time
study period, the aggregation of static trajectories over all samples (in the limit sense that we
have infinitely many of such static trajectories) would eventually approach the equivalent of
the final aggregation of the dynamic trajectories. Hence, we can utilize the information of the
static trajectories as an approximation of the real flow pattern.
The computation of flow pattern is straightforward as counting the frequency of trajectories
passing through each alley. An alley is represented by a link in the network graph. As the
trajectories have been transformed into nodes sequences and, the link frequency can be put
into a flow matrix F which is equivalent to the adjacency matrix A with all ones elements
being replaced with the flow pattern. Table 1 shows the pseudo code for the algorithm to
compute flow matrix. The flow matrix contains the flow pattern or frequency of each link on
the network graph on each direction over the study time period.
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
Table 1: Algorithm for computation of flow pattern
For each respondent
For each trajectory
For each link in the trajectory
F (node origin, node destination) = F (node origin, node destination) + 1
Next link
Next trajectory
Next respondent
The values of flow matrix F are illustrated in Figure 9. The flow matrix has a similar pattern
to distance matrix (Figure 4) but the values are different. Higher flow has heat orange color
and lower distance value is indicated by a cool blue color. The maximum value of flow
pattern is 265 pedestrians per alley.
Figure 9. Pattern of flow matrix (left) and its top right values (right)
Figure 10. Spatial distribution of flow pattern
To see the spatial distribution of flow pattern (in term of total trajectories passing each alley),
the values of the flow patterns are divided into 4 categories to indicate very high, high,
medium and low values such that they can be scaled into the thickness of the network graph
as shown in Figure 10. This spatial distribution information is very useful to distinguish
which alleys on the hypermarket have more flow than the others. Relating flow pattern with
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
the products and services along these alleys reveals the relationship between the design of
store layout and products arrangement. Changing the store layout and rearranging goods
inside the store will eventually change the trajectory movement pattern of visitors to move
around and in turn alter the spatial pattern of the indices.
In our case study, we attempted to correlate the spatial distribution of flow pattern with the
product items on the hypermarket. Relating the products along the high alley attractiveness
index of Figure 10 points out that high flow pattern is related to two factors. The first major
factor is that they are located in the main major route to the items that the shoppers actually
want to buy. The second factor that signifies high flow pattern is the alley containing product
items of daily usage such as food, cosmetics and groceries. It is interesting to see the products
that related to low alley attractiveness index (dash line in Figure 10): rice cooker, mixer,
stove, fan, dispenser, furniture, bed cover, adult’s clothing and frozen products. These product
items are clearly non-daily usage and therefore less attractive than the other necessity
products.
Though flow pattern indicates the demand of each alley, the value of flow pattern itself is
affected by the number of samples. As the number of sample is affected by the study area and
time, the distribution of flow pattern values would be differ. This is because flow pattern
gives only absolute values for the particular alley in the study area. When we would like to
compare the different supermarket or hypermarket or different study period on the same study
area, we need only relative values of flow pattern.
Figure 11. Distribution and box plot of alley attractiveness index values
To obtain relative values of flow pattern, we need to normalize the values of flow pattern (by
division toward maximum flow pattern) to make it into an index between 0 and 1. We call the
normalization of flow pattern as Alley Attractiveness Index denoted by α because it
represents the attractiveness of each alley. Matrix of alley attractiveness index α as
formulated in Equation (2) has exactly the same pattern as flow pattern (see Figure 9) as it is
only scaled by a scalar of maximum flow pattern.
(2)
α
=
F
F
max( )
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009
α>
≈
0.59 0.6
Alley Attractiveness Index shows which alley inside the hypermarket has higher visitors
compared to the others. The distribution of alley attractiveness indices as shown in Figure 11
is clearly skewed to the right with skewness index 1.65. The mean distribution of αis 0.2147
(95% confidence interval is between 0.2130 and 0.2163) with median 0.1455 and mode of
0.0061. The standard deviation is 0.2223 and interquartile range of 0.2121. In our case study,
the values of
are considered outliers. As the value of alley attractiveness index
is between 0 and 1, one can easily multiply that by the maximum rent value to obtain the
relative rental values of shops along the alley.
6. CONCLUSIONS
We have shown a simple yet novel method to collect static trajectory data from questionnaire
and analyze them into shopper’s behaviors and flow pattern or alley attractiveness indices.
The alley attractiveness has been demonstrated through case study that it is useful to answer
important business questions such as which alleys on the stores get more flow than the others
and which product-items are preferable than the others. For our case study, daily necessity
products are closely related to higher flow pattern.
We also found out from our case study that the actual walking distance is about 7 times longer
than the ideal shortest path. Thus, significantly we can state that shoppers do not walk in
shortest path. Shopping walking distance inside the hypermarket below 77.8 meter or above
457.8 meters can be considered as unusual or outliers.
ACKNOWLEDGEMENTS
The authors are grateful for the questionnaire data collected by Andi Siahaan and Harry
Patmadjaja from Petra Christian University, Surabaya Indonesia and also for the support of
the management team from Giant Hypermarket Pondok Chandra Surabaya.
REFERENCES
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. (2001) Introduction to
Algorithms, Second Edition, the MIT Press, Cambridge.
Siahaan, A. (2007) Shopping trip and pedestrian behavior in a shopping mall, BSCE thesis,
Petra Christian University, Surabaya (in Indonesian).
Teknomo K. (2006) How Could Recent Pedestrian Technologies Assist You? Keynote
Lecture International Symposium on Lowland Technology September 12-14, 2006,
Saga, Japan
Teknomo, K., Takeyama, Y. and Inamura, H. (2000), Data Collection Method for Pedestrian
Movement Variables, Dimensi Teknik Sipil - Journal of Civil Engineering Science and
Technology, Vol. 2 no 1, pp. 43-48.
|
1610.06251 | 1 | 1610 | 2016-10-20T00:16:05 | DeepGraph: Graph Structure Predicts Network Growth | [
"cs.SI",
"cs.LG"
] | The topological (or graph) structures of real-world networks are known to be predictive of multiple dynamic properties of the networks. Conventionally, a graph structure is represented using an adjacency matrix or a set of hand-crafted structural features. These representations either fail to highlight local and global properties of the graph or suffer from a severe loss of structural information. There lacks an effective graph representation, which hinges the realization of the predictive power of network structures.
In this study, we propose to learn the represention of a graph, or the topological structure of a network, through a deep learning model. This end-to-end prediction model, named DeepGraph, takes the input of the raw adjacency matrix of a real-world network and outputs a prediction of the growth of the network. The adjacency matrix is first represented using a graph descriptor based on the heat kernel signature, which is then passed through a multi-column, multi-resolution convolutional neural network. Extensive experiments on five large collections of real-world networks demonstrate that the proposed prediction model significantly improves the effectiveness of existing methods, including linear or nonlinear regressors that use hand-crafted features, graph kernels, and competing deep learning methods. | cs.SI | cs | DeepGraph: Graph Structure Predicts Network Growth
Cheng Li1, Xiaoxiao Guo∗2, Qiaozhu Mei1,2
1School of Information, University of Michigan, Ann Arbor, MI, USA
2Department of EECS, University of Michigan, Ann Arbor, MI, USA
{lichengz, guoxiao, qmei}@umich.edu
6
1
0
2
t
c
O
0
2
]
I
S
.
s
c
[
1
v
1
5
2
6
0
.
0
1
6
1
:
v
i
X
r
a
ABSTRACT
The topological (or graph) structures of real-world networks are
known to be predictive of multiple dynamic properties of the net-
works. Conventionally, a graph structure is represented using an
adjacency matrix or a set of hand-crafted structural features. These
representations either fail to highlight local and global properties
of the graph or suffer from a severe loss of structural information.
There lacks an effective graph representation, which hinges the re-
alization of the predictive power of network structures.
In this study, we propose to learn the represention of a graph,
or the topological structure of a network, through a deep learn-
ing model. This end-to-end prediction model, named DeepGraph,
takes the input of the raw adjacency matrix of a real-world network
and outputs a prediction of the growth of the network. The ad-
jacency matrix is first represented using a graph descriptor based
on the heat kernel signature, which is then passed through a multi-
column, multi-resolution convolutional neural network. Extensive
experiments on five large collections of real-world networks demon-
strate that the proposed prediction model significantly improves the
effectiveness of existing methods, including linear or nonlinear re-
gressors that use hand-crafted features, graph kernels, and compet-
ing deep learning methods.
Categories and Subject Descriptors
H.4 [Information Systems Applications]: Miscellaneous
General Terms
Algorithms, Experimentation
Keywords
Graph Representation, Network Growth, Deep Learning
1.
INTRODUCTION
Today we are surrounded by real-world networks of people, in-
formation, and technology. These heterogeneous, large scale, and
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00.
fast evolving networks have provided a new perspective of scien-
tific research, which has resulted in a rapid development of new
theories, algorithms, and applications.
How to model and predict the dynamic properties of social or in-
formation networks has received considerable attentions recently [33,
42, 1, 27, 20, 35, 8]. These properties may include the size of the
network or a subgraph (e.g., size of a community), the influence of
cascades or contagions in the network (e.g., number of adopters),
metrics of individual nodes or structures (e.g., degree or diameter),
or even external properties that are not directly observed from the
network structure (e.g., prestige, productivity or revenue of a node
or a community). All these properties change over time, and their
dynamics can be generally referred to as the growth of a network1.
Indeed, the prestige of an individual node grows with the size of its
ego-network. The influence range of a diffusion grows with the size
of the diffusion network, subgraph of people who have adopted the
diffusion. Accurate prediction of network growth has many valu-
able applications. For example, predicting the growth of research
communities helps scientists to identify promising research direc-
tions; predicting the growth of social groups helps social network
vendors optimize their marketing strategies; predicting the growth
of the diffusion of a rumor helps analysts to estimate its potential
damage and apply intervention in time.
Taking a typical data mining perspective, most existing methods
extract features from both the network itself and any external in-
formation sources available. A function is learned that takes these
features as input and outputs a predicted value of the network prop-
erty in the future [1]. From many explorations on different genres
of networks, there has been a consensus in literature that features
extracted from the topological structure of the network (a.k.a., the
graph) are generally very informative in these prediction tasks [1,
8]. As a comparison, other types of information, e.g., content or
demographics, are only useful in certain scenarios. For example,
the content of a hashtag is predictive to its diffusion [43] and ho-
mophily (e.g., similar demongraphics) is predictive to the growth
of social groups [7], but these effects are not generalizable to other
networks and other dynamic properties. In this study, we focus on
investigating the predictive power of the graph structure of a net-
work on its growth.
Existing structural features are typically hand-crafted based on
theoretical and empirical findings in the social network literature.
For example, open triads with two strong ties are likely to be closed
in the near future [11]; dense communities are resistant to novel
information and they grow slower than others [16]; nodes span-
ning structural holes are likely to gain social capital and experience
a rapid growth of its prestige and other properties [6]. Features
1The growth refers to both the increment and decrement of the dy-
namic properties of the networks, i.e., positive or negative growth.
such as network density, clustering coefficients, triadic profiles,
and structural holes are therefore designed to implement these in-
tuitions and represent the graph structure.
Despite the success in predicting network growth, there are ob-
servable issues of representing the topological structure of a net-
work using these hand-crafted features. Some of them only de-
scribe a global property of the network, such as network density or
degree distribution; some of them provide a fine-grained descrip-
tion of local structures but fail to capture global information, such
as triads and other substructures; others lie between the two ex-
tremes, such as structural holes. None of these features is able to
fully represent both the local and the global structure of a graph
and the complex interaction between local and global properties.
On the other hand, these heuristic features usually have a limited
characterization power of networks, as many networks may share
the same feature representation. For example, most real-world net-
works at scale may have a similar (power-law) degree distribution,
and two very different networks may happen to have the same ratio
of closed triangles. Taking a machine-learning point of view, we
are intrigued by the following questions: what is a suitable repre-
sentation of network structure and how effective is such a represen-
tation when used to predict network growth?
Our answers to the two questions are inspired by the recent de-
velopments in deep learning and graph representation. We intro-
duce a graph descriptor that is based on the Heat Kernel Signature
(HKS) [31], which serves as a universal low-level representation
of the topological structures of networks. HKS has been success-
fully employed in representing the surface of 3D objects [13, 39].
By modeling the amount of heat flow over nodes of a network over
time, HKS successfully stores both the global and the local struc-
tural information of the entire network. Using a histogram to de-
scribe the probability distribution of heat values at a series of time
points [13, 39], isomorphic networks (networks with the same topo-
logical structure) can be mapped to a unique representation at little
loss of structural information. However, unlike 3D objects which
are composed of polygon meshes, the structures of networks vary
in shape, size, and complex local structures. To address this issue,
some computations of HKS need to be approximated carefully. In-
spired by the semantics of the HKS-based graph descriptors, we
propose a multicolumn, multiresolution neural network that learns
latent hierarchical representations of graphs on top of the HKS-
based graph descriptor. The proposed deep neural network, named
DeepGraph, predicts network growth in an end-to-end process.
We conduct extensive experiments to evaluate the effectiveness
of DeepGraph. Different growing properties are predicted for five
genres of real-world networks, including cascade networks and ego-
networks. Empirical results show that our method outperforms
baseline approaches that use alternative graph representations, hand-
crafted features, or existing deep learning architectures. High-level
representations learned by DeepGraph well connect to existing find-
ings in the social network literature.
The rest of the paper starts with Section 2, which summarizes the
related literature. In Section 3, we formulate the data mining prob-
lem and describe how HKS is used to represent the network struc-
ture and how the deep neural network is architected. We present
the design and the results of empirical experiments in Section 4
and Section 5, and then conclude the paper in Section 6.
2. RELATED WORK
Predicting the growth of networks or the evolution of certain
properties of networks has been widely studied. People attempt
to predict the dynamics of various network metrics or aggregated
activities in a network, e.g., the number of up-votes on Digg sto-
ries [33], the number of newly infected nodes in diffusion [42], the
growth of a community [1, 27], or the dynamics of a cascade [20,
35, 8]. In these studies, a set of problem-specific features are usu-
ally manually designed based on the network structure, textual con-
tent, user demographics, historical statistics, and other sources of
information. Among them, the features extracted from the network
structure are both effective in individual tasks and robust across dif-
ferent tasks. In this work, we limit our focus on information purely
from the network structure.
Finding a suitable representation of the topological structure of
a network has always been a critical preliminary step of network
analysis. Conventionally, a network is represented as an adjacency
matrix or a sparse list of edges. However, these lossless repre-
sentations do not effectively present the structural characteristics
of the network. Moreover, they are sensitive to the manipulation
of node orders, making networks with the same topological struc-
ture mapped to different representations. Other approaches repre-
sent the network structure with a series of network metrics and/or
a set of structural patterns (e.g., triads [19], quads [37], or meta-
paths [32]). Arbitrary higher-order substructures can be included,
such as communities and structural holes. These bag-of-substructures
better capture local patterns of the network structure.The major
problem of this approach is that it is computationally infeasible
to enumerate high-order substructures, and low-level substructures
have limited representation power of the global structure of the net-
work. As a result, many different networks may share the same or
similar bag-of-substructures.
In graph classification, a myriad of graph kernel methods are pro-
posed which compute pairwise similarities between graphs [17, 2,
30, 29]. For example, graphlets [29, 36] computes the graph sim-
ilarity based on the distribution of induced, non-isomorphic sub-
graphs. Some other graph kernels integrate frequent graph mining
into the model training process [28, 26]. Graph kernels provide an
indirect representation of networks so that similar structured net-
works yield a high value through the graph kernel function. The
burden of graph kernels is the design of effective kernels. In the
paper, we compare existing graph kernels to highlight the flexibil-
ity of our model.
Recently, researchers have started to apply deep learning to net-
work structure representation learning. Several proposals have been
made to learn a low-dimensional vector representation of individual
nodes by considering their neighborhood [34, 25, 15]. Deep learn-
ing techniques have also improved graph kernels for graph structure
learning[40, 41, 23]. Recently, Niepert et al. [24] applied convo-
lution over receptive fields constructed by sequence of neighboring
nodes. These methods focus only on the local structure of a graph
and graph kernels require expensive pairwise comparisons. In the
paper, we compare our model to these alternative deep learning ap-
proaches and show the performance advantage of our model.
Heat kernels have been studied for the task of graph cluster-
ing [3], graph partitioning [12], and modeling social network mar-
keting processes [21]. These applications rely on the raw output
of heat kernels for a variety of tasks, rather than developing a sig-
nature, nor do they abstract representation of graphs base on heat
kernels. In the community of computer vision, Heat kernel signa-
ture has been successfully used to model 3D objects [31, 13, 39],
whose surfaces are defined by polygon meshes, a network com-
posed of simple convex polygons. In contrast, real-world networks
are consist of various shapes, sizes, and local structures. How to
represent arbitary networks with heat kernel signatures and how to
predict network growth using such a signature remain a challenging
question to be studied.
3. DEEPGRAPH FOR NETWORK
GROWTH PREDICTION
We propose a unified predictive neural network model to learn
graph structure representation for network growth prediction prob-
lem. The proposed predictive model, named DeepGraph, combines
heat kernel signature and deep neural networks. Below we describe
the two key components of our model, (1) a heat kernel signa-
ture based graph descriptor and (2) a deep multi-column, multi-
resolution convolutional neural network, in turn, following a brief
definition of the network growth prediction problem.
3.1 Problem Formulation and Notations
Given a real-world network snapshot at time t, denote its graph
structure as G(t) = (V, E), with a set of nodes V and a set of
edges E. A node i ∈ V represents an entity (e.g., an actor in a
social network or a paper in a citation network), an edge (i, j) ∈
E represents a relationship (e.g., friendship, citation, or influence)
between node i and node j. An adjacency matrix W ∈ RV ×V
encodes the topological structure of the graph G. In this work, we
consider the binary adjacency matrix. Its element wij is 1 if and
only if (i, j) ∈ E and 0 otherwise.
A network property is a function that maps a graph structure
G(t) to a property value y(t) ∈ R. For example, a network prop-
erty could be the number of friends given a user's Facebook ego-
network. A network growth predictor is a function that maps a
graph structure G(t) to a property value y(t(cid:48)) at time t(cid:48), satisfy-
ing t(cid:48) > t. For example, a network growth predictor could map a
user's Facebook ego-network of this year to the number of friends
next year.
, y(t(cid:48)
The network growth prediction can be naturally formulated as
a supervised learning problem. Specifically, the problem is to de-
rive a network growth predictor f given a training set of tuples
)}M
{(G(ti)
i=1 to minimize the prediction error over a test set
of tuples {(G(tj )
j > tj,
minj(tj) > maxi(ti), and minj(t(cid:48)
i). The time order-
ing constraints highlights the practical motivation that we are inter-
ested in using historical data to predict future properties of current
networks.2 To apply a machine learning algorithm, it is critical to
first represent the graph G(t) computationally, such as using a vec-
tor of features.
j=1 satisfying ∀i t(cid:48)
)}N
i > ti, ∀j t(cid:48)
j) > maxi(t(cid:48)
(t(cid:48)
j )
j
Notice that such a representation can consider different sources
of information when a particular type of real-world network is con-
sidered: the graph structure, the profiles of the nodes, the semantics
of the edges, the activities of the nodes, and the information con-
tent being circled within the network. We focus our investigation
onto solely the graph (topological) structure, as the structural infor-
mation is ubiquitously available in all types of networks and it is
known to be predictive to the growth of the network. We leave a
multi-modal representation of the network for future work.
3.2 Heat Kernel Signature based
, y
j
i)
i
i
Graph Descriptors
The motivation in adopting Heat Kernel Signature (HKS) is its
theoretical proven properties in representing graphs: HKS is an in-
trinsic and informative representation for graphs [31]. Intrinsic-
ness means that isomorphic graphs map to the same HKS repre-
sentation, and informativeness means if two graphs have the same
HKS representation, then they must be isomorphic graphs. Our
2In practice, researchers focus on a specially case of the network
growth prediction problem with the equal interval increment con-
straint, t(cid:48)
i − ti = C > 0 [20, 35].
j − tj = t(cid:48)
HKS-based graph descriptor builds on the theoretical properties of
HKS and further provides universal representations for graph with
different sizes in network growth prediction.
Heat kernel function. Formally, the heat kernel hz(i, j), a func-
tion of two nodes i, j at any given diffusion step z, denotes the
amount of aggregated heat flow through all edges among two nodes
after diffusion step z3. In computer vision, graphs are stored as
meshed networks and heat kernels are computed by finding eigen-
functions of the Laplace-Beltrami operator [31]. However, meshed
networks are not available for most real-world networks. Instead,
we use eigenfunction expansion of a graph Laplacian [31, 3] to
compute the heat kernel for information networks. Given a graph
G = (V, E, W ), the graph Laplacian is defined as:
L = D − W
the summation of rows of W : Dii = (cid:80)
where D is a diagonal degree matrix with diagonal entries being
j wij. The normalized
(1)
Laplacian of the graph is given by
− 1
LN = D
2 LD
− 1
2
The heat kernel is then defined as
V (cid:88)
(2)
(3)
hz(i, j) =
−λkzφk(i)φk(j)
e
k=1
and φk is the k-th eigenfunction s.t.(cid:80)
where λk is the k-th eigenvalue of the normalized Laplacian LN
i φk(i)2 = 1. Note that the
eigenvalues might be unreal in the case of directed graphs. There
has been studies on how to tackle this problem [9]. In this work,
for simplicity, we convert directed graphs to undirected ones by
applying W = (W + W
)/2.
(cid:124)
Heat kernel signature. Heat kernel signature was introduced to
mitigate the computation bottleneck of using heat kernel functions
in representing graphs. Both heat kernel and heat kernel signature
are proven to be intrinsic and stable against noises. However, the
computation complexity of using heat kernel as a point signature
is overwhelming since the point signature, {kt(v, .)}t>0 , is de-
fined on the product of temporal and spatial domain. Heat kernel
signature simplifies the computation by considering only a subset
of product of temporal and spatial domain while keeping as much
information as possible. Specifically, heat kernel signature reduces
the computation complexity by only requiring hz(v, v) over a finite
set of N diffusion steps z ∈ {z1, z2, ..., zN} for ∀v ∈ V without
losing the intrinsic and informative properties.
Formally, a heat kernel signature (HKS) is a matrix H ∈ RV ×N
satisfying
Hij = hzj (i, i)
(4)
These time points are sampled with equal difference after loga-
rithm [31], such that log zn − log zn−1 = log zn+1 − log zn.
Graph descriptor. The practical issues in combining HKS and
deep neural networks are that we need a global vertex indexing to
guarantee the uniqueness and that the size depends on V . We
further process heat kernel signature H into a universal representa-
tion independent of V using a histogram conversion. Specifically,
3The diffusion is simulated for a given graph snapshot. The heat
kernel computation does not require graph snapshot at other times-
tamps. The diffusion step z should not be confused with the net-
work timestamp t.
3.3 Deep Graph Descriptor
As information abounds in the raw representation extracted by
the HKS-based graph descriptor, applying a simple regressor, e.g.,
linear regression, could fail to fully extract useful information from
it. In contrast, deep neural networks (DNN) have achieved tremen-
dous success in learning latent representations from raw inputs in a
compositional hierarchy. Combining DNN and HKS-based graph
descriptor together thus offers an opportunity to address the graph
structure representation challenges in predicting network growth.
Inspired by the semantics of the graph descriptors, we propose a
deep multicolumn, multiresolution convolutional neural networks
for the network growth prediction task.
Multiresolution convolutions. Our model builds on the multires-
olution 1-D convolution (MrConv) which maps an input matrix
into a feature map matrix. Specifically, let xi ∈ Rk denote the
i-th row of the input matrix. The input is then represented as
x1:n = ⊕n
i=1xi where ⊕ is the concatenation operator and n is
the number of rows. The 1-D convolution with a filter size m apply
a filter w ∈ Rmk to each possible window of m rows to produce
a new feature vector c = [c1, c2, ..., cn−m+1]. The feature ci is
generated from a window of m rows xi:i+m−1 by:
(cid:124)
ci = g(w
(5)
where b ∈ R is a bias term and g is a non-linear function such as a
hyperbolic tangent function or a rectified non-linearity function.
xi:i+m−1 + b)
We have described the process by which one feature vector c
is extracted from one filter. Our multiresolution convolution (Mr-
Conv) layer uses multiple filters with varying filter sizes to obtain
multiple resolution features. Specifically, one MrConv layer has
l different convolution filter sizes {m1, m2, ..., ml}. The filter of
size m generates a corresponding feature vector c(m). Feature vec-
tors generated by different filter sizes are then concatenated into
one vector c∗ = ⊕l
i=1c(mi). Moreover, we extend each filter size
to have d different filters. The final output feature map is a ma-
trix O where each column is a feature vector c∗ and there are d
columns.
O =
∗1, c
c
∗2, ..., c
(6)
(cid:16)
∗d(cid:17)
An example of our MrConv is shown in Figure 2(a). The exam-
ple MrConv layer has two different filter sizes {1, 2}. Each filter
size has three different filters, whose feature vectors form different
columns in the final feature map. Multiple multiresolution convo-
lution layers are stacked to form our model.
Multicolumn model. Inspired by the different semantics of rows
and columns in the HKS-based graph descriptor, our model de-
ploys a two network-column structure, as shown in Figure 2(b).
One column uses multiresolution 1-D convolution (MrConv) oper-
ations over the graph descriptor bins and the other one uses MrConv
over diffusion times. The two columns extract different features
from the graph descriptors at multiple resolution scales. Intuitively,
the first column extracts statistical features of the density dynamics
in diffusion. The second column extracts features on static den-
sity pattern for different diffusion steps. Both kinds of features
reflect the topology of the underlying graph structure, but explain
the structure topology from different perspectives. A single column
convolutional neural network can hardly extract such two kinds of
features successfully.
The feature maps from the two columns are then concatenated
and passed through multiple dense (i.e.
fully-connected) layers
with non-linear activation functions. The output from the multiple
(a)
(b)
(c)
(d)
Figure 1: Examples of HKS-based graph descriptors. The first
row shows our graph descriptors for graphs in the second row.
Figure (a) and (b) are subnetworks from Facebook [38]. Figure (c)
and (d) are some authors' collaboration networks built from ACL
Anthology [10].
we use histograms to estimate the distribution of HKS values in
each column4. By denoting NB the number of bins used in the
histogram, we obtain a universal descriptor S ∈ RNB×N . Unlike
HKS, the new descriptor is independent of vertex ordering and ver-
tex number. We call this final matrix graph descriptor, S(G), as it
is adapted to describe information networks. Figure 1 shows four
examples of our graph descriptors for real world graph structures.
Graph descriptor vs. adjacency matrix. We have described the
process in converting an adjacency matrix into our graph descrip-
tor, which is then passed through a deep neural network for further
feature extraction. All computation in this process is to obtain a
more effective low-level representation of the topological structure
information than the original adjacency matrix.
First, isometric graphs could be represented by many different
adjacency matrices, while our graph descriptor would provide a
unique representation for those isometric graphs. The unique repre-
sentation simplifies the neural network structures for network growth
prediction.
Second, our graph descriptor provides similar representations for
graphs with similar structures. The similarity of graphs is less pre-
served in adjacency matrix representation. Such information loss
could cause great burden for deep neural networks in growth pre-
diction tasks.
Third, our graph descriptor is a universal graph structure repre-
sentation which does not depend on vertex ordering or the number
of vertexes, while the adjacency matrix is not.
Time complexity. The major overhead of computing graph de-
scriptors lies in the calculation of eigenvectors. The time complex-
ity of computing eigenvectors is O(KV 2) where K is the num-
ber of eigenvectors. Our graph descriptors finish in acceptable time
frame for real world network data. The data description and time
complexity analysis are in Section 4.
Semantics of graph descriptor. The rows and columns in our
graph descriptor reflect the network topology from different per-
spectives. The rows express the heat density dynamics over diffu-
sion steps, and the columns capture the static heat density patterns
for a given diffusion step. Successive rows or columns express
higher-order properties of the topology structure information. Such
representational properties motivate the adoption of row-wise and
column-wise convolution networks for feature learning.
4The bin ranges are aligned column-wise on the training data.
Figure 2: (a) An example of the multiresolution convolution unit with two kernel sizes. (b) An example of the multicolumn, multires-
olution deep neural network model for network growth prediction with two convolution layers.
dense layers are then passed through a final linear fully-connected
layer with only one output unit. The output unit y is thus the net-
work growth prediction of our model.
3.4 End-to-End Training
Let McMrConv(., θ) denote the multicolumn multiresolution con-
volutional neural network with parameters θ. The final output of
our neural network given a graph Gk is represented as:
yk = McMrConv(S(Gk), θ)
(7)
Given a training data set {(Gk, yk)}K
is trained to minimize the average squared error.
k=1, the deep neural network
K(cid:88)
(cid:16)
k=1
L(θ) =
1
K
McMrConv(S(Gk), θ) − yk
(8)
(cid:17)2
The HKS-based graph descriptor and the deep neural network as-
sembles DeepGraph, an end-to-end deep architecture to predict net-
work growth based on graph structure.
4. EXPERIMENT SETUP
We compare our model with existing approaches, including hand-
crated feature based linear or nonlinear regression, graph kernels
and alternative deep learning approaches, on the network growth
prediction problem. We then evaluate variants of our model to as-
sign the credit of the two key components, the HKS-based graph
descriptor and the deep neural network.
4.1 Data sets
When selecting real-world data sets for evaluation, we consider
both popularity and diversity of the application scenarios. The five
data sets we choose include social networks, scientific collabora-
tion networks, information diffusion networks, and entertainment
networks. Note that to train and test the network growth prediction
algorithm, it is desirable to obtain a large number of time-variant
networks, which is not directly available (e.g., there is one global
Facebook network). So following [40], from each large network
we extract the ego-networks (subgraph consisting of the neighbors
of an "ego" node) of many individual nodes. The statistics of these
data sets are presented in Table 1. Please note that due to the di-
verse nature of the data sets and the various precision of timestamps
available, it is hard to apply an unified time frame for all data sets.
Viewed from another perspective, this helps us evaluate the flex-
ibility and generality of our methods, verifying whether it can be
applied to any length and granularity of time frames.
12990
890
2092
399.9
397.5
436
6800.8
6764.4
7499.2
15258
1283
3273
147.6
167.3
165.8
1439.2
1626.1
1620.9
Table 1: Statistics of the data sets.
Dataset Facebook YouTube AAN IMDB Weibo
12500 14614
train
8426
1092
1017
val
713
2555
2407
test
1722
71.1
197.3
train
271.4
76.6
208
val
302.4
test
216
64.9
402.4
55.6
train
2079.8 7801.5
2327.2 7847.7
val
95.8
3321.8 7964.5 100.1
test
15.4
train
val
16.7
test
14.1
train
val
test
train
val
test
train
val
test
all
1.3
1.3
1.3
1
1
0.9
2000
2001
2002
2001
2002
2003
1.2
1.2
1.2
0.9
0.9
0.9
2009
2010
2011
2010
2011
2012
2007.6
2007.7
2007.8
2007.10
2007.11
2007.12
2
1.8
1.9
5h
5h
5h
3h
3h
3h
-
2007.2
2007.3
2007.4
2007.4
2007.5
2007.6
2
9
10.8
9.3
2.4
2.2
2.1
3.6
3.8
3.4
1.7
1.8
1.6
3
2
2
# graphs
Avg. nodes
Avg. edges
Avg. growth
Avg. scaled
growth1
Graph time2
Growth time3
k-hop ego-net4
1. Avg. scaled growth scales label y to log2(y + 1) [20, 35].
2. Graph time of 2007.6 means the graph is built by taking the snapshot of
Jun. 1, 2007. For diffusions in Weibo, we use the first 5 hours to build
graph, and the next 3 hours to compute growth.
3. Growth time of 2007.10 means the growth is computed between its
corresponding graph time to Oct. 1, 2007. Graphs in train/val/test set do
not overlap.
4. k-hop ego-net for AAN is set to 3, due to its small size of 2-hop
ego-nets. Weibo contains diffusion networks rather than ego-nets.
We follow the procedure described in [40] to construct ego-nets.
The Facebook data set is collected from the New Orleans networks [38],
where nodes are Facebook users and edges are friendships. We de-
rive the snapshot of ego-networks for each user according to the
timestamps listed in Table 1, which is used to predict the number
of new friends this user made in the next four months.
As the YouTube [22] data set also describes user friendships, it
#1
conv.
#2
conv.
dense
layers
bins
*mes
bins
*me
#1
conv.
#2
conv.
#1
conv.
#2
conv.
#1
conv.
#2
conv.
convolu*on
layers
over
bins
convolu*on
layers
over
*mes
output
unit
input
input
HKS
transpose
Graph
Structure
input
feature
map
output
kernel
size
1
kernel
size
2
kernel
size
1
(a)
(b)
follows the same setting as Facebook.
The AAN data set [10] is built upon scientific publications from
the ACL Anthology5, where nodes are authors and edges are col-
laboration. Each author's ego-nets are extracted to predict her h-
index in the next year.
IMDB is a movie co-star data set6, where nodes are actors or
actresses, and an edge is formed if they appear in the same movie.
The ego-nets of each actor/actress is used to predict the number of
new movies the actor/actress produced in the next year.
The Weibo data set [44] contains a set of Sina Weibo users with
their complete following-followee relationships, as well as 300,000
retweeting paths among these users. For an original tweet we con-
struct its diffusion network, which is the subgraph (of the following-
followee graph) with users who retweeted the tweet within the first
5 hours of the original tweet. We then predict the growth of this
diffusion network in the next 3 hours (i.e., the number of new users
who retweet this tweet). For simplicity, we ignore the direction of
the edges and treat all graphs as undirected.
To examine whether we can truly predict future growth, we make
sure of two important points: (1) the period to compute growth for
test set is always later than that for training set; (2) one graph can
only appear in one of the training, validation and test set. For Weibo
data set, we sort all diffusion graphs by time of occurrence, and take
the earliest 80 percent graphs for training, the next 5 percent for val-
idation, and the last 15 percent for testing. For other data sets, for
each node in the global network, they are randomly assigned to the
training/validation/test set with probability of 0.8/0.05/0.15. Based
on which set they are in, their ego-nets and growth are computed
according to the time listed in Table 1. If a node has not yet been
created for the given time, it is simply removed.
We notice that the growth of all the networks in general follows
a power-law distribution, where a large number of networks did
not grow at all. Therefore we downsampled 50% graphs of each
train/val/test set with zero growth (to the numbers shown in Ta-
ble 1) and applied a logarithm transformation of the outcome vari-
able (network growth), following [20, 35]. The network growth
are scaled logarithmically for two reasons. First, baseline methods
with linear regression are sensitive to extremely large outcomes.
Second, when a network grows to a considerably large scale, we
care more about its scale rather than the exact number.
Please note that our method is not limited to ego-networks – data
set Weibo is a set of diffusion graphs of tweets.
4.2 Evaluation Metric
We use mean squared error (MSE) as our evaluation metric, which
is a common choice for regression tasks. Specifically, denote y a
prediction value, and y the ground truth value, the MSE is:
n(cid:88)
i=1
MSE =
1
n
(yi − yi)2
(9)
As noted before, y in above equation is a scaled version of the
original value yo, that is y = log2(yo + 1).
4.3 Baseline methods
We compare DeepGraph with methods from two categories: feature-
based methods used for network prediction tasks, and alternative
graph representation methods.
Feature based. Many structural features have been designed for
various network prediction tasks [1, 27, 35, 8]. We select from
them those that could be generalized across data sets, including:
5http://aclweb.org/anthology/
6http://www.imdb.com/
Frequencies of k-node substructures (k ≤ 4)[37]. This counts
the number of nodes (k = 1), edges (k = 2), triads (e.g., the
number of closed and open triangles) and quads.
Other network properties: average degree, the length of the short-
est path, edge density, the number of leaf nodes (nodes with degree
1), the number of leaf edges, the average closeness of all nodes,
clustering coefficient, diameter, and the number of communities
obtained by a community detection algorithm [4].
Graph kernels. Following [24], we compare with four state-of-
the-art graph kernels: the shortest-path kernel (SP) [5], the random
walk kernel (RW) [14], the graphlet count kernel (GK) [29], and
the Weisfeiler-Lehman subtree kernel (WL) [30]. In our experi-
ment, the RW kernel does not finish after 10 days for a single data
set, so we exclude it for comparison. This exclusion is also ob-
served for the same reason in [24, 41].
-linear and -deep. Feature based methods and graph kernels are
usually trained on SVMs. We report linear regression instead, as
SVM empirically generates poor results for our regression tasks.
We append -linear to each method to indicate usage of linear re-
gression. To obtain even stronger baselines, we apply deep learning
to both feature vectors and graph kernels, indicated by -deep.
Smoothed graph kernels. Yanardag et al. [41] apply smoothing
to graph kernels, which extends their method of deep graph ker-
nels [40] by considering structural similarity between sub-structures.
We report smoothed results only on deep neural networks as it out-
performs alternatives empirically.
PSCN, which applies convolutional neural networks (CNN) to
locally connected regions from graphs [24], achieving better results
over graph kernels on some of the classification data sets.
Hyper-parameters. All hyper-parameters are tuned to obtain
the best results on validation set. For linear regression, we chose the
L2-coefficient from {100, 10−1, ..., 10−7}. For neural network re-
gression, the initial learning rate is selected from {0.1, 0.05, 0.01,
..., 10−4}, the number of hidden layers from {1, 2, ..., 4}, and the
hidden layer size from {32, 64, ..., 1024}. The size of the graphlets
for GK is chosen from {3, 4} (higher than 4 is extremely slow), the
height parameter of WL from {2, 3, 4}, the discount parameter for
smoothed graph kernels from {1, 0.8, ..., 0}. Following [24] for
PSCN, the width is set to the average number of nodes, and the
receptive field size is chosen between 5 and 10.
Notes. Please notice that in our experiments we are not iden-
tifying the nodes in the networks or using the information of the
nodes outside the network itself. Of course, knowing the presi-
dent of United States is in the network provides more confidence
on its growth. We choose not to identify nodes because (1) this
study focuses on investigating the predictive power of the topolog-
ical structure of networks, and (2) in practice information about
individual nodes may not be available for privacy reasons. For the
same reasons, we do not include any information other than the
network structure (e.g., content of tweets, or historical metrics of
the network) in the prediction task, even though including more
information may improve the prediction accuracy.
It is also worth mentioning that even though most networks in
our data sets are subgraphs of a much larger network (e.g., the
Facebook friendship network), we only use the structure within the
subgraphs and do not touch the outside structure of the global net-
work. This is because partitioning a large network into subgraphs is
just a way to create abundant networks for training and testing the
model. In reality we may make predictions of an entire network, or
the global structure outside a network may not be observable.
4.4 DeepGraph Model Parameters
Hyper-parameters and Preprocessing. For parameters included
in HKS, we set them to default values across all data sets without
further tuning.
In Equation 4, we set t1 = 0.1, tN = 25, and
N = 64. Number of bins NB is set to 64. In order to compute his-
tograms, HKS values above +1.2 and below −1.2 standard devia-
tion are respectively put to the first and last bins. Values in between
are assigned to the remaining equally divided 62 bins.
We perform standard normalization for the histograms of graphs.
Each histogram is preprocessed by pixel-wise normalization. We
compute the mean and standard deviation for each pixel over the
training data set. Then each pixel is normalized by subtracting the
corresponding mean value and being divided by sd7 .
We initialize the parameters of the neural networks using a Gaus-
sian distribution with zero mean and unit standard deviation. An
adaptive optimizer, Adam, is used to optimize the parameters of the
neural networks. Default hyper-parameters of Adam are used [18].
Structure related hyper-parameters of DeepGraph is set to be the
same across datasets. There are two multiresolution convolution
layers for each network column, with number of filters 32 and 16.
For each convolution layer, we apply three sizes of filters, which
are 2, 4, and 6. TanH is used as the activation function. There are
two fully connected layers both of size 256. Dropout is applied to
the last two dense layers with probability of 0.5. Other learning
parameters are listed in Table 2.
Table 2: Setup of hyper-parameters for DeepGraph.
Facebook YouTube AAN IMDB Weibo
0.005 1e-5
1e-6
5e-4 0.005 0.001
L2-coefficient
Init learning rate
1e-5
0.005
1e-5
0.01
4.5 Variants of DeepGraph
To assign the credit of each key component in our DeepGraph
model, we also experiment with some of its variants, by feeding our
graph descriptor (GD) to a linear regressor (GD-linear), a standard
convolutional neural network (GD-CNN), and a multilayer percep-
tron (GD-MLP). Hyper-parameters for these models are tuned sim-
ilarly as baselines.
5. EXPERIMENT RESULTS
5.1 Overall performance
The overall performance of all competing methods across data
sets are displayed in 3. We make the following observations. First,
integrating graph descriptor with deep learning, our method Deep-
Graph outperforms all competing methods significantly. This em-
pirically confirms that graph descriptor could preserve more in-
formation of the network structure than bag-of-substructures, both
globally and locally. In contrast, utilizing manually designed fea-
tures could lead to loss of information.
GD-MLP and GD-CNN have already gain improvement over
the strongest baseline on most of the data sets, while DeepGraph
can further improve the performance by utilizing the semantics of
HKS-based graph descriptor. This shows that we can indeed ex-
tract more useful features by applying column-wise and row-wise
convolution over graph descriptors.
Comparing with GD-linear, which applies linear regression on
top of the HKS-based graph descriptor, DeepGraph, GD-MLP, and
GD-CNN performs significantly better. This indicates that the ef-
fectiveness of the HKS-based graph descriptor has to be utlized by
7 = 10−8 is added to the denominator to avoid numeric issues.
Table 3: Performance measured by MSE (the lower the better),
where original label y is scaled to log2(y + 1).
Dataset
Facebook YouTube
Feature-deep
2.623
1.107
2.633
1.116
Feature-linear
GK-smooth 1.313∗∗∗ 2.675∗∗∗
1.315∗∗∗ 2.671∗∗∗
GK-deep
1.335∗∗∗ 2.736∗∗∗
GK-linear
WL-smooth 1.158∗∗∗
2.659
1.165∗∗
WL-deep
2.654
1.331∗∗∗ 2.702∗∗∗
WL-linear
2.615
SP-smooth
1.138
1.155∗∗
2.607
SP-deep
1.179∗∗∗
SP-linear
2.613
2.534∗∗∗
1.117
PSCN
AAN
0.421
0.439
0.480∗∗∗
0.492∗∗∗
0.519∗∗
0.434
0.437
0.445
0.422
0.428
0.432
0.425
IMDB
0.527
0.525
0.561∗∗
0.565∗∗
0.576∗∗∗
0.536
0.532
0.596∗∗∗
0.530
0.531
0.535
0.528
Proposed methods
0.583∗∗∗
GD-linear
0.513∗
GD-MLP
0.512∗
GD-CNN
DeepGraph 1.068∗∗(cid:79) 2.409∗∗∗(cid:79)(cid:79) 0.379∗∗∗ 0.508∗∗∗(cid:79)
1.174∗∗∗ 2.750∗∗∗
2.427∗∗∗
1.082∗
2.429∗∗∗
1.087
0.587∗∗∗
0.394∗∗∗
0.391∗∗∗
Weibo
2.244
2.346∗∗∗
3.011∗∗∗
3.061∗∗
3.242∗∗∗
2.397∗∗∗
2.403∗∗∗
2.411∗∗∗
2.315∗∗∗
2.322∗∗∗
2.359∗∗∗
2.441∗∗∗
2.812∗∗∗
2.080∗∗∗
2.114∗∗∗
1.961∗∗∗(cid:79)(cid:79)(cid:79)
"***(**)" means the result is significantly better or worse over
Features-dp according to paired t-test test at level 0.01(0.1). "(cid:79)" means
DeepGraph-multi is better than the better one between DeepGraph-MLP
and DeepGraph-CNN.
a "deeper" model which explores the convolutions and non-linear
transformations of the low-level representation.
Comparing feature based methods with other baselines, the for-
mer exhibit strong prediction power. Incorporating both local and
global information of the networks, the hand-crafted features are
very indicative of the network growth, which is hard for automatic
methods to compete.
When trained on deep networks, the performance of graph ker-
nels could be improved over their linear version. Smoothing ker-
nels can further bring in some improvement. By applying convolu-
tion over locally connected regions of the graphs, PSCN can beat
many graph kernels on most data sets. These results are consistent
with previous studies [24, 41].
5.2 Computational Cost of DeepGraph
Training of DeepGraph is very fast. The models are converged
in less than 10 minutes on a Titan X GPU. The major overhead
of DeepGraph is the computation of the HKS-based graph descrip-
tors. We empirically measure the computation time for all data sets
on a server with 2.40 GHz CPU and 120G RAM. The graphs in
our data sets have size as large as 5,000 nodes and 200,000 edges,
which is enough for most network prediction problems [20, 27,
42]. The generation of graph descriptors takes an average of 0.86
hour per data set. In contrast, the strongest baseline, feature based
method, takes 7.9 hours on average to generate all features. While
the strongest graph kernel, SP, takes nearly 5 days.
5.3 Feature Analysis
It has been shown empirically that DeepGraph could well ab-
It is intriguing to
stract high-level features to represent graphs.
know whether these learned features correspond to well-known struc-
tural patterns in network literature. To this end, we select some of
the network properties manually computed for the feature based
method. Note that we work only on test set, as we care more about
the prediction performance. These properties characterize either
global or local aspects of networks, and are listed in Figure 3.
(a) # edges.
(b) # closed triangles.
(c) # leaf nodes.
(d) # open triangles.
(e) # communities.
(f) Edge density.
(g) Growth (Size).
(h) Growth (h-index).
Figure 3: Feature visualization. One point is a graph in
test set. The layout is produced from high-level representa-
tions of DeepGraph, colored using structural, hand-crafted
network properties, which are presented under each sub-
figures. Red (blue) color indicates high (low) property val-
ues. The left column displays graphs from Weibo, while
the right column shows AAN. The bottom row displays the
ground-truth growth of the network properties.
The feature vectors output by the last hidden layer of DeepGraph
are fed to t-SNE [4], a dimensionality reduction algorithm for visu-
alizing high-dimensional data sets. The visualizations of data sets
Weibo and AAN are displayed in Figure 3. We obtain similar re-
sults on other data sets, which are omitted to conserve space.
To connect the hand-crafted structural properties with the learned
high-level features, we color individual graphs by the values of
these properties (e.g., network density). Patterns on the distribu-
tion of colors could suggest a connection between learned features
and the network property.
As we could observe, properties on left column of Figure 3 ex-
hibit some related patterns. For example, in the Figure 5(e), the
graphs clustered to the top have the fewest communities, while
graphs in the bottom right corner have the most. This is interesting
as an ego-net with a larger number of communities implies that the
graph center lies in between bigger communities, which are likely
to be structural holes in the global network. According to social
network literature [6], nodes spanning structural holes are likely to
gain social capital, promoting the growth of its ego-net. Indeed,
when we compare the color scheme of 5(e) with 5(g), which plots
the actual growth of the network sizes, we can see that the number
of communities in a diffusion network is indeed positively corre-
lated with the growth of the diffusion network.
Top three figures on the right column also show some common
characteristics: the left cluster forms a band, with lower values on
the bottom and higher ones on the top. Graphs with higher values
mostly cluster to the right area.
These common patterns suggest that the high-level features out-
put by deep learning have indeed captured these network proper-
ties. As we include both local and global properties, we demon-
strate from another perspective that DeepGraph could learn global-
to-local structural information from the network topology. Com-
paring to 5(h), which plots the actual growth of the h-index of
the ego-nodes, we can see the correlation of the features are much
weaker than those in the left column (Weibo network). This is not
surprising, as h-index is a property that can not be directly derived
from the network itself, and thus the prediction task is much harder.
Some additional observations can be made from Figure 3. First,
as the number of open and closed triangles are actually features of
graphlets [29, 36], we can see that DeepGraph has automatically
learned these useful features without human input. Second, since
edge density is a function of the number of edges and nodes, Deep-
Graph not only learns the number of edges and nodes (we do not
show the node property in Figure 3, but this is true), but also their
none-linear relationship that involves division.
5.4 Error Analysis
Graphs in our data sets typically have hundreds of nodes, which
is hard for humans to directly generalize useful information from
a set of graphs. As a compromise, we characterize graphs by a set
of simple network properties, e.g., the number of nodes, edges, and
edge density.
We first want to investigate graphs for which DeepGraph makes
more mistakes than baseline, and also the other way around. Here
we use the strongest baseline, feature-based method as our refer-
ence. The procedure is as follows: among graphs where Deep-
Graph has smaller MSE than the baseline, we select the top 100
with the largest MSE differences between the two methods. For
these top graphs, we compute the average of the properties men-
tioned above. Similar procedure is also applied to the baseline.
The statistics of graphs where either DeepGraph or the base-
line significantly outperforms the other are higher than the average
statistics of each data set. This could result form the skewed distri-
bution of the data set – a large number of graphs are of smaller size,
leading to more training instances of small graphs. We also observe
that both methods perform reasonably well on denser networks.
On the other hand, graphs on which DeepGraph performed better
have relatively larger sizes than those where the baseline performed
better. This indicates that the HKS representation has an advantage
on larger graphs, the structures of which are more difficult to be
represented by a bag of local substructures.
6. CONCLUSION
We present a novel neural network model that predicts the growth
of network properties based on its graph structure. This model,
DeepGraph, computes a new representation of the graph structure
based on heat kernel signatures. A multi-column, multi-resolution
convolution neural network is designed to further learn the high-
level representations and predict the network growth in an end-to-
end fashion. Experiments on large collections of real-world net-
works prove that DeepGraph significantly outperforms methods based
on hand-crafted features, graph kernels, and competing deep learn-
ing methods. The higher-level representations learned by Deep-
Graph well correlate with findings and theories in social network
literature, showing that a deep learning model can automatically
discover meaningful and predictive structural patterns in networks.
Our study reassures the predictive power of network structures
and suggests a way to effectively utilize this power. A meaningful
future direction is to integrate network structure with other types
of information, such as the content of information cascades in the
network. A joint representation of multi-modal information may
maximize the performance of particular prediction tasks.
HighLow7. REFERENCES
[1] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan.
Group formation in large social networks: membership,
growth, and evolution. In Proc. of SIGKDD, 2006.
[2] L. Bai, L. Rossi, A. Torsello, and E. R. Hancock. A quantum
jensen–shannon graph kernel for unattributed graphs. Pattern
Recognition, 2015.
[3] X. Bai and E. R. Hancock. Heat kernels, manifolds and
graph embedding. In Structural, Syntactic, and Statistical
Pattern Recognition. Springer, 2004.
[4] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and
E. Lefebvre. Fast unfolding of communities in large
networks. JSTAT, 2008.
[5] K. M. Borgwardt and H.-P. Kriegel. Shortest-path kernels on
graphs. In Proc. of ICDM, 2005.
[6] R. S. Burt. The network structure of social capital. Research
in organizational behavior, 2000.
[7] R. Chen, Y. Chen, Y. Liu, and Q. Mei. Does team
competition increase pro-social lending? evidence from
online microfinance. Games and Economic Behavior, 2015.
[8] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and
J. Leskovec. Can cascades be predicted? In Proc. of WWW,
2014.
[9] F. Chung. Laplacians and the cheeger inequality for directed
graphs. Annals of Combinatorics, 2005.
[10] B. G. P. M. Dragomir R. Radev, Mark Thomas Joseph. A
Bibliometric and Network Analysis of the field of
Computational Linguistics. JASIST, 2009.
[11] D. Easley and J. Kleinberg. Networks, crowds, and markets:
Reasoning about a highly connected world. Cambridge
University Press, 2010.
[12] Y. Fang, M. Sun, and K. Ramani. Heat-passing framework
for robust interpretation of data in networks. PloS one, 2015.
[13] Y. Fang, J. Xie, G. Dai, M. Wang, F. Zhu, T. Xu, and
E. Wong. 3d deep shape descriptor. In Proc. of CVPR, 2015.
[14] T. Gärtner, P. Flach, and S. Wrobel. On graph kernels:
Hardness results and efficient alternatives. In Learning
Theory and Kernel Machines. 2003.
[15] A. Grover and J. Leskovec. node2vec: Scalable feature
learning for networks. In Proc. of SIGKDD, 2016.
[16] R. Guimera, B. Uzzi, J. Spiro, and L. A. N. Amaral. Team
assembly mechanisms determine collaboration network
structure and team performance. Science, 2005.
[17] H. Kashima, K. Tsuda, and A. Inokuchi. Kernels for graphs.
Kernel methods in computational biology, 2004.
[18] D. Kingma and J. Ba. Adam: A method for stochastic
optimization. Proc. of ICLR, 2015.
[19] G. Kossinets and D. J. Watts. Empirical analysis of an
evolving social network. science, 2006.
[20] A. Kupavskii, L. Ostroumova, A. Umnov, S. Usachev,
P. Serdyukov, G. Gusev, and A. Kustarev. Prediction of
retweet cascade size over time. In Proc. of CIKM, 2012.
[21] H. Ma, H. Yang, M. R. Lyu, and I. King. Mining social
networks using heat diffusion processes for marketing
candidates selection. In Proc. of CIKM, 2008.
[22] A. Mislove. Online Social Networks: Measurement,
Analysis, and Applications to Distributed Information
Systems. PhD thesis, 2009.
[23] A. Narayanan, M. Chandramohan, L. Chen, Y. Liu, and
S. Saminathan. subgraph2vec: Learning distributed
representations of rooted sub-graphs from large graphs. In
Workshop on Mining and Learning with Graphs, 2016.
[24] M. Niepert, M. Ahmed, and K. Kutzkov. Learning
convolutional neural networks for graphs. 2016.
[25] B. Perozzi, R. Al-Rfou, and S. Skiena. Deepwalk: Online
learning of social representations. In Proc. of SIGKDD,
2014.
[26] S. Ranu and A. K. Singh. Graphsig: A scalable approach to
mining significant subgraphs in large graph databases. In
Proc. of ICDE, 2009.
[27] D. M. Romero, C. Tan, and J. Ugander. On the interplay
between social and topical structure. Proc. of ICWSM, 2013.
[28] H. Saigo, S. Nowozin, T. Kadowaki, T. Kudo, and K. Tsuda.
gboost: a mathematical programming approach to graph
classification and regression. Machine Learning, 2009.
[29] N. Shervashidze, T. Petri, K. Mehlhorn, K. M. Borgwardt,
and S. Vishwanathan. Efficient graphlet kernels for large
graph comparison. In International conference on artificial
intelligence and statistics, pages 488–495, 2009.
[30] N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen,
K. Mehlhorn, and K. M. Borgwardt. Weisfeiler-lehman
graph kernels. JMLR, 2011.
[31] J. Sun, M. Ovsjanikov, and L. Guibas. A concise and
provably informative multi-scale signature based on heat
diffusion. In Computer graphics forum, 2009.
[32] Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu. Pathsim: Meta
path-based top-k similarity search in heterogeneous
information networks. In Proc. of VLDB, 2011.
[33] G. Szabo and B. A. Huberman. Predicting the popularity of
online content. Communications of the ACM, 2010.
[34] J. Tang, M. Qu, and Q. Mei. Pte: Predictive text embedding
through large-scale heterogeneous text networks. In Proc. of
SIGKDD, 2015.
[35] O. Tsur and A. Rappoport. What's in a hashtag?: content
based prediction of the spread of ideas in microblogging
communities. In Proc. of WSDM, 2012.
[36] J. Ugander, L. Backstrom, and J. Kleinberg. Subgraph
frequencies: Mapping the empirical and extremal geography
of large graph collections. In Proc. of WWW, 2013.
[37] J. Ugander, L. Backstrom, C. Marlow, and J. Kleinberg.
Structural diversity in social contagion. Proc. of the National
Academy of Sciences, 2012.
[38] B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On
the evolution of user interaction in facebook. In Proc. of
WOSN, 2009.
[39] J. Xie, Y. Fang, F. Zhu, and E. Wong. Deepshape: Deep
learned shape descriptor for 3d shape matching and retrieval.
In Proc. of CVPR, 2015.
[40] P. Yanardag and S. Vishwanathan. Deep graph kernels. In
Proc. of SIGKDD, 2015.
[41] P. Yanardag and S. Vishwanathan. A structural smoothing
framework for robust graph comparison. In NIPS, 2015.
[42] J. Yang and J. Leskovec. Modeling information diffusion in
implicit networks. In Proc. of ICDM, 2010.
[43] L. Yang, T. Sun, M. Zhang, and Q. Mei. We know what@
you# tag: does the dual role affect hashtag adoption? In
Proc. of WWW, 2012.
[44] J. Zhang, B. Liu, J. Tang, T. Chen, and J. Li. Social influence
locality for modeling retweeting behaviors. In IJCAI, 2013.
|
1211.4783 | 3 | 1211 | 2013-05-13T16:02:14 | Inference of the Russian drug community from one of the largest social networks in the Russian Federation | [
"cs.SI",
"physics.soc-ph"
] | The criminal nature of narcotics complicates the direct assessment of a drug community, while having a good understanding of the type of people drawn or currently using drugs is vital for finding effective intervening strategies. Especially for the Russian Federation this is of immediate concern given the dramatic increase it has seen in drug abuse since the fall of the Soviet Union in the early nineties. Using unique data from the Russian social network 'LiveJournal' with over 39 million registered users worldwide, we were able for the first time to identify the on-line drug community by context sensitive text mining of the users' blogs using a dictionary of known drug-related official and 'slang' terminology. By comparing the interests of the users that most actively spread information on narcotics over the network with the interests of the individuals outside the on-line drug community, we found that the 'average' drug user in the Russian Federation is generally mostly interested in topics such as Russian rock, non-traditional medicine, UFOs, Buddhism, yoga and the occult. We identify three distinct scale-free sub-networks of users which can be uniquely classified as being either 'infectious', 'susceptible' or 'immune'. | cs.SI | cs | Inference of the Russian Drug Community from One of the Largest
Social Networks in the Russian Federation
L.J. Dijkstra · A.V. Yakushev · P.A.C. Duijn · A.V. Boukhanovsky · P.M.A. Sloot
3
1
0
2
y
a
M
3
1
]
I
S
.
s
c
[
3
v
3
8
7
4
.
1
1
2
1
:
v
i
X
r
a
10 May 2013
Abstract The criminal nature of narcotics complicates the
direct assessment of a drug community, while having a good
understanding of the type of people drawn or currently us-
ing drugs is vital for finding effective intervening strateg ies.
Especially for the Russian Federation this is of immediate
concern given the dramatic increase it has seen in drug abuse
since the fall of the Soviet Union in the early nineties. Using
unique data from the Russian social network ‘LiveJournal’
with over 39 million registered users worldwide, we were
able for the first time to identify the on-line drug community
by context sensitive text mining of the users’ blogs using a
dictionary of known drug-related official and ‘slang’ termi -
nology. By comparing the interests of the users that most ac-
tively spread information on narcotics over the network wit h
the interests of the individuals outside the on-line drug com-
munity, we found that the ‘average’ drug user in the Russian
L.J. Dijkstra and A.V. Yakushev share first authorship of thi s work.
L.J. Dijkstra · P.M.A. Sloot
Computational Science Department, University of Amsterdam (UvA),
The Netherlands.
E-mail: [email protected]
A.V. Yakushev · L.J. Dijkstra · A.V. Boukhanovsky · P.M.A. Sloot
High-Performance Computing Department, National Research Univer-
sity of Information Technologies, Mechanics and Optics (NRU ITMO),
Saint Petersburg, Russia.
E-mail: [email protected]
P.A.C. Duijn
Criminal Intelligence Analysis, Dutch Police, The Netherlands.
E-mail: [email protected]
A.V. Boukhanovsky
E-mail: avb [email protected]
P.M.A. Sloot (corresponding author)
School of Computer Engineering (SCE), Nanyang Technological Uni-
versity (NTU), Singapore.
Tel.: +31 (0) 20 525 7537
Fax: +31 (0) 20 525 7419
E-mail: [email protected]
Federation is generally mostly interested in topics such as
Russian rock, non-traditional medicine, UFOs, Buddhism,
yoga and the occult. We identify three distinct scale-free
sub-networks of users which can be uniquely classified as
being either ‘infectious’, ‘susceptible’ or ‘immune’.
Keywords Illicit drug use · Social network · LiveJournal ·
Power-law · Russian Federation
1 Introduction
Since the fall of the Soviet Union in the early nineties drug
abuse has seen a dramatic increase in the Russian Federa-
tion. From 1990 to 2001 the number of registered drug ad-
dicts and drug-related crimes went up a nine- and fifteen-
fold respectively (Sunami, 2007) and continued to rise over
the last decade (Mityagin, 2012). The rapid spread and ex-
tent of this ‘drug epidemic’ is of immediate concern to the
Russian government and finding effective ways to halt this
trend is considered to be of outmost importance.
Due to the criminal nature and general social disapproval
of drug use it is complicated to assess the drug community
directly. Official governmental statistics do provide an in -
sight into the general trend, but only manage to scratch the
surface of the entire drug community in the Russian Feder-
ation. The drug users registered in their databases are ofte n
among the extreme cases: they have been in one (or more)
rehabilitation programs or were arrested for using and/or
selling illicit narcotics. The (still) ‘moderate’ user stays out
of the picture, making it difficult to obtain reliable inform a-
tion on the drug community as a whole. Within crimino-
logical research this non-registered crime is often referr ed
to as dark number, see Coleman and Moynihan (1996), and
Rhodes et al. (2006).
Gaining a better understanding of what constitutes the
drug community in the Russian Federation and in which
2
L.J. Dijkstra et al.
ways its members can in fluence (or even inspire) others to
start using might prove valuable for devising more effective
intervening strategies that can turn the current situation for
the better.
In order to handle the drug society’s inherent complex-
ity, we will partition the Russian population into (roughly)
three groups varying in their involvement in illicit drug us e:
1. The immune: the group of people that because of, for
example, social commitments (e.g., marriage, children,
job) and/or strongly held (religious) convictions will not
be persuaded to start using drugs.
2. The infectious, i.e., the drug community: the group con-
sisting of all individuals involved with drug abuse in one
way or another (i.e., using, selling or producing).
3. The susceptible containing all individuals that are not
a member of one of the previously mentioned groups.
They are not involved in any way with illicit drug use at
the moment, but might, due to their social position and
environment be drawn toward drug use in the future.
The idea to divide the population into these three groups
was inspired by the division often used in models for virus
spread, see for example the SIR-model of Daley and Kendall
(1964), since a similar process seems to underlie the spread
of drug addiction through society: infectious (drug users/
dealers) can infect susceptible others with the (drug) viru s
by means of direct and personal contact (i.e., sharing or sel l-
ing drugs). This analogy has been made before, not only
between virus spread and drug addition (Agar, 2005; Been-
stock and Rahav, 2004; Mityagin, 2012), but also in the field
of ‘obesity spreading’ (Gallos et al. 2012) and for modeling
the spread of information (Iribarren and Moro, 2009; Onnela
et al., 2007; Bernardes et al., 2012).
Social network sites (SNSs) have proved over the years
that they provide means to uncover social structures and pro -
cesses that were difficult to observe before (Scott, 2011).
In this paper we investigate the social network site Live-
Journal1 . With approximately 2.6 million registered Rus-
sian users and over 39 million registered users worldwide,
it is one of the largest and most popular SNSs in the Rus-
sian Federation. The site offers its users an easy-to-use blog-
platform where people can read and share their articles with
others. In contrast to micro-blogging SNSs such as Face-
book2 (Wilson et al., 2012; Ferri et al., 2012) or Twitter 3 of-
ten mentioned in the literature, the site offers a tremendou s
amount of large user-written texts, making it extremely sui t-
able for text-mining and, consequently, a unique source of
data. Maybe because of having the impression to be among
‘friends’, LiveJournal users write sometimes quite openly
1 LiveJournal is available at http://www.livejournal.com (En-
glish) and http://www.livejournal.ru (Russian).
2 Facebook is available at http://www.facebook.com .
3 Twitter is available at http://www.twitter.com .
about their personal lives in their blogs. Some even com-
ment on their use of drugs and their experiences with vari-
ous kinds of narcotics. Others (the extreme cases) describe
in detail the production process. These openly online ex-
pressions can be ascribed to the on-line disinhibition effect
(Suler, 2004); the invisible and anonymous qualities of on-
line interaction lead to disinhibited, more intensive, self-
disclosing and aggressive uses of language. Furthermore,
recent studies show that criminal organizations are active ly
using on-line communities as a new ‘business’ tool for com-
munication, research, logistics, marketing, recruitment , dis-
tribution of drugs and monetarization (D ´ecary-H ´etu and
Morselli, 2011; EURO POL, 2011; Walsh, 2011; Choo and
Smith, 2008; Williams, 2001). Research of on-line commu-
nities, therefore, might aid in gaining a better understand ing
of the behavior of opaque networks within a society.
In order to get a better insight into the drug community
in the Russian Federation, we crawl a large randomly se-
lected group of Russian LiveJournal users. Every blog en-
try of every user is associated with a weight indicating to
what extent it refers to illicit forms of drug use by overlayi ng
the document word-for-word with a dictionary consisting of
known drug-related terminology (both official as well as in-
formal/‘slang’). When the sum of ‘indicator’ weights of all
the blog entries of a specific user reaches a certain threshol d,
the user is considered to be a member of the on-line drug
community. The idea behind this approach is that drug users
are more likely to use drug-related terminology in their blo g
entries than others. We will return to this assumption ex-
tensively in Section 5. The way users are classified and the
drug-dictionary are discussed in detail in Section 3.2.
After identifying the on-line drug community, we might
ask ourselves what kind of people are generally to be found
in this sub-network? In order to get a better picture of the
‘average’ user in this sub-community, we gather all the in-
terests mentioned on each user’s pro file page and compare
how often they appear within the on-line drug community
with the frequency of appearance in the rest of the network.
We limit ourselves here to interests, due to the fact that it is
rather unclear how to automatically construct a ‘psycholog -
ical pro file’ of a user based solely on his or her texts. That
way, we try to isolate those interests that are truly more com -
mon in one of these two distinct groups of users. In Section
3.3 we describe the used methodology in more detail.
The susceptibility of people to the ‘drug virus’ is thought
to depend on their exposure to drug-related information and
their own interest in this topic. This social mechanism of
transmission is called differential association in which drives,
techniques, motives, rationalizations and attitudes toward de-
viant behavior are learned and exchanged by social inter-
action (Sutherland, 1947; Lanier and Henry, 1998; Haynie,
2002). From this perspective the number of interests a user
has in common with the on-line drug community might in-
Inference of the Russian Drug Community from the Social Network LiveJournal
3
dicate a higher susceptibility, since 1) this person is more
likely to stumble upon blog entries published by member
of the on-line drug community (which are more often about
drug use), and 2) it might indicate a certain lifestyle more
prone to drugs. Following this reasoning, we present a naive
Bayesian classifier using the log-likelihood ratio method
(Kantardzic, 2011; Hastie et al., 2009) in Section 3.4 that as-
sesses the susceptibility of a user to drugs given his/her pe r-
sonal interests. When a user’s interests overlap more with
the interests in the on-line drug community than the inter-
ests of the rest of the population, they are considered to be
susceptible.
Users that were not identified as being a member of the
on-line drug community on the basis of their written texts
or as susceptible due to a large similarity with their intere sts
and the interests common in the on-line drug community are
considered to be immune. They do not write (much) about
illicit drug use and their interests do not suggest a lean to-
wards the on-line drug community.
After having (roughly) identified the three subgroups (i.e.
immune, infectious and susceptible) in the social network
LiveJournal, we might wonder whether there are structural
differences between the corresponding subnetworks. In Sec -
tion 4.3 we will describe and compare them.
The remainder of this paper is organized as follows. In
Section 2 we discuss the social network site LiveJournal,
describe the kind of information users put out about them-
selves and point to several unique features this SNS has over
others often studied in the literature. Section 3 describes the
crawled LiveJournal data set and the methods used to parti-
tion its users and determine significant interests. The resu lts
are presented in Section 4. We will finish with several con-
clusions, a rather extensive discussion and a few pointers
for future research. In Appendix 1 we explore the frequency
with which interests appear in the network and show that
this probability distribution follows a power-law.
tagged and an extensive comment system provides the read-
ers with the possibility to respond and exchange opinions
and ideas.
Users can unilaterally declare any other registered user
as a ‘friend’, i.e., ties are unidirectional. A tie re flects t he de-
sire of a user to keep up-to-date with the articles of the othe r.
Consequently, every pro file contains two lists of ties: 1) a
list of alters that currently follow the articles published by
the ego, and 2) a list of alters whose articles the ego follows.
(Note the similarity with Twitter). We will refer to these li sts
as the list of followers and following friends, respectively.
LiveJournal differs from other (large) social network site s
in two important aspects: 1) it has a large number of users
that actively write in Russian, and 2) the texts are large in
contrast to the micro-blogging SNSs often considered in the
literature (Wilson et al., 2012). The latter makes LiveJour-
nal exceptionally suitable for text-mining and, as such might
provide insights into social structures and processes wher e
other SNSs cannot.
,
3 Methods
Section 3.1 describes the data collected from the SNS Live-
Journal. In Section 3.2 we discuss the drug-dictionary and
procedure used for classifying those users who are most
likely to be involved in drug abuse. After colouring the sub-
network of the on-line drug community, we proceed in Sec-
tion 3.3 with identifying those interests that are more com-
mon for this set of users or the rest of the on-line. These
indicative interests are used by the nave Bayesian classifie r
introduced in Section 3.4 for identifying the ‘susceptible’
and ‘immune’ subnetworks. We will later analyze the struc-
ture of these three subnetworks later in Section 4.3.
3.1 The LiveJournal Data Set
2 The SNS LiveJournal
The social network site LiveJournal with over 39 million
worldwide and approximately 2.6 million registered Russian
users is by far the most popular blog-platform in the Rus-
sian Federation. With 1.7 million active users and (approx-
imately) 130,000 new posts every day the site offers a fast
body of data for studying social structures and processes 4 .
In addition to publishing their own articles, the users are
offered the possibility to enter information on their where -
abouts (e.g. hometown), demographics (e.g. birthday), their
personal interests (e.g. favourite books, films and music) a nd
even their current mood (e.g. happy, sad). Articles can be
4 LiveJournal’s
can
page
statistics
own
http://www.livejournal.com/stats.bml .
be
found
at
On the 9th of September 2012 we crawled 98602 randomly
selected Russian user pro files. For each pro file we stored its
username, the last 25 posted blog entries, personal interes ts
and the lists of followers and following ‘friends’. In addition
we stored (when available) the user’s birthday and place of
living.
In order to collect this data, we developed a distributed
crawler that employs the MapReduce Model (L ammel, 2007)
and the open source framework Apache Hadoop (White, 2009).
The system is similar to the Apache Nutch crawler (Ca-
farella and Cutting, 2004) but allows for multiple users to
collect and process data at the same time; the fetcher module
is moved outside the Hadoop framework making it a sepa-
rate application that can run on various machine architec-
tures simultaneously.
4
L.J. Dijkstra et al.
A total of 22357 users fully specified their birthday on
their public pro file (ages higher than 80 were regarded to
be reported falsely). In Section 4.1 we explore some charac-
teristics of the crawled population and compare it with the
Russian population.
3.2 The On-line Drug Community
Users are classified as being a member of the on-line drug
community by comparing their last 25 blog entries with a
dictionary of known drug-related terminology collected by
drug experts at the Saint Petersburg Information and An-
alytical Center5 . The total of 368 words in this dictionary
are split up into two categories: official and informal/‘sla ng’
terminology. Official terminology are words that are unmis-
takingly related to illicit drug use (e.g., cocaine and hero in)
and are assigned a high weight, i.e., 5. Informal/‘slang’ ex-
pressions can often be interpreted in various ways and can-
not be directly related to drug use. For example, the Russian
word ‘kolesa’ refers normally to wheels while it also can be
used (in rather dubious circumstances) as a word for pills.
To account for this ambiguity, ‘slang’ expressions are as-
signed a lower weight than official terminology, i.e., 1. Tab le
1 shows a few example words from the dictionary alongside
their weight and (free) English translation 6 .
In addition to this set of words, each blog entry was
also checked for the presence of a collection of drug-related
phrases. The presence of certain combinations of words in a
text, e.g., ‘injecting’ and ‘heroin’, is a strong indication that
the author is involved with illicit drug use. In order to ac-
count for this valuable information, the dictionary consis ts
additionally of 8359 phrases, each assigned with a slightly
higher weight than the mere sum of the words it consists of 7 .
In order to compare in flected or derived words in the
posts with words in the dictionary we first reduce them to
their root form using a Russian version of the Porter stem-
ming algorithm (Porter, 1980; Porter, 2006).
When the summed weights of all the blog entries of a
user reaches a certain threshold, he/she is considered to be
a member of the on-line drug community. Users who use
a small number of the words and phrases from the dictio-
nary in a limited number of blog entries are, thus, less likely
to be identified as a member than the ones who frequently
5 The homepage of SPb IAC can be found at http://iac.spb.ru
(in Russian).
6 The full drug-dictionary is freely available and can be down loaded
at http://escience.ifmo.ru/?ws=sub48 .
7 The number of phrases (8359) is rather high in comparison to t he
number of words (368) in this dictionary. This is due to the fact that
we consider a phrase consisting, for example, of the words ‘injecting’,
‘heroin’ and the phrase with the words ‘injection’, ‘heroin ’ and ‘nee-
dle’ as two separate expressions (where the latter is associ ated with a
higher weight than the former).
use drug-related terminology throughout a large numbers of
texts. The threshold was set manually, see Fig. 1.
We will refer to the entire set of users who’s summed
weights reaches the threshold as the on-line drug community
throughout the rest of this paper. To what extent the sub-
community corresponds to the Russian drug community will
be a point of discussion in Section 5.
Table 1 Examples of words in the drug-dictionary
Russian
English translation
Weight
Kokain
Geroin
Mariguana
Abstyag
Tabletki
Kolesa
Cocaine
Heroin
Marijuana
Withdrawal syndrome
Pills
Pills/Wheels
5
5
5
5
1
1
3.3 Identifying Common Interests of the On-line Drug
Community
In this section we will formulate an approach for determin-
ing which interests are most common (or uncommon) for
a particular subset of SNS users, in our particular case, the
on-line drug community.
First, we collect the interests on the pro file pages of all
users in the on-line drug community that at least appear
more than 10 times. (The reason for disregarding rather un-
frequent interests is that they do not add much when one
wants to gain a better understanding of an entire commu-
nity). Lets denote this set of interests with I = {I1 , I2 , . . . , Im }.
Since the members of the on-line drug community are known,
we are able to count how often users express their interest in
both this sub-community and the rest of the social network.
For every interest Ii we can, thus, obtain a 2 × 2 contingency
table similar to Table 2 where (a + b + c + d ) = n is the total
Table 2 The 2 × 2 contingency table for interest Ii
Is interested in Ii
Not interested in Ii
Total
Drug community
a
c
a + c
Rest
b
d
b + d
Total
a + b
c + d
n
number of users in the crawled population that have at least
one interest on their pro file page (i.e., n = 62370), a + c is
the number of users identified as members of the on-line
drug community, a + b is the total number of users who ex-
pressed their interest in Ii and c + d are the users not inter-
ested in Ii . The question is whether this interest appears sig-
nificantly more (or less) in the on-line drug community than
Inference of the Russian Drug Community from the Social Network LiveJournal
5
in the rest of the rest of the network, i.e., do the proportion s
a/(a + c) and b/(b + d ) differ?
We, thus, have m null hypotheses (H 0
i ), one for each in-
terest Ii in I. Applying the two-sided version of Fisher’s ex-
act test8 (Fisher, 1922; Agresti, 1992) to each contingency
table provides us with their corresponding p-values: p1 , p2 ,
. . . , pm .
The total number of null hypotheses is large (3282 to
be precise, corresponding to the total number of interests
expressed more than 10 times in the on-line drug commu-
nity). Simply comparing the obtained p-values with a com-
mon fixed significance level (e.g.,
p ≤ .05) will result in a
high number of false discoveries, i.e., falsely rejected nu ll
hypotheses. Benjamini and Hochberg (1995) showed that
the expected false discovery rate can be upper bounded by
q ∈ [0, 1] with the following control procedure9 (Benjamini
and Hochberg, 1995; Benjamini and Yekutieli, 2001):
1. Order the p-values in increasing order, i.e., p(1) ≤ p(2) ≤
. . . ≤ p(m) .
2. For a given q, find the largest k for which p(k) ≤ kq.
3. Reject all H 0
(i) for i = 1, 2, . . . , k.
We will use a q-value of 5%. The interests associated with
all rejected H 0
(i) , I′ = (cid:8)I(1) , I(2) , . . . , I(k)(cid:9), are considered to
be the interests that really differ between the on-line drug
community and the rest of the social network.
Due to the large sample size and the initially large num-
ber of interests, the number of significant interests in I′ is
expected to be quite high. Partitioning them into a set of
themes might help with getting a better overview of the wide
variety of significant interests. In order to do so, we cluste r
the set of significant interests I′ using a hierarchical agglom-
erative clustering algorithm with a complete linkage strategy
(Kantardzic, 2011; Everitt, 2001). Complete-linkage is pre-
ferred here over single-linkage due to the fact is does not
suffer from the chaining phenomena, i.e., clusters may be
forced together due to single elements being close to each
other, even if a majority of elements is very distant. Averag e-
linkage was no option due to its high computational load.
The similarity between two clusters of interests, C1 and C2 ,
is de fined as
(1)
sim(C1 ,C2 ) =
n(S1 ∩ S2 )
pn(S1 ) · n(S2 )
where S1 and S2 are the sets of users that expressed their
interest in at least one of the topics in, respectively, C1 and
C2 . n(·) returns the number of users. This similarity measure
is known as cosine similarity or more commonly known in
8 A c2 test originally designed for 2 × 2 contingency tables by Sir
R.A. Fisher (1922).
9 Strictly speaking, the expected false discovery rate is only upper
bounded when the m test statistics are independent, which does not
hold in this particular case. B. Efron makes the case in his book Large-
Scale Inference (2010) that this independency constraint is not strong.
biology as the Ochiai coefficient (Ochiai, 1957). We will re-
fer to the resulting clusters of significant interests as the mes
throughout the rest of this paper.
3.4 Assessing Susceptibility
A large number of common interests between a user and the
on-line drug community might indicate a higher susceptibil-
ity to drugs, since 1) the user is more likely to stumble upon
blog entries published by members of this sub-community,
and 2) it might indicate a certain lifestyle more prone to drug
use. Certain interests might, on the other hand, indicate a
low susceptibility. Think of interests that suggest that the
user in question has certain social commitments (e.g., mar-
riage, children, job) or strong-held (religious) convicti ons.
The idea that interests are related to susceptibility under-
lies the classification method in this section: an individua l
is considered to be a susceptible user when his/her personal
interests resemble the interests common for the drug com-
munity more than the interests of the rest of the on-line pop-
ulation.
A naive Bayesian classifier was used (Kantardzic, 2011).
Due to the fact that certain combinations of interests are
rare, we are forced to assume conditional independence be-
tween each pair of interests and use the log-likelihood ratio
method.
Let us first de fine
est in the set I′ :
k feature variables, one for each inter-
P(D F) =
P(Fi D).
F = {F1, F2 , ..., Fk }
where Fi is true when the user is interested in Ii in I′ and
otherwise false. The set of feature variables F is used to de-
scribe the personal interests of each user in the network.
The chance that a user belongs to the drug community
(D) given his/her interests is given by the conditional chance
P(D F). Given the assumption that each feature variable Fi
is conditionally independent of Fj when i 6= j, i.e., P(Fi
D, Fj ) = P(Fi D), this probability can be expressed as
k(cid:213)
i=1
Similarly, the chance of not being a member of the drug
community given the users interests is
k(cid:213)
P(¬D)
P(F)
i=1
By applying the log-likelihood ratio method, i.e., dividing
eq. (2) by eq. (3) and taking the natural logarithm of both
sides, we find that the inequality P(D F) > P(¬D F), i.e.,
the user is more likely to belong to the drug community
given the user’s interests, is equivalent to the inequality :
k(cid:229)
i=1
P(Fi D)
P(Fi ¬D)
P(D)
P(¬D)
P(¬D F) =
P(Fi ¬D).
log
+
log
(2)
(3)
P(D)
P(F)
> 0.
(4)
6
L.J. Dijkstra et al.
especially popular among 20 to 40 year old individuals. Fig-
ure 2b depicts the age distribution of the Russian Federa-
tion as determined on the 1st of January 2011. The data was
made available by Rosstat10 . The major dip around the ages
62-70 is a re flection of the impact that the Second World
War had on the Russian population.
Note the difference between the Russian LiveJournal com-
munity and the Russian population as a whole. Using Live-
Journal to sample the Russian population poses two prob-
lems: 1) one only samples those individuals who are regis-
tered as a user in this SNS, and 2) we seriously oversam-
ple the age group 20-40. Both aspects might not pose a real
threat; the Russian drug community is, as mentioned be-
fore, difficult (or even impossible) to sample directly, mak -
ing sampling a SNS one of the limited options one has, when
one wants to gain a better insight into this sub-community.
In addition, illicit drug use is known to occur especially in
this particular age group (Mityagin, 2012). The strong pres -
ence of this group, thus, might help in gathering more infor-
mation on the community of interest.
Of the total number of 98602 users studied in the Live-
Journal data set, 16553 and 3586 were identified as, respec-
tively, members of the drug community and susceptible users .
Susceptible users are identified using the naive Bayesian
classifier as described in Section 3.4 which makes use of
the interests the user posted on his/her pro file page. Com-
mon interests can be shown to be rare. In fact, the frequency
with which an interest is mentioned by users of this SNS can
be shown to follow a power-law distribution with coefficient
g ≈ 1.54, see Appendix 1. With a low number of common
interests, there is often not enough to go on in order to reli-
ably classify a user as being susceptible, which explains the
relatively small number of susceptible users found.
4.2 Drug Indicators
After applying Fisher’s exact test and Benjamini and Hochberg’s
false discovery rate control procedure with a q-value of 5%
(see Section 3.3), we found 268 of the 3282 initial interests
to be significant, i.e., the on-line drug community is, thus,
more/less interested in these topics than the rest of the Live-
Journal users. In order to assess to what extent an interest I
is indicative for being a member of the drug community (D)
or the rest of the population, we use the conditional proba-
bility P(D I ). Among the interests most indicative for the
on-line drug community (i.e., P(D I ) > .5), we found in-
terests such as: the White Movement (a loose confederation
of anti-communist forces who fought the Bolsheviks in the
Russian civil war; now often associated with the Russian
Fig. 1 The summed weights of the blog entries of each user in the Live-
Journal data set. The higher the summed weight the more the user used
the words and phrases present in the drug-dictionary (see Se ction 3.2).
Users are considered to be a member of the on-line drug commun ity
when their weighted sum crosses the threshold of 8
A user is considered to be susceptible when he/she does
not belong to the drug community and this inequality holds.
Users that are not a member of the on-line drug community
or considered to be susceptible, are immune.
4 Results
In order to identify those users in the network involved with
illicit drug use, we overlaid their last 25 blog entries with a
dictionary of known drug-related terminology (see Section
3.2). Fig. 1 depicts the distribution of the weights assigned to
the randomly crawled LiveJournal users. Note that the ma-
jority of users appear to make use of a rather small num-
ber of drug-related terminology. The fluctuations that can
be seen around the weights 5, 10 and (less distinct) 15 and
20 can be explained by the weights assigned to the words
present in the drug-dictionary (5 for official, clearly drug -
related, terminology and 1 for (ambiguous) ‘slang’ expres-
sions). The users with the highest weights are assumed to be
the ones most interested and/or involved in illicit drug use .
The threshold was set to 8 (see Fig. 1), i.e., when the weight
of a user crosses 8, he/she is considered to be a member
of the on-line drug community. Other thresholds close to 8
were considered as well. We found that the themes as pre-
sented in Section 4.2 did not change tremendously. By set-
ting the threshold to 8, approximately 20% of the total set
of crawled users were classified as being a member of the
on-line drug community.
4.1 Characteristics of the SNS LiveJournal
Fig. 2a depicts the age distribution of the LiveJournal data
set split out between the on-line drug community and the
susceptible and immune user groups. Note that this SNS is
10 The governmental statistics agency of the Russian Federation.
They can be found at http://www.gks.ru (in Russian) with links
to their rather extensive database.
Inference of the Russian Drug Community from the Social Network LiveJournal
7
e
g
a
r
e
p
s
l
a
u
d
i
v
i
d
n
i
#
)
s
n
o
i
l
l
i
m
n
i
(
2.5
2
1.5
1
0.5
0
20
40
60
80
Age (in years)
b Russian Federation (2011)
a LiveJournal (2012)
Fig. 2 a The age distribution of the LiveJournal data set (2012) split out between the on-line drug community, and the susceptible and immune
user groups. Note that this SNS is especially popular in Russia among 20 to 40 year olds b The age distribution of the Russian Federation on the
1st of January 2011 (the data was made available by Rosstat). Note the difference between the two age distributions. LiveJournal does, thus, not
provide a good sample of the Russian population, although, while investigating illicit drug use it might be useful to sample especially that fraction
of the population known to be most involved with narcotics (Mityagin 2012)
20
15
10
5
d
e
t
s
e
r
e
t
n
i
s
r
e
s
u
%
0
s
e
c
n
cie
s
cial
o
S
s
e
c
n
cie
s
ct
a
x
E
Drug community
Rest of the network
nity
hristia
C
s
m
g
otericis
hin
c
a
te
s
stern
E
a
E
writers
s
ctivitie
g
a
n
o
or
er-s
o
utd
g
Sin
O
m
alis
n
atio
N
ur
o
m
Gla
hiatry
sic
u
m
c
m
y
s
a
P
stre
ain
M
g
s/Clothin
orie
s
s
e
c
c
A
Literature
s
olitic
P
ult
c
c
O
n
ctio
fi
e
c
n
cie
S
history
n
sia
s
u
R
Fig. 3 The percentage of users within the on-line drug community and the rest of the on-line population interested in each theme (see Table 3).
Users are considered to be interested in a theme when they men tion at least one of the interests contained in that theme. Note that the last three
themes are more likely to be found in the non-drug section of the network. The other themes are relatively more likely to ap pear in the on-line drug
community
nationalistic movement), humanistic psychology, partisans,
Aryan (ancient people that partly inhabited current Russian
territory), Stalinism, Dadaism, narcology and Magadan (a
city in the far east of the Russian territory, famous for its
large jail). Among interests most indicative for not belong -
ing to the drug community (i.e., P(D I ) < .5), we found in-
terests such as: accessories, beads, jewellery, London, cloth-
ing, glamour, handmade, shoes, beach and interior design.
In order to get a better view on the wide variety of signif-
icant indicative interests, we clustered them using the cluster
algorithm described in Section 3.3. We found 42 different
themes in total. In this Section we will only discuss the ones
most prominent within the on-line drug community and the
rest of the LiveJournal population.
Fig. 3 shows the various themes and to what extent they
appear in the on-line drug community and the rest of the
LiveJournal population. We consider users to be interested
in a theme, when they mention at least one of the interests
contained in that theme on their pro file page.
The names assigned to each theme were determined by
the writers of this article. In order to overcome some of
the inevitable subjectivity inherent to this process, we will
describe the themes shortly in Table 3, where the second
column denotes the number of significant interests in each
theme. When the number of interests in a theme is small, we
will sum up all the interests (translated to English); other-
wise we will suffice with a short description.
In both Fig. 3 and Table 3 the last three themes (Main-
stream music, Accessories/Clothing and Glamour) appear
8
L.J. Dijkstra et al.
more often in the non-drug section of the network. The oth-
ers are more common for the on-line drug community.
Recall that significant interests were clustered solely on
the basis of their cosine similarity (i.e., the more users th at
expressed their interest in both topics, the higher the ‘sim i-
larity’). In which of the two distinct communities the interest
is more prominent is not taken into account. Each theme is,
thus, likely to contain interests that are more common for
the on-line drug community and interests that are more of-
ten found in the rest of the network. To what extent a theme
can be related to one of these two groups can, therefore, be
expected to be less clear than for individual interests.
4.3 Network Structure Analysis
In this section we will explore the structure of the on-line
drug community, susceptible and immune subnetworks.
Fig. 4a shows the degree distribution of the total crawled
LiveJournal network. Degree is de fined here as the num-
ber of followers and following ‘friends’ of a user. Note that
the number of users seems to decrease exponentially with
degree; an indication that the distribution might follow a
power-law:
p(x) = Cx−g
(5)
where x is the degree of a user, g is the power-law coeffi-
cient and C is a constant. Power-law distributions appear in
a wide variety of natural and man-made processes, e.g., the
number of inhabitants in cities, the diameter of moon crates
and the intensity of solar flares. The wide-spread appearanc e
of the power-law raises the question whether the same pro-
cess might underlie these (at first glance) different phenom -
ena, causing quite a discussion in the literature. For a more
elaborate discussion of power-laws and their appearance, w e
refer the reader to a recent paper by Pinto et al. (2012).
Fig. 4b shows the rank/frequency log-log plot11 of the
degree distribution in 4a. Note the points in this plot lie (ap-
proximately) on a straight line, which is a characteristic o f
power-law distributions.
Very few real-word networks display a power-law dis-
tribution over the entire degree range, making it necessary
to determine where the degree distribution is most likely to
start following a power-law (denoted here with xmin ). The
power-law exponent g and xmin were determined using the
maximum likelihood method as described in the paper by
Clauset et al. (2009) and were found to be equal to 1.54
and 8, respectively. The fit is shown in Fig. 4b as a dashed
line. Note that the line seems to fit the data quite well. The
standard statistical test for the quality of fit as proposed b y
11 A rank/frequency log-log plot is the plot of the occurrence f re-
quency versus the rank on logarithmically scaled axes. For a more
elaborate description on how to construct such a plot, see the paper
by Mark Newman (2005), Appendix A.
A. Clauset, C. Shalizi and M. Newman (2009) shows that
the data gives no raise to believe that the degree distribution
does not follow a power-law (i.e., p = .57 with 1000 repeti-
tions).
Fig. 5 shows the rank/frequency log-log plots of the de-
gree distributions of the on-line drug community, suscepti-
ble and immune network together with their power-law fits.
Note that these sub-networks also follows a power-law dis-
tribution, only with slightly different g’s.
Table 4 shows various characteristics of the LiveJournal
network and its three subnetworks. Standard deviations are
reported between parentheses. Note that the mean age does
not differ much. The large differences between the maxi-
mum degrees of these networks are common for heavy right-
tailed distributions. The best fits for g, xmin and the p-value
of the goodness of fit test are reported as well.
5 Conclusions/Discussion
Drug abuse has seen a dramatic increase in the Russian Fed-
eration during the last two decades (Sunami, 2007; Mitya-
gin, 2012). The rapid spread and extent of this ‘drug epi-
demic’ forms a serious cause for alarm and finding effective
ways to halt the current trend is of outmost importance.
Due to the criminal nature and the general social disap-
proval of narcotics, it is difficult (or outright impossible ) to
assess the drug community directly. Official governmental
statistics do provide some insight, but fail to give the com-
plete picture; the ‘moderate’ drug user is hardly noticed. I n-
formation retrieved from social networks such as LiveJour-
nal can, therefore, contribute in gaining a better understa nd-
ing of what constitutes the drug community in the Russian
Federation and might prove to be vital for devising more ef-
fective intervention strategies.
In this paper we present a method to assess this non-
directly observable community by mining the popular so-
cial network site LiveJournal. By comparing the users’ blog s
with a dictionary consisting of known drug-related Russian
terminology, we were able to identify those users that write
most actively about drug use. By collecting their interests,
we were able to create a general picture of the kind of users
that can be found within the on-line drug community, see Ta-
ble 3 and Fig. 3. In addition, we introduced a naive Bayesian
classifier for identifying potentially susceptible users b y com-
paring their personal interests with the interests most com -
mon within the on-line drug community. The ‘infectious’,
‘susceptible’ and ‘immune’ subnetworks were shown to have
a similar structure; their degree distributions follow a power-
law, although with slightly varying exponents.
It is unclear to what extent we were able to identify the
users that are really involved in drug use. Users that tend
to write often about narcotics might do so for the follow-
ing three reasons: 1) to raise the discussion on the social
Inference of the Russian Drug Community from the Social Network LiveJournal
9
Table 3 Description of the most prominent themes
Theme
#
Description
Social sciences
Exact sciences
Literature
Politics
Occult
Science fiction
8
Russian history
Christianity
Esotericism
Eastern teachings
Singer-songwriters
Outdoor activities
Nationalism
Psychiatry
Mainstream music
Accessories/Clothing
Glamour
15
3
7
5
7
9
22
Sociology, history, economics, psychology and law.
Programming, biology, astronomy, medicine, archeology, ecology and philosophy.
Containing rather general interests such as bo oks, journalism, poetry and prose.
This theme contains various national (opposition, corruption and Russia), international (Chech-
nya, NATO, Poland and Ukraine) and general (socialism, democracy and anti-communism)
political topics.
Concerns a wide variety of topics, including, for example, the occult, non-traditional medicine,
mysticism, clairvoyance, telepathy and the prediction of the future through the reading of cards
(tarot).
Containing interests like UFOs, futurolog y, nanotechnology, science fiction and the American
science fiction writer H. Harrison.
Ranging from general sciences (anthropo logy, ethnography, war history) to particular events in
the history of Russia (WWII, the Russian civil war) and important historical groups (partizans).
God, the Russian orthodox church and religion.
Contains various topics related to esoterici sm (esotericism itself, but also the expansion and
altering of the human mind) and Castaneda, a rather famous au thor who popularized topics
such as ‘stalking’ (technique to control the mind) and lucid dreams.
10 Various eastern teachings/religions (Buddhism, Zen and yoga) and related terms (e.g., mantras,
chakras and tantras).
Interests related to Russian rock and singer-songwriters (e.g., V. Vysotsky).
Diving, fishing, hunting and topics rel ated to Mountain climbing (e.g., alpinism and the Altai
mountains) and survival.
Covering interests such as the Russian empire, patriotism, the Russian people, the White Move-
ment and antiglobalization.
Including psychiatry, psychoanalysis, psychotherapy, psychosomatic medicine and transper-
sonal and humanitarian psychology.
6
Containing several famous mainstream musicians, such as Madonna, Coldplay and Bj ork.
13 Varying from accessories like beads, jewelry, shoes and bags to clothing and interior design.
Includes the interest glamour itself. It further covers fashion (e.g., journals, style, jeans, design
13
and shopping) and the night-life of Moscow.
11
6
8
9
6
100
k
n
a
r
x
a
m
/
k
n
a
r
10−1
10−2
a
100
102
104
Frequency
b
Fig. 4 a A fraction of the degree distribution of the crawled LiveJou rnal network. Note that the number of users decreases expone ntially with
degree b The rank/frequency log-log plot of the degree distribution and the power-law fit depicted as a dashed line ( g ≈ 1.54 and xmin = 8). The
p-value was found to be approximately .57, i.e., there is no reason to believe that the degree distribution does not follow a power-law
problems caused by drug abuse or propose possible ways to
change the current situation for the better, 2) in an attempt to
persuade others to stop or never start using drugs, i.e., ‘an ti-
propaganda’, or 3) to share their experiences with drugs or
to express their interest in this topic. We are solely inter-
ested in the group of users writing about narcotics for the
third reason; they are the ones that use drugs or are likely to
do so in the future.
The appearance of the theme politics in Fig. 3 might be
best explained by the presence of users in LiveJournal that
do not write about drugs because they are personally in-
terested or using them, but rather since they want to bring
the social problems related to narcotics under the attention.
10
L.J. Dijkstra et al.
100
10−1
10−2
k
n
a
r
x
a
m
/
k
n
a
r
100
10−1
100
10−1
10−2
100 101 102 103
100
101
102
103
100
102
104
Frequency
a
Frequency
b
Frequency
c
Fig. 5 The rank/frequency log-log plots of the degree distributions of the three subnetworks in the crawled LiveJournal netwo rk: the drug commu-
nity (g ≈ 1.57 and xmin = 19) and the susceptible (g ≈ 1.66 and xmin = 8) and immune subnetwork (g ≈ 1.54 and xmin = 10) . The power-law fit is
depicted as a dashed line. The found p-values give no reason to believe these distributions do not follow a power-law
Table 4 Structural characteristics of the various subnetworks in L iveJournal
Network
Size
Edges
Age
Max. degree
Drug community
Susceptible
Immune
16553
3586
78463
61021
16499
496018
32.08 (9.20)
32.14 (8.75)
30.31 (8.03)
Total
98602
982197
30.71 (8.32)
160
72
323
524
g
1.57
1.66
1.51
1.54
xmin
p-value
19
8
10
8
.97
.84
.76
.57
The same might hold for the themes as the social and ex-
act sciences, psychiatry and, potentially, nationalism. The
presence of a theme like Christianity (consisting of the in-
terests ‘God’, ‘the Russian orthodox church’ and ‘religion ’)
is more likely to be explained by the presence of users that
spread anti-propaganda, especially when taking the negative
stance of the church towards drugs into account.
Themes such as the occult, esotericism, science fiction
and eastern teachings, however, are hardly explained by sta t-
ing that the users interested in these topics are heavily con -
cerned with the social impact of drug abuse, or actively spre ad-
ing anti-propaganda. Most likely, we caught a glimpse of the
actual drug community.
The explanations of why certain themes are presented
in the on-line drug community are, of course, based solely
on the view of the authors and, therefore, subjective. Fur-
ther research is required to establish what themes are truly
related to the Russian drug community. In order to estab-
lish the validity of the approach described in this paper, one
might compare the presented results with law enforcement
data, e.g., it would be interesting to compare the number of
convictions for drug-related crimes between the on-line drug
community and the rest of the crawled LiveJournal popula-
tion.
The susceptibility of an individual to drugs was deter-
mined on the basis of the similarity between his/her persona l
interests and the interests common in the on-line drug com-
munity. We limited ourselves here to their interests, since
it was unclear how to relate the susceptibility of a user and
his/her texts.
The number of susceptible users is relatively small due
to the small number of common interests present in the Live-
Journal network. In fact, it can be shown that the frequency
with which a certain interest occurs follows a power-law
with exponent g≈ 1.54, see Appendix 1. With a low number
of common interests, there is often not enough to go on to
identify a user as being susceptible. It is, thus, very well pos-
sible that we overlooked several immune users who should
have been noted as being susceptible.
Users were considered to be a member of the on-line
drug community when the weighted sum of their blog en-
tries crossed the threshold of 8, see Fig. 1. We experimented
with different thresholds and found that, although the list of
significant interests does vary, the resulting clusters/th emes
remain stable. The weights assigned to the official and in-
formal/‘slang’ terminology in the drug-dictionary were no t
varied. Since the final themes did not vary much while vary-
ing the threshold, it is unlikely that they would now.
As mentioned before, we found that the LiveJournal net-
work and the infectious, susceptible and immune subnet-
works are most likely scale-free (i.e., their degree distri bu-
tions follow a power-law). Although the performed good-
ness of fit test (Clauset et al., 2009) does not exclude other
possibilities, e.g., Poisson, we can state with certainty that
the distributions are heavy-right tailed, which entails that
the network has hubs, i.e., users with a far higher degree
than the rest of the network. This knowledge might be of
Inference of the Russian Drug Community from the Social Network LiveJournal
11
major importance when one wants to disrupt the network to,
for example, limit the spread of drug-related information o n
the network. Removing the hubs would heavily disrupt the
information flow (Bollobas and Riordan, 2004; Albert et al.,
2000; Crucitti et al., 2003).
This paper has shown the promise of ‘crawling social
networks’ in delineating and analyzing social groups that
hitherto have eluded such research, because of the funda-
mentally opaque nature of membership of such groups. The
case in point is the Russian drugs community. We hope that
continuing research along the lines we set out in this paper
will help to map the dynamics of this group, and will ulti-
mately contribute to halting, if not reverting its tragic tr end
to grow.
Acknowledgements The authors thank Dr. Sergey Mityagin from the
Saint Petersburg Information and Analytical Center (SPb IAC) for fruit-
ful discussions on the drug addiction profiles in the Russian Federa-
tion. In addition, the authors would like to express their gratitude to
Prof. dr. T.K. Dijkstra from the University of Groningen (RUG) and
the Free University Amsterdam (VU) for introducing us with false
discovery rate control and his useful remarks. This work is s upported
by the Leading Scientist Program of the Russian Federation, contract
11.G34.31.0019, as well as by the Complexity program of NTU, Singa-
pore. Peter Sloot also acknowledges the support from the FET-Proactive
grant TOPDRIM, number FP7-ICT-318121.
Appendix 1: LiveJournal User Interests
In this appendix we take a closer look at the frequency with
which interests are expressed by the users of the social net-
work LiveJournal. Fig. 6 shows the frequency of occurrence
of interests within the crawled population. Note that the dis-
tribution is heavy right-tailed; its slope suggests that the dis-
tribution might follow a power-law, see eq. (5). Fig. 6b shows
the corresponding rank/frequency log-log plot of the his-
togram in 6a. The exponent g ≈ 1.54 and the start of the
distribution xmin = 3 were approximated using the maximum
likelihood method as proposed by Clauset et al. (2009). Note
that the fitted line in 6b approximates the distribution quite
well. The standard goodness-of- fit test (Clauset et al. 2009 )
indicates there is no reason to believe that the distribution
does not follow a power-law, i.e., the p-value was approxi-
mately equal to .57.
The fact that the distribution of interests within the SNS
LiveJournal is heavy-right tailed explains why the number o f
susceptible users (see Table 4) is relatively small compared
to the other groups.
References
1. Agar, M. (2005). Agents in living color: towards emic agent-based
models. Journal of Arti ficial Societies and Social Simulati on 8(4).
http://jasss.soc.surrey.ac.uk/8/1/4.html . Accessed 19
November 2012.
2. Agresti A (1992) A survey of exact inference for contingency ta-
bles. Statistical Science 7(1):131–177
3. Albert R, Jeong H, Barabasi, AL (2000) Error and attack tolerance
of complex networks. Nature 406:378–382
4. Beenstock M, Rahav G (2004) Immunity and susceptibility in il-
licit drug initiation in Israel. Journal of Quantitative Criminology
20(2):117–142
5. Benjamini Y, Hochberg Y (1995) Controlling the false discovery
rate: a practical and powerful approach to multiple testing . Journal of
the Royal Statistical Society, Series B (Methodological) 57(1):289–
300
6. Benjamini Y, Yekutieli D (2001) The control of the false discov-
ery rate in multiple testing under dependency. Annals of Sta tistics
29(4):1165–1188
7. Bernades DF, Latapy M, Tarissan F (2012) Relevance of SIR model
for real-world spreading phenomena: experiments on a large -scale
p2p system. Proceedings of the International Conference on Ad-
vances in Social Network Analysis and Mining (ASONAM), Istan-
bul (Turkey)
8. Bollobas B, Riordan O (2004) Robustness and vulnerability of
scale-free random graphs. Internet Mathematics, 1(1): 1–3 5
9. Cafarella M, Cutting D (2004) Building Nutch: open source search.
ACM Queue 2(2):54–61. doi: 10.1145/988392.988408
10. Choo KR, Smith RG (2008) Criminal exploitation of online sys-
tems by organised crime groups. Asian Journal of Criminolog y
3(1):37–59
11. Clauset A, Shalizi C, Newman M (2009) Power-law dis-
tributions in empirical data. SIAM review 51:661–703. doi:
10.1137/070710111
12. Coleman C, Moynihan J (1996) Understanding crime data:
haunted by the dark figure. Open University Press. ISBN 0-335 -
19519-9
13. Crucitti P, Latora V, Marchiori M, Rapisarda A (2003) Effi ciency
of scale-free networks: error and attack tolerance. Physic a A: Statis-
tical Mechanics and it Applications 320:622–642
14. Daley D, Kendall D (1964) Epidemics and rumours. Nature
204:1118. doi: 10.1038/2041118a0
15. D ´ecary-H ´etu D, Morselli C (2011) Gang presence in soci al net-
work sites. International journal of cyber criminology 5(2 ):876–890
16. Efron B (2010) Large-scale inference: empirical Bayes methods
for estimation, testing and prediction. Cambridge Univers ity Press
17. EU RO PO L (2011) Internet facilitated organized crime. iOCTA
(abridged). The Hague: European Police Office
18. Everitt B, Landau S, Leese M (2001) Cluster Analysis. Arnold,
London
19. Ferri F, Grifoni P, Guzzo T (2012) New forms of social and p ro-
fessional digital relationships: the case of Facebook. Social network
analysis and mining 2(2):121–137
20. Fisher R (1922) On the interpretation c2 from contingency ta-
bles, and the calculation of p. Journal of the Royal Statistical Society
85(1):87–94
21. Gallos LK, Bartt field P, Havlin S, Sigman M, Makse HA (2012 )
Collective behavior in the spatial spreading of obesity. Scienti fic Re-
ports 2(45):1–9
22. Haynie D (2002) Friendship networks and delinquency: The rela-
tive nature of peer delinquency. Journal of Quantitative Criminology
18(2):99–134
23. Hastie T, Tibshirani R, Friedman J (2009) The elements of statis-
tical learning. Springer, New York
24. Iribarren JB, Moro E (2009) Impact of human activity patterns
on the dynamics of information diffusion. Physical Review Letters
103(3):8–11
25. Kantardzic M (2011) Data mining: concepts, models, methods,
and algorithms. IEEE Press, Wiley-Interscience
26. L ammel R (2007) Google’s MapReduce programming model —
Revisted. Science of Computer Programming 70:1–30
12
L.J. Dijkstra et al.
k
n
a
r
x
a
m
/
k
n
a
r
10−2
10−3
10−4
a
101
103
105
Frequency
b
Fig. 6 a The histogram of interests expressed by the users in the craw led LiveJournal data set b The rank/frequency log-log plot of the histogram
in 6a and the maximum likelihood power-law fit ( g ≈ 1.54 and xmin = 3)
27. Mityagin SA (2012) Modeling the spread of drug-addiction
through the population on the basis of complex networks (in Russian
- Modelirovanie processov narkotizatsiya nasileniya na osnove kom-
pleksnix cetei). Dissertation, National Research University of Infor-
mation Technologies, Mechanics and Optics (NRU ITMO)
28. Newman M (2005) Power laws, Pareto distributions and Zipf ’s
law. Contemporary Physics 46:323–351
29. Ochiai A (1957) A zoogeographic studies on the solenoid fi shes
found in Japan and its neighbouring regions. Bulletin of the Japanese
Society of Fish Sciences 22:526–530
30. Onnela J, Saram aki J, Hyv onen J, Szab ´o G, Lazer D, Kaski K,
Kert ´esz J, Barab ´asi AL (2007) Structure and tie strengths in mobile
communication networks. Proceedings of the National Academy of
Sciences of the United States of America 104(8):7332–7336
31. Pinto C, Mendes Lopez A, Machado J (2012) A review of power
laws in real life phenomena. Communications in Nonlinear Science
and Numerical Simulation 17(9):3558–3578
32. Porter MF (1980) An algorithm for suffix stripping. Progr am
14(3):130–137
algo-
Stemming
(2006)
MF
33. Porter
rithms
languages.
European
various
for
http://www.snowball.tartarus.org/texts/stemmersoverview.html .
Accessed 19 November 2012.
34. Rhodes W, Kling R, Johnson P (2006) Using booking data to
model drug user arrest rates: a preliminary to estimating th e preva-
lence of chronic drug use. Journal of Quantitative Criminology
23(1):1–22
35. Scott J (2011) Social network analysis: developments, advances,
and prospects. Social network analysis and mining 1(1):21– 26
36. Suler J (2004) The online disinhibition effect. Journal of Cy-
berpsychology and Behaviour 7(3):321–326
37. Sunami AN (2007) Drug-conflict management in the context of
information warfare (in Russian - Politika upravleniya narkokonflik-
tom v kontekste informatsionnoi voiny). Saint Petersburg State Uni-
versity.
38. Sutherland EH (1947) Principles of criminology. Philidelphia: JB
Lippincott
39. Walsh C (2011) Drugs, the internet and change. Journal of Psy-
choactive Drugs 43(1):55–63
40. Williams P (2001) Organized crime and cybercrime: synergies,
trends and responses. Arresting Transnational Crime 6(2)
41. Wilson RE, Gosling SD, Graham LT (2012) A review of Face-
book research in the social sciences. Perspectives on Psychological
Science 7(3):203–220
42. White T (2009) Hadoop: the definitive guide. O’Reilly Med ia, Ya-
hoo! Press
|
1904.05334 | 2 | 1904 | 2019-07-26T08:14:01 | Nine Quick Tips for Analyzing Network Data | [
"cs.SI",
"physics.soc-ph",
"stat.ME"
] | These tips provide a quick and concentrated guide for beginners in the analysis of network data. | cs.SI | cs |
Nine Quick Tips for Analyzing Network Data
Vincent Miele1,*, Catherine Matias2, St´ephane Robin3, and St´ephane Dray1
1Universit´e de Lyon, F-69000 Lyon; Universit´e Lyon 1; CNRS, UMR5558,
Laboratoire de Biom´etrie et Biologie ´Evolutive, F-69622 Villeurbanne,
France
2Sorbonne Universit´e, Universit´e Paris Diderot, Centre National de la
Recherche Scientifique, Laboratoire de Probabilit´es, Statistique et
3UMR MIA-Paris, AgroParisTech, INRA, Universit´e Paris-Saclay, F-75005,
Mod´elisation, F-75005 Paris, France
*Corresponding author: [email protected]
Paris, France
These tips provide a quick and concentrated guide for beginners in the analysis
Abstract
of network data.
Introduction
From the molecular to the ecosystem level, a biological system can often be represented
as a set of entities that interact with other biological entities. Recent advances in data
acquisition technology (e.g., high-throughput sequencing or tracking devices) open up
the opportunity to quantify these interactions and call for the development of ambitious
methodology to tackle these data. In this context, networks are widely used in Biology,
Bioinformatics, Ecology, Neuroscience or Epidemiology to represent interaction data [1].
A network contains a set of entities (the nodes or vertices) that are connected by edges
(or links) depicting some interactions or relationships. These relationships may be either
directly observed or deduced from raw data. The first case encompasses protein-protein
interaction (PPI) networks where interactions between two proteins are experimentally
assessed or plant-pollinator interactions that are directly observed in the field. Gene
regulatory networks reconstructed from gene expression data, co-occurrence networks
inferred from species abundances or animal social contact networks deduced from GPS
tracks are some examples of the second case. New kinds of networks are still emerging
(for instance, cell-cell similarity networks [2], Hi-C networks and image similarity
networks [3]).
Networks are very attractive objects and many methods have been developed to
analyze their structure. However, biological networks are often analyzed by
non-specialists and it may be difficult for them to navigate through the plethora of
concepts and available methods. In this paper, we propose nine tips to avoid common
pitfalls and enhance the analysis of network data by biologists.
1
Tip 1: Formulate questions first, use networks later
Network theory is well established and truly powerful but it cannot be used as a
"black-box". Indeed, building a network should not be considered as an end in itself. We
recommend to (i) establish a list of scientific questions and hypotheses before
manipulating the data and then (ii) evaluate if these questions naturally translate into a
series of network analyses, rather than making network analyses first and checking
whether they raise questions after (in agreement with rule 1 in [4]). Indeed, it is
generally immediate to represent/model the data with a network, but much trickier to
translate a question into a network-based analysis.
To this end, besides integrating the network formalism, it is important to embrace
the network viewpoint. It relies on a cornerstone idea that makes the strength but also
the challenge of network modelling: any interaction is considered within its context
taking into account the other interactions that occur (or not). In this viewpoint, any
interaction between the pair of nodes (A,B) is considered in the context of the other
pairs involving A or B. For instance, the importance of a particular edge between two
genes will be differently assessed if the target gene is or is not a hub (i.e. regulated by
many genes). This viewpoint does not consider interactions as independent objects and
is thus the exact opposite of examining the set of interactions one by one.
Finally, it is obviously recommended to check whether your questions and data really
fit the network viewpoint before performing any analysis. If the number of nodes
and/or edges is very low, network analysis can be applied but results can be
disappointing as they are not enough observed interactions to identify a structure in the
data. On the other hand, although any matrix can be viewed as a network (one edge
per cell, see next Tip), it is often more adequate to consider using non-network methods
dedicated to complete matrices. For instance a correlation matrix, possibly viewed as a
correlation network, can be naturally analysed with a hierarchical clustering or a
principal component analysis. In other words, network analysis is not necessarily the
answer when analysing a data matrix.
Tip 2: Categorize your network data correctly
To grab the cutting-edge concepts and methods in the networks field, learning the
appropriate vocabulary from graph theory is a prerequisite [5]. In particular, it is
important to categorize your network properly to be sure you apply suitable methods.
Different network categories for different data lead to different approaches.
Links can be directed (from a source to a target), possibly including self-loops (e.g., a
protein interacting with itself or cannibalism in food webs). Ignoring this information
for the sake of simplicity would actually betray the original data. When dealing with
edges embedding a value (a weight), we strongly advise you to avoid transforming the
network into a binary one using any ad-hoc threshold value. Indeed it clears a
significant part of the available information because some aspects of the network
structure might be undetected in the binarized network [6]. This binarization could be
used as an exploratory step only (for instance, to facilitate a first visualization step - see
Tip 4), but it can bias your analysis (e.g., a nested pattern can be observed in binarized
ecological networks but no not in weighted ones [7]). Methods handling weighted
networks are usually available and therefore more efficient. Furthermore, the data
analyst must be very cautious since, in the literature, weights can be considered as
intensity-based (the greater the weight, the stronger the edge is) as well as
distance-based (the smaller the weight, the closer the nodes are).
Nodes can belong to different categories and edges can be allowed only between
nodes of different categories (bi/tri/multi-partite networks; e.g., nodes as hosts/parasites
2
or as plant/fungus/seed dispersers [8]). It is mandatory to select methods that handle
this particularity. For instance, many statistical approaches rely on the expected
number of edges (e.g., in the computation of modularity, see Tip 5) which is here clearly
different compared to the unipartite case.
Finally, additional information on the nodes is often available. For instance, nodes
can have spatial positions (e.g., nodes as habitat patches or farms in 2D, brain area in
3D) or can be associated to external attributes (e.g., species traits in a food web). This
additional information can be explicitly considered in the analysis, either to understand
if it contributes to organize the network [9], or to look for some remaining structure once
accounted for its effect (e.g., spatial [10] or phylogenetic effect [11]). In the former case,
a simpler but suboptimal alternative often consists in using this information a posteriori
in the interpretation of results (e.g., explaining the structure of genetic networks with
spatial information [12] or comparing network structure with metadata [13]).
Tip 3: Use specific network analysis software
A range of versatile software is dedicated to network analysis. It is therefore a waste of
time trying to use unspecific tools. These software tools belong to two distinct
categories that have pros/cons: graphical user interface (mouse-based navigation) and
software packages (command line interface or programming). The first category is
mainly dedicated to powerful and interactive visualization (see Tip 4). It includes the
two major open source software tools Gephi and Cytoscape, both supported by an
active community. They also offer the computation of some network metrics (the choice
of a relevant metric is discussed in Tip 5). The second category is dominated by the two
leading general-purpose network packages NetworkX and igraph, but there exist plenty
of more specific packages (for instance bipartite in R). Browser-based
visualization [14] recently emerged as an intermediate category, mostly based on a
collection of javascript libraries (e.g., Sigma.js).
That said, we strongly suggest that you learn programming and scripting your
analysis (in agreement with papers in the "10 simple rules" collection about computing
skills and reproducibility [15, 16]). Dealing with reproducible code enhances network
research: you can re-run with no effort the complete analysis on a modified version of
your raw data, on different datasets and share the code with others colleagues interested
in the modelling approach. Finally, there exist a limited set of common network file
formats (e.g., adjacency list in the format source target) that you should adopt from
the very beginning, to easily switch between different software tools.
Meanwhile, the data analyst should avoid a hasty use of the different functions
implemented in these tools. As underlined in Tips 5 and 6, it is crucial to understand
the metrics/methods before running functions, and to select the appropriate ones with
respect to the questions and the data at hand.
Tip 4: Be aware that network visualization can be
useful but possibly misleading
One powerful aspect of networks is their ability to depict complex data in a single
object. It can be therefore tempting to represent networks graphically in two
dimensions: nodes are spread in the plane and edges drawn with the objective to
achieve the most aesthetic design (the nodes'positioning is called a layout). This
apparently simple task is in fact a very hard combinatorial problem. An active research
community proposed a series of heuristics aiming at obtaining a nice network view in a
3
reasonable time, despite the growing size of available networks. The aforementioned
tools (see Tip 3) embed a wide range of easy-to-use layouts.
Graphics are usually considered as an important tool for exploratory data
analysis [17]. However, special care is required to not over-interpret network
visualization. A layout does not only provide a nice representation of a network, it
makes it optimal for a given set of objectives (e.g., maximizing attractions between
connected nodes) that you often ignore. As a consequence, what you see with your eyes
can be biased. When visualizing a network, always keep in mind that the position of a
node in such a display is not part of the data, but results from an algorithm. Hence, the
distance between two nodes should not be interpreted as an intrinsic measure of
proximity as another display algorithm would result in a possibly very different distance
(see the distances between the two red nodes in Figure 1a-b). On the other hand,
network visualization can be useful as a way to illustrate the results of a network
analysis (as presented in Tips 5 and 6). In this case, a layout should be chosen for its
ability to highlight network properties (Figure 1c) or conclusions drawn by an analysis
(Figure 1d). For instance, nodes can be positioned according to the values of some
particular metrics of interest [18]. In any case, we encourage biologists to clearly
describe the layout used in any graphical representation of a network in scientific
publications, especially to make it reproducible.
Lastly, we also advise to consider visualizing the adjacency matrix as a heatmap/a
colored matrix (see Figure 1 in [19] for an explanation). It allows to represent the
presence or weight of edges (colored cells) but it has also the advantage to highlight
edges' absence (blank matrix cells). This is particularly relevant when the matrix
rows/columns are reordered in an informative manner (e.g., by increasing value of a
metric [20] or according to some clustering results; see Tips 5 and 6 and Figure 1 d).
a)
b)
c)
d)
Fig 1. Four visualizations of the same network modelling interactions between 64
sociable weavers [14, 21]. a) Random layout. b) Fruchterman and Reingold layout. c)
Circle layout where nodes'size and position are defined by their degree. The same two
nodes are colored in red in panels a-c to show their distance varies depending on the
layout. d) Representation of the adjacency matrix with row/columns ordering consistent
with the clustering obtained with the Infomap algorithm (see [22] for details). Graphical
representations are performed with the package igraph.
Tip 5: Avoid blind use of metrics, understand formu-
las instead
Beside the limitations of network visualization, describing a network can also (and
advantageously) consist in computing summary statistics. The beginner will
immediately find the path to a series of network metrics: one number per node or edge
(local metrics; e.g., degree) or one number for the whole network (global metrics; e.g.,
connectance/density or modularity). Metrics have proliferated and it is strongly advised
to take time to read carefully the mathematical definition of the metrics one has at
hand (see also Tip 9): the deeper the mathematical understanding, the easier the
4
lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllinterpretation is. For instance, the concept of nodes'centrality goes with a range of
centrality metrics that have different meanings. Moreover, it is so easy to compute any
metric with the aforementioned software tools that it can sometimes prevent the analyst
to check their pros/cons. As an example, reading the definition of the widely-used
betweenness centrality, you can understand it is based on shortest paths. If you intend to
use this measure, it is therefore necessary to check whether the shortest path is a
relevant concept associated to the process under study (such as energy fluxes in food
webs) or if it is more questionable (e.g., paths in functional networks may not actually
correspond to information flow [19], paths in contact networks may not be relevant
when information or disease diffusion is not studied [23]). Another example consists in
the analysis of directed and/or weighted networks with extensions of metrics to this
case. It is important to note that the formula of the weighted degree accounts for two
effects: how many neighbours and how large the weights are, two effects that are
impossible to disentangle (a weighted degree of 2 can correspond to a single edge of
weight 2 or four edges of weights 0.5). A similar problem can also be raised for the
weighted path (potential pitfalls highlighted in [24]). Lastly, global metrics are often
used to compare networks (networks measured from different data or conditions, or
simulated networks as mentioned in Tip 7). In this case, special care should be taken
when comparing values because metrics differences can be a side effect of differences in
simple network characteristics such as the number of nodes or edges (see common
pitfalls mentioned in [25] for brain networks and a discussion on co-variation of metrics
with characteristics of ecological networks in [26]). For instance, modularity, number of
modules and network size are known to be intertwined [27].
It is not unusual that authors, instead of choosing a given metric adapted to a
particular question, compute a high number of metrics among the available ones.
However, many metrics are correlated (see a correlation study in [23]) and it becomes
necessary to deal with this redundancy to interpret the results (e.g., with an ordination
method [28]). This approach is not hypothesis-driven as recommended in Tip 1 and can
undeniably be replaced by an incremental approach where metrics are selected one at a
time for their ability to check particular hypothesis associated to the fundamental
questions on the data (as for many statistical analysis, see rule 5 in [4]).
Tip 6: Avoid blind use of clustering methods, check
their difference instead
With the data avalanche arising this decade, leading to larger networks, clustering has
become one of the most popular tool to get a comprehensive view of the network
structure. Its general purpose is to aggregate nodes into clusters in order to identify a
meso-scale structure in the network (i.e. zooming out the network). Choosing a network
clustering raises similar issues than for choosing a network metric (Tip 5). It is much
more than using one of the functions available in a software. Indeed, likewise any
clustering methods, the ones dedicated to networks aim at gathering similar objects (i.e.
nodes) and thus relies on a specific definition of node similarity. What does the analyst
want to be similar in a network? Discussing the pros/cons of the different methods is
beyond the scope of this article whereas a massive literature on the topic exists (see Tip
9). However, we illustrate the impact of choosing a specific definition for node similarity
with three classical proposals (among others).
A first and natural definition for the similarity between nodes is the existence of a
connection between them. Based on this definition, network clustering consists in
finding a modular structure, i.e. identifying dense clusters of nodes (also called modules
or communities) poorly connected with others. Community detection methods [22]
5
implement this approach, which implicitly assumes the existence of modules in the
network. They were successfully applied in many studies in Biology (for instance to
identify chromatin domains [29]). A second approach considers that two nodes are
similar when they tend to be connected (or unconnected) with the same type of nodes.
Hence, species in a food web are considered similar if they have similar preys and
predators [30]. This definition can accommodate networks with non-modular
structure [31] since it assumes that the nodes are involved in a "diversity of meso-scale
architectures" [32]. The stochastic block model (SBM) is a popular method based on this
definition [31, 33], which has shown to be relevant for the analysis of some biological
networks (to highlight the complex architecture of connectomes [32] or functional
groups in ecological networks [34]). One important feature is that it allows to model
explicitly edge directions and weights by means of different statistical distributions [11].
A third approach consists in associating a vector of characteristics to each node and
then to gather nodes with similar characteristics. This includes motifs-based
approaches [35] and a wide range of innovative node's embedding techniques [36, 37].
Nodes are described as points in a space with reasonable low dimension, which allows to
apply the huge variety of existing clustering methods for multivariate data. It is
important to realize that each of these similarity concepts naturally results in different
nodes clustering. The choice between these alternatives must be driven by biological
questions not by their availability in software tools (Tip 1).
Tip 7: Don't choose the easy way when simulating
networks
To highlight the properties specific to an observed network (for instance a peculiar
metric value), a common practice consists in comparing with simulated networks. These
properties are detected as significant deviation (or not) from a typical behaviour
implemented in simulated networks. However, there is no generic definition of a typical
network and, as a consequence, the features that can be detected depends dramatically
on the null model used to simulate networks. This null model must be chosen for a
given purpose, fitting expected behaviours whereas contrasting those we are interested
in. In other words, it must fit the data reasonably well to avoid numerous false
discoveries, but not too well so that deviations can emerge.
A natural option could consist in selecting a null model among the series of random
graph models (e.g., Erdos-R´enyi, small-world, scale-free, SBM, Exponential Random
Graph, configuration model). However, we recommend not to use them too hastily
because they are often too general. For example, the Erdos-R´enyi model (all edges
independent and having the same probability of occurrence) is often a poor null model
to detect nodes having an unexpectedly high degree. Indeed, it induces a Poisson degree
distribution which is so far from the one observed in most networks that many nodes
appear to be unexpectedly connected. On the opposite, no node can display an
unexpectedly high degree with respect to the configuration model, as this null model
precisely fits to the degree of each node. Moreover, the analyst is usually aware of a
series of properties that should be displayed by a simulated network: imbalanced degree
distribution, different nodes' roles associated with available side information, forbidden
interactions (e.g., depending on body-mass in food webs [38]), etc. Such expected
properties must be encoded in the simulation process (for instance a fixed degree
sequence [34]), otherwise they will emerge and be detected as significant, or contribute
to detect false significant effects as side effects. As an example, when assessing whether
the number of feed-forward loops is unexpected in a given transcription network, the
simulation procedure must rely on fixed number of nodes and degrees whereas the
6
number of these loops remains free.
Lastly, when the network under study is not directly observed but built from raw
data interpretation, it can be relevant to simulate the whole construction process.
Consider the case of contact networks inferred from movement data [23]: one can either
simulate trajectories keeping some properties of the original data and then build a
contact network, or directly simulate a "realistic" contact network. The former
approach will intrinsically account for the uncertainties and biases induced by the
construction steps, which are likely to be overlooked by the later approach.
Tip 8: Reconsider the data to build multiple network
layers
A network object can be the result of data aggregation. Indeed, interactions are often
observed at different times, locations or for different conditions. You are therefore
strongly urged to keep in mind (and at hand) the different layers of data (time, space,
type,...) and consider networks composed by multiple layers, because multilayer
networks can provide new insights compared to an aggregated one [39 -- 41].
A network is called dynamic when it gathers a time series of network snapshots
corresponding to successive rounds of data collection (the nodes' list possibly varying in
time). In this case, the temporal variability of the network structure can be assessed
(e.g., rewiring of interactions or changes in network metrics over time) and extensions of
the concepts developed in Tip 6 now exist in the dynamic case [42, 43]. For instance, the
dynamics of animal social structure can be inferred from dynamic networks to enhance
the understanding of disease transmission [44]. On another hand, interactions can be
observed at different spatial locations. In ecology, they are often aggregated in a
metanetwork (or metaweb [45]) to study how the local networks differ from this
metanetwork and explain these variations with environmental factors. In these two
cases, multiple layers allows to describe a network as an evolving object and the analysis
aim to identify the spatio-temporal variations of interactions and their drivers.
Different kind of interactions can also be observed between nodes. Stacking layers
representing molecular interactions in different human tissues [46] or mapping
extrasynaptic and synaptic connectomes [47] leads to a multiplex network: between any
two nodes, there possibly exist more than one edge, one per interaction type at most
(often visualized with different colors). Taking jointly into account the different layers
enhances the understanding of the nodes' interplay. For instance, using jointly trophic
and non-trophic interactions enhances the definition of species ecological roles compared
to the use of single layers independently [34]. Finally, it is also possible to integrate
different layers of information with different sets of nodes for each layer, such as
proteins and chemical compounds [48]. In this case, different kind of interactions are
defined inside and between layers. In all these cases, different information layers are
integrated into a comprehensive network such that they are treated jointly rather than
one after the other.
Tip 9: Dive into the network literature, beyond your
discipline
Network science has emerged "at the dawn of the 21st century" [49]. It now involves a
hyper-active community of researchers from different domains such as Physics,
Statistics, Computer Science or Social Science. As a result, a massive literature on
networks exists and it is challenging for biologists to dive into it. Indeed, we are not
7
used to explore the bibliography outside our research domain. Reference
books [5, 41, 49, 50] and reviews [22, 39, 51] are obviously good entry-points for
developing your network skills. However, without any doubt you will highly benefit
from a round trip in this literature exogenous to your field, provided that you make the
effort to learn the appropriate vocabulary of this area.
Conclusion
The 9 tips presented here should be a way for the data analyst to get a foot in the door
of network data analysis. These tips are not exclusive and we are aware of other
network-based questions that deserve a special interest, including diffusion on networks
for instance. Still, the network non-specialist must be confident in his ability to learn,
step by step, the network concepts and methods with a productive effect on his
scientific questions.
Acknowledgements
This work was partially supported by the grant ANR-18-CE02-0010-01 of the French
National Research Agency ANR (project EcoNet).
References
1. T. Ideker and R. Nussinov, "Network approaches and applications in biology,"
PLoS computational biology, vol. 13, no. 10, p. e1005771, 2017.
2. M. Zitnik, R. Sosi, and J. Leskovec, "Prioritizing network communities," Nat
Commun, vol. 9, no. 1, p. 2544, 2018.
3. B. Wang, A. Pourshafeie, M. Zitnik, J. Zhu, C. D. Bustamante, S. Batzoglou, and
J. Leskovec, "Network enhancement as a general method to denoise weighted
biological networks," Nat Commun, vol. 9, no. 1, p. 3108, 2018.
4. R. E. Kass, B. S. Caffo, M. Davidian, X.-L. Meng, B. Yu, and N. Reid, "Ten
simple rules for effective statistical practice," 2016.
5. R. Diestel, "Graph theory." http://diestel-graph-theory.com, 2016.
6. A. Barrat, M. Barthelemy, R. Pastor-Satorras, and A. Vespignani, "The
architecture of complex weighted networks," Proceedings of the national academy
of sciences, vol. 101, no. 11, pp. 3747 -- 3752, 2004.
7. P. P. Staniczenko, J. C. Kopp, and S. Allesina, "The ghost of nestedness in
ecological networks," Nature communications, vol. 4, p. 1391, 2013.
8. G. A. Pavlopoulos, P. I. Kontou, A. Pavlopoulou, C. Bouyioukos, E. Markou, and
P. G. Bagos, "Bipartite graphs in systems biology and medicine: a survey of
methods and applications," GigaScience, vol. 7, no. 4, p. giy014, 2018.
9. V. Miele, F. Picard, and S. Dray, "Spatially constrained clustering of ecological
networks," Methods in Ecology and Evolution, vol. 5, no. 8, pp. 771 -- 779, 2014.
10. P. Expert, T. S. Evans, V. D. Blondel, and R. Lambiotte, "Uncovering
space-independent communities in spatial networks," Proceedings of the National
Academy of Sciences, vol. 108, no. 19, pp. 7663 -- 7668, 2011.
8
11. M. Mariadassou, S. Robin, C. Vacher, et al., "Uncovering latent structure in
valued graphs: a variational approach," The Annals of Applied Statistics, vol. 4,
no. 2, pp. 715 -- 742, 2010.
12. M. A. Fortuna, R. G. Albaladejo, L. Fern´andez, A. Aparicio, and J. Bascompte,
"Networks of spatial genetic variation across species," Proceedings of the National
Academy of Sciences, vol. 106, no. 45, pp. 19044 -- 19049, 2009.
13. D. Hric, R. K. Darst, and S. Fortunato, "Community detection in networks:
Structural communities versus ground truth," Physical Review E, vol. 90, no. 6,
p. 062805, 2014.
14. R. Rossi and N. Ahmed, "The network data repository with interactive graph
analytics and visualization," in Twenty-Ninth AAAI Conference on Artificial
Intelligence, 2015.
15. G. K. Sandve, A. Nekrutenko, J. Taylor, and E. Hovig, "Ten simple rules for
reproducible computational research," PLoS Comput. Biol., vol. 9, no. 10,
p. e1003285, 2013.
16. M. A. Carey and J. A. Papin, "Ten simple rules for biologists learning to
program," PLoS Comput. Biol., vol. 14, no. 1, p. e1005871, 2018.
17. J. W. Tukey, Exploratory data analysis. Reading: Addison-Wesley, 1977.
18. M. Krzywinski, I. Birol, S. J. Jones, and M. A. Marra, "Hive plots -- rational
approach to visualizing networks," Briefings in Bioinformatics, vol. 13, no. 5,
pp. 627 -- 644, 2011.
19. M. Rubinov and O. Sporns, "Complex network measures of brain connectivity:
uses and interpretations," Neuroimage, vol. 52, no. 3, pp. 1059 -- 1069, 2010.
20. J. Bascompte, P. Jordano, C. J. Meli´an, and J. M. Olesen, "The nested assembly
of plant -- animal mutualistic networks," Proceedings of the National Academy of
Sciences, vol. 100, no. 16, pp. 9383 -- 9387, 2003.
21. R. E. Van Dijk, J. C. Kaden, A. Arguelles-Tic´o, D. A. Dawson, T. Burke, and
B. J. Hatchwell, "Cooperative investment in public goods is kin directed in
communal nests of social birds," Ecology letters, vol. 17, no. 9, pp. 1141 -- 1148,
2014.
22. S. Fortunato and D. Hric, "Community detection in networks: A user guide,"
Physics Reports, vol. 659, pp. 1 -- 44, 2016.
23. D. R. Farine and H. Whitehead, "Constructing, conducting and interpreting
animal social network analysis," J Anim Ecol, vol. 84, no. 5, pp. 1144 -- 1163, 2015.
24. A. Costa, A. M. M. Gonzalez, K. Guizien, A. M. Doglioli, J. M. Gomez,
A. Petrenko, and S. Allesina, "Ecological networks: Pursuing the shortest path,
however narrow and crooked," bioRxiv, p. 475715, 2018.
25. B. C. Van Wijk, C. J. Stam, and A. Daffertshofer, "Comparing brain networks of
different size and connectivity density using graph theory," PloS one, vol. 5,
no. 10, p. e13701, 2010.
26. L. Pellissier, C. Albouy, J. Bascompte, N. Farwig, C. Graham, M. Loreau, M. A.
Maglianesi, C. J. Meli´an, C. Pitteloud, T. Roslin, et al., "Comparing species
interaction networks along environmental gradients," Biological Reviews, vol. 93,
no. 2, pp. 785 -- 800, 2018.
9
27. S. Fortunato and M. Barthelemy, "Resolution limit in community detection,"
Proceedings of the National Academy of Sciences, vol. 104, no. 1, pp. 36 -- 41, 2007.
28. S. Kortsch, R. Primicerio, M. Aschan, S. Lind, A. V. Dolgov, and B. Planque,
"Food-web structure varies along environmental gradients in a high-latitude
marine ecosystem," Ecography, vol. 42, no. 2, pp. 295 -- 308, 2019.
29. H. K. Norton, D. J. Emerson, H. Huang, J. Kim, K. R. Titus, S. Gu, D. S.
Bassett, and J. E. Phillips-Cremins, "Detecting hierarchical genome folding with
network modularity," Nature methods, vol. 15, no. 2, p. 119, 2018.
30. S. Allesina and M. Pascual, "Food web models: a plea for groups," Ecol. Lett.,
vol. 12, no. 7, pp. 652 -- 662, 2009.
31. M. E. Newman and E. A. Leicht, "Mixture models and exploratory analysis in
networks," Proceedings of the National Academy of Sciences, vol. 104, no. 23,
pp. 9564 -- 9569, 2007.
32. R. F. Betzel, J. D. Medaglia, and D. S. Bassett, "Diversity of meso-scale
architecture in human and non-human connectomes," Nature Communications,
vol. 9, no. 1, p. 346, 2018.
33. J.-J. Daudin, F. Picard, and S. Robin, "A mixture model for random graphs,"
Statistics and computing, vol. 18, no. 2, pp. 173 -- 183, 2008.
34. S. K´efi, V. Miele, E. A. Wieters, S. A. Navarrete, and E. L. Berlow, "How
Structured Is the Entangled Bank? The Surprisingly Simple Organization of
Multiplex Ecological Networks Leads to Increased Persistence and Resilience,"
PLoS Biol., vol. 14, no. 8, p. e1002527, 2016.
35. D. B. Stouffer, M. Sales-Pardo, M. I. Sirer, and J. Bascompte, "Evolutionary
conservation of species' roles in food webs," Science, vol. 335, no. 6075,
pp. 1489 -- 1492, 2012.
36. B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of social
representations," in Proceedings of the 20th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, KDD '14, (New York, NY,
USA), pp. 701 -- 710, ACM, 2014.
37. A. Grover and J. Leskovec, "node2vec: Scalable feature learning for networks," in
Proceedings of the 22nd ACM SIGKDD international conference on Knowledge
discovery and data mining, pp. 855 -- 864, ACM, 2016.
38. U. Brose, T. Jonsson, E. L. Berlow, P. Warren, C. Banasek-Richter, L.-F. Bersier,
J. L. Blanchard, T. Brey, S. R. Carpenter, M.-F. C. Blandenier, et al.,
"Consumer -- resource body-size relationships in natural food webs," Ecology,
vol. 87, no. 10, pp. 2411 -- 2417, 2006.
39. S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio, J. G´omez-Gardenes,
M. Romance, I. Sendina-Nadal, Z. Wang, and M. Zanin, "The structure and
dynamics of multilayer networks," Physics Reports, vol. 544, no. 1, pp. 1 -- 122,
2014.
40. S. Pilosof, M. A. Porter, M. Pascual, and S. K´efi, "The multilayer nature of
ecological networks," Nature Ecology & Evolution, vol. 1, no. 4, p. 0101, 2017.
41. G. Bianconi, Multilayer Networks: Structure and Function. Oxford university
press, 2018.
10
42. C. Matias and V. Miele, "Statistical clustering of temporal networks through a
dynamic stochastic block model," Journal of the Royal Statistical Society: Series
B (Statistical Methodology), vol. 79, no. 4, pp. 1119 -- 1141, 2017.
43. G. Rossetti and R. Cazabet, "Community discovery in dynamic networks: a
survey," ACM Computing Surveys (CSUR), vol. 51, no. 2, p. 35, 2018.
44. D. Farine, "The dynamics of transmission and the dynamics of networks,"
Journal of Animal Ecology, vol. 86, no. 3, pp. 415 -- 418, 2017.
45. M. Ohlmann, V. Miele, S. Dray, L. Chalmandrier, L. O'Connor, and W. Thuiller,
"Diversity indices for ecological networks: a unifying framework using Hill
numbers," Ecology letters, 2019.
46. M. Zitnik and J. Leskovec, "Predicting multicellular function through multi-layer
tissue networks," Bioinformatics, vol. 33, no. 14, pp. i190 -- i198, 2017.
47. B. Bentley, R. Branicky, C. L. Barnes, Y. L. Chew, E. Yemini, E. T. Bullmore,
P. E. V´ertes, and W. R. Schafer, "The multilayer connectome of caenorhabditis
elegans," PLoS computational biology, vol. 12, no. 12, p. e1005283, 2016.
48. A. J. Berenstein, M. P. Magarinos, A. Chernomoretz, and F. Aguero, "A
multilayer network approach for guiding drug repositioning in neglected diseases,"
PLoS neglected tropical diseases, vol. 10, no. 1, p. e0004300, 2016.
49. A.-L. Barab´asi, "Network science." http://networksciencebook.com, 2019.
50. M. Newman, Networks. Oxford university press, 2018.
51. P. Goyal and E. Ferrara, "Graph embedding techniques, applications, and
performance: A survey," Knowledge-Based Systems, vol. 151, pp. 78 -- 94, 2018.
11
|
1308.1118 | 1 | 1308 | 2013-08-05T21:00:08 | Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks | [
"cs.SI",
"physics.soc-ph"
] | With the growing amount of mobile social media, offline ephemeral social networks (OffESNs) are receiving more and more attentions. Offline ephemeral social networks (OffESNs) are the networks created ad-hoc at a specific location for a specific purpose and lasting for short period of time, relying on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices. The primary purpose of people in the OffESNs is to acquire and share information via attending prescheduled events. Event Recommendation over this kind of networks can facilitate attendees on selecting the prescheduled events and organizers on making resource planning. However, because of lack of users preference and rating information, as well as explicit social relations, both rating based traditional recommendation methods and social-trust based recommendation methods can no longer work well to recommend events in the OffESNs. To address the challenges such as how to derive users latent preferences and social relations and how to fuse the latent information in a unified model, we first construct two heterogeneous interaction social networks, an event participation network and a physical proximity network. Then, we use them to derive users latent preferences and latent networks on social relations, including like-minded peers, co-attendees and friends. Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise factor graph to infer event attendance probabilities for recommendation. Experiments on an RFID-based real conference dataset have demonstrated the effectiveness of the proposed model compared with typical solutions. | cs.SI | cs | Latent Networks Fusion based Model for Event Recommendation
in Offline Ephemeral Social Networks
Guoqiong Liao, Yuchen Zhao, Sihong Xie, Philip S. Yu
lasting for some short period of time. The networks primarily rely
on mobile social media such as Radio Frequency Identification
(RFID) and Bluetooth devices to facilitate people connecting with
each other freely[1-5].
Differing from online social networks, where people tend to share
recent experiences and make
long-standing
friends with
relationships, the OffESNs are face-to-face interaction and event-
driven dynamic networks, where people are apt to share
information and make temporary friends via physical proximity[6].
Some fundamental and important questions of the OffESNs still
remain unexplored. For example, what are the factors to influence
users’ behaviors? Is there any latent social relation in the
networks? Can we recommend events effectively by the latent
social relations? And so on.
Basically, the primary purpose of people in the OffESNs is to
acquire and share information via attending some prescheduled
events such as keynotes, talks or exhibitions. It is an interesting
and important work to make personalized recommendation over
this kind of events. On the one hand, it can help attendees identify
the potential conflict on multiple scheduling events and facilitate
them making attendance decisions easily, since it is a common
phenomenon in the networks that there are multiple events to be
scheduled simultaneously due to the constraint of short period. On
the other hand, it can also help event organizers guide resource
planning. For example, if we can predict, based on the
recommendation results, that the number of the people who will
attend a future event is more than the capacity of its assigned
room, the organizers can reassign a larger room for the event in
advance.
Motivating example. Let’s consider a scenario of an academic
conference held in a specific hotel, where many people gather
together for a few days, to attend keynotes or parallel sessions, or
share personal experiences with their friends freely. This is a
typically scenario of the OffESNs where people can make free
face-to-face
interactions frequently. For example, Bob
is
attending a conference, where there are 10 talks to be held during
10:00am~11:00am, on the first day. Our task is to recommend a
ranked list of the 10 events to Bob by his individual features and
the latent social relations. Moreover, we can provide the predicted
numbers of people attending the future events to the organizers
for resource allocation.
In the research domain of recommender systems, numerous
studies have focused on item recommendation (e.g., movies,
books, commodities). Such systems are widely implemented in e-
commerce systems according to users’ historical rating data[7].
Recently, with the popularity of social networks, social-trust
based recommendation has recently been proposed to improve
recommendation accuracy[8-11]. However, both of the two kinds of
methods can no longer work well to recommend the events in the
OffESNs due to following reasons.
− Lack of users’ preference and rating information. Differing
from the item recommendation in the Web, it is difficult to
ask people to provide their real preference and give comments
or ratings on the occurred events in the offline environment.
Although we can retrieve a user’s features such as research
ABSTRACT
With the growing amount of mobile social media, offline
ephemeral social networks (OffESNs) are receiving more and
more attentions. Offline ephemeral social networks (OffESNs) are
the networks created ad-hoc at a specific location for a specific
purpose and lasting for short period of time, relying on mobile
social media such as Radio Frequency Identification (RFID) and
Bluetooth devices. The primary purpose of people in the OffESNs
is to acquire and share information via attending prescheduled
events. Event Recommendation over this kind of networks can
facilitate attendees on selecting the prescheduled events and
organizers on making resource planning. However, because of
lack of users’ preference and rating information, as well as
explicit
social
relations, both
rating based
traditional
recommendation methods and social-trust based recommendation
methods can no longer work well to recommend events in the
OffESNs. To address the challenges such as how to derive users’
latent preferences and social relations and how to fuse the latent
information
in a unified model, we first construct
two
heterogeneous interaction social networks, an event participation
network and a physical proximity network. Then, we use them to
derive users’ latent preferences and latent networks on social
relations, including like-minded peers, co-attendees and friends.
Finally, we propose an LNF (Latent Networks Fusion) model
under a pairwise factor graph
infer event attendance
to
probabilities for recommendation. Experiments on an RFID-
based real conference dataset have demonstrated the effectiveness
of the proposed model compared with typical solutions.
Categories and Subject Descriptors
H2.8 [Data Mining]: Database Application – data mining
General Terms
Algorithms; Performance; Design; Experimentation
Keywords
Event recommendation; Ephemeral social networks; Offline
social networks; Heterogeneous networks; Factor graph model
1. INTRODUCTION
W i t h t h e g r ow ing amoun t o f mob i l e so c i a l m ed i a , o f f l in e
ephemeral social networks (OffESNs) are receiving more and
more attentions. The OffESNs are defined as a kind of offline
social networks created ad-hoc at a specific location for a specific
purpose, e.g., hosting an academic conference or an expo, and
Guoqiong Liao is with the School of Information Technology, Jiangxi
University of Finance and Economics, Nanchang 330013, China. E-mail:
[email protected] . This work was done when he visited UIC.
Yuchen Zhao is with Sumo Logic, Redwood 94063, USA. E-mail: zycemail
@gmail.com. This work was done when he was a Ph. D. student at UIC.
Sihong Xie is with the Department of Computer Sciences, University of Illinois
at Chicago(UIC), Chicago 60607, USA.E-mail: [email protected].
Philip S. Yu is with the Department of Computer Sciences, University of Illinois
at Chicago(UIC), Chicago 60607, USA.E-mail: [email protected].
1
interests from the Web, we still don’t know exactly which
event is his/her favorite when he/she faces multiple events at
the same
time. Hence,
the
rating based
traditional
recommendation methods become invalid in the OffESNs.
− Lack of explicit social relations information. In general, we
usually don’t know who old friends are or who will become
new friends in the offline networks, so it is also difficult to
obtain trusted social relations for recommendation. Zhuang et
al.[2] used the online information such as co-authorships to
facilitate predicting whether a pair of users will meet together
in future time in a conference scenario. But the co-author
relationships don’t mean trusted relationships. Moreover, in
some offline scenarios such as the expos, there are no co-
authorships. Thus, the social-trust based methods cannot be
used for event recommendation in the OffESNs effectively too.
Therefore, it is necessary to study new methods to recommend the
events in the OffESNs. According to our observations, whether
people attend the prescheduled events in the OffESNs are mainly
determined by the factors in two aspects: individual interests or
preferences on event contexts; social relations such as like-
minded peers, co-attendees and friends, which are very useful for
event recommendation. Unfortunately, we have little explicit
information about them. Hence, there are two major challenges to
recommend events in the networks:
− How to derive users’ latent preferences and the latent social
relations
interaction
the observed historical
from
information in the networks?
− How to fuse multiple latent networks on social relations into
a unified model to recommend the events effectively?
To address the challenges, we first construct two observed
heterogeneous
interaction networks, an event participation
network from human-event interactions and a physical proximity
network from human-human interactions, to derive the latent
preferences and the social relation networks. Then, we establish a
fusion model
to merge
the
latent networks
to
infer
the
probabilities that users will attend the future events. Finally, based
on the probabilities, a ranked event list is recommended to each
user.
To the best of our knowledge, this paper is the first work to define,
construct and fuse multiple latent social networks for event
recommendation in the offline social networks. Specifically, our
contributions can be summarized as follows.
− We model the activities in the OffESNs as prescheduled events
two observed
and spontaneous events, and construct
heterogeneous interaction networks: an event participation
network and a physical proximity network.
− Based on the statistical measures on the two heterogeneous
networks, we derive users’ latent context preferences and
three latent social relation networks, including a preference
similarity network, an attendance relevancy network and an
encounter network, to identify the social relations of like-
minded peers, co-attendees and friends.
− We propose an effective Latent Networks Fusion (LNF) model
based on a pairwise factor graph to fuse the three latent
networks to infer the probabilities that users will attend the
future events based upon their contexts, and provide a ranked
event list for each user.
2
− Experiments on a real RFID-based conference dataset have
demonstrated the effectiveness of our approach.
The rest of the paper is arranged as follows. We introduce the two
heterogeneous interaction networks and problem statement in
Section 2. In Section 3, we discuss our observations, and derive
users’ latent preferences and multiple latent social relation
networks. We suggest a Latent Networks Fusion (LNF) model to
fuse
infer event attendance
to
latent networks
three
the
probabilities and give an event ranking algorithm in section 4. In
Section 5, we verify and evaluate the performance of the proposed
model-based recommendation methods under a RFID-based real
dataset. Section 6 is the related works, and we conclude the paper
in the end.
2. HETEROGENOUS SOURCES AND
PROBLEM STATEMENT
2.1 Heterogeneous interaction networks
In the OffESNs, people not only attend the prescheduled events,
but also like to gather together spontaneously to talk about their
common interests. Hence, the networks will generate a great deal
of interaction information. In this work, we represent all activities
in the networks as events.
Definition 1 (prescheduled events). The prescheduled event is a
scheduled social activity organized by the sponsors, e.g., an
opening ceremony, a keynote or a talk. Such events usually have
context information such as topics, time, locations, etc.
From the prescheduled events, we can obtain a lot of ephemeral
human-event interaction information, e.g., event participation
durations.
Definition 2 (spontaneous events). The spontaneous event is a
social activity initiated spontaneously by two or more people,
such as having lunch together, talking about papers, news or else.
Such events are unpredictable and are generated occasionally.
Differing from the prescheduled events, sometimes we don’t
know what people are actually doing in the spontaneous events.
But from such events, we can obtain a great amount of sporadic
human-human interactions (i.e., physical proximity) information,
e.g., encounter durations and frequencies. Physical proximity is a
significant metric to quantify users’ offline behaviors[6]. For
example, one may have much more physical proximity
information with his friends than with other people.
Note that the recommendation task discussed in this paper is to
recommend the prescheduled events. If there is no specific
statement, the events mentioned in the paper indicate the
prescheduled events.
Definition 3 (physical proximity). If two or more people are
involving in a spontaneous event for some period of time detected
by the sensor devices, it is said that they are in physical proximity.
i.e., they are encountering.
Physical proximity indicates the face-to-face interactions only
generated from the spontaneous events, while the proximity due
to attending the prescheduled events will be represented as
another kinds of relations - co-attendees, which will be discussed
in Section 3.1. In order to eliminate the noisy proximity
information, it is required that the lasting time of each encounter
should be longer than a duration threshold, which is determined
by the specific scenario. In addition, although physical proximity
is related to locations, here we put more attention on the facts that
two or more people stay closely together. Therefore, the locations
are not relevant information here.
Thus, from the above two kinds of events, we can establish two
observed heterogeneous
interaction networks:
an
event
participation (human-event interaction) network and a physical
proximity (human-human interaction) network.
Fig. 1(a) is an example of the event participation network to
record the 4 users’ participation history on the prescheduled
events till t is 2. In each time, 3 events were held simultaneously.
The network is a bipartite graph including user nodes (u1~u4) and
event nodes (e1.1~e1.3, e2.1~e2.3.). The edge attribute is the
participation duration of the specific user on the specific event.
The example of the physical proximity network is shown as Fig.
1(b), which is used to record the encounter information between
the users. The network only contains one kind of nodes – user
nodes (u1~u4). For a pair of users may encounter many times, it is
possible for a pair to have multiple edges. The edge attribute in
the network is the encounter duration.
u1
u2
u3
u4
u1
u2
u4
e1.1
e1.3
e2.3
e2.1
e1.2
e2.2
u3
t=1
t=2
(b) physical proximity network
(a) event participation network
Figure 1. Observed heterogeneous interaction networks in the OffESNs
2.2 Problem statement
In this work, we use a part of data as the training set. Let ts be the
begin time of the overall social event, te be the end time, and t∈[ts,
te]. We consider the events during [ts, t] as training data and the
events during (t, te] as testing data for recommendation. We first
define the input heterogeneous interaction networks formally, and
then state our problem.
Definition 4
(event participation network). The event
t=<Ut, Et, Xt>, where
participation network is denoted as GE
Ut={ui}(i=1, 2, .., N) is the set of user nodes, Et ={ej,k,}(j=1, 2, .., t;
k=1, 2, .., M) is the set of prescheduled event nodes occurring till
t, and an edge x=(ui, ej,k)∈Xt represents
the event
time
participation relationship between ui and ej,k, where the edge
weight is the duration that ui attended ej,k.
t is a dynamic and incremental graph, where new edges will be
GE
added over time, i.e.
t=<Ut, Et, Xt> = GE
t-1∪ gE
t = gE
t-1∪ gE
t (1)
2∪…∪gE
1∪gE
GE
t=<ut, et, xt> is an event participation sub-graph at time t.
where gE
Of which, ut, et and xt are the sets of users, prescheduled events
and participation relationships at t respectively.
Definition 5
(physical proximity network). The physical
t=(Ut, Yt), where Ut is the set
proximity network is denoted as GP
of user nodes and an edge y=(ui, uj)∈Yt represents the physical
proximity relationship between ui and uj, where the edge weight is
the encounter duration.
t, GP
t, and a set of prescheduled events
Problem 1. Given GE
et+1={et+1,1, et+1,2, …} at time t+1. The goal of the work is to infer
the probabilities that each user in ui∈U t will attend each event
et+1,j∈et+1, and rank the events based on the probabilities for
personalized recommendation.
3
3. BUILDING LATENT NETWORKS ON
SOCIAL RELATIONS
3.1 Observations
According to our observations, whether a user attends an event is
influenced by following factors:
− His/her own preferences on the context of the event, i.e.,
explicit preferences
− The actions of the users having similar preferences, i.e.,
implicit preferences
− The actions of his/her friends
Thus, we can group the people in the OffESNs into three kinds of
social relations as following:
− SRA: The users who usually attend the events with the same
contexts (they aren’t required to attend the same events),
called as like-minded peers.
− SRB: The users who usually attend the same events together,
called as co-attendees.
− SRC: The users who usually encounter in the spontaneous
events, called as friends.
However, both of the preferences and the social relations are
latent
the observed
to use
intend
the OffESNs, we
in
heterogeneous interaction networks to derive them.
3.2 Interaction measures in OffESNs
An event refers to a real-world occurrence, which is described
using the attributes such as who, where, when and what. The
contextual attributes are application dependent[14]. For example, in
the applications of location-based services (LBS), locations and
time are critical aspects of their contexts. But in the OffESNs, for
all prescheduled events are held in a building and last for a short
period of time, people are more concerned with event topics than
with the locations and time. Therefore, this work only considers
the aspect of “what” as the context attributes. Note only the
prescheduled events have the context attributes.
Definition 6 (event context). We refer event topics as the contexts
of the prescheduled events. The set of contexts is denoted as
C={ci}, i=1,2, …d, where ci represents the i-th context.
Thus we use the topics to represent the features of the
prescheduled events. In general, an event can have more than one
context, and a context can correspond to multiple events. Whether
a user likes an event is determined whether he/she likes the
t to get
contexts of the event. We first use the observed network GE
the measures about context participation.
Definition 7 (context participation frequency). The context
participation frequency is the count that ui has attended the events
with context cj, which is equal to the number of the edges
t, denoted as PFij.
connecting ui and the events with cj in GE
Definition 8
time). The context
(context participation
participation time is the sum of all durations that ui has attended
the events with cj, denoted as PTij, i.e.,
ijPF
PTij= ∑
k
1
=
k is the duration of ui’s k-th attendance on cj, which is
where PDij
t.
equal to the weight of the corresponding edge in GE
(2)
ijPD
k
We can also obtain the measures about encounter from the
t.
observed network GP
Definition 9 (encounter frequency). The encounter frequency is
the count that ui and uj have encountered in the spontaneous
events, which is equal to the number of the edges between ui and
t, denoted as EFij.
uj in GP
Definition 10 (encounter time). The encounter time is the sum of
all durations that ui and uj have encountered in the spontaneous
events, denoted as ETij, i.e.
ijEF
ETij= ∑
k
1
=
k is the duration of the k-th encounter, which is equal to
where EDij
t.
the weight of the corresponding edge in GP
(3)
ijED
k
3.3 Derivation of latent information
Based on the measures mentioned above, this section first derives
users’ latent context preferences, and then derive and construct
three latent networks on social relations including a preference
similarity network, an attendance relevancy network and an
encounter network, to identify the social relations such as like-
minded peers, co-attendees and friends.
Derivation of the latent preferences
Because a user is usually interested in multiple contexts, we use a
d-dimensional attribute vector zi to denote ui’s latent preferences,
where the j-th dimension attribute zij represents the preference that
ui on cj.
Intuitively, the longer the time that a user attends an event is, the
more interests he has on the event contexts. Thus, we intend to
explore the context participation time to represent user’s latent
feedback.
Definition 11 (latent context preference). The latent context
preference zij is the ratio between ui’s participation time on cj and
the total session time of cj, i.e.,
t
/
t
=
/
=
z
ij
ST
j
ST
j
PT
ij
PD
k
ij
∑
Ec
∈
j
(4)
PF
ij
∑
∑
k
1
Ec
=
∈
j
where STj is each session time of cj.
Derivation of the latent networks on social relations
We can drive the latent social relation networks from the context
t and GP
t.
preference, the observed networks GE
For the overall context preferences of different users are
difference, we use the adjusted cosine similarity[15] to represent
users’ preference similarity by subtracting the corresponding
average context preferences.
Definition 12 (preference similarity). The preference similarity is
the measure to describe the similar degree based on context
preferences between a pair of users ui and uj, denoted as λij:
∑
d
z
z
z
z
(
)
)(
−
−
jk
k
∑
∑
n
d
z
z
(
(
)
k
k
1
1
=
=
jz are the average preferences of ui and uj,
iz and
where
respectively.
For λij∈[-1, 1],we normalize it by Equation (6).
(5)
ijλ =
ik
z
i
−
−
z
j
2
)
jk
1
=
ik
i
2
j
4
μij =
ijλ =1-
(7)
(6)
cos 1
λ )
(
−
ij
π
Definition 13 (preference similarity network). The preference
t = (Ut, St), where Ut is the set
similarity network is denoted as GS
of user nodes, and each node ui∈Ut is associated with a d-
dimensional attribute vector zi, to denote ui’s preferences. An
edge s=(ui, uj)∈St represents the preference similarity relationship,
where the edge weight is equal to λij.
t be the K
Definition 14 (like-minded peers). Let KNN(i)\GS
t. If uj∈KNN(i)\GS
t, it is said that ui
nearest neighbors of ui in GS
and uj are like-minded peers.
In this work, we use the K-nearest-neighbor (KNN) method to
determine the like-minded peers for the users. That is, for each
t
user, we regard its K highest preference similarity neighbors in GS
as his/her like-minded peers. Therefore, we only need keep the
t.
connections between each node and its K nearest neighbors in GS
t, the more the neighbors (i.e., the common attendance
In GE
events) that two users have, the more relevant they are. But the
durations attending the same events of different users may be
different, so we use a weighted Jaccard’s Coefficient to calculate
attendance relevancy.
Definition 15 (attendance relevancy). The attendance relevancy
is the measure to describe the correlations degree that a pair of
users ui and uj attend events together, denoted as μij:
∑
eDeD
)(
)(
+
j
i
e
u
u
(
)
(
)
Γ∈
Γ∩
j
i
∑
∑
eD
eD
)(
)(
+
i
j
u
e
u
e
(
)
(
)
Γ∈
Γ∈
i
j
where Di(e) and Dj(e) are the durations that ui and uj attended the
same event e respectively, and Γ(ui) and Γ(uj) are the sets of
events that ui and uj have attended respectively.
Definition 16 (attendance relevancy network). The attendance
t=(Ut, Rt), where Ut is the set
relevancy network is denoted as GR
of user nodes and an edge r=(ui, uj)∈Rt represents the attendance
correlation between ui and uj, where the edge weight is equal to μij.
Definition 17 (co-attendees). Let φ be the threshold of the
attendance relevancy. If r=(ui, uj)∈Rt and μij≥φ, it is said that ui
and uj are co-attendees.
t has recorded the encounter information
The observed network GP
between each pair, so we can be used to derive the encounter
network.
Definition 18 (encounter network). The encounter network is
t = (Ut, Qt), where Ut is the set of user nodes and an
denoted as GQ
edge q=(ui, uj)∈Qt represents the encounter relationship, where
the edge weight is EFij or ETij.
We can obtain two kinds of encounter networks by the weight
used: frequency-based encounter networks using EFij and time-
based encounter networks using ETij. We will evaluate their
influence on recommendation performance in Section 5.
By intuitions, the more count or time that a pair of users have
encountered, the more closer they are, so that we can derive the
friendship relations from the encounter network.
Definition 19 (friends). Let δ be the threshold of the encounter
frequency, θ be the threshold of the encounter time. If q=(ui,
uj)∈Qt and EFij≥δ in frequency-based encounter networks or
EDij≥θ in time-based encounter networks, it is said that they are
friends.
4. EVENT RECOMMENDATION BASED
LATENT NETWORKS FUSION MODEL
4.1 Basic idea
By now, we obtain three latent social relation networks, which
have extracted all information from the observed heterogeneous
interaction networks. Although now we can explore collaborative
filtering (CF) methods[15-17] to recommend the events, since we
can find the similar users from the preference similarity network.
But in the OffESNs, besides users’ individual preferences, users’
actions are also influenced by the social relations, while the CF
methods cannot handle such complexity.
The graphical models have long been used for modeling
conditional dependency relationships between variables. An
innovation work in [18] unified both directed and undirected
graphical models as factor graphs, which provides a natural way
of representing global functions or probability distributions that
can be factored into simpler local functions, and is a widely used
representation for modeling complex dependencies amongst
hidden variables. Therefore, we intend to design a LNF model
based on a pairwise factor graph (PGF) to infer the hidden
probabilities that users will attend future events given the contexts.
The symbols used in this section are listed in Table 1.
Table1. Notations
Description
Symbol
t = (Ut, St)
GS
preference similarity network
t = (Ut, Rt)
GR
attendance relevancy network
t = (Ut, Qt)
GQ
encounter network
U t={ui}(i=1, 2, .., N) the set of users
t
St
the set of edges in GS
t
Rt
the set of edges in GR
Qt
t
the set of edges in GQ
ui
a user node or an observed variable
zi
ui’s context preference vector
the m-th attribute of zi
zim
Y={yi}(i=1, 2, .., N)
the set of hidden variables
yi
a single hidden variable
~{yi}
the set of variables in Y with yi removed
the m-th attribute of yi
yim
t)
g(yi,ui,KNN(i)\GS
attributes feature function
t
t
ui’s K nearest neighbors in GS
KNN(i)\GS
f(yi, yj)
attendance correlation function between yi
and yj
local constraint function between yi and yj
the set of event contexts
the m-th context in C
preference similarity between ui and uj
attendance relevancy between ui and uj
encounter frequency between ui and uj
encounter time between ui and uj
indicator function of attendance correlations
attendance correlation matrix between yi
and yj
behavior correlation between ui and uj
the threshold of attendance relevancy
the threshold of encounter frequency
the threshold of encounter time
the number of the nearest neighbors
a normalizing factor
h(yi, yj)
C={ci}(i=1, 2, .., d)
cm
λij
μij
EFij
ETij
αij
CMij
CRij
φ
δ
φ
K
Z
5
4.2 Latent networks fusion (LNF) model
The purpose of the latent networks fusion model is to incorporate
the three latent networks on social relations into a unified model,
to infer users’ overall desires to attend a specific event, i.e., to
predict how likely the users will attend a future event.
Figure 2 shows the fusion model under a pairwise factor graph
implementation, where each factor function only involves two
variable nodes. It is shown that all the three latent networks are
captured via two types of variable nodes (the circle nodes in Fig.
2) and three types of factor function nodes (the square nodes in
Fig. 2), which form the basic components of the model.
The corresponding relationships between
input
the
networks and the PFG components can be seen clearly:
t corresponds to
− The preference similarity network GS
observed variable nodes U={ui} and attribute feature
t);
function nodes g(yi, ui, KNN(i)\GS
t corresponds to the
− The attendance relevancy network GR
attendance correlation function nodes f(yi, yj) and the related
edges in the factor graph.;
t corresponds to the local
− The encounter network GQ
constraint function nodes h(yi, yj) and the related edges in
the factor graph.
latent
y1
y3
h(y3, y4 )
t)
g(y1, u1, KNN(1)\GS
y2
y4
f(y2, y4)
u1
u3
u1
u3
u1
u3
u2
u4
t
GS
u4
u2
GR
t
u2
u4
t
GQ
Figure 2. The pairwise factor graph implementation
4.3 Model definition
We give the definitions of the variable nodes and the factor
function nodes, and design the concrete factor functions in this
section.
Definition 20 (Observed variable nodes). The observed variable
t (the pink
nodes are the user nodes U={ui}(i=1, 2, .., N) in GS
circle nodes in Fig. 2), and ui has a d-dimension attribute vector zi.
Definition 21 (Hidden variable nodes). The hidden variable
nodes Y={yi}(i=1, 2, .., N) (the green circle nodes in Fig. 2)
correspond to the N observed variables nodes. Each yi is also a d-
dimension attribute vector, and each dimension attribute is a
binary discrete variables. For the m-th attribute yim, the value as
yim=1 represents the probability that ui will attend context cm; the
value as yim=0 represents the probability that ui will not attend
context cm.
Definition 22 (Attribute feature function nodes). The attribute
t) (the brown square
feature function nodes g(yi, ui, KNN(i)\GS
nodes in Fig. 2) define the correlations among the hidden
variables {yi}, yi’s corresponding observed variables ui and ui’s K
t, to represent the prior probabilities that ui
nearest neighbors in GS
t) in Fig. 2.
will attend each context, e.g., g(y1, u1, KNN(1)\GS
Definition 23 (Attendance correlation function nodes). The
attendance correlation function nodes f(yi, yj) (the yellow square
nodes in Fig. 2) represent the attendance correlations between the
hidden variables yi and yj, e.g., f(y2, y4) in Fig. 2.
Definition 24 (Local constraint function nodes). The local
constraint function nodes h(yi, yj) (the pink square nodes in Fig. 2)
reflect the constraint relations between the hidden variables yi and
yj, e.g., h(y3, y4) in Fig. 2.
Basically, the attribute feature functions such as g(yi, ui,
t) describe the attributes of the hidden variable nodes,
KNN(i)\GS
and the edge feature functions such as f(yi, yj) and h(yi, yj)
describe the conditional dependency relations between the hidden
variable nodes via edges.
Attribute feature functions
t) is defined on the input network GS
t. It
g(yi, ui, KNN(i)\GS
incorporates ui’s attribute vector zi and the attribute vectors of ui’s
t.
K nearest neighbors in GS
As the idea of the user-based collaborative filtering methods, the
users with similar context preferences have similar ratings on the
same things. We use the maximum value between ui’s original
preference zim and the weighted average preference of ui’s K
nearest neighbors on context cm as the prior probability of ui
attending cm, denoted as pim.
,
]
im
jm
im
z
z
p
=
(9)
max[
(8)
1
∑
λ
∑ ∈
ij
λ
t
Gi
j
KNN
\)(
ij
S
t
KNN
Gi
j
\)(
∈
S
The values of yi’s m-th attribute can be computed as:
pim yim =1
yg
KNN
z
Gi
t
,
,
(
=)
\)(
1-pim yim=0
im
im
S
Attendance correlation functions
f(yi, yj) is an edge feature function to describe how likely that ui
and uj attend the events together, i.e.,
f(yi, yj) = αij* CMij (10)
where αij is an indicator function to represent whether there is an
t and the weight of the edge is more
edge between ui and uj in GR
than φ, to filter the weak co-attendance relations.
1 μij≥φ, i.e., ui and uj are co-attendees
0 otherwise
We represent the attendance correlations of each pair as a
discretized correlations matrix CMij as shown in Table 2, where
CRij represents the behavior correlation between ui and uj in
t.
different combinations, which is derived from the weight μij in GR
Table 2. Definition of CMij
yi
CRij
yj
0
0
μij
1
0
1-μij
1
0
1-μij
1
1
μij
=ijα
(11)
The semantic of the matrix is: the cases of yi=0, yj=0 and yi=1,
6
=)
i yyh
,
(
yj=1 indicate ui and uj take the same actions: for any event, either
they don’t attend, or they attend together; the cases of yi=1, yj=0
and yi=0, yj=1 indicate ui and uj take different actions: for any
event, either yi attends, or yj attends.
Local constraint functions
We define the local constraint function h(yi, yj) as an indicator
t as an input, i.e.,
function, taking friend relations in GQ
1 EFij≥ δ or EDij≥θ, i.e., ui and uj are friends
(12)
0 otherwise
Note the choice of EFij or EDij in the condition of Equation (12) is
determined by the weight that the encounter network uses.
4.4 Probability inference and ranking algorithm
Based on the PFG implementation, we can formalize the context
attendance probabilities as calculating the marginal probabilities
of yi conditioned on the factor graph G(Y) as:
∑=
YGyp
YGy
yyp
(
(
(
(
))
,...
,
i
n
1
iy
}{~
YGy
yyp
is the joint probability of all hidden
where
))
(
,...
,
(
n
2
1
variables in the PFG, which can be computed as Equation(13).
YGy
yyp
=
(
,
))
(
,...
n
1
[(1
Z
yyhyyf
(
,
()
,
i
j
i
(13)
N
d
∏ ∏
i
m
1
1
=
=
N
N
∏ ∏
i
j
1
1
=
=
Gi
\)(
KNN
yg
(
]))
))
))
•
z
im
(
,
im
,
j
j
2
2
t
S
(14)
where Z is a normalizing factor.
We use a widely used approximate iterative algorithm - loopy
belief propagation (LBP)[19]
to
infer
the
joint probability
distribution and the marginal probabilities. We omit the details
due to the space limitation.
After obtaining the marginal probabilities, we can easily rank the
parallel events as Algorithm 1.
Algorithm 1. Event-ranking ( ).
INPUT:
ut+1={ut+1, i}, i=1,2, …, n; /* the set of users at time t+1*/
et+1={et+1, j}, j =1, 2, ..., k; /* the set of events at time t+1*/
OUTPUT:
t+1}}, i=1,2,…, n; /* the set of ranked event lists */
{{ei
BEGIN
① Ct+1:=∅; /*initialization of the set of contexts*/
② for j=1 to k
③ Ct+1, j:= GetContext(et+1, j); /* get context of each event*/
④ Ct+1:= Ct+1 ∪ Ct+1, j
⑤ end for
⑥ for i=1 to n
⑦ for j=1 to k
⑧ pij=GetProb(p(yij=1)) /*get marginal probabilities */
⑨ end for
t+1}=RankDescend (pi1, pi2, …, pik)
⑩ {ei
⑪ /* order by the probabilities in the descending order*/
⑫ end for
END
0.1
0
0.25
0.2
0.3
0.25
0.2
0.15
0.1
0.05
0
0.15
0.05
y
t
i
l
i
b
a
b
o
r
P
Talk p articipat ion coun t
1
Talk part icipat ion du rat ion
1
[1,5]
[6,10]
[11,15]
[16,20]
[21,25]
[26.30]
>30
(0,3)
[3,5)
[5,10)
[10,15)
[15,20)
[20,25)
[25,30)
[30,35)
[35,40)
[40,45)
[45,50]
Fig.3 Probability analysis of talk
participation durations
encounter records including for each pair (A, B), the ID numbers
of A and B, and their encounter duration.
y
t
i
l
i
b
a
b
o
r
P
Fig. 5 demonstrates the probability distribution of the encounter
durations. It shows almost 80% of the encounter durations are less
than 3 minutes. After filtering them out, we obtain 36,573
encounter records.
We make further statistical analysis on the probability distribution
of the encounter frequencies and the encounter time as shown in
Fig. 6 and Fig. 7 respectively. The two figures show that about
80% of the encounter frequencies are only 1 and 80% of the
encounter time are less than 10 minutes. Hence, the minimal
threshold of the encounter frequency is set as 2, that of the
encounter time set as 10 minutes. Because the cleansing process
may also remove a lot of real encounter information, so the actual
encounter frequencies and encounter time of each pair should be
larger than the statistical results.
Fig.4 Probability analysis of talk
participation counts
y
t
i
l
i
b
a
b
o
r
P
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
[1,3)
[3,5)
[5,10)
≥10
Encounter duration
1
y
t
i
l
i
b
a
b
o
r
P
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
1
2
3
≥4
1
Encounter frequency
5. EXPERIMENTS AND EVALUATIONS
5.1 Dataset description
The data set used for our experiments, “Attendee Meta-Data”
(AMD), is downloaded from CRAWDAD (Community Resource
for Archiving Wireless Data At Dartmouth)[20].
AMD HOPE was a project that aims to explore potential uses of
RFID technology at “The Last HOPE” Conference held in July
18-20, 2008, New York, USA. It attempted to allow attendees to
not only get a better conference experience, but also give them a
new way to connect with other people.
All attendees in the conference received RFID badges that
uniquely identified and tracked them across the conference area in
the 3 days. RFID readers were deployed at 21 locations
containing 3 conference rooms for tracking the attendees. The
data set contained the information including attendee id numbers,
interests, talks, tracking logs, etc. According to the talk schedule
information, there were 39 parallel sessions and 99 talks. Each
session contains 1~3 talks, which were held in the 3 conference
rooms simultaneously lasting for 50 minutes. However, there are
5 sessions containing 15 talks without tracking logs, and 3
sessions had only 1 talk. We excluded these sessions. We thus left
with 31 sessions containing 82 talks for the testing. In the
experiments, we regard the talks as the prescheduled events, and
incorporate the 21 interests provided by the dataset into 11 event
contexts.
We divide the tracking logs into a training set and a testing set.
The training set includes the tacking logs of the first 16 sessions
containing 45 talks from which we obtain the event participation
network, and other tracking logs in the same period from which
we generate the physical proximity network. The testing set
includes the latter 15 sessions containing 37 talks.
5.2 Data analysis and cleansing
For there are a lot of noisy data in the logs, we first clean them up
based on statistical analysis results.
Talk participation data analysis and cleansing
There are 1,136,127 logs and 1,227 attendees in the initial
tracking logs occurring in the 3 conference rooms in the 3 days.
From the logs, we extract all talk participation records including
an attendee id number, a talk id number and the attendance
duration. It is found that the average participation duration is
about 30 minutes.
The probability distribution of different duration intervals is
shown in Fig. 3. We can see that about 20% of the durations are
below 3 minutes. Since 3 minutes seems too short to reflect uses’
real preferences, so we remove the participation records which
durations are below 3 minutes.
Based on the above data, we analyze the probability distribution
of the talk participation counts shown as in Fig. 4. There are over
25% attendees whose participation counts are less than 6. Because
we use only half of the sessions for training, we remove the
attendees whose participation counts in the training sessions are
less than 3. Finally we are left with 915 attendees.
Encounter data analysis and cleaning
There are 21,374,278 tracking logs involving the 915 attendees
occurring at the areas other than the conference rooms during the
same period of the training sessions. From which, we extract all
y
t
i
l
i
b
a
b
o
r
p
7
Fig.5 Probability analysis of
encounter durations
Fig.6 Probability analysis of
encounter frequencies
0.6
0.5
0.4
0.3
0.2
0.1
0
Fig.7 Probability analysis of encounter time
[20,30)
[10,20)
encounter time
Fig.7 Probability analysis of encounter time
[30,40)
[5,10)
[3,5)
≥40
The experimental parameters are listed in Table 3.
Table 3. Experimental parameters
Parameter
Description
Cleansing condition
MIN(PD) minimal talk presence duration
MIN(PF) minimal talk presence frequency
MIN(ED) minimal encounter duration
Network parameters
N
number of user nodes
M
number of event nodes
t
X
number of edge in GE
t
number of edge in GP
Y
t
number of edge in GR
R
t
Q
number of edge in GQ
Default thresholds
K
threshold of number of neighbors
δ
threshold of encounter frequency
θ
threshold of encounter time
φ
threshold of attendance relevancy
Value
3 min.
3
3 min.
915
45
6,976
51,538
313,138
36,573
6
6
30 min.
0.4
5.3 Comparison methods and evaluation measures
The first goal of our evaluation is to examine whether the
proposed model-based methods can improve recommendation
performance. We also examine the contributions of different
factors and the sensitivity of thresholds.
For we have three factors and two kinds of encounter networks,
we will test following LNF models:
t
• LNF-g: The LNF model only using the g factor, i.e., the GS
network.
• LNF-gf: The LNF model using both factors g and f , i.e., the
t and GR
t networks.
GS
• LNF-gfh-EF. The LNF model using all three factors based
on the frequency-based encounter network, i.e., all three
latent networks.
• LNF-gfh-ET. The LNF model using all three factors based
on the time-based encounter network, i.e., all three latent
networks.
Two baseline methods are used for comparison:
• Naïve method. This method ranks the talks only by context
preferences derived from the event participation network.
t for
Hence, this method only uses the node attributes in GS
recommendation.
• User-based collaborative filtering (UBCF) method[21].
Because of the widespread usage, we choose the user-based
nearest neighbor algorithm as another baseline algorithm. For
a user, if its preference value of a specific context is 0, the
UBCF method is used. This method uses the node attributes
t for recommendation, and 5%
and neighbor relations in GS
nearest neighbors are determined.
In the test, we generate a ranking list of the parallel talks in each
session for each user. The results are evaluated against users’ real
actions (i.e. ground truths) according to the metrics of precision
and normalized discounted cumulative gain (nDCG)[22].
The precision
is used
to
test
the correct ratio of only
recommending the talks with the maximum probabilities, which is
the ratio between the number of correct recommendation and the
number of all users’ real participation actions.
8
A normalized discounted cumulative gain is a normalized version
of a Discounted Cumulative Gain (DCG) measure that can
account for differently output ranked lists, which is computed
as[23]:
nDCG =
p
DCG
p
IDCG
(14)
p
where IDCG is the ideal DCG, p is a particular rank position.
In general, a user attends one talk in a session, so the grades of all
talks can be regarded as binary: 1 represents presence; 0
represents not-presence. Hence, we use Equation (15)[24] to
compute the DCG, where reli∈{0, 1}, and p∈{2, 3} since there
are 2 or 3 talks in a session in the data set.
rel
2
1
−
i
i
log
)1
(
+
p
∑
i
1
=
2
For example, there are three talks A, B and C in a session. User ui
attended A, but didn’t attend B and C, so the grades of A, B and C
for ui should be 1, 0 and 0, respectively. IDCG3 is (1+0+0)=1. If
list <B, A, C> for ui, his DCG3
we get a ranked
is
(0+0.63+0)=0.63, and nDCG3 is 0.63/1=0.63.
(15)
DCG
=
p
0
0.7
0.5
0.4
0.3
0.2
0.6
0.1
C
G
D
n
Naïve
UBCF
LNF-g fh -EF
LNF-g fh -ET
Naïve
UBCF
LNF-g fh -EF
LNF-g fh -ET
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
5.4 Experiment results and discussion
Performance comparison
We first compare the recommendation performance between our
LNF based methods and two baseline methods as shown in Figs. 8
and 9. It can be clearly seen that our methods outperform the
baseline methods.
n
o
i
s
i
c
e
r
P
Fig.9 nDGC comparison between our
Fig.8 Precision comparison between
methods and the baselines
our methods and the baselines
In terms of the metric of precision, the LNF-gfh-EF and LNF-gfh-
ET methods achieves improvements of approximately 16~20%
compared to the UBCF method, and 24~28% to the naïve method.
The two LNF methods also give a rise of 16~28% compared to
the
the
in nDGC. The reason of
two baseline methods
improvements is that the LNF methods not only consider the
preference similarity, but also take the attendance relevancy and
friends relationships into account.
From the experimental results, we can find that LNF-gfh-ET can
improve slightly the performance about 4% in precision and 3%
in nDGC respectively compared to LNF-gfh-EF. It indicates the
encounter time is more suitable to be used for representing the
closeness between users than the encounter frequency.
Factor contributions testing
We also investigate the contributions of different factors as shown
in Figs. 10 and 11.
1
1
n
o
i
s
i
c
e
r
P
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
1
0.7
0.5
0.4
0.3
0.2
0.1
0.6
C
G
D
n
n
o
i
s
i
c
e
r
P
UBCF
LNF-g
LNF-gf
LNF-gfh-EF
LNF-gfh-ET
UBCF
LNF-g
LNF-g f
LNF-g fh -EF
LNF-g fh -ET
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
Fig.11 nDGC comparison under
Fig.10 Precision comparison
different factors
under different factors
We can see that the performances on both metrics of LNF-g (only
uses factor g) are better than those of UBCF about 3%. This is
because UBCF only considers neighbors’ context preferences in
the case that users’ context preference values are 0, while LNF-g
always considers neighbors’ context preferences, sine it gets the
maximum value between his own preferences and the weighed
average preferences of the K nearest neighbors on the same
context.
The LNF-gf method (uses factors g and
f) can achieve
performance improvements of approximately 4% compared to the
LNF-g method. But its performances are worse than the LNF-gfh-
EF and LNF-gfh-ET methods, since many users who often attend
common talks may be irrelevant, which misleads the probability
inference. This shows the importance of fusing all three latent
networks.
C
G
D
n
Thresholds sensitivity testing
We further conduct experiments to investigate the sensitivity of
different thresholds. Note when we test the performance of a
specific threshold, the other thresholds are set the default values.
From Figs.12 and 13, we can see that the performance change
trends both in precision and nDGC is stable when the K is up to 6.
0.7
0.9
0.8
0.6
0.7
0.5
0.6
n
o
0.4
0.5
i
s
i
c
0.4
0.3
e
r
P
0.3
0.2
0.2
0.1
0.1
0
0
6
6
K
K
Fig.13 nDGC comparison under
Fig.12 Precision comparison
different K values
under different K values
Figs. 14 and 15 are the results when we select different thresholds
of δ. We can see that 0.4 is the optimal point.
Fig. 16 is the test results on the LNF-gfh-EF method when we
select different encounter frequencies (from 2 to 8). Similarly, Fig.
17 is the test results on the LNF-gfh-ET method when we select
different encounter time (from 10 to 60 minutes). We can see that
6~8 is a better range for the encounter frequency, and 30~40
minutes for the encounter time.
LNF-gfh-EF
LNF-gfh-ET
LNF-gfh-EF
LNF-gfh-ET
10
10
2
8
4
8
2
4
9
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
C
G
D
n
1
0.8
0.6
0.4
0.2
0
LNF-gfh-EF
LNF-gfh-ET
LNF-gfh-EF
LNF-gfh-ET
0.6
0.3
0.5
0.2
0.4
δ
Fig.14 Precision comparison under
different δ values
0.2
0.5
0.6
0.3
0.4
δ
Fig.15 nDGC comparison under
different δ values
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
Fig.17 Precision and nDGC comparison
under different φ values
4
8
2
60
10
20
50
10
t
n
e
c
r
e
P
40
30
φ(min.)
P recision
nDGC
P recision
nDGC
t
n
e
c
r
e
P
6
θ
Fig.16 Precision and nDGC comparison
under different θ values
6. RELATED WORKS
Traditional and social network recommendation. Traditional
recommendation systems mainly aim to recommend items that are
likely to be interested to users. Such systems are widely
implemented in e-commerce systems where the goal is to
recommend items to the users by mining user rating history data.
The methods used to solve this problem can be roughly
categorized into content-based, collaborative filtering and hybrid
approaches[7]. Recently, with
the popularization of social
networks, social-trust based recommendation has recently been
proposed to improve recommendation accuracy[8-11]. The common
rationale behind all of them is that a user’s taste is influenced by
her trusted friends in social networks[25]. Meanwhile, advances in
location-based services and wireless communication technologies
have enabled
the creation of
location-based online social
networking such as Foursquare, Twinkle, and GeoLife[26-27],
which make
locations, users, activities and social media
recommendation feasible[28-29]. However, because of lack of
explicit users’ preference, rating and trusted social relations in the
OffESNs, both rating based traditional methods and social-trust
based methods can no longer work well to recommend events in
the OffESNs.
Event recommendation. The study on event recommendations is
relatively little, especially in the offline social networks. For the
Pittsburgh area, a cultural event recommender was build around
trust relations[30]. Simon et al.[31] set up an online user-centric
based evaluation experiment to find a recommendation algorithm
that can improve user satisfaction for a popular Belgian cultural
event website. Results show that a hybrid of a user-based
collaborative filtering and content-based approach outperforms
the other algorithms. Einat et al.[32] demonstrated a method for
collaborative ranking of future events, which recommends the
events based on
individuals’ preferences for past events,
combined collaboratively with other peoples’ likes and dislikes.
But all these methods don’t consider the characteristics of offline
networks. Liu et al.[1] suggested event-based social networks
(EBSN) containing both online and offline social interactions. It
recommends events only based on the topological structures of
the networks. The method can’t be applied in the OffESNs since
the networks usually can’t get helps of the online interactions.
Ephemeral social networks and prediction. In recent two or
three years, the offline ephemeral social networks have attracting
the attentions of people. Alvin et al.[5] presented the concept of
ephemeral social networks. It investigated how social connections
can be established and examined user behaviors in the networks.
Anne-Marie et al.[3] described the concept, potential applications,
and underlying technologies of the offline social networks, and
gave two scenarios of ephemeral social networks: remote meeting
and family sharing. Christoph et al.[4] analyzed influence factors
for link prediction and the strength of stronger ties in human
contact networks, and used several network proximity measures
to predict new links and recurring links. Zhuang et al.[2]
formalized the problem of predicting geographic coincidences in
the ephemeral social networks. It used a factor graph model
integrating temporal correlations and social correlations to predict
how likely two users will meet in future. However, both
prediction methods are not event-driven and don’t consider any
context information when doing prediction, so they cannot be
used for event recommendation in the OffESNs effectively.
7. CONCLUSIONS
In this work, we first construct two observed heterogeneous
interaction networks including the event participation (human-
event interaction) network and the physical proximity (human-
human interaction) network. Based on them, we define some
interaction measures in the OffESNs to construct the three latent
social relation networks,
including a preference similarity
network, an attendance relevancy network and an encounter
network. We then propose a latent networks fusion (LNF) model
to merge the three latent networks into a pairwise factor graph to
infer the probabilities that users will attend the future events given
the contexts. The experimental results show that the suggested
methods outperform the baseline methods.
An important contribution of our work is to propose a novel latent
networks fusion based model for event recommendation in the
offline ephemeral networks. The model uses a pairwise factor
graph to factor the global functions into multiple simpler local
functions, and capture all the features of the three latent networks
via two types of variable nodes and three types of factor function
nodes. The experimental results show the contributions of
different factors, and verify the fusion model is effective.
8. REFERENCES
[1] Xingjie Liu, Qi He, Yuanyuan Tian, Wang-Chien Lee, John McPherson,
Jiawei Han. Event-based Social Networks: Linking the Online and Offline
Social worlds. In Proc. of KDD’12, pp.1032-1040.
[2] Honglei Zhuang, Alvin Chin, Sen Wu, Wei Wang, Xia Wang, Jie Tang.
Inferring Geographic Coincidence in Ephemeral Social Networks. In Proc.
ECML/PKDD’12, pp. 613-628.
[3] Anne-Marie Kermarrec, Erwan Le Merrer. Offline social networks:
stepping away from the internet. In Proc. of SNS’12, pp.14-15.
[4] Christoph Scholz, Martin Atzmueller, Gerd Stumme. On the Predictability
of Human Contacts: Influence Factors and the Strength of Stronger Ties. In
Proc. of SocialCom/PASSAT’12, pp. 312-321.
10
[5] Alvin Chin, Hao Wang, Bin Xu, Ke Zhang, Hao Wang, Lijun Zhu.
Connecting People in the Workplace through Ephemeral Social Networks.
In Proc.of SocialCom/PASSAT’11, pp.527-530.
[6] Alvin Chin, Bin Xu, Fangxi Yin, Xia Wang, Wei Wang, Xiaoguang Fan.
Using Proximity and Homophily to Connect Conference Attendees in a
Mobile Social Network. In Proc. of the Workshops of ICDCS’12, pp.79-87.
[7] J. Herlocker, J. Konstan, L. Terveen, J. Riedl. Evaluating Collaborative
Filtering Recommender Systems. ACM Trans. on Information Systems
(ACM TOIS), 2004, 22(1), pp.5–53.
[8] Xiwang Yang, Yang Guo, Yong Liu. Bayesian-inference Based
Recommendation in Online Social Networks. IEEE Trans. on Parallel and
Distributed Systems, 2013, 24(4), pp 642-651.
[9] Vineet Chaoji, Sayan Ranu, Rajeev Rastogi, Rushi Bhatt.
Recommendations to Boost Content Spread in Social Networks. In Proc.
of WWW’12, pp. 529-538.
[10] Ioannis Konstas,Vassilios Stathopoulos, Joemon M. Jose. On Social
Networks and Collaborative Recommendation. In Proc. of SIGIR’09, pp.
195-202.
[11] Xiwang Yang, Harald Steck, Yong Liu. Circle-based Recommendation in
Online Social Networks. In Proc. of KDD’12, pp. 1267-1275.
[12] X. Guo, G. Zhang, E. Chew, S. Burdon. A Hybrid Recommendation
Approach for One-and-only Items. Advances in Artificial Intelligence,
2005, pp.457~466
[13] Simon Dooms, Toon De Pessemier, Luc Martens. A User-centric
Evaluation of Recommender Algorithms for an Event Recommendation
System. In Proc. of Workshop of RecSys’11, pp. 67-73.
[14] Bageshree Shevade, Hari Sundaram, Lexing Xie. Modeling Personal and
Social Network Context for Event Annotation in Images. In Proc. of
JCDL’07, pp. 127-134.
[15] R. McLauglin, J. Herlocher. A Collaborative Filtering Algorithm and
Evaluation Metric that Accurately Model the User Experience. In Proc. of
SIGIR’04, pp.329-336.
[16] Gediminas Adomavicius, Alexander Tuzhilin. Toward
the Next
Generation of Recommender Systems: A Survey of the State-of-the-Art
and Possible Extensions. IEEE Trans. on Knowledge and Data
Engineering (TKDE), 2005, 17(6), pp. 734-749.
[17] Kai Yu, Anton Schwaighofer, Volker Tresp, Xiaowei Xu, Hans-Peter
Kriegel. Probabilistic Memory-based Collaborative Filtering. IEEE Trans.
on Knowledge and Data Engineering (TKDE), 2004, 16(1), pp. 56-69.
[18] F. R. Kschischang, B. J. Frey, H. A. Loeliger. Factor Graphs and the Sum-
Product Algorithm. IEEE Trans. on Information Theory(TIT), 2001, 47(2),
pp. 498-519.
[19] Daphne Koller, Nir Friedman. Probabilistic Graphical Models: Principles
and Techniques – Adaptive Computation and Machine Learning. The MIT
Press, 2009.
[20] http://crawdad.cs.dartmouth.edu/meta.php?name=hope/nh_amd, 2008.
[21] Jun Wang, Arjen P. de Vries, Marcel J. T. Reinders. Unifying User-based
and Item-based Collaborative Filtering Approaches by Similarity Fusion.
In Prof. of SIGIR’06, pp.501-508.
[22] Kalervo Järvelin, Jaana Kekäläinen. Cumulated Gain-based Evaluation of
IR Techniques. ACM Trans. on Information Systems (ACM TOIS), 2002,
20(4), pp.422-446.
[23] http://en.wikipedia.org/wiki/Discounted_cumulative_gain
[24] Chris Burges, Tal Shaked, Erin Renshaw, Ari Lazier, Matt Deeds, Nicole
Hamilton, Greg Hullender. Learning to Rank Using Gradient Descent. In
Proc. of ICML '05, pp.89-96.
[25]Mohsen
Jamali, Martin Ester. Mining Social Networks
Recommendation. Tutorial of ICDM ’11.
[26] Vincent W. Zheng, Yu Zheng, Xing Xie, Qiang Yang. Collaborative
Location and Activity Recommendations with GPS History Data. In Proc.
of WWW’09, pp.1029-1038.
[27] Ling-Yin Wei, Yu Zheng, Wen-Chih Peng. Constructing Popular Routes
rom Uncertain Trajectories. In Proc. of KDD’12, pp.195-203
[28] Jie Bao, Yu Zheng, David Wilkie, and Mohamed F. Mokbel. A Survey on
Recommendations in Location-based Social Networks. ACM Transaction
on Intelligent Systems and Technology (to be published), 2013
[29] Mao Ye, Peifeng Yin, Wang-Chien Lee. Location Recommendation for
Location-based Social Networks In Proc. of GIS’10, pp. 458~461.
[30] Danielle Hyunsook Lee. PITTCULT: Trust-based Cultural Event
Recommender. In Proc. of RecSys’08, pp.311-314.
[31] Simon Dooms, Toon De Pessemier, Luc Martens. A User-centric
Evaluation of Recommender Algorithms for an Event Recommendation
System. In Proc. of Workshop of RecSys’11: 67-73.
[32] Einat Minkov, Ben Charrow, Jonathan Ledlie, Seth Teller, Tommi
Jaakkola. Collaborative Future Event Recommendation. In Proc. of
CIKM’10, pp., 819-828.
for
|
1903.12579 | 2 | 1903 | 2019-06-10T19:50:01 | Predicting complex user behavior from CDR based social networks | [
"cs.SI",
"physics.soc-ph"
] | Call Detail Record (CDR) datasets provide enough information about personal interactions to support building and analyzing detailed empirical social networks. We take one such dataset and describe the various ways of using it to create a true social network in spite of the highly noisy data source. We use the resulting network to predict each individual's likelihood to default on payments for the network services, a complex behavior that involves a combination of social, economic, and legal considerations. We use a large number of features extracted from the network to build a model for predicting which users will default. By analyzing the relative contributions of features, we choose their best performing subsets ranging in size from small to medium. Features based on the number of close ties maintained by a user performed better than those derived from user's geographical location. The paper contributions include systematic impact analysis that the number of calls cutoff has on the properties of the network derived from CDR, and a methodology for building complex behavior models by creating very large sets of diverse features and systematically choosing those which perform best for the final model. | cs.SI | cs |
Predicting complex user behavior from CDR based social
networks
Casey Doylea,b, Zala Hergac,d, Stephen Dipplea,b, Boleslaw K. Szymanskia,e,f,∗,
Gyorgy Kornissa,b, Dunja Mladenićc,d
aNetwork Science and Technology Center, Rensselaer Polytechnic Institute, 110 8th
bDepartment of Physics, Applied Physics, and Astronomy, Rensselaer Polytechnic Institute,
Street,Troy, NY 12180, USA
110 8th Street,Troy, NY 12180, USA
cArtificial Intelligence Laboratory, Jožef Stefan Institute, Jamova 39, Ljubljana, Slovenia
dJožef Stefan International Postgraduate School, Jamova 39, Ljubljana, Slovenia
eDepartment of Computer Science, Rensselaer Polytechnic Institute, 110 8th Street,Troy,
fFaculty of Computer Science and Management, Wrocław University of Science and
NY 12180, USA
Technology, Wrocław, Poland
Abstract
Call Detail Record (CDR) datasets provide enough information about personal
interactions of cell phone service customers to enable building detailed social
networks. We take one such dataset and create a realistic social network to pre-
dict which customer will default on payments for the phone services, a complex
behavior combining social, economic, and legal considerations. After extracting
a large feature set from this network, we find that each feature poorly correlates
with the default status. Hence, we develop a sophisticated model to enable
reliable predictions. Our main contribution is a methodology for building com-
plex behavior models from very large sets of diverse features and using different
methods to choose those features that perform best for the final model. This ap-
proach enables us to identify the most efficient features for our problem which,
unexpectedly, are based on the number of unique users with whom the given
user communicates around the Christmas and New Year's Eve holidays. In gen-
eral, features based on the number of close ties maintained by a user perform
better than others. Our resulting models significantly outperform the methods
∗Corresponding author
Email address: [email protected] (Boleslaw K. Szymanski)
Preprint submitted to Information Sciences
June 12, 2019
currently published in the literature. The paper contributes also a systematic
analysis of properties of the network derived from CDR.
Keywords:
default; feature selection; Call Detail Record dataset
social networks; complex behavior prediction; probability of
1. Introduction
Call Detail Record (CDR) datasets, created from cell phone logs of large
groups of people, have become common in studying human behavior thanks to
the large amount of detailed data they provide [7]. These datasets typically in-
clude both basic information about the users (age, gender, location) and records
of calls and text messages including the time, location, and direction of each
communication.
Here, we analyze such a dataset and focus on the properties of the underlying
social network that can be obtained from the data. First, we discuss various
methods for building the network, aiming to mitigate the noise inherent within
the cell phone records and address other issues identified in prior work such as
the definitions of links, communities, reciprocity, and data types suitable for
the study. These considerations are particularly relevant to our application due
to the large amounts of noise and potential biases inherent to various network
representation schemes [16, 19, 22, 18, 33]. In this paper, we combine techniques
based on geographic and usage features along with higher level social network
measures such as centrality and community structure to predict the probability
of customers defaulting on their accounts.
The specific CDR dataset used here includes the detailed call history of
500, 000 clients of a cell phone company over a three month period. The dataset
contains also information about the users' basic demographic data (age, home
district, gender, and default status at the end of the three month period) as well
as usage information (frequency and duration of calls, messages, and movement
records based on frequently used cell towers). We perform traditional network
analysis on the data to create new complex features. We analyze weighted links
2
based on the number of communications sent between individuals to reveal the
paths between individuals, reciprocity imbalances among users, and community
structure in the network.
The default status (an indicator of whether the client stopped paying the
phone bill over the course of data collection) is the predicted variable for this
study. It is typically accessible as a part of the user's phone records, yet it still
measures a complex user behavior combining many different behavioral factors.
To encompass the wide variety of possible correlations between individual
attributes, behavioral indicators as well as network metrics and the probability
of default, we create an extremely broad feature set, aggregating thousands of
features of varying complexity from all the facets of information contained in
the CDR dataset. Then, we perform feature contribution analysis and choose
the features with the strongest predictive power to balance model performance
and its complexity. As discussed in the next section, this general methodology
for building complex behavior models is a novel approach and our contribution
to the state of the art.
2. Related work on modeling complex human behavior
2.1. Mobile phone data
Call detail records (CDR) is a standard dataset collected by telecommunica-
tion operators. For each user, it contains information about telecommunication
events in which this user was involved. In recent years, it has become a popular
source of information for users' behavioral analytics.
The closest to our goals is the work on modeling credit defaults [27] by
building a model of the user's financial risk which yields a score that can be
interpreted as the probability of default. This model outperforms the Credit
Bureau scores by using thousands of weak predictors derived from CDR and
demographic data. This work uses only 60, 000 users and uses only basic level
network features such as degree.
3
2.2. Credit risk management
Our paper focuses on credit risk, which refers to the clients who may stop
paying back their loans, e.g., mortgage loan, credit card spending or, in our
case, cell phone bill. Such events are called defaults. Banks and companies
traditionally tackle this problem by calculating credit scores or probability of
default for each of the potential clients. For individual customers data sets used
to predict a customer's probability of default include demographic data, loan
and credit information [4], social media [10, 38] or mobile phone data [6].
Traditionally, the logistic model was often used to predict defaults and today
is still useful for benchmarking thanks to its simplicity, interpretability and de-
pendability [34, 4, 14]. However, more sophisticated and innovative approaches
are also used, like neural networks [34, 38, 15], smart ubiquitous data mining [4],
theory of three-way decisions [20], and theory of survival [14]. In our paper, we
introduce a novel approach that starts with creating a large number of features
(over 6,000 here) and then reducing them to a few well performing subsets.
3. Network creation and analysis
In this section, we define the node-level location and communication activity
features that indicate how embedded the node is in the network which is likely to
determine the social cost of leaving the network. Such social network analysis is
common in working with CDR datasets [7], but the highly detailed information
contained in the CDR comes with a large amount of noise. Quantifying what
level of communication between individuals indicates a connection is challenging.
This issue is made worse considering the potential bias introduced by specific
patterns of communication, as generational and cultural divides are prominent
in phone usage [19]. Therefore use of case-specific methods is common. Some
attempts at a more general solution to this problem include reciprocity or ac-
tivity requirements for links, but these solutions suffer from losing many fine
details of the system [16]. More complete results can be obtained by using sta-
tistical methods to detect and remove links that are more likely to be random,
4
but the methods come with increased computation cost [18].
In this study for detailed analysis, we use directed graphs in order to preserve
the imbalances that tend to arise even among reciprocal relationships [13]. We
also use communication frequency between individuals to define edges. We
primarily use a weighted network for network analysis and feature generation
as it better represents relationship strength and network location properties,
but the unweighted network is very useful for understanding many of other
interesting properties of the network unrelated to predicting user defaults. For
more information on the construction, behavior, and dynamics of unweighted
graphs of this network see Supplementary Material Sec. 1.
3.1. Weighted network based on event frequency
Let wi,j denote the number of communications sent from user i to user j
is wij. We choose here the most dense representation of the network in which
as long as wi,j > 0, a directed link is formed from node i to node j with
weight wi,j (some interesting properties of this type of network is discussed in
[37, 33, 22]). Figure 1 shows various probability distributions associated with
w. These distributions possess a curvature somewhere between an exponential
distribution and a power law distribution. It is then appropriate to fit them
using a log-normal distribution and a stretched exponential which have the
following form.
− (ln w−µ)2
P (w)log-normal ∝ 1
P (w)stretched-exp ∝ e−wβ /α
2σ2
e
w
(1)
(2)
Table 1 shows the fitting parameters and R-squared values for Figure 1. Both
fits yield high R-squared values.
We use centrality measures, reciprocity measures, and community detection
to define features indicative of how embedded a user is in the network. For
all distance-based applications, we use a link's weight to define a normalized
distance from the source node i to the target node j, defined as di,j = wavg/wi,j
where wavg is the average weight of all connections in the network. To provide
5
Figure 1: a) Distribution of directional link weights wi,j. (b) Distribution of non-directional
link weight wi,j + wj,i. (c) Distribution of the sum of outgoing link weights of users in the
j wi,j. (d) Distribution of the sum of incoming link weights of users in the system
j wj,i. Table 1 shows relevant fit parameters and R-squared values. Both functions in this
system (cid:80)
(cid:80)
case reasonably fit the distributions with neither significantly outperforming the other.
a baseline for comparison, we rewire the network by swapping the edge desti-
nations to create a pseudo-random weighted graphs that maintain the in and
out-degree structure of the original network.
(cid:80)
We first look at the measure of harmonic closeness centrality (closeness cen-
trality adapted to non-connected graphs) [26, 23]. We define this centrality
as CH (i) = 1
, where N is the total number of nodes and li,j is
N−1
the distance of the shortest path between nodes i and j. For the original net-
work, these centrality scores are generally fairly high and evenly distributed,
j(cid:54)=i
1
li,j
6
σ
β
R2 log-normal
R2 stretched exp
wi,j
2.01
0.127
0.9967
0.9978
wi,j + wj,i
2.37
0.0959
0.9991
0.9994
(cid:80)
j wi,j
1.47
0.332
0.9926
0.9984
(cid:80)
j wj,i
1.47
0.333
0.9924
0.9980
Table 1: Fitting parameters and R-squared values for Figure 1. σ corresponds to the fitting
parameter in equation 1. β corresponds to the fitting parameter in equation 2.
avg = 4.61 and a standard deviation
with an average harmonic centrality of C cell
std = 1.84. Both values are higher than those for the randomly rewired
of C cell
std = 1.20. Interestingly, the diameter
graph which yields C rand
and average shortest path length of the giant component in the original network
Dcell = 6.24 and (cid:104)lcell(cid:105) = .311 are also slightly higher than the corresponding
values Drand = 4.35 and (cid:104)lrand(cid:105) = .30 for the randomly rewired network.
avg = 4.11 and C rand
These differences reveal the basic shape of the original network, which is
characterized by significant populations of both highly connected and highly
isolated nodes. This property is shown clearly via the diameters of the two
networks. The original network is significantly wider than its randomly rewired
counterpart. Despite the existence of close communities and hubs within the
original network, there are multiple extremely remote nodes in it with no close
ties.
We also use this weighted network to measure reciprocity [33], which is used
to measure how one sided interactions are. Our first measure is how many
pairwise communications are matched with communications in the opposite
direction. A surprisingly low number of communications, 62.88%, have com-
munications in both directions indicating that over a third of interactions are
unreciprocated.
Next, we construct a reciprocity metric that measures the average contribu-
tion of a nodes' links so that it is independent of the degree of the node. Unlike
[33], we apply it to directional links as opposed to [33]. The corresponding
definition is Ri = 1
, where ki is the total (both in and out)
ki
wi,j−wj,i
wi,j +wj,i
(cid:80)
j∈N (i)
7
Figure 2: a) The distribution of reciprocities. (b) The distribution of reciprocities using a
randomized network. Peaks are observed at -1, and 1. This is consistent with a large number
of nodes have low degree as most links are not reciprocated. The randomized network produces
a narrower and rougher distribution indicating some level of order in how individuals interact.
degree of node i, wi,j is the number of communications from node i to node j,
and N (i) is the set of neighbors that have a link connected to node i. Accord-
ing to this definition, links over which a node is sending more than receiving
contribute positively to the node's metric, while links with the reverse pattern
contribute negatively. The absolute value of the contribution itself increases
monotonically with the difference in the level of communication [33]. Finally,
every link's contributions are normalized, thus bound within the range [-1,1].
We show in Fig 2(a) that the distribution of reciprocity is fairly smooth with
large spikes at the extreme values. These spikes arise because there are nodes
with either no incoming communications (Ri = 1) or no outgoing communica-
tions (Ri = −1). Since all data comes from a single cell phone provider, it is
likely that many of these nodes simply have contacts that use different carriers
not included in the set. Removing these outliers, we fit the remaining distribu-
tion using a stretched exponential as described in Equation 2. Table 2 shows
the fitting parameters for Fig 2. As can be seen, there is an asymmetry in the
width of the positive and negative side of the distribution. This can be caused
by an increased amount of communication for nodes with reciprocity equal to 1.
While each link's contribution wi,j − wj,i is symmetric, the overall contributions
8
Fitting parameter
CDR graph
Random graph
Positive Negative Positive Negative
1.52
0.168
0.994
1.49
0.198
0.991
1.96
0.080
0.687
1.07
0.111
0.961
β
α
R2
Table 2: The fitting parameters used in Fig 2. Positive and Negative refer to the fit of the
distribution where the reciprocity values are positive and negative respectively. Due to the
non-integer value of the curvature, we fit the absolute value of the negative side and plot
accordingly. For the CDR graph both positive and negative sides have very similar fitting
parameters except for the width in the distribution which suggest an asymmetry.
are averaged and thus the symmetry can be broken. If an unreciprocated link
is the only link for a node, its reciprocity will be Ri = ±1 regardless of what
w is. This means if there are overall more communications from nodes with
Ri = 1 than nodes with Ri = −1, this difference would show itself in the overall
distribution.
For the randomized network, Fig 2(b), the concavity of the distribution nar-
rows compared to Fig 2(a) from the presence of more frequent values close to
zero. Hence, the original network is more diverse than its randomized counter-
part is.
For other possible representations of reciprocity within the network, see Sup-
plementary Material Sec. 2, where we discuss two additional variants. These
alternative metrics are not independent from the metric presented in this sec-
tion.
3.2. Community detection and geographical districts
The CDR based network allows us to analyze the social communities present
in the system. We use the GANXiS(SLPA) algorithm for its ability to detect
even disjointed and overlapping communities and fully encapsulate the social
structure of the network [36, 35]. Using this algorithm, we identify a set of
over 6450 social communities, many more than the 231 geographic communities
derived from the districts reported. Despite the size differences (the largest
9
district contains 63491 users while the largest social community has just 741 with
an average of only 74.65 users), the groups are substantial enough to test the
overlap of the lists for greater insight into how the social ties form. Intuitively, it
seems reasonable to expect that the social communities are highly influenced by
the geographic district of their members. Instead we see in Fig. 3 that on average
only 41% of each community comes from the same district, and in fact even
the top five districts only account for 78% of each community's makeup. The
diversity of the geographic locations within social groups is especially surprising
given the generally small size of the social groups compared to the geographic
districts. The communities are also included in our feature set for predicting
user default's as it is possible that individuals of a certain groups are more likely
to default.
4. Feature generation
We combine the above described network features with the various raw usage
and location features that are inherent to the dataset to create our full feature
set. For ease of analysis, we divide them into six groups:
1. High Level Network features - explained in detail above. This subset
consists of 5 features.
2. Consumption features - includes information about the total number of
communication events, the total and average duration of phone calls, and
average time between consecutive communications. This subset consists
of 2784 features.
3. Correspondent features - based on the distinct number of individuals
that each user communicates with over various time periods. This subset
consists of 2561 features.
4. Reciprocated event features - number of events where the observed
user returns a call/message within a specified time period of receiving a
communication. This subset consists of 672 features.
10
Figure 3: Top: Community and districts sizes, which are sorted in descending order. The
average social community size is 75 with a median of 70, whereas geographic districts show an
average of 2, 380 and median of 1273. Bottom: average proportion of users from a community
that belong to the same geographic district - from most represented geographic district by
users (1st) to the 5th most represented.
5. Mobility features - includes the movement patterns of individuals based
on the cell tower used for each communication with relation to commonly
used towers. This subset consists of 29 features.
6. Location features - includes the two most used cell phone towers for
each user. This subset consists of 2 features.
In some cases large or very inclusive features can be broken up by analyzing
time windows (hours, days, day of the week, weeks, months, business hours,
non-business hours, weekend, weekday), direction (ingoing/outgoing event), and
communication type (call/message), leading to a large overall set of more than
6000 features. Most of these features are standard, so we do not present them
11
Figure 4: This graph shows point biserial correlation of each individual feature to default
status. Values are sorted in descending order by absolute value of their correlation coefficient.
Features with highest absolute correlation (originally all negative) are the average number of
used cell towers in one week, distance traveled in a day of week and the average daily radius.
in detail here, but relegate the full descriptions of each feature set to Supple-
mentary Material Sec. 3.
5. Predicting default status
5.1. Correlation analysis
We utilize point biserial correlation to define the basic correlation between
each feature and user default status due to its suitability for handling both
categorical and continuous variables as are present in our feature set. This
process indicates that individual features tend to have very little correlation
to default status (shown in Fig. 4), with a maximum absolute correlation of
only 0.1155 and average correlation of −0.006. This poor individual correlation
shows that no single feature reproduces the default status of the individuals
reliably, proving the value of building an accurate predictive model through
more complex analysis.
12
5.2. Modeling
5.2.1. Logistic regression
To create the predictive models, we start by defining the notation for logistic
regression. Let β0 denote the intercept and β stand for a vector of regression
coefficients of length p. Both are determined by maximum likelihood estimation
method which uses a training set with n known outcomes in the vector Y for
nodes in the training set. Matrix X of size n × p with rows corresponding to
nodes and columns corresponding to features contains values of features for all
nodes in training set. For any node u in test set and its corresponding vector of
feature values xu of size p, the probability of "success" (in our case the default
status of this node being 1) is defined as
P (yu = 1xu) =
1
1 + exp−β0−β·xu
,
(3)
where yu denotes the value of the dependent variable for node u.
5.2.2. Principal Component Analysis
To build a more complex model that utilizes the other 6048 features, we
first normalize the features to mean values of 0 and variance 1. Once normal-
ized, to deal with the extremely large number of features we perform Principal
Component Analysis [24](PCA) to decompose the feature space and yield a set
of "principal components". The results are linearly uncorrelated and ranked
in such a way that the first principal component explains the highest possible
amount of variability in the data, while each following component explains the
highest amount of variance under the condition that it is orthogonal to all pre-
ceding components. Once these components are obtained, we select subsets of
the components that account for large amounts of variability in the data and
use them as explanatory variables for a linear model. We do this for both large
and small subsets of the components, as pruning the data in this way represents
a careful balance between model simplicity and accuracy. In our dataset, this
balance manifests in the rapidly diminishing returns seen from larger component
inclusion. The first component explains 20% of variability in the data while the
13
second explains only 7%. In fact, the first thirty components together explain
only 42% of the variability, while the first five hundred sum up to just 66%. For
this reason, we generate two distinct logistic models: a simple one based on the
first 30 PCA components (pca-30 ) and a more complex one, based on the first
500 PCA components (pca-500 ). We use notation p1 for the number of selected
principal components. We then map our features into the new space to fit these
groupings, such that
XP C = X · C,
where C ∈ Rp×p1 is the matrix of p1 principal components and XP C ∈ Rn×p1 is
the new feature matrix. Finally, we also fit a model (pval-05 ) using only those
variables from pca-500 that have a p − value < 0.5 to include the greater detail
of the larger model with a lower complexity for calculation.
5.2.3. Other models
We further examine the data by utilizing other techniques, and build models
for each as a comparison to the above described PCA models. For instance, one
large issue with our dataset is that positive samples (defaulted users) account
for only 0.25% of the whole dataset, making it extremely unbalanced. Learning
from this kind of unbalanced dataset is a well-known challenge in the data
mining community that we attempt to account for by performing oversampling
(multiplying positive samples to make them a larger portion of the dataset) [8].
In this case, we use multiplication factors ranging from 2−100, but in the model
benchmarks presented here, we show only the model with a multiplication factor
of 2 (oversampled-2 ) since it performed the best. Oversampling was applied to
the reduced dataset (XP C).
Further, as an alternative to the PCA reduction presented in the prior sec-
tion, we also build a separate model by selecting features via Lasso regres-
sion [31]. This method adds a penalty term to the log likelihood function in
the prediction that shrinks the coefficients of less important variables to zero.
We fine tune this reduction via a free parameter λ, varying it through a range
of values to obtain the best lasso fits. The efficacy of this method is demon-
14
strated in two separate models: one based on logistic regression (lasso-logistic)
and another using a Support Vector Machine [32] (lasso-svm).
Finally, the last model we use for comparison utilizes a simple method for
feature space reduction that aggregates some of the more specific features into
general descriptions of behavior. For instance, features that were based on a
particular day or week of the three month period are grouped and combined,
creating instead features for weekdays versus weekend averages or business hours
versus off-hours. This aggregation not only simplifies the model, but also makes
it generalizable to other datasets with different levels of detail. This method
shrinks the overall feature set considerably, leaving only 781 features. As before,
these features are then normalized before being further reduced via PCA.
6. Results and discussion
6.1. Experimental setting
After each of the above models is fit to a training set comprising 70% of the
whole dataset, they are tested on the remaining 30% of the data and evaluated
via their recall, fall-out, and precision. Defaulting users are labeled as positive
examples and default predictions are defined as those users within the 95th
percentile of default probabilities. This threshold is chosen to be relatively
low to fit the nature of our study where false positives (non-defaulted users that
were predicted as defaulters) are less damaging than false negatives (unidentified
defaulters) to companies.
The recall (the true positive rate) is the rate of identified defaulting cus-
tomers. The fall-out (the false positive rate) is the probability of labeling a
good client as a defaulting one. The precision is the fraction of correct default
predictions out of all default predictions. These metrics are calculated as
recall =
T P
T P + F N
,
f all-out =
F P
F P + T N
,
precision =
T P
T P + F P
where TP is the number of true positives, FN is the number of false negatives,
FP is the number of false positive, and TN is the number of true negatives.
15
6.2. Evaluation
The performance of the models tested can be compared using a receiver
operating characteristic curve (ROC), which we show in Figure 5. Here, we
focus this comparison on the recall and fall-out of the model, where recall (which
identifies defaulting customers) is of interest to phone companies, while fallout
has greater relevancy in other applications of the models. The exact values of
these performance metrics can be seen in Table 3, which also shows the precision
of each model for reference.
The initial results are in line with what would be expected intuitively: the
worst performance comes from the random model, followed by glm-7 (the logis-
tic model based on only 7 features). As the models become more complicated,
their performance tends to increase. For instance, a significant reduction in
false positives can be seen in the lasso-logistic model (which uses 309 variables)
over the glm-7, then a further reduction in the lasso-svm model that uses 475
variables. Additionally in both Lasso models, the variable with the highest co-
efficient is the user's most commonly utilized cell tower, indicating the presence
of geographic regions which are high risk areas for user defaults. Other high
performance models include the various PCA models, led by pca-500, pval-05
and oversampled-2 with pval-05 outperforming all other models.
From these results, it is clear that for the most part larger feature sets allow
for more accurate models (as would be expected), but this is not a strict rule.
The best performing model is the one that begins with a large sample of features,
but is then stripped of those that aren't considered significant. In other words,
there are likely some 'false flags' in the feature list that tend to confuse the
model rather than contribute. Feature removal only works to a point, however,
as the more aggressive methods in the pca-aggr model lose these benefits and
in fact make it one of the worst performing models tested. Thus, there is likely
some very meaningful information even within the extremely specific features
that would be intuitively too limited to contribute much. Finally, it should
be noted that while the highest performing oversampling model, oversampled-
2 yields improvements comparable to filtering insignificant features, applying
16
both techniques worsens the results as the model apparently over-fits.
Model
random
glm-7
lasso-logistic
pca-aggr
lasso-svm
pca-30
pca-500
oversampled-2
pval-05
Recall Fall-out Precision
0.060
0.224
0.484
0.676
0.749
0.810
0.889
0.897
0.900
0.0501
0.0495
0.0490
0.0484
0.0482
0.0480
0.0478
0.0478
0.0477
0.003
0.012
0.023
0.036
0.040
0.043
0.047
0.047
0.048
Table 3: Recall, fall-out and precision for each of the models presented in Figure 5. Precision
is low due to the fact that the dataset is majorly unbalanced; however, precision of the best
model is about 15 times higher than in the random model.
Figure 5: Model performance when predicting defaulting users from worst to best: glm-7,
lasso-logistic, pca-aggr, lasso-svm, pca-30, oversampled-2, pca-500 and pval-500.
17
6.3. Stability
For a more in depth look into the differences in prediction among the top
three models (oversampled-2, pca-500, pval-05 ), we look at the overlap size
(the intersection of correctly labeled defaulting customers) and average overlap
score (the similarity of two rankings at increasing depth giving higher weights
to higher ranked observations; AOS). All analysis is restricted to only those
customers with a calculated probability of default (PD) in the 95 − th quantile.
As can be seen in Table 4, both the overlap and AOS are extremely high for
all model comparisons, indicating that all three models are stable and predict
roughly the same nodes for default. Further, the pval-05 and pca-500 models
can be seen to be more similar to each other than the oversampled-2 model
due to pval-05 being essentially pca-500 with some of the problematic features
removed.
pval-05
pca-500
oversampled-2
pval-05
pca-500
oversampled-2
overlap
AOS
overlap
AOS
overlap
AOS
100
100
98.8
96.5
100
100
97.3
94.3
97.9
95.5
100
100
Table 4: Overlap size (in percentage) and average overlap score of correctly labeled defaulting
customers for the three best models.
6.4. Contribution of feature sets
Finally, we identify the original features that contribute the most to our
models to gain a better understanding of what aspects of the mobile phone data
are most important for predicting default status. However, as we mentioned
before in Sec. 5.1, each feature is generally fairly poorly correlated with defaults.
Thus it is no surprise that there is no one outstanding feature that stands out as
the strongest contributor. To remedy this, we perform a general analysis using
18
Model
Full feature set
- consumption features
- correspondent features
- reciprocated features
- mobility features
- network features
- cell tower PD features
Only correspondent features
0.9
0.88
0.58
0.88
0.88
0.88
0.89
0.86
Recall Precision ∆Recall ∆P recision
-
0.001
0.017
0.002
0.002
-0.002
-0.002
-
0.048
0.047
0.031
0.046
0.046
0.05
0.050
0.049
-
0.02
0.32
0.02
0.02
0.02
0.01
-
Table 5: Results of models based on reduced feature sets. In each row, the underlying dataset
is missing one category of features (listed in first column of the table). Two models that proved
to be the best were fitted in each case: glm-500 and glm-500-filt. Most features contribute
only about 2-3% to the final recall and 0.1-0.2% to the final precision, except for correspondent
features which contribute 33% of recall and 1.9% of precision.
the feature set groupings described in Sec. 4 to identify which class of features
contributes the most. By building a host of modified models, each consisting
of all of the feature sets except one, we can compare the performance of the
models with the reduced data against the model with all data included. This
method allows us to gain a better understanding of how much information is
lost when a feature set is removed (i.e. how unique that information is), data
that is especially valuable to this study considering the high redundancy in our
data set.
As shown in Table 5, by far the highest contributors to recall and precision
are the correspondent features, which focus on individual's unique frequent cor-
respondents in various time frames. To better understand exactly what features
within the correspondent feature set are important, we perform 5-fold cross val-
idation on a linear model using only these features. On average, this model
is able to achieve a 0.86 recall and 0.049 precision, both fairly high for such a
small subset of all features. Further, we explore which out of the 2543 corre-
spondent features contribute most to the final PD by mapping the maximum
19
likelihood estimation (MLE) coefficients of PCA components back to original
features' coefficients,
β = C · βP C
where β ∈ R2543×1, C ∈ R2543×500 is the matrix of principal components and
βP C ∈ R500×1 are the MLE coefficients for a model fitted on 500 PCA compo-
nents.
We then multiply each regression coefficient by the mean of the correspond-
ing feature (separately for paying and defaulting customers). Finally, we define
a score for each user based on the values of βXj, j = 1, ...n. This creates a sys-
tem where higher scores correspond to customers with higher PD's, and leads
to an average score of −0.0453 for paying customers and 16.2758 for defaulting
customers. This analysis is not possible using the whole feature set together,
as the normalization of the features leads to an average contribution of zero,
but the absolute contribution values of each feature are taken into account to
maintain a focus on the actual impact of the features on the PD. The results for
the four strongest features are presented in Table 6. In the end, the same ten
features are identified as the strongest contributors for both the paying and de-
faulting customer groups. All ten relate to the number of unique correspondents
with whom the user communicates during the holiday period around Christmas
and New Year's Eve. This strongly indicates a tie between not only unique
correspondents and defaulting, but also unique correspondents around holiday
periods (when users are most likely to be contacting close family and friends).
From these results we can begin to draw a clear connection of low probability
of default with the large number of active unique ties an individual has within
the network, and the high strength of those ties.
However, it should be noted that this kind of estimation of variable contri-
bution is too simple to provide a definitive insight into the relative importance
of the variables. There are several other approaches that compare predictors
in regression including methods considering variable importance via R2 par-
titions [25, 29], dominance analysis [3] and relative weights analysis [11, 17].
20
Feature
unique message correspondents (12/24)
unique message correspondents (incoming, 12/24)
unique message correspondents (outgoing, 12/24)
unique correspondents (outgoing, 12/24)
sum
Mean relative contribution
0.043
0.041
0.024
0.023
0.131
Table 6: Four features with the highest contribution to the PD calculated on separate sets of
paying and defaulting customers. All of the top 10 relate to the number of unique correspon-
dents during holiday period around Christmas and New Year's Eve.
According to the literature, the dominance analysis provides the most accu-
rate results, but it is not practical for our problem since it measures relative
importance in a pairwise fashion and is suitable only for small variable sets. In-
stead, the relative weights approach is sometimes used for systems with multiple
correlated predictors as can be found here [17], but this approach is theoreti-
cally flawed and is therefore not recommended for use [30]. We instead utilize
a variable importance (VI) extension for logistic regression [29] that is based
on Pratt's axiomatic [25] and the geometric approach of Thomas [28]. This
method equates VI to variance explained by the variable, which is βjρj, where
βj is the standardized regression coefficient and ρj is the simple correlation be-
tween variables Y and Xj. For our purposes, we use the geometric approach
to this method; an interpretation of Pratt's measure based on the geometry of
least squares. Here, the VI indices are defined as
dj =
βj ρj
R2 , j = 1, . . . , p,
(4)
where hats denote sample estimates, and R2 is as usual the proportion of sample
variance explained.
Further, we utilize a pseudo-R2 measure based on Weighted Least Squares
such that this set of indices sums to one and the importance of a subset of
variables is equal to the sum of their individual importance. This results in
the four most important features, according to VI metric, shown in Table 7,
21
Feature
unique message correspondents (12/24)
unique message correspondents (incoming, 12/24)
unique message correspondents (outgoing, 12/24)
unique correspondents (outgoing, 12/24)
sum
dj
0.048
0.045
0.029
0.026
0.148
Table 7: Ten features with the highest contribution to the PD. All of them relate to the
number of unique correspondents during holiday period around Christmas and New Year's
Eve.
yielding results very similar to the ones presented in Table 6. The two most
important variables are: the number of unique correspondents with whom the
user had a call on Dec 24th with relative importance of 0.048, and the number
of unique correspondents from which the user received a message on Dec 24th
with relative importance of 0.045. This finding reiterates the significance of the
number of unique correspondents with whom the user communicates around
holiday periods. Finally, to ensure that these features actually carry unique
information, we fit another model removing from the dataset the features with
the highest identified VI. Doing so reduces the recall by 0.042 and leaves none
of the new identified important variables with a relative importance above 0.03.
7. Conclusion
In this paper, we investigate many different aspects of user behavior to build
a large suite of features for analysis, starting with constructing the underlying
social networks based on the cell phone usage data. This produces a complex
network rich with information. Applying common network metrics reveals some
of the characteristics of the network such as the heterogeneity of the centrality,
diameter, and reciprocity measures.
The complex nature of the problem addressed by our machine learning
method to predict whether users will default in paying their cellphone bill leads
us to utilize some 6000 features, which we then pare down to only the most
22
predictive ones. The resulting model achieves a recall of 0.9 with a fall-out of
only 0.048, the performance that compares favorably with [27, 1], e.g., recall of
0.674 is reported in this reference.
Finally by investigating in depth the various features that contribute to the
model, we are able to pinpoint the surprisingly best, contributor: the number
of unique contacts with whom the user interacted around the winter holidays
(when users are most likely to contact their closest friends and family). The
significance of this correspondent information is higher than that of more tra-
ditionally used features. These results demonstrate the need for systematic
approach to selecting features for complex behavior prediction. Indeed, our re-
sults show that the strength of links within the network is better determined
by the timing of communications rather than the volume, duration, or distance
traditionally used for the similar predictions.
While our use of CDR data here focuses on user analytics and predictive
modeling, CDR datasets can support many other avenues of research. This
work investigates the default status of individuals, but there are many other
complex aspects of user behavior that could benefit from similar computational
techniques. The modeling we present could be improved by gathering informa-
tion over larger time periods in order to get a larger population of defaulting
individuals. Finally, with new machine learning algorithms constantly being de-
signed and improved, a more specific algorithm that is built for high dimensional
data such as ours could improve the resultant predictions and understanding of
how the specific features contribute to the overall model which is novel and
unexpected. Hence, our novel approach leading to these results is the main
contribution of our paper to the state of the art.
8. Acknowledgments
Funding: This work was supported in part by the Army Research Laboratory
(ARL) under Cooperative Agreement Number W911NF-09-2-0053 (NS-CTA),
by the Office of Naval Research (ONR) Grant No. N00014-15-1-2640, by the
23
RENOIR EU H2020 project under the Marie Skłodowska-Curie Grant Agree-
ment No. 691152 and by the National Science Centre, Poland, project no.
2016/21/B/ST6/01463. The views and conclusions contained in this document
are those of the authors and should not be interpreted as representing the of-
ficial policies either expressed or implied of the Army Research Laboratory or
the U.S. Government.
References
References
[1] Agarwal, R. R., Lin, C.-C., Chen, K.-T., and Singh, V. K. (2018). Predicting
financial trouble using call data -- on social capital, phone logs, and financial
trouble. PloS one, 13(3):e0191863.
[2] Alstott, J., Bullmore, E., and Plenz, D. (2014). powerlaw: A Python Package
for Analysis of Heavy-Tailed Distributions. PLoS ONE, 9(1):e85777.
[3] Azen, R. and Budescu, D. V. (2003). The dominance analysis approach for
comparing predictors in multiple regression. Psychological methods, 8(2):129.
[4] Bae, J. K. and Kim, J. (2015). A personal credit rating prediction model
using data mining in smart ubiquitous environments. International Journal
of Distributed Sensor Networks, 11(9):179060.
[5] Barabási, A.-L. and Pósfai, M. (2016). Network science. Cambridge univer-
sity press.
[6] Björkegren, D. and Grissen, D. (2017). Behavior revealed in mobile phone
usage predicts loan repayment. arXiv preprint arXiv:1712.05840.
[7] Blondel, V. D., Decuyper, A., and Krings, G. (2015). A survey of results on
mobile phone datasets analysis. EPJ Data Science, 4(1):10.
[8] Chawla, N. V. (2009). Data mining for imbalanced datasets: An overview.
In Data mining and knowledge discovery handbook, pages 875 -- 886. Springer.
24
[9] Clauset, A., Shalizi, C. R., and Newman, M. E. J. (2009). Power-Law
Distributions in Empirical Data. SIAM Review, 51(4):661 -- 703.
[10] Ge, R., Feng, J., Gu, B., and Zhang, P. (2017). Predicting and deterring
default with social media information in peer-to-peer lending. Journal of
Management Information Systems, 34(2):401 -- 424.
[11] Johnson, J. W. (2000). A heuristic method for estimating the relative
weight of predictor variables in multiple regression. Multivariate behavioral
research, 35(1):1 -- 19.
[12] Klaus, A., Yu, S., and Plenz, D. (2011). Statistical Analyses Support Power
Law Distributions Found in Neuronal Avalanches. PLoS ONE, 6(5):e19779.
[13] Kovanen, L., Saramaki, J., and Kaski, K. (2011). Reciprocity of mobile
phone calls. Dynamics of Socio-Economic Systems, 2(2):138 -- 151.
[14] Kuznetsova, N. V. and Bidyuk, P. I. (2017). Modeling of credit risks on
the basis of the theory of survival. Journal of Automation and Information
Sciences, 49(11).
[15] Kvamme, H., Sellereite, N., Aas, K., and Sjursen, S. (2018). Predicting
mortgage default using convolutional neural networks. Expert Systems with
Applications, 102:207 -- 217.
[16] Lambiotte, R., Blondel, V. D., de Kerchove, C., Huens, E., Prieur, C.,
Smoreda, Z., and Van Dooren, P. (2008). Geographical dispersal of mobile
communication networks. Physica A: Statistical Mechanics and its Applica-
tions, 387(21):5317 -- 5325.
[17] LeBreton, J. M. and Tonidandel, S. (2008). Multivariate relative impor-
tance: Extending relative weight analysis to multivariate criterion spaces.
Journal of Applied Psychology, 93(2):329.
[18] Li, M.-X., Palchykov, V., Jiang, Z.-Q., Kaski, K., Kertész, J., Miccichè, S.,
Tumminello, M., Zhou, W.-X., and N Mantegna, R. (2014). Statistically val-
25
idated mobile communication networks: the evolution of motifs in European
and Chinese data. New Journal of Physics, 16(8):083038.
[19] Ling, R., Bertel, T. F., and Sundsøy, P. R. (2012). The socio-demographics
of texting: An analysis of traffic data. New Media & Society, 14(2):281 -- 298.
[20] Maldonado, S., Peters, G., and Weber, R. (2018). Credit scoring using
three-way decisions with probabilistic rough sets. Information Sciences.
[21] Newman, M. E. J. (2001). Scientific collaboration networks. II. Shortest
paths, weighted networks, and centrality. Physical Review E, 64(1):016132.
[22] Onnela, J.-P., Saramäki, J., Hyvönen, J., Szabó, G., Lazer, D., Kaski, K.,
Kertész, J., and Barabási, A.-L. (2007). Structure and tie strengths in mobile
communication networks. Proceedings of the National Academy of Sciences
of the United States of America, 104(18):7332 -- 6.
[23] Opsahl, T., Agneessens, F., and Skvoretz, J. (2010). Node centrality in
weighted networks: Generalizing degree and shortest paths. Social Networks,
32(3):245 -- 251.
[24] Pearson, K. (1901). Liii. on lines and planes of closest fit to systems of
points in space. The London, Edinburgh, and Dublin Philosophical Magazine
and Journal of Science, 2(11):559 -- 572.
[25] Pratt, J. (1987). Dividing the indivisible using simple symmetry to partition
variance explained. Proceedings of the Second International Conference in
Statistics, pages 245 -- 260.
[26] Rochat, Y. (2009). Closeness centrality extended to unconnected graphs:
The harmonic centrality index. In ASNA, number EPFL-CONF-200525.
[27] San Pedro, J., Proserpio, D., and Oliver, N. (2015). Mobiscore: towards
universal credit scoring from mobile phone data. In International Conference
on User Modeling, Adaptation, and Personalization, pages 195 -- 207. Springer.
26
[28] Thomas, D. R., Hughes, E., and Zumbo, B. D. (1998). On variable impor-
tance in linear regression. Social Indicators Research, 45(1-3):253 -- 275.
[29] Thomas, D. R., Zhu, P., Zumbo, B. D., and Dutta, S. (2008). On measur-
ing the relative importance of explanatory variables in a logistic regression.
Journal of Modern Applied Statistical Methods, 7(1):4.
[30] Thomas, D. R., Zumbo, B. D., Kwan, E., and Schweitzer, L. (2014). On
johnson's (2000) relative weights method for assessing variable importance:
A reanalysis. Multivariate behavioral research, 49(4):329 -- 338.
[31] Tibshirani, R. (1996). Regression shrinkage and selection via the lasso.
Journal of the Royal Statistical Society. Series B (Methodological), pages 267 --
288.
[32] Vapnik, V. N. (1999). An overview of statistical learning theory. IEEE
transactions on neural networks, 10(5):988 -- 999.
[33] Wang, C., Lizardo, O., Hachen, D., Strathman, A., Toroczkai, Z., and
Chawla, N. V. (2013). A dyadic reciprocity index for repeated interaction
networks. Network Science, 1(1):31 -- 48.
[34] Wang, Y. and Lee, Y.-C. (2018). Customer credit evaluation using big data
of microfinance company in china. The Korean Academic Society of Business
Administration, (2):1601 -- 1645.
[35] Xie, J. and Szymanski, B. K. (2011). Community detection using a neigh-
borhood strength driven label propagation algorithm. In IEEE NSW 2011,
pages 188 -- 195.
[36] Xie, J., Szymanski, B. K., and Liu, X. (2011). Slpa: Uncovering overlapping
communities in social networks via a speaker-listener interaction dynamic
process. In ICDM 2011 Workshop on DMCCI.
[37] Yan, X., Jeub, L. G., Flammini, A., Radicchi, F., and Fortunato, S. (2018).
Weight thresholding on complex networks. Phys. Rev. E 98, 042304.
27
[38] Zhang, X.-j. and Hu, J. (2009). Personal credit rating assessment for the
national student loans based on artificial neural network. In Business Intel-
ligence and Financial Engineering, 2009. BIFE'09. International Conference
on, pages 53 -- 56. IEEE.
Appendix A. Constructing an unweighted network representation
with frequency cutoffs
We define the unweighted network via a cutoff, c, representing the minimum
number of communications from node i to node j required for an edge to be
drawn [21]. Specifically, if you consider the weight of communications between
node i and node j to be the total volume of communications wi,j, then the
condition for a directional link being formed from node i to node j is wi,j ≥ c.
This link then becomes an unweighted directional edge from node i to node j
without restricting the possibility of another link forming from node j to node i
to create an unweighted bidirectional edge. One main advantage of constructing
the network in this way is that it allows the network to be simplified, removing
noise while still retaining information regarding the frequency of communication.
Still, the methodology proposed here contains some inherent loss of information
partially stemming from the use of the raw number of communications between
individuals. To account for possible differences in the amount of information
contained in calls versus texts, it is natural to attempt to use different commu-
nication weights based on communication type. As such, we experimented with
such methods to better account for these information exchange levels and found
that any such scheme would cause bias between age groups. In general, since
younger individuals used more text messages while older individuals used more
calls we treat their contributions to the network flatly to minimize bias.
This method yields a strict structural view of the true friendship network,
addressing the need for noise reduction by pruning down the network as well
as showing how robust the network is to increasingly strict friendship require-
ments. [37] In Fig. A.6(a), we show that the giant component of the network
28
Figure A.6: (a) The giant component of the social network decays exponentially (λ = 0.0238)
with increased minimum number of communications required for an edge to be drawn. (b)
The number edges in the network also decays rapidly with increased cutoff, closely fitting
a power law with γ = 0.7536. (c) The percentage of non-giant component nodes that are
isolated for a given cutoff. The isolated nodes reach a minimum at a cutoff of 43.
decays exponentially with an increased frequency cutoff for edges, and is gener-
ally very sensitive to such an increase. Without a cutoff, the giant component of
the network contains 99.1% of the nodes, but it drops to only half of the network
when the frequency cutoff reaches 30. A similar effect can be seen in Fig.A.6(b),
where the total number of edges in the social network shows a power law decay
for increasing cutoff values. This power law decay of edges implies that the
scheme is useful for removing noisy, low frequency communication while leav-
ing intact the dense communications representative of strong social ties. The
proper cutoff value for a given situation is difficult to establish, however, since
the vast majority of connections in the network are low frequency. In fact, less
than half of the original edges remain when a cutoff of c = 4 is implemented.
29
Figure A.7: The out-degree distribution of the mobile phone network for various edge weight
cutoffs. The inset shows the estimated power law exponent for the various cutoff values to
highlight the different scaling rates.
As the cutoff increases further, the network loses much of its connectivity and
instead shows a rough sketch of the community structure of the system. This
effect is seen in Fig. A.6(c), in which the percentage of nodes outside of the
giant component that are isolated decreases with increased cutoff, the result
of small communities being separated from the giant component but remaining
intra-connected. Of course, these results yield only a crude approximation of
the community structure; high cutoffs lower the connectivity within communi-
ties as well as separate them from the giant component. This trade-off becomes
apparent at cutoffs larger than c = 43, where the number of isolated nodes in-
creases and even tightly bound communities unravel. A more direct and robust
detection of the network's community structure is discussed in Sec. 3.2.
In addition to the effects on the connectivity of the network, the frequency
cutoff also has a significant impact on the overall degree distribution (shown
in Fig. A.7). As expected [18, 22, 5], for all values of the cutoff the degree
distribution shows a power law tail. However, the rate at which the tail decays
changes as the edges are removed. As the cutoff increases, many of the highest
30
degree nodes lose the vast majority of their edges. As a result, the higher cutoffs
greatly reduce the maximum degree of the network and increase the power
scaling exponent of the degree distribution causing faster tail decay [2, 12, 9].
As with the prior results on increased cutoff, however, this is only true to a
point. The exponent increase appears to saturate at high values of the cutoff
where the impact gets weaker and weaker. These properties allow us to use an
unweighted graph with low cutoffs to define basic network features such as node
degree, while higher cutoff values are useful for finding the stable number of
strong contacts.
Appendix B. Reciprocity Measures
Here we generalize how reciprocity is defined using Ri =(cid:80)
require Ni,j to be normalized, (1 =(cid:80)
j Ni,jri,j where
ri,j is the reciprocity score between node i and j and Ni,j is the weight of that
score. To keep the metric bounds at [−1, 1], we constrain ri,j to [−1, 1] and
j Ni,j). Previously, we defined a metric
and where all scores are equal. Under normalization this
where ki is the total degree of node i. Here we introduce
using ri,j = wi,j−wj,i
wi,j +wj,i
means that Ni,j = 1
ki
two variants to produce two alternative metrics for reciprocity.
First we remove the dependence on the number of communications by mod-
ifying ri,j to take on only three values −1, 0, 1, causing links with small wi,j to
become more important. If between node i and node j there exists any number
of communications from i to j, but no communications from j to i, then ri,j = 1.
If the opposite is true, then ri,j = −1. Finally if both i and j send any number
of communications to each other, ri,j = 0. Ni,j in this metric is unchanged. We
call this metric binary weighted reciprocity.
The second metric modifies Ni,j rather than ri,j. To make high volume links
more important, we set Ni,j ∝ wi,j + wj,i. Applying normalization leads to
Ni,j = wi,j +wj,i
,
which we call hyper-weighted reciprocity.
. The simplified expression is then Ri =(cid:80)
wi,j−wj,i
j(cid:48) wi,j(cid:48) +wj(cid:48) ,i
j(cid:48) wi,j(cid:48) +wj(cid:48),i
(cid:80)
(cid:80)
j
In Fig B.8, we show the distribution for both of these metrics. The hyper-
31
Figure B.8: (a) The distribution of reciprocities using the hyper-weighted metric. (b) The
distribution of reciprocities using the binary metric. Both metrics maintain the extreme values.
They also maintain a bell shape curve, but the binary metric exhibits multiple discrete peaks.
weighted reciprocity is very similar to the weighted reciprocity, but the binary
distribution is significantly different. Most of these difference arise from the
binary nature of the metric, where for example a node with degree three can
only have reciprocity 0,±1/3,±2/3,±1. Because the system is dominated by
low degree nodes, this type of scenario is frequent causing a few discrete fractions
to be most prevalent. Further, we include a fit following the same methodology
as in Fig 2, where Table B.8 shows the fitting parameters.
Fitting Parameter
A
B
C
R2
Hyper-weighted
Binary Weighted
Positive Negative Positive Negative
0.218
1.84
0.124
.798
0.707
1,33
0.179
.976
0.136
1.83
0.142
0.785
0.957
1.08
0.157
0.957
Table B.8: The fitting parameters used in Fig B.8. Positive and Negative refer to the fit of the
distribution where the reciprocity values are positive and negative respectively. The Binary
metric has relatively poor R2 values due to the many peaks present, but the fit captures the
general shape. The Hyper-weighted metric preforms better on goodness of fit and clearly
shows the asymmetry between the positive and negative side of the distribution.
32
Unfortunately, these features are not sufficiently unique from that shown in
the main text of this work, and thus not suitable as separate features. The binary
and weighted metrics have a Pearson correlation coefficient of 0.9224, while the
hyper-weighted and weighted metrics have a coefficient of 0.727. Because of
these high levels of correlation and despite weighting reciprocity differently, we
conclude that the alternate methods do not produce any sufficiently unique
information. They can, however, be substituted for the metric used based on
specific use cases where the intuition behind the calculations fits better, and
thus may be useful for future work.
Appendix C. Feature Sets
Appendix C.1. Consumption features
Consumption features include information about the total number of com-
munication events, the total and average duration of phone calls, and average
time between consecutive communications. These broad categories are then
broken up into time windows (specific times of day or days of the week) and
separated by communication type and direction to form a large contribution to
our overall feature set. These features characterize the normal activity patterns
for individuals within the network. On average, per day each user makes 5.3
calls lasting about 40 seconds each, and sends 10.4 messages. Additionally, this
feature shows a slightly higher wait time for incoming events (3 hours) than
outgoing events (2.5 hours).
Appendix C.2. Correspondent features
Correspondent features are based on the distinct number of individuals that
each user communicates with over specific time periods, separated between calls
and text messages. This includes the total number of unique people that ex-
change at least five messages with the user on average every week, and the
number of regular correspondents that make at least two calls to the user on
average in a week. Further, this feature includes the percentage of incoming
33
communications that are messages and the number of unique correspondents
over various time periods and scales (such as normal business hours versus rest
hours and week days versus weekends). Analysis of this feature set shows that
the average number of correspondents (call or message) is 31, while call corre-
spondents make on average 21 calls and message correspondents sent on average
17 messages. However for regular correspondents, each user makes only 3.3 calls
and sends 1.7 messages. The number of unique correspondents during the week-
end drops to about half of the number for weekdays.
Appendix C.3. Reciprocated event features
We define reciprocated events as events where the observed user returns a
call/message within an hour of receiving a communication. We extract this
information for each user and every hour of the week, as well as the median
time between reciprocated call events and median time to answer messages.
Similar to above, we also aggregate these indicators to days of week and time of
day. On average, this analysis shows that users reciprocate only 14 calls and 15
messages for the night time (midnight-6am) during the whole 3-month period.
Interestingly, the average time to answer a message is only 21 minutes in the
morning (6am-10am). This drops even further to a little less than 10 minutes
during other times of the day (10am-6am). Further, the average number of
reciprocated messages increases as the week goes by, going from 6.5 to 6.9 from
Monday to Friday, but then dropping to 5.7 and 4.8 on Saturday and Sunday,
respectively.
Appendix C.4. Mobility features
Mobility features describe daily movement patterns of a person. They use the
cell tower location to which the individual connected to for each event. Features
include average daily radius of gyration (minimum radius that encompasses
all the locations visited by a user), average distance traveled per day of week
(calculated as sum of distances between consecutive antennas), popular cell
towers (IDs of most popular cell towers that sum up to 90% of records) and
34
average number of unique cell towers per week. A typical user's average daily
radius of gyration is 8.5 km.
Interestingly, there is an order of magnitude
difference when comparing mean and median distance traveled by day of the
week, but the trend is the same in both cases. From Monday to Thursday, the
median distance traveled is fairly constant around 33 km, but increases to 40 km
on Friday and 47km on Saturday before dropping to 23 km on Sunday. Lastly,
the average number of utilized cell towers per week is 15.
Appendix C.5. Location features
From information about the two most commonly used cell towers and the
default status of each user, we can develop location features to identify high risk
geographic regions. We use two cell towers instead of one to account for users
spending a large amount of time at both their residence and workplace/school.
For this reason, two new features are added for each user; one for each tower.
From this information, we can calculate the empirical probability of default for
each cell tower, yielding a mean of 0.0032. Note that when used for prediction
purposes, these calculations are based only on the training data set and then
applied to the test dataset accordingly (more information on this experimental
setting is in 6.1).
35
|
1510.02700 | 3 | 1510 | 2016-01-26T00:06:36 | A short-graph Fourier transform via personalized PageRank vectors | [
"cs.SI"
] | The short-time Fourier transform (STFT) is widely used to analyze the spectra of temporal signals that vary through time. Signals defined over graphs, due to their intrinsic complexity, exhibit large variations in their patterns. In this work we propose a new formulation for an STFT for signals defined over graphs. This formulation draws on recent ideas from spectral graph theory, using personalized PageRank vectors as its fundamental building block. Furthermore, this work establishes and explores the connection between local spectral graph theory and localized spectral analysis of graph signals. We accompany the presentation with synthetic and real-world examples, showing the suitability of the proposed approach. | cs.SI | cs |
A SHORT-GRAPH FOURIER TRANSFORM VIA PERSONALIZED PAGERANK VECTORS
Mariano Tepper and Guillermo Sapiro
Department of Electrical and Computer Engineering, Duke University
ABSTRACT
The short-time Fourier transform (STFT) is widely used to
analyze the spectra of temporal signals that vary through time.
Signals defined over graphs, due to their intrinsic complex-
ity, exhibit large variations in their patterns. In this work we
propose a new formulation for an STFT for signals defined
over graphs. This formulation draws on recent ideas from
spectral graph theory, using personalized PageRank vectors
as its fundamental building block. Furthermore, this work es-
tablishes and explores the connection between local spectral
graph theory and localized spectral analysis of graph signals.
We accompany the presentation with synthetic and real-world
examples, showing the suitability of the proposed approach.
Index Terms -- Graph, localized Fourier transform, per-
sonalized PageRank, local spectral graph theory.
1. INTRODUTION
The Fourier transform globally decomposes a temporal signal
into its constituting frequencies, identifying their contribution
to the signal formation. Often, temporal signals vary their be-
havior through time; in these cases, the Fourier transform, be-
ing global, falls short as a tool to analyze the characteristics of
these signals. The short-time Fourier transform (STFT) [1] is
used to analyze the Fourier spectrum of temporally localized
sections of the signal. It is well studied that there is a trade-off
between resolution (sharpness) in time and its counterpart in
frequency. There is no way to get arbitrarily sharp analysis in
both domains simultaneously [2, Sec. 2.6.2].
Formally, in the STFT a window function w which is
nonzero for only a short period of time is slid along the time
axis and multiplied by the input signal f; then the Fourier
transform of the resulting signal is taken. Formally, for one
dimensional signals,
STFTf (u, ξ)
.
=
f (t)w(t − u)e−iξtdt.
(1)
(cid:90) ∞
−∞
The changing spectra is usually analyzed as a function of the
time-shift u and is well suited to analyze time-varying signals.
The above formula can be interpreted as the following three-
sets algorithm: (1) translate the window w by u, (2) modulate
Work partially supported by NSF, ONR, NGA, ARO, and NSSEFF.
the result by frequency ξ, and (3) take the convolution of the
result with the signal f. This can be written as
STFTf = (cid:104)f,MξTuw(cid:105),
= g(t − u) and (Mξg)(t)
.
(2)
where (Tug)(t)
translation and modulation operators, respectively.
.
= g(t)eiξt are the
Weighted graphs are a natural representational structure in
most modern network applications (including, for example,
social, energy, transportation, and sensor networks). These
graphs are loaded with information, usually in the form of
high-dimensional data (i.e., signals) that reside on the vertices
(nodes) of graphs. Graph signal processing lies at the inter-
section of graph theory and computational harmonic analysis
and seeks to process such signals on graphs. See [3, 4] for
further details and references on this emerging field.
Graph signal processing has been successful at charac-
terizing the equivalent of the Fourier transform in graph do-
mains. Many different types of localized spectral transforms
have been proposed in recent years, see [3, Sec. IV] for a
thorough discussion. This list includes a windowed Fourier
transform [5], later described in this work.
In parallel,
One of the main examples are diffusion wavelets [6],
which are based on compressed representations of powers
of a graph diffusion operator.
local spectral
techniques, in which personalized PageRank vectors play a
prominent role, have become increasingly popular in the field
of community detection in graphs [e.g., 7]. As we will see
in Section 2, the PageRank equation is defined recursively,
and we can consider a single PageRank vector in place of a
sequence of random walk vectors, or of powers of a diffusion
operator [8].
In this work, we establish and explore for the first time
the connection between local spectral graph methods and lo-
calized spectral analysis of graph signals. This work is a first
step in this exploration, and introduces a short-graph Fourier
transform inspired on the ideas of local graph analysis, us-
ing personalized PageRank vectors as fundamental building
blocks of the method.
The remainder of the paper is organized as follows. In
Section 2 we introduce our short-graph Fourier transform.
Experimental results on synthetic and real graphs are pre-
sented in Section 3, showing the interesting characteristics of
the proposed formulation. Finally, we provide some conclud-
ing remarks in Section 4.
2. FROM LOCAL SPECTRAL GRAPH THEORY TO
A SHORT-GRAPH FOURIER TRANSFORM
We begin by introducing the notation and fundamental for-
mulas used throughout the paper.
.
+
=(cid:80)n
Let X be a matrix. In the following, (X)ij, (X):j, (X)i:
denote the (i,j)th entry of X, the jth column of X, and the
ith row of X, respectively.
We consider a graph G = (V, A), where V = n and
A ∈ Rn×n
is the weighted adjacency matrix. The weighted
entry (A)ij represents in most applications a measure of sim-
ilarity between vertices i and j. We assume that G is con-
nected and undirected, i.e., (A)ij = (A)ji. The degree of a
node i ∈ V is di
j=1(A)ij. Let D ∈ Rn×n be a diag-
onal matrix with entries (D)ii = di. The Laplacian of G is
= D − A, and the normalized Laplacian of G is
.
defined as L
defined as L .
= D−1/2LD−1/2. We denote the eigendecom-
positions of L and L by UΛUT and VΛLVT, respectively.
We assume that the eigenvalues, the diagonal entries of Λ and
ΛL, are sorted in increasing order. Finally, the volume of a
set of vertices S ⊆ V is vol (S)
Let f ∈ Rn be a signal over the graph vertices, i.e., (f )i
is the signal value at vertex i. The classical Fourier transform
can be defined as the transform that diagonalizes the Laplace
operator. Similarly, the graph Fourier transform [9] is defined
.
= VTf, where V diagonalizes the graph Laplacian. The
.
=
inverse graph Fourier transform is then simply defined as f
=(cid:80)
i∈S di.
.
as(cid:98)f
V(cid:98)f.
2.1. Local spectral graph theory
The second eigenvalue of the graph Laplacian L can be
viewed as the solution to
x
min
xTLx s.t. xTDx = 1, xTD1 = 0.
(3)
The optimal solution x∗ is a generalized eigenvector of L with
respect to D and provides a map from the graph to the real
line. This map encodes a measure of similarity (geodesic dis-
tance) between graph vertices. This property is exploited for
clustering [10] and hashing [11], for example.
In [12] the above problem is modified to incorporate a
bias towards a target region (defined by one or more vertices)
in the graph. This region is represented as an indicator vector
s, normalized such that sTD1 = 0 and sTDs = 1. More
precisely, given a set of nodes S ∈ V we define the unit vector
s = unit(S) as
(unit(S))i
b/ vol (S) if i ∈ S;
−b/ vol (V (cid:114) S) otherwise,
where b = (cid:112)vol (S) vol (V (cid:114) S) / vol (V ). The modified
(4)
.
=
(cid:40)
The only modification is the addition of the constraint on
xTDs. This can be interpreted as imposing to the solution
a correlation with s larger than arccos(κ).
Intuitively, as the solution to Problem (3) provides a no-
tion of geodesic distance between graph nodes, the solution to
Problem (5) provides a notion of geodesic distance from the
seed set to the rest of the vertices. This link will become clear
in the following.
Theorem ([12]). Let s ∈ Rn be a seed vector such that
sTD1 = 0 and sTDs = 1, and sTDv2 (cid:54)= 0, where v2 is
the second generalized eigenvector of L with respect to D. In
addition, let x∗ be an optimal solution to Problem (5) with
correlation parameter κ ∈ [0, 1]. Then, there exists some
γ ∈ (−∞, (Λ)2,2) and some c ∈ [0,∞] such that
x∗ = c (L − γD)+ Ds.
(6)
PageRank [13] assigns a numerical weight to each vertex of a
graph, assessing its relative importance within the graph; its
personalized variant is frequently used to localize the PageR-
ank vector within a subset of the network [8]. The following
proposition can be proven using simple algebraic manipula-
tions and the definition of L.
Proposition. Let c = −γ = 1−α
α in Theorem 6. The vector
−1 Ds, is the solution to the
p, defined as p = c (L − γD)
(degree normalized) personalized PageRank (PPR) equation
(7)
Dp = (1 − α)(Ds) + αAD−1(Dp).
Theorem 6 and Equation (7) connect Problem (5) with the
personalized PageRank equation [14]. In the field of commu-
nity detection, PPR vectors are used to find local communi-
ties around seed vertices [e.g., 7, 8, 15], where a small but
cohesive "seed set" of vertices is expanded to generate its en-
closing community (vertices having a stronger relationship to
the seed set than to the rest of the graph).
In this context,
PPR vectors arise as natural units of observation for localized
analysis of graphs.
Furthermore, powers of a graph diffusion operator were
identified in [6] as natural building blocks to define wavelets
on graphs. Notice that the PPR vector is exactly equivalent to
the recursive application of the diffusion operator AD−1 [8],
which leads naturally to the notion of geodesic distance.
Given this evidence, we posit that the PPR vector is a fun-
damental tool to perform a localized spectral analysis of graph
signals. This connection is the key observation of this work
and drives our definition of a short-graph Fourier transform.
2.2. A short-graph Fourier transform
problem is given by [12]
xTLx s.t.
min
x
xTDx = 1, xTD1 = 0,
xTDs ≥ κ.
As described in the introduction, we need two elements to
define a short-graph Fourier transform: a localization (e.g.,
classically a translation) and a modulation operators.
(5)
Definition (Localization). We define the local window at
node i as
= max (0, x∗
.
i ) /(cid:107)max (0, x∗
wi
(8)
i the solution to Problem (5) with s = unit({i}) and
i )(cid:107)1 ,
where x∗
the maximum is taken entrywise.
The window wi is defined in terms of its correlation with
unit({i}), yielding to a simple conceptual interpretation. In
this work, we solve Problem (5) using Theorem 6. Given
the eigendecomposition of the normalized Laplacian, we have
L = D1/2UΛUTD1/2. Then,
(cid:16)
(cid:17)
(Λ − γI)+(cid:16)
(cid:17)T
x∗ = c
D−1/2U
D−1/2U
Ds.
(9)
Once the eigendecomposition is computed as a preprocess-
ing step, this formula delivers an efficient method for obtain-
ing x∗, without any iterations nor matrix inversions (albeit
the inversion of the diagonal matrix Λ − γI). Interestingly,
the spectral localization of x∗ is determined by the product
Ds = UTD1/2s, i.e., by the correlation be-
Since the eigendecomposition of L is used in Equa-
tween s and each element of the graph Fourier basis.
(cid:0)D−1/2U(cid:1)T
tion (9), we also use it in our graph modulation operator.
Definition (Graph modulation). For k ∈ {1, 2, . . . , n}, we
define the graph modulation operator Mk : Rn → Rn by
=(cid:112)vol (V ) f ◦ (D−1/2U):k,
.
Mkf
(10)
where ◦ denotes the entrywise multiplication.
M1 is the identity operator, such as T0 is in the classical mod-
ulation for temporal signals.
Definition. Given the localization and modulation operators,
we define the short-graph Fourier transform of a signal f ∈
Rn at vertex i ∈ V and frequency k ∈ {1, 2, . . . , n} as
SGFTf (i, k) = (cid:104)f , Mkwi(cid:105).
The spectrogram of f is defined as
spectrogramf (i, k) = SGFTf (k, i)2.
(11)
(12)
It is not hard to see that Equation (11) reduces to the standard
one when the unweighted graph is a Cartesian grid.
.
=
√
lation operator as (cid:102)Mkf
Note. Shuman et al. provide a different definition for a short-
graph Fourier transform [5]. They define the graph modu-
n f ◦ (V):k, where ◦ denotes
the entrywise multiplication. They also define a convolution
operator as f ∗ g
, and a translation operator
, where δi
as Tif
is the impulse function at vertex i. This leads to the (more
(cid:16)(cid:98)f ◦(cid:98)g
(cid:17)
(cid:16)(cid:0)VT(cid:1)
(cid:17)
:i ◦ (cid:98)f
n (f ∗ δi) =
.
= V
n V
√
√
.
=
(a) The linear graph has 200 vertices, where each vertex is connected to its
two neighbors (with periodicity in the edges). In the weighted case, the graph
weights for all edges are set to one, excepting edges (40, 41) and (159, 160)
(marked in red) which have a weight of 10−3.
Unweighted
Weighted
Conv. (τ = 200) PPR (β = 10−4) Conv. (τ = 200) PPR (β = 10−4)
(b) We compute localized windows around vertices 45, 50, and 55 (red, blue
and green curves, respectively). Note how the convolutional approach [5]
fails to properly locate the window in the weighted case, as the window peak
does not coincide with the desired vertex.
Fig. 1. Window localization comparison.
In the unweighted case (in
which the graph Fourier and the standard Fourier transforms are equal), con-
volutional localization [5] works well; however, when the graph weights
present a sharp discontinuity, it fails to provide an accurate result. Contrarily,
the proposed PPR approach works well in both cases.
classical) definition SGFTf (i, k) = (cid:104)f ,(cid:102)MkTig(cid:105). Defining
((cid:98)g)k = e−τ λk and then invert the graph Fourier transform.
an appropriate window (kernel) g is not trivial in the graph
space. It is possible to define it in the graph spectral space as
In this work we do not aim at producing a better method than
the one in [5] (although we will exemplify potential localiza-
tion advantages of our definition). The method here proposed
is based on radically different principles, which are of interest
by themselves for the spectral study of graph signals.
3. EXPERIMENTAL RESULTS
We implemented the proposed short-graph Fourier trans-
form in Python, using the graph-tool
library [16]. We
make the code publicly available at https://github.
com/marianotepper/sgft.
In all examples we set
γ = (Λ)1,1 − β, where β takes a particular value in each
example.
We begin by examining the localization operator (Equa-
tion (8)). For this, we use in Fig. 1 a linear graph, where lo-
calization can be easily interpreted and visualized. The main
observation is that the window is properly localized when us-
ing the proposed approach, while this is not always the case
with the convolutional approach.
In the second example, we present results on a 2D grid
graph, see Fig. 2. When this graph is unweighted, the graph
Fourier transform amounts to the classical 2D Fourier.
In
the unweighted and weighted cases, the proposed short-graph
Fourier transform is able to clearly identify the two differ-
ent signal regions. Naturally, since the weight discontinu-
ity matches the boundary between both signal regions, the
spectrograms of the weighted graph have better spatial and
0123839404142431571581591601611621971981990501001502000.0000.0050.0100.0150.0200.0250501001502000.0000.0050.0100.0150.0200.0250.0300501001502000.0000.0050.0100.0150.0200.0250.0300.0350.0400.0450501001502000.0000.0050.0100.0150.0200.0250.030(a) The graph is a 50 × 50 regular grid, where each
vertex is connected to its four neighbors (with period-
icity in the edges). The input signal is formed by two
sinusoidal waveforms, as shown on the side. In the
weighted case, the graph weights for the edges con-
necting both waveforms are set to 10−5 while for the
rest of the edges, they are set to one.
Unweighted
Weighted
Conv. (τ = 5)
PPR (β = 10−4) Conv. (τ = 200) PPR (β = 10−4)
(a) Graph of weather stations in the US, with color representing the average
annual temperature in 2014. The graph was built by connecting each station
to its 6 spatial nearest neighbors (the corresponding edge weight is the spatial
distance between both stations).
(b) Top row: Localized windows at the central vertex of the grid. Cen-
ter row: Spectrograms. Bottom row: For each vertex, color represents the
index of the frequency with maximum magnitude, from light green (low fre-
quencies) to dark green (high frequencies).
Fig. 2. All spectrograms coarsely identify the two sections in the input sig-
nal with different patterns (in all cases, we use the first 500 eigenvectors
only). In the unweighted case, the proposed method works significantly bet-
ter than the convolutional approach [5].
In the unweighted and weighted
cases, the proposed PPR-based method has better spectral localization, i.e.,
for each vertex, fewer frequencies are selected.
frequency localizations. The proposed PPR-based spectro-
gram exhibits better spatial and frequency localizations than
the convolutional approach.
For our last example, we use a real graph comprised of
weather stations distributed throughout the US. The input sig-
nal is the average temperature in each station in 2014. The lo-
calized PPR windows follow nicely the graph topology, being
more isotropic or anisotropic, depending on the local graph
topology. The spectrogram obtained with the proposed PPR-
based method presents clear patterns, which are coherent with
the spatial arrangement of the graph vertices.
4. CONCLUSIONS
In this work we presented an extension of the classical short-
time Fourier transform (STFT) to signals defined over graphs.
We have shown with different examples that this new short-
graph Fourier transform can be a valuable tool for extracting
information from signals on graphs.
(b) Different personalized
PageRank windows.
(c) Spectrogram obtained with the proposed
technique (for better visualization, we only show
the first 30 components).
(d) For the vertex marked with a red square (and a red arrow), we show the
correlation between its spectral signature (its column in the spectrogram) and
the signatures of the other vertices.
Fig. 3. Clear patterns appear in the spectrogram, where nodes with similar
spectral signature are localized in spatially coherent areas (e.g., Florida). We
use β = 10−3 and restrict the computations to the first 500 eigenvectors.
More broadly, we established the connection between lo-
cal spectral graph theory and localized spectral analysis of
graph signals. This is the first work that studies the use of per-
sonalized PageRank vectors as fundamental building blocks
for local spectral analysis of graph signals.
The STFT becomes ineffective when the signal includes
structures having different time-frequency resolution, some
very localized in time and others in frequency. Wavelets ad-
dress this issue by changing the time and frequency resolu-
tion. Such as diffusion wavelets extended the definition to the
graph domain using powers of a graph diffusion operator, we
plan on extending the use of personalized PageRank vectors
to produce an alternate definition of wavelets on graphs.
010203040010203040050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.0050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.0050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.0050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.015.4928.8242.1555.4868.820500100015002000250005101520250.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0References
[1] J. Allen, "Short term spectral analysis, synthesis, and
modification by discrete Fourier transform," EEE Trans.
Acoust., vol. 25, no. 3, 1977.
[2] M. Vetterli and J. Kovacevi´c, Wavelets and Subband
Coding, Prentice Hall, 1995.
[3] D. Shuman, S. Narang, P. Frossard, A. Ortega, and
P. Vandergheynst, "The emerging field of signal pro-
cessing on graphs: Extending high-dimensional data
analysis to networks and other irregular domains," IEEE
Signal Process. Mag., vol. 30, no. 3, pp. 83 -- 98, 2013.
[4] A. Sandryhaila and J. Moura, "Discrete signal process-
ing on graphs: Frequency analysis," IEEE Trans. Signal
Process., vol. 62, no. 12, pp. 3042 -- 3054, 2014.
[5] D. Shuman, B. Ricaud, and P. Vandergheynst, "A win-
dowed graph Fourier transform," in SSP, 2012.
[6] R. Coifman and M. Maggioni, "Diffusion wavelets,"
Appl. Comput. Harmon. Anal., vol. 21, no. 1, pp. 53 -- 94,
2006.
[7] R. Andersen and K. Lang, "Communities from seed
sets," in WWW, 2006.
[8] R. Andersen, F. Chung, and K. Lang, "Local graph par-
titioning using PageRank vectors," in FOCS, 2006.
[9] F. Chung, Spectral Graph Theory, vol. 92, American
Mathematical Soc., 1997.
[10] J. Shi and J. Malik, "Normalized cuts and image seg-
mentation," IEEE Trans. Pattern Anal. Mach. Intell.,
vol. 22, no. 8, pp. 888 -- 905, 2000.
[11] Y. Weiss, A. Torralba, and R. Fergus, "Spectral hash-
ing," NIPS, 2008.
[12] M. Mahoney, L. Orecchia, and N. Vishnoi, "A local
spectral method for graphs: With applications to im-
proving graph partitions and exploring data graphs lo-
cally," J. Mach. Learn. Res., vol. 13, no. 1, pp. 2339 --
2365, 2012.
[13] L. Page, S. Brin, R. Motwani, and T. Winograd, "The
PageRank citation ranking: Bringing order to the web.,"
Tech. Rep. 1999-66, Stanford InfoLab, 1999.
[14] G. Jeh and J. Widom,
search," in WWW, 2003.
"Scaling personalized web
[15] K. Kloster and D. Gleich, "Personalized PageRank so-
lution paths," arXiv:1503.00322, 2015.
[16] T. Peixoto, "The graph-tool Python library," figshare,
2014.
|
1912.08931 | 1 | 1912 | 2019-11-10T13:07:46 | Impact of Traffic Conditions and Carpool Lane Availability on Peer to Peer Ridesharing Demand | [
"cs.SI"
] | A peer to peer ridesharing system connects drivers who are using their personal vehicles to conduct their daily activities with passengers who are looking for rides. A well-designed and properly implemented ridesharing system can bring about social benefits, such as alleviating congestion and its adverse environmental impacts, as well as personal benefits in terms of shorter travel times and or financial savings for the individuals involved. In this paper, the goal is to study the impact of availability of carpool lanes and traffic conditions on ridesharing demand using an agent based simulation model. Agents will be given the option to use their personal vehicles, or participate in a ridesharing system. An exact many to many ride matching algorithm, where each driver can pick up and drop off multiple passengers and each passenger can complete his or her trip by transferring between multiple vehicle, is used to match drivers with passengers. The proposed approach is implemented in AnyLogic ABS software with a real travel data set of Los Angeles, California. The results of this research will shed light on the types of urban settings that will be more recipient towards ridesharing services. | cs.SI | cs | Proceedings of the 2016 Industrial and Systems Engineering Research Conference
H. Yang, Z. Kong, and MD Sarder, eds.
Impact of Traffic Conditions and Carpool Lane Availability on
Peer-to-Peer Ridesharing Demand
Sara Masoud and Young-Jun Son
Department of Systems and Industrial Engineering
University of Arizona
Tucson, AZ, USA
Neda Masoud and Jay Jayakrishnan
Civil and Environmental Engineering
University of California Irvine
Irvine, CA, USA
Abstract
A peer-to-peer ridesharing system connects drivers who are using their personal vehicles to conduct their daily
activities with passengers who are looking for rides. A well-designed and properly implemented ridesharing system
can bring about social benefits, such as alleviating congestion and its adverse environmental impacts, as well as
personal benefits in terms of shorter travel times and/or financial savings for the individuals involved. In this paper,
the goal is to study the impact of availability of carpool lanes and traffic conditions on ridesharing demand using an
agent-based simulation model. Agents will be given the option to use their personal vehicles, or participate in a
ridesharing system. An exact many-to-many ride-matching algorithm, where each driver can pick-up and drop-off
multiple passengers and each passenger can complete his/her trip by transferring between multiple vehicle, is used to
match drivers with passengers. The proposed approach is implemented in AnyLogic® ABS software with a real
travel data set of Los Angeles, California. The results of this research will shed light on the types of urban settings
that will be more recipient towards ridesharing services.
Keywords
Peer-to-peer ridesharing, Ride-matching algorithm, Agent-Based Simulation (ABS)
1. Introduction
Traffic congestion is a major problem in urban areas, which may easily lead to major economic loss every year [1].
In the U.S., the increasing population growth of urban areas has led to rise of demands for highway travels, which in
return has strained the transportation infrastructure. Travel demands and physical highway features along with traffic
influenced events are identified as three major causes of traffic congestion by the Federal Highway Administration
[2]. The 2015 Urban Mobility Scorecard report [3] reveals that traffic congestion in 2014 in the U.S. caused a total
delay of 6.9 billion hours and a waste of 3.1 billion gallons in fuel, which led to total loss of $160 billion 2014
dollars. In addition to the waste of fuel, the additional green gas emission of congestion contributes to climate
change. American Highway User Alliance has identified the top 30 highway bottlenecks in the U.S. [4]. 10 of these
bottlenecks which are responsible for about 91 million hours of delay every year are located in the Los Angeles
County, and have led to a queue length range of one to seven miles [4].
Various approaches have been implemented in the past to eliminate or to mitigate traffic congestion. One of the
common approaches is expanding the infrastructure by adding new lanes to existing highways or even building new
roads, which is costly. Texas A&M Transportation Institute showed that adding new lanes to an existing highway
may cost about 2 to 10 million dollars per lane-mile, and the construction cost of a new highway is in range of 5 to
20 million dollars per lane-mile [5]. The disadvantage of this approach is that not only is it expensive, but also
extension of most major highways will induce higher levels of demand for the improved roads, not alleviating the
congestion, and even encouraging people to have additional trips, which eventually lead to a potential growth in
Masoud, Masoud, Son, and Jayakrishnan
traffic demand [6]. To find the optimal location for the new road segments, network design policy is usually utilized
in a discrete form to define the additional road segments with respect to budget restriction to minimize the total
travelling cost of the network. Similarly, to find the potential road segments for additional lane, network design is
applied in a continuous form to achieve the optimal capacity expansion of the highway network [7]. On the other
hand, instead of expanding the existing infrastructure, congestion management can be done by utilizing the unused
capacity of the currently existing highway. To this end, one of the popular approaches in this area which has been
employed for decades is toll pricing. Due to the improvement of the technology and implementation of the
intelligent transportation systems in the transportation network, the emergence of the real-time traffic data has led to
appearance of new concepts such as Dynamic toll pricing for a better control over traffic flow [8]. The only
drawback of this approach is its limitation to tollways and toll lanes [9].
Public transit (e.g., bus) is another approach that can successfully reduce the vehicle miles travelled by carrying a
high number of passengers by one vehicle. The disadvantage of this approach is the lack of flexibility due to fixed
schedules and routes. Complementary to public transit, other services such as para-transit (e.g., shuttles) or taxies are
defined based on a similar concept to reduce to vehicle miles travelled. However, Para-transit systems are limited
due to the fact that they are usually dependent on the federal funding [10]. In addition, taxis usually contributes to
traffic congestion in large cities [11].
Although many of the mentioned alternatives have been employed to manage traffic congestion, none of them has
been effective enough to eliminate or alleviate the traffic congestion. This motivates the researchers to look for
better alternatives such as shared-use mobility [12]. In the past few years, ridesharing has evolved from an idea into
a reality. Ridesharing is the sharing of the vehicles by passengers who have similar routes to reduce the vehicle
miles travelled and traffic congestion. The trip can be managed by one of the passengers, which is known as
informal ridesharing (e.g., the carpooling for school or work by parents or collages) or it can be monitored by an
external transportation network company (e.g., Uber or Lyft) to maximize the profit for both the company and the
driver. As a result, the latter case can lead to additional traffic congestion like the case of taxis instead of solving the
problem. In this paper, we consider alleviating traffic congestion and its adverse impacts, by using a peer-to-peer
ridesharing system. In this system, drivers try to share their vehicle by other passengers who have similar routes
while doing their daily activities. In addition, we will study the impact of availability of carpool lanes, and traffic
conditions on ridesharing demand. To this end, a methodology that consists of agent-based simulation and a
matching algorithm is introduced in Section 2. The experiment is discussed in Section 3. And, Section 4 provides the
conclusions of the research works.
2. Methodology
The core of each ridesharing system is the ride-matching algorithm which can be considered as a general case of
dial-a-ride problem [13]. In a practical dial-a-ride problem, several users request a door to door transportation
service from a specific agency. Users can specify a time window for them to be picked up at the origin or be
dropped off at the destination, or both. Agencies usually provide multiple vehicles to serve their customers. Each
vehicle can handle multiple trip request in an each mission. Although an agency can minimize its operational costs
by increasing the occupancy of its fleet, such savings come at the cost of low quality of service for users (due to
longer trips) and may impact demand in the future. Drivers in a dial-a-ride system are employed by the company. In
addition, it is assumed that all vehicles are available throughout the day. These two properties of a dial-a-ride system
is what differentiates it from a peer-to-peer ridesharing system. In a ridesharing system, drivers are available only
for a short period of time and within a certain time window due to their daily schedules, and each has a specific
origin and destination of their own.
The limited availability of drivers in a peer-to-peer ridesharing problem make it really hard to achieve high matching
rates in such systems [14]. To this end, Masoud and Jayakrishnan [10] have proposed an advanced ride-matching
algorithm that can increase the efficiency of a ridesharing system by maximizing the number of successful driver-
rider matches. Although the main difference between a dial-a-ride and a peer-to-peer ridesharing system is the fact
that in the latter there is no pre-deterministic set of resources (i.e., vehicles), Masoud and Jayakrishnan showed that
following and revising a basic dial-a-ride model may not be the most effective way to model a peer-to-peer
ridesharing system [10]. They proposed a peer-to-peer ride-matching algorithm that can provide multi-hop routes for
Masoud, Masoud, Son, and Jayakrishnan
riders by optimally routing drivers in real-time. One of the properties of this algorithm is that it allows for using
time-dependent travel times. This property becomes increasingly important in this paper, since the objective of this
study is to measure the impact of carpool lanes on the percentage of successful matches, and in this context the
attractiveness of carpooling is mainly in lower travel times. In this study, in order to take advantage of this property
of the proposed system, we use agent-based simulation to incorporate realistic traffic conditions and travel times.
Here, the simulation model maintains the traffic equilibrium under different conditions and will call the matching
algorithm whenever a potential rider enters the system. We assume that real-time travel times at both ordinary and
carpool lanes are available to all the drivers at all times. Additionally, the model considers the network elements that
may affect the interaction of vehicles such as the network topology, and speed limits. More details about the
simulation model and algorithms are provided in the following sections.
2.1. Agent-Based Simulation Model
The agent-based model in this study provides a realistic environment, which allows for evaluating the efficiency of
peer-to-peer ridesharing system. Although a ride-matching algorithm plays an important role in the effectiveness of
the system, the successful implementation of a ridesharing system also depends on other elements, such as traffic
conditions. The model has been constructed in AnyLogic® by utilizing the car following and lane changing libraries
that are provided by the software [15]. In this model, three types of agents are defined. An agent can be a regular
driver who is not participating in the peer-to-peer ridesharing experiment, a rider who is looking to employ a driver
who can match his requirements, or a driver who volunteers to share his vehicle by other riders as long as he can
follow his personal schedule. A rider can turn to a regular driver if he/she is not matched with any other driver in the
ridesharing system. In this model, the regular drivers have their own individual behaviour and goal which is
minimizing the total travelling cost. Their behaviour is modelled by Dijkstra's algorithm [16]. Each time a regular
driver arrives to a decision making point (e.g., a highway junction), the driver will get the up-to-date traffic data of
the network and by utilizing the Dijkstra's algorithm updates his/her route plan to his/her final destination. The
following equation represents the traveling cost for each driver.
𝑐𝑖𝑗(𝑡) = 𝑤1(𝑇𝑖𝑗(𝑡)) + 𝑤2𝑠(𝑓𝑖𝑗(𝑡))
(1)
This equation shows that the travelling cost for each link at any moment in time (𝐶𝑖𝑗(𝑡)) depends on average
travelling time of the link (i.e., s(fij(t))) and also the potential toll price of the link (i.e. Tij(t)) if the user decides to
utilize a toll road. We denote the average travelling time as s(fij(t)) to emphasize that the traveling time depends on
the traffic flow (i.e., fij(t)) of the link. This value is directly obtained from the simulation model. W1 and W2 are the
coefficients to normalize the effect of toll price and average travelling time on the travelling cost.
Table 1: Validation of the simulation model
Link ID
Traffic Flow Distribution
Real Data
Simulation
0
1
2
3
0.056
0.231
0.460
0.253
Average
0.054
0.227
0.464
0.254
Error
0.002
0.004
0.005
0.001
0.003
Table 1 compares the traffic distribution of the real data shown in Table 2 and the distribution provided by the
simulation model. The last column, which shows the errors (i.e., absolute difference) between the real and
simulated traffic flows, has an average of 0.003. Utilizing the data in Table 1 for a chi-squared test at 0.05 level of
significance reveals that the null hypothesis (i.e., H0: The agent-based simulation data follow the real traffic flow
distribution) cannot be rejected, and the simulated traffic flows can be considered as a realistic representation of the
traffic flows of the area under study.
Masoud, Masoud, Son, and Jayakrishnan
On the other hand, the main goal for the riders and drivers who participate in the ridesharing system is to minimize
the travelling time while utilizing others' vehicles and maximizing the profit by sharing their vehicle by other riders,
respectively. To model their behaviours, the matching algorithm would be utilized each time a rider enters the
system. The next section provides details about the matching algorithm.
2.2. Matching Algorithm
In this work, a simulation model is used to incorporate the dynamic behaviour of traffic flow. As a result, a dynamic
algorithm is needed, where users are allowed to register in the system when they are ready to travel. The ride-
matching algorithm proposed by [10] is adopted in this work. The ride-matching algorithm not only creates a best
set of driver-riders match in real-time, but also guarantees the optimal route plans for the participants. The steps
used by the algorithm to find the optimal solution is depicted in Figure 1.
Figure 1: Logical steps in the matching algorithm
The algorithm consists of three main steps. In the first step, by using Spatio-Temporal Ellipsoid Method (STEM), a
time-expanded network for each individual rider is generated, which is used to find the optimal route plan for the
mentioned rider. To do so, the links whose starting and/or ending nodes are not reachable by the drivers in the
original network are removed. In the remaining network, STEM finds time interval during which nodes are available
based on the travel time window of the rider. Then, considering the rider's time intervals, STEM defines the feasible
network for the rider.
The second step in the algorithm, as it is denoted in Figure 1, is pre-processing. Here, all the nodes that are not
descendants of the origin and predecessors of the destination nodes are removed using an iterative process. Then,
this revised network is topologically sorted. Finally, a depth fist search is employed to ensure that there exists at
least one feasible route plan for the rider. If so, a dynamic programming algorithm is used to search the graph for the
optimum route plan. The optimum route for each rider who enters the node j on driver 𝑑's vehicle is the one which
satisfies the following Bellman equation:
𝑉(𝑛𝑗, 𝑑) =
𝑚𝑖𝑛
𝑛𝑖: (𝑛𝑖, 𝑑) ∈ 𝐷𝑁𝑗
{
𝑑′ ∈ 𝐷𝑖
𝑚𝑖𝑛
𝑖𝑛\𝐸𝐷(𝑛𝑖, 𝑑′)
{𝑉(𝑛𝑗, 𝑑′) + 𝐶(𝑛𝑖, 𝑛𝑗)}}
(2)
In Equation (2), V(nj ,d) is the optimum cost of the optimal route from node 1 to node j. DNj is the set of all nodes 𝑖
in is the set that contains all the drivers who enter node i. ED(ni , d')
engering node 𝑗 with 𝑑 as the driver.. Di
contains the list of optimal drivers on the optimal route to ni, excluding the drivers in the last link to ensure the
feasibility of the solution. C(ni , nj) is the cost of traveling of the link connecting the two adjacent nodes ni and nj.
This cost is given by the simulation model if there is travelling between physically different nodes on the revised
feasible time-expanded network, and can be equal to a penalty P, if the movement is only temporal. After running
the matching algorithm, each driver knows where to pick up his/her assigned riders and where to drop them off. In
addition, each rider will know if he/she can utilize the ridesharing service, and if so, when he will be picked up in a
few seconds.
3. Experiments and Results
As mentioned in Section 1, the main goal of this study is to understand the effect of carpool lanes and traffic
conditions on a dynamic peer-to-peer ridesharing system. To this end, we used a data set of Los Angeles County in
Los Angeles, California, to construct a simulation model. The constructed simulation model is then used to conduct
experiments to study the impacts of traffic conditions and carpool lanes. As mentioned previously, Los Angeles
hosts eleven of the top thirty bottlenecks of the U.S. and out of these eleven bottlenecks, ten of them are in Los
Masoud, Masoud, Son, and Jayakrishnan
Angeles County [4]. Figure 2 and Table 2 depict the part of the Los Angeles County that was modeled in AnyLogic®
software.
Table 2: Topology of the testbed (i.e., part of Los Angeles County, California, 2014)
ID
0
1
2
3
Link
Starting
Node
Ending
Node
Length
(mile)
Free Flow Travel
Carpool
Traffic Flow
Time (hour)
Lane
(car / 24 hours)
0
0
1
1
Total
3
1
2
3
36.0
14.3
33.1
41.7
125.1
0.55
0.22
0.50
0.64
1.91
No
No
Yes
No
NA
12,948
53,319
106,058
58,343
230,668
As shown in Table 2, each link is defined by a unique ID. For each link (i.e., each row of the table), we gathered
various data such as the length, the free flow travel time, the existence of a carpool lane, and the traffic flow of
each link [17]. These pieces of information were used to validate the simulation model as well.
Figure 2: Highway topology of the testbed
Figure 2 depicts the topology of the network of our testbed which consist of four links. Out of these four links, only
one of them (i.e., link 2 in blue) has a carpool lane and the other three green links do not have any carpool lanes. We
considered six different Origin-Destination (O-D) pairs in this study, and all of them are shown in Figure 2. In this
work, we conducted four different experiments to study the impact of carpool lanes and traffic flow on ridesharing.
Table 3 provides the settings of each experiment as well as the results.
Table 3: Experiments and results
Experiment
Unused Capacity of
ID
carpool lane
Participants
Rider Driver Regular driver
Successful
Match rate
1
2
3
4
100%
75%
50%
25%
10%
10%
10%
10%
40%
40%
40%
40%
50%
50%
50%
50%
60%
60%
50%
45%
In the conducted experiments, the behavior and preference of the riders (e.g., the earliest arrival, latest arrival,
earliest departure and latest departure), and the percentage of participants were fixed. In each experiment, different
amount of the capacity of the carpool lane (i.e., column two) was used. The minimal percentage of unused capacity
of carpool lane was 25%, because this percentage leads to an equivalent traffic flow in the carpool lane and other
lanes. Table 3 shows that remaining capacity of carpool lane and the success rate in matching of the riders and
drivers in a peer-to-peer ridesharing system has a direct relationship. It means that the lower traffic flow in the
carpool lane leads to a higher rate in successfully matching the riders and drivers, which will reduce the traffic flow.
In addition, it is important to note that other elements such as the time windows that the riders define or the topology
Masoud, Masoud, Son, and Jayakrishnan
of the system have significant impacts on the results. Smaller time windows make the matching harder. If the time
intervals that the rider defines are smaller than a threshold the matching will be infeasible. The mentioned threshold
dynamically dependent on the traffic flow of the related routes. The first experiment revealed that even with a
practically empty carpool lane, only 60% of the riders could find a matching driver. On the other hand, the last
experiment revealed that with a zero capacity carpool lane, still 45% of the riders can find their matching drivers in
the system.
4. Conclusion
In this study, we proposed a simulation based approach involving a peer-to-peer ridesharing algorithm to study the
impact of traffic conditions and carpool lane on the peer-to-peer ridesharing demand. This study was conducted
based on a data set of Los Angeles County. An agent-based simulation was employed to present a realistic traffic
setting by considering the impacts of the topology of the network and dynamic behavior of vehicles (e.g., car
following and lane changing). Using the constructed simulation, four experiments were conducted to study the
impacts of carpool lane and traffic conditions. The experimental results revealed a positive relation between carpool
lane and a peer-to-peer ridesharing system.
Reference
1. Cici B., Markopoulou A., Frías-Martínez E., Laoutaris N., 2013, "Quantifying the Potential of Ride-sharing
Using Call Description Records," Proc. of the 14th Workshop on Mobile Computing Systems and
Applications, Feb 26 , New York, New York.
2. Federal Highway Administration (FHWA), "Congestion Report", available at http://www.ops.fhwa.dot.
gov/ congestion_report/ chapter2.htm, accessed on January 28, 2016.
3. Schrank D., Eisele B., Lomax T., Bak J., 2015, "2015 Urban Mobility Scorecard"
4. American Highway User Alliance, 2015, "Unclogging America's Arteries 2015," available at
on
http://www.highways.org/wp-content/uploads/2015/11/unclogging-study2015-hi-res.pdf,
January 25, 2016.
accessed
5. Texas A&M, mobility investment priority, available at http://mobility.tamu.edu/mip/strategies.php,
accessed on Jan. 28.
6. Duranton G., and Matthew A. T., 2011, "The Fundamental Law of Road Congestion: Evidence from US
Cities," The American Economic Review, 2616-2652.
7. Yang H.H., Bell M.G., 1998, "Models and Algorithms for Road Network Design: A Review and Some
New Developments," Transport Reviews,18(3), 257-78.
8. Phan T, Annaswamy A, Yanakiev D, Tseng E, 2016, "A Model-based Dynamic Toll Pricing Strategy for
Controlling Highway Traffic," Submitted to the 2016 IEEE American Control Conference, July 6-8,
Boston, Massachusetts.
9. Masoud s., Kim S., Son Y., 2015, "Integrated Dual Toll Pricing with Network Design for Hazardous
Material Transportation," In Proc. of Industrial and Systems Engineering Research Conference (ISERC),
Nashville, Tennessee.
10. Masoud N., Jayakrishnan R., 2015, "A Real-Time Algorithm to Solve the Peer-to-Peer Ride-Matching
Problem in a Flexible Ridesharing System," working paper.
11. Yang T., Yang H., Wong S.C., 2014, "Taxi services with search frictions and congestion externalities,"
Journal of Advanced Transportation, 48(6), 575-587.
12. Shaheen S.A., Chan N.D., 2015, "Evolution of E-Mobility in Carsharing Business Models," InElectric
Vehicle Business Models, 169-178.
13. Costa D.L., Cabral L.A., Siebra C.A., 2012, "Metaheuristic iterated local search and variable neighborhood
search for the dial-a-ride problem," InGlobal Optim Workshop, 61-64.
14. Masoud N., Jayakrishnan R., 2015, "A decomposition Algorithm to solve the multi-hop peer-to-peer ride-
matching problem," In Proc. of Transportation Research Board 94th Annual Meeting, Washington D.C.
15. AnyLogic. AnyLogic help, XJ Technologies Company Ltd., available at http://www.anylogic.com/
anylogic/help. accessed January 24, 2016.
16. Dijkstra, E.W., 1959, "A note on Two Problems in Connexion with Graphs," Numerische Mathematik,
269-271.
17. California Department of Transpiration (DOT), "2014 Traffic Volumes on California State Highways,"
available at http://traffic-counts.dot.ca.gov/docs/2014_aadt_volumes.pdf, accessed January 24, 2016.
|
1703.08590 | 2 | 1703 | 2017-08-27T13:26:52 | Efficiently Clustering Very Large Attributed Graphs | [
"cs.SI",
"cs.DM",
"physics.soc-ph"
] | Attributed graphs model real networks by enriching their nodes with attributes accounting for properties. Several techniques have been proposed for partitioning these graphs into clusters that are homogeneous with respect to both semantic attributes and to the structure of the graph. However, time and space complexities of state of the art algorithms limit their scalability to medium-sized graphs. We propose SToC (for Semantic-Topological Clustering), a fast and scalable algorithm for partitioning large attributed graphs. The approach is robust, being compatible both with categorical and with quantitative attributes, and it is tailorable, allowing the user to weight the semantic and topological components. Further, the approach does not require the user to guess in advance the number of clusters. SToC relies on well known approximation techniques such as bottom-k sketches, traditional graph-theoretic concepts, and a new perspective on the composition of heterogeneous distance measures. Experimental results demonstrate its ability to efficiently compute high-quality partitions of large scale attributed graphs. | cs.SI | cs | Efficiently Clustering Very Large Attributed Graphs
Alessandro Baroni
University of Pisa, Italy
[email protected]
Alessio Conte
University of Pisa, Italy
[email protected]
7
1
0
2
g
u
A
7
2
]
I
S
.
s
c
[
2
v
0
9
5
8
0
.
3
0
7
1
:
v
i
X
r
a
Abstract-Attributed graphs model real networks by
enriching their nodes with attributes accounting for
properties. Several techniques have been proposed for
partitioning these graphs into clusters that are homo-
geneous with respect to both semantic attributes and
to the structure of the graph. However, time and space
complexities of state of the art algorithms limit their
scalability to medium-sized graphs. We propose SToC
(for Semantic-Topological Clustering), a fast and scal-
able algorithm for partitioning large attributed graphs.
The approach is robust, being compatible both with
categorical and with quantitative attributes, and it is
tailorable, allowing the user to weight the semantic and
topological components. Further, the approach does
not require the user to guess in advance the number
of clusters. SToC relies on well known approxima-
tion techniques such as bottom-k sketches, traditional
graph-theoretic concepts, and a new perspective on
the composition of heterogeneous distance measures.
Experimental results demonstrate its ability to effi-
ciently compute high-quality partitions of large scale
attributed graphs.
I.
Introduction
Several approaches in the literature aim at partition-
ing a graph into communities that share some sets of
properties (see [14] for a survey). Most criteria for defin-
ing communities in networks are based on topology and
focus on specific features of the network structure, such
as the presence of dense subgraphs or other edge-driven
characteristics. However, real world graphs such as the
World Wide Web and Social Networks are more than just
their topology. A formal representation that is gaining
popularity for describing such networks is the attributed
graph [6], [16], [19], [38].
An attributed graph is a graph where each node is
assigned values on a specified set of attributes. Attribute
domains may be either categorical (e.g., sex) or quan-
titative (e.g., age). Clustering attributed graphs consists
in partitioning them into disjoint communities of nodes
that are both well connected and similar with respect to
their attributes. State of the art algorithms for clustering
attributed graphs have several limitations [38]:
they are too slow to be compatible with big-data
scenarios, both in terms of asymptotic time complexity and
in terms of running times; they use data-structures that
need to be completely rebuilt if the input graph changes;
This work has been published in ASONAM 2017 [3]. This version
includes an appendix with validation of our attribute model and
distance function, omitted in [3] for lack of space. Please refer to
the published version.
Maurizio Patrignani
Roma Tre University, Italy
[email protected]
Salvatore Ruggieri
University of Pisa and
ISTI-CNR, Italy
[email protected]
and they ask the user to specify the number of clusters to
be produced. Moreover, they only work with categorical
attributes, forcing the user to discretize the domains of
quantitative attributes, leading to a loss of information in
distance measures.
We offer a new perspective on the composition of het-
erogeneous distance measures. Based on this, we present a
distance-based clustering algorithm for attributed graphs
that allows the user to tune the relative importance of the
semantic and structural information of the input data and
only requires to specify as input qualitative parameters of
the desired partition rather than quantitative ones (such as
the number of clusters). This approach is so effective that
can be used to directly produce a set of similar nodes that
form a community with a specified input node without hav-
ing to cluster the whole graph first. We rely on state-of-the-
art approximation techniques, such as bottom-k sketches
for approximating similarity between sets [10] and the
Hoeffding bound (see [15]) to maintain high performance
while keeping the precision under control. Regarding ef-
ficiency, our approach has an expected time complexity
of O(m log n), where n and m are the number of nodes
and edges in the graph, respectively. This performance is
achieved via the adoption of a distance function that can
be efficiently computed in sublinear time. Experimental
results demonstrate the ability of our algorithm to produce
high-quality partitions of large attributed graphs.
The paper is structured as follows. Section II describes
related work. Section III summarizes our contributions.
Section IV formally states the addressed problem. Sec-
tion V introduces the notion of distance, essential for clus-
ter definition. The algorithm and its data structures are
described in Section VI. Section VII describes the tuning
phase which selects suitable parameter values for the input
graph according to the user's needs. The results of our
experimentation are discussed in Section VIII. Finally,
Appendix A and B contain a validation of our attribute
model and combined distance function.
II. Related work
Graph clustering, also known as community discovery,
is an active research area (see e.g., the survey [14]).
While the overwhelming majority of the approaches assign
nodes to clusters based on topological information only,
recent works address the problem of clustering graphs
with semantic information attached to nodes or edges (in
this paper, we restrict to node-attributed graphs). In fact,
topological-only or semantic-only clustering approaches
are not as effective as approaches that exploit both sources
of information [17]. A survey of the area [6] categorizes
the following classes for node-attributed graphs (here we
recall only key references and uncovered recent papers).
Reduction-based approaches translate the semantic infor-
mation into the structure of the graph (for example adding
weights to its edges) or vice versa (for example encoding
topological information into new attributes), then perform
a traditional clustering on the obtained data. They are
efficient, but the quality of the clustering is poor. Walk-
based algorithms augment the graph with dummy nodes
representing categorical only attribute values and estimate
node distance through a neighborhood random walk [38].
The more attributes two nodes shares the more paths
connect them the more the nodes are considered close. A
traditional clustering algorithm based on these distances
produces the output. Model-based approaches statistically
infer a model of the clustered attributed graphs, assuming
they are generated accordingly to some parametric dis-
tribution. The BAGC algorithm [35] adopts a Bayesian
approach to infer the parameters that best fit the input
graph, but requires the number of clusters to be known
in advance and does not handle quantitative attributes.
The approach has been recently generalized to weighted
attributed graphs in [36]. The resulting GBAGC algo-
rithm is the best performing of the state-of-the-art (in
Section VIII we will mainly compare to this work). A
further model-based algorithm is CESNA [37], which
addresses the different problem of discovering overlapping
communities. Projection-based approaches focus on the
reduction of the attribute set, omitting attributes are
irrelevant for some clusters. A recent work along this line
is [30]. Finally, there are some approaches devoted to
variants of attributed graph clustering, such as: I-Louvain
[12], which extends topological clustering to maximize
both modularity and a newly introduced measure called
'inertia'; PICS [1], which addresses a form of co-clustering
for attributed graphs by using a matrix compression-
approach; FocusCO [28] and CGMA [8], which start
from user-preferred clusters; M-CRAG [20], which gen-
erates multiple non-redundant clustering for exploratory
analysis; CAMIR [27], which considers multi-graphs.
Overall, state-of-the-art approaches to partition at-
tributed graphs are affected by several limitations, the first
of which is efficiency. Although, the algorithm in [38] does
not provide exact bounds, our analysis assessed an Ω(n2)
time and space complexity, which restricts its usability to
networks with thousands of nodes. The algorithm in [36]
aims at overcoming these performance issues, and does
actually run faster in practice. However, as we show in
Section VIII, its time and space performances heavily rely
on assuming a small number of clusters. Second, similarity
between elements is usually defined with exact matches on
categorical attributes, so that similarity among quantita-
tive attributes is not preserved. Further, data-structures
are not maintainable, so that after a change in the input
graph they will have to be fully recomputed. Finally, most
of the approaches require as input the number of clusters
that have to be generated [22], [33], [38], [36]. In many
applications it is unclear how to choose this value or how
to evaluate the correctness of the choice, so that the user
is often forced to repeatedly launching the algorithm with
tentative values.
III. Contributions
We propose an approach to partition attributed graphs
that aims at overcoming the limitations of the state of the
art discussed in Section II. Namely: (i) We propose a flex-
ible concept of distance that can be efficiently computed
and that is both tailorable (allowing the user to tune the
relative importance of the semantic and structural infor-
mation) and robust (accounting for both categorical and
quantitative attributes). Further, our structures can be
maintained when entities are added or removed without re-
indexing the whole dataset. (ii) We present the SToC algo-
rithm to compute non-overlapping communities. SToC al-
lows for a declarative specification of the desired clustering,
i.e., the user has to provide the sensitivity with which two
nodes are considered close rather than forecast the number
of clusters in the output. (iii) We describe an experimental
comparison with state-of-the-art approaches showing that
SToC uses less time/space resources and produces better
quality partitions. In particular, in addition to good qual-
ity metrics for the obtained clusters, we observe that SToC
tends to generate clusters of homogeneous size, while most
partitioning algorithms tend to produce a giant cluster and
some smaller ones.
IV. Problem statement
Intuitively, attributed graphs are an extension of the
structural notion of graphs to include attribute values
for every node. Formally, an attributed graph G(V, E, F)
consists of a set V = {v1, . . . , vn} of nodes, a set E =
{e1, . . . , em} ⊆ V × V of edges, and a set of mappings
F = {f1, . . . , fA} such that, for i ∈ [1..A], fi
: V →
dom(ai) assigns to a node v the value fi(v) of attribute
ai, where dom(ai) is the domain of attribute ai. Notice
that the definition is stated for directed graphs, but it
readily applies to undirected ones as well. A distance
function d : V × V → R≥0 quantifies the dissimilarity
between two nodes through a non-negative real value,
where d(v1, v2) = d(v2, v1), and d(v1, v2) = 0 iff v1 = v2.
Given a threshold τ, the ball centered at node v, denoted
Bd(v, τ), consists of all nodes at distance at most τ:
Bd(v, τ) = {v0 ∈ V d(v, v0) ≤ τ}. We distinguish between
topological distances, that are only based on structural
properties of the graph G(V, E), semantic distances, that
are only based on node attribute values F, and multi-
objective distances, that are based on both [25]. Using on
distance functions, a cluster can be defined by considering
nodes that are within a maximum distance τ from a given
node. Namely, for a distance function d() and a threshold
τ, a τ-close cluster C is a subset of the nodes in V such
that there exists a node v ∈ C such that for all v0 ∈ C,
d(v, v0) ≤ τ. The node v is called a centroid. Observe that
C ⊆ Bd(v, τ) is required but the inclusion may be strict. In
fact, a node v0 ∈ Bd(v, τ) could belong to another τ-close
cluster C0 due to a lower distance from the centroid of C0.
A τ-close clustering of an attributed graph is a parti-
tion of its nodes into τ-close clusters C1, . . . , Ck. Notice
that this definition requires that clusters are disjoint,
i.e., non-overlapping.
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
0.0
y
v2
v0
v1
v5
v7
v3
v4
v6
x
ID sex
0
1
2
3
4
5
6
7
1
1
1
0
0
0
0
1
x
0
0
0.1
0.2
0.4
0.55
0.6
0.7
y
0.1
0
0.1
0
0
0.1
0
0.09
dS(v0, vi)
0
0.00471
0.0066
0.3427
0.3521
0.3596
0.3616
0.3327
dT (v0, vi)
0
0.4
0.25
0.6
0.86
1
1
0.86
Fig. 1. A sample attributed graph. Attributes include: sex (categorical) and spatial coordinate x, y (quantitative). Edges are colored by
topological distance between the connected nodes. Topological distance dT () considers 1-neighborhoods.
V. A multi-objective distance
In this section we introduce a multi-objective distance
function that will be computable in sublinear time (Sec-
tion VI-A) and that allows for tuning the semantic and
topological components (Section VII). Regarding semantic
distance, we assume that attributes can be either categor-
ical or quantitative. For clarity, we assume that attributes
1, . . . , Q are quantitative, and attributes Q + 1, . . . , A are
categorical. Thus, the attribute values (f1(v), . . . , fA(v)) of
a node v, boil down to a relational tuple, which we denote
by tv. Semantic distance dS() can then be defined as:
dS(v1, v2) = f(tv1 , tv2)
(1)
where f() is any distance function over relational tuples
(see e.g., [21]). In our implementation and in experiments,
we first normalize quantitative attributes in the [0, 1]
interval using min-max normalization [26]. Then, we adopt
the following distance:
qPQ
i=1
((fi(v1) − fi(v2))2 ·pQ +PA
i=Q+1 J(fi(v1), fi(v2))
A
ds(v1, v2) =
(2)
Quantitative attributes are compared using Euclidean
distance, and categorical attributes are compared using
Jaccard distance (J(X, Y ) = 1 − X∩Y
X∪Y ). The scaling
factor
Q balances the contribution of every quantitative
attribute in the range [0, 1]. The overall distance function
ranges in [0, 1].
√
Regarding topological distance, we assume it is defined
as a distance of the node neighborhoods. Let us recall
the notion of l-neighborhood from [19]: the l-neighborhood
Nl(v) of v is the set of nodes reachable from v with a path
of length at most l. N(v) is a shorthand for N1(v), namely
the nodes linked by v.
Topological distance dT () can then be defined as:
dT (v1, v2) = g(Nl(v1), Nl(v2))
(3)
where g() is any distance function over sets of nodes,
e.g., Dice, Jaccard, Tanimoto [25]. In particular, we adopt
the Jaccard distance. Fig. 1 shows an example on dis-
tances. Fix node v0, and consider distances (semantic
and topological) between v0 and the other nodes in the
graph. For topological distance (with l = 1), e.g., we
have dT (v0, v2) = J({v0, v1, v2, v7},{v0, v1, v2}) = 1 −
{v0,v1,v2}
{v0,v1,v2,v7} = 0.25. Thus, v0 is closer to v2 than to v1,
since dT (v0, v1) = 0.4. For semantic distance (Equ. 2),
instead, it turns out that v0 is closer to v1 than to v2.
In fact, all three of them have the same sex attribute, but
v1 is spatially closer to v0 than to v2.
dST (v1, v2) = h(dS(v1, v2), dT (v1, v2))
Finally, semantic and topological distance can be com-
bined into a multi-objective distance dST () as follows [6]:
(4)
where h : R≥0 × R≥0 → R≥0 is such that h(x, y) = 0 iff
x = y = 0. This and the assumptions that dS() and dT ()
are distances imply that dST () is a distance. [11], [32], [38]
set h(x, y) = x + y as the sum of semantic and topological
distances. If x (cid:29) y then h(x, y) ≈ x, so the largest distance
if x ≈ y then h(x, y) ≈ 2x,
weights more. However,
which doubles the contribution of the equal semantic and
topological distances. In this paper, we consider instead
h(x, y) = max(x, y). If x (cid:29) y then h(x, y) ≈ x ≈ y, as
before. However, when x ≈ y then h(x, y) ≈ x, which
agrees with the distance of each component.
VI. The SToC Algorithm
For a given distance threshold τ, SToC iteratively
extracts τ-close clusters from the attributed graph starting
from random seeds. This is a common approach in many
clustering algorithms [6], [14]. Nodes assigned to a cluster
are not considered in the subsequent iterations, thus the
clusters in output are not overlapping. The algorithm
proceeds until all nodes have been assigned to a cluster.
This section details the SToC algorithm. We will proceed
bottom-up, first describing the STo-Query procedure
which computes a τ-close cluster with respect to a given
seed s, and the data structures that make its computation
efficient. Then, we will present the main SToC procedure.
A. The STo-Query Procedure
The STo-Query procedure computes a connected τ-
close cluster C for a given seed s and threshold τ. With
our definition of dST (), it turns out that C ⊆ BdST (s, τ) =
BdS(s, τ) ∩ BdT (s, τ). We define C as the set of nodes in
BdST (s, τ) that are connected to s. Computing C is then
possible through a partial traversal of the graph starting
from s. This is the approach of the STo-Query procedure
detailed in Algorithm 1.
Algorithm 1: STo-Query algorithm.
Input : G, τ, s
Output: C, a τ-close connected cluster
Global : S and T data structures (described in
Section VI-A, used to compute dST )
1 Q ← empty queue
2 C ← {s}
3 enqueue(Q, s)
4 while Q 6= ∅ do
5
6
7
8
9
10
11
12 end
13 return C;
v ← dequeue(Q)
foreach x ∈ N(v) do
C ← C ∪ {x}
enqueue(Q, x)
end
end
if x 6∈ C and dST (s, x) ≤ τ then
The efficiency of STo-Query relies on two data struc-
tures, S and T, that we adopt for computing semantic
and topological distances respectively and, a fortiori, for
the test dST (s, x) ≤ τ at line 7. Recall that dST (s, x) =
max(dS(s, x), dT (s, x)). Semantic distance is computed by
directly applying (Equ. 2). We store in a dictionary S the
mapping of nodes to attribute values. Thus, computing
dS(s, x) requires O(A) time, where A is the number of
attributes. For topological distance, instead, a naıve us-
age of (Equ. 3) would require to compute online the l-
neighborhood of nodes. This takes O(n) time for medium-
to-large values of l, e.g., for small-world networks. We
overcome this issue by approximating the topological dis-
tance with a bounded error, by using bottom-k sketch
vectors [10]. A sketch vector is a compressed representation
of a set, in our case an l-neighborhood, that allows the
estimation of functions, in our case topological distance,
with bounded error. The bottom-k sketch S(X) consists
in the first k elements of a set X with respect to a given
permutation of the domain of elements in X. The Jaccard
distance between Nl(v1) and Nl(v2) can be approximated
using S(Nl(v1)) and S(Nl(v2)) in their place, with a
precision by choosing k = log n
(see [15]). We store in a
2
dictionary T the mappings of nodes v to the sketch vector
of Nl(v). T allows for computing dT (s, x) in O(log n) time.
B. The SToC Procedure
The algorithm consists of repeated calls to the STo-
Query function on selected seeds. τ-close clusters returned
by STo-Query are added to output and removed from
the set of active nodes V 0 in Algorithm 2 (lines 7–9). We
denote by G[V 0] the subgraph of G with only the nodes
in V 0. Seeds are chosen randomly among the active nodes
through the select node function (line 6). This philoso-
phy can be effective in real-world networks (see, e.g., [13]),
and is inherently different from selecting a set of random
seeds in the beginning (as in k-means), since it guarantees
that each new seed will be at a significant distance from
previously chosen ones. Calls to STo-Query return non-
overlapping clusters, and the algorithm terminates when
Algorithm 2: SToC algorithm.
Input : G(V, E, F) attributed graph, τ distance
threshold
Output: R, a τ-close clustering of G
1 S ← global dictionary of the semantic vectors
2 T ← global topological similarity table of G
3 R ← ∅
4 V 0 ← V
5 while V 0 6= ∅ do
6
7
8
9
10
11 end
12 return R
s ← select node(G)
C ← STo-Query(G, τ, s)
V 0 ← V 0 \ C
G ← G[V 0]
R ← R ∪ {C}
all nodes have been assigned to some cluster, i.e., V 0 = ∅.
C. Time and space complexity
case complexity of SToC is O(P
Let us consider time complexity first. For a seed s, STo-
Query iterates over nodes in C ⊆ Nl(s) through queue Q.
For each node v ∈ C, the distance dST (v, x) is calculated
for all neighborhoods x of v. Using the data structures S
and T, this takes O(log n + A). SToC iterates over seeds
s by removing from the graph nodes that appear in the
cluster C returned by STo-Query. This implies that a
node is enqued in Q exactly once. In summary, worst-
x∈V N(x)(log n+ A)) =
O(m(log n + A)). According to related work, we consider
A to be constant in real world datasets. This leads to an
overall time complexity of O(m log n). The initialization
of the data structures S and T has the same cost. In fact,
S can be filled in linear time O(n) through a scan of the
input attributed graph. Moreover, bottom-k sketches can
be computed in O(mk) time [5], hence, for k ∈ O(log n),
building T requires O(m log n).
Regarding space usage, the dictionary S requires
O(nA) = O(n) space, assuming A constant. Moreover,
since each sketch vector in T has size O(log n), T requires
O(n log n) space. Thus, SToC requires O(n log n) space,
in addition to the one for storing the input graph.
VII. Auto-tuning of parameters
The SToC algorithm assumes two user parameters1
in input: the value l to be used in topological distance
(Equ. 3), and the distance threshold τ tested at line 7
of STo-Query. The correct choice of such parameters
can be critical and non-trivial. For example, consider the
cumulative distributions of dS() and dT () shown in Fig. 2
for the datasets that will be considered in the experiments.
Small values of l make most of the pairs very distant,
and, conversely, high values of l make most of the pairs
close w.r.t. topological distance. Analogously, high values
of threshold τ may lead to cluster together all nodes, which
1The error threshold is more related to implementation perfor-
mance issues rather than to user settings.
Fig. 2. Cumulative distributions of dT (), for varying l-neighborhoods, and of dS() for datasets DIRECTORS (left) and DBLP (right).
have semantic and topological distance both lower than τ.
E.g., almost every pair of nodes has a semantic distance
lower than 0.4 for the DIRECTORS dataset in Fig. 2.
Another issue with parameters l and τ is that they
are operational notions, with no clear intuition on how
they impact on the results of the clustering problem. In
this section, we introduce a declarative notion, with a
clear intuitive meaning for the user, and that allows to
derive optimal values for l and τ. We define the attraction
ratio α as a value between 0 and 1, as a specification
of the expected fraction of nodes similar to a given one.
Extreme values α = 1 or α = 0 mean that all nodes
are similar to each other and all nodes are different from
each other respectively. In order to let the user weight
separately the semantic and the topological components,
we actually assume that a semantic attraction ratio αS
and a topological attraction ratio αT are provided by the
user. We describe next how the operational parameters l
and τ are computed from the declarative ones αS and αT .
Computing τ. We approximate the cumulative distri-
bution of dS() among all the n2 pairs of nodes by looking
at a sample of 2 log n
pairs. By the Hoeffding bound [15],
this guarantees error of the approximation. Then, we set
τ = τ as the αS-quantile of the approximated distribution.
By definition, dS() will be lower or equal than τ for the
fraction αS of pairs of nodes. Fig. 2 (second and fourth
plots) show the approximated distributions of dS() for
the DIRECTORS and DBLP datasets. E.g., an attraction
ratio αS = 0.4 can be reached by choosing τ = 0.2 for
DIRECTORS and τ = 0.45 for DBLP.
2
Computing l. In the previous step, we fixed τ = τ
using the semantic distance distribution. We now fix l
using the topological distance distribution. The approach
consists in approximating the cumulative distribution of
dT (), as done before, for increasing values of l starting
from l = 1. For each value of l, we look at the quantile
of τ, namely the fraction αl = P r(dT ≤ τ) of pairs of
nodes having topological distance at most τ. We choose
the value l for which αl − αT is minimal, namely for
which αl
is the closest one to the attraction ratio αT .
Since αl is monotonically decreasing with l, we stop when
αl+1 − αT > αl − αT. Fig. 3 shows an example for
αT = 0.3 and τ = 0.6. The value l = 6 yields the quantile
αl closest to the expected attraction ratio αT = 0.3.
We now show that the cost of the auto-tuning phase
is bounded by O(m log n), under the assumptions that
both −1 and l are O(1). Such assumption are realis-
tic. In fact, values for cannot be too small, otherwise
Fig. 3. Computing the l value for αT = 0.3 and τ = 0.6 on the
DBLP dataset.
the performance improvement of using bottom-k sketches
would be lost [10]. Regarding l, it is bounded by the graph
diameter, which for real-world networks, can be considered
bounded by a constant [2], [31]. Let us consider then the
computational cost of auto-tuning. Computing τ requires
calculating semantic distance among 2 log n
pairs of nodes,
which requires O(log2 n), and in sorting the pairs accord-
ingly, which requires O((log n)(log log n)). Overall, the cost
is O(log2 n). Computing l requires a constant-bounded
loop. In each iteration, we need to build an approximate
cumulative distribution of the topological distance dT (),
which, as shown before, is O(log2 n). In order to compute
dT () we also have to construct the data structure T for
the value l at each iteration, which requires O(m log n). In
summary, computing l has a computational cost that is in
the same order of the SToC algorithm.
2
VIII. Experiments
We first present the evaluation metrics and the ex-
perimental datasets, and then show the results of our
experiments, which aim at showing the effectiveness of the
approach and at comparing it with the state of the art.
A. Evaluation metrics
According to existing approaches [18],
[38]we
adopt both a semantic and a topological metric. The
semantic metric is the Within-Cluster Sum of Squares
(WCSS) also called Sum of Squared Error (SSE), widely
[36],
Attributes
Edges Categorical Quantitative
774,162
topic
prolific
Topology
DBLP
Nodes
60,977
DIRECTORS
Nodes
3,609,806
DIRECTORS-gcc
12,651,511
Edges Categorical Quantitative
sectors, sex
age, birthplace, residence
Nodes
1,390,625
Edges Categorical Quantitative
10,524,042
sectors, sex
age, birthplace, residence
TABLE I.
Summary of experimental datasets.
used by widespread approaches such as the k-means [23]:
W CSS =
kv − µik2
(5)
kX
X
i=1
v∈Ci
where C1, . . . , Ck is the clustering of the graph, and, for
i ∈ [1, k], µi is the centroid of nodes in Ci w.r.t. the se-
mantics distance dS() [29]. WCSS ranges over non-negative
numbers, with lower values denoting better clusterings.
Alternative semantic metrics, such as entropy [36], [38],
are suitable for categorical/discretized attributes only.
The topological metric is the modularity [9], a de-facto
standard for graph clustering evaluation [36], [38]:
(cid:21)
Avw − kvkw
2m
δ(cv, cw)
(6)
(cid:20)
X
v,w∈V
Q = 1
2m
where A is the adjacent matrix of the graph, kv is the
degree of node v, cv is the cluster ID of node v, and δ is
the identity function (δ(i, j) = 1 if i = j and 0 otherwise).
Q is defined in [− 1
2 , 1], with a random clustering expected
to have Q = 0, and a good clustering Q > 0 [9].
B. Experimental datasets
We will run experiments on two datasets, whose sum-
maries are shown in Table I.
DIRECTORS: A social network of directors. A director
is a person appointed to serve on the board of a company.
We had a unique access to a snapshot of all Italian boards
of directors stored in the official Italian Business Register.
The attributed graph is build as follows: nodes are distinct
directors, and there is an (undirected) edge between two
directors if they both seat in a same board. In other
words, the graph is a bipartite projection of a bipartite
graph directors-companies. In the following we distinguish
the whole graph (DIRECTORS) from its giant connected
component (DIRECTORS-gcc). Node attributes include
quantitative characteristics of directors (age, geographic
coordinates of birth place and residence place) and cat-
egorical characteristics of them (sex, and the set of in-
dustry sectors of companies they seats in the boards of
– e.g., such as IT, Bank, etc.). Clustering this network
means finding communities of people tied by business
relationships. A combined semantic-topological approach
may reveal patterns of structural aggregation as well as
social segregation [4]. For example, clusters may reveal
communities of youngster/elderly directors in a specific
sub-graph.
DBLP: Scientific coauthor network. This dataset con-
sists of the DBLP bibliography database restricted to
four research areas: databases, data mining, information
retrieval, and artificial intelligence. The dataset was kindly
provided by the authors of [38], where it is used for eval-
uation of their algorithm. Nodes are authors of scientific
publications. An edge connect two authors that have co-
authored at least one paper. Each node has two attributes:
prolific (quantitative), counting the number of papers of
the author, and primary topic (categorical), reporting the
most frequent keyword in the author's papers.
Fig. 2 shows the cumulative distributions of semantic
and topological distances for the datasets. In particular,
the 1st and 3rd plots show the impact of the l parameter
on the topological distance. The smaller (resp. larger) l,
the more distant (resp. close) are nodes. This is in line
with the small-world phenomenon in networks [34, Fig.2].
C. Experimental results
We will compare the following algorithms:
•
Inc-C: the Inc-Clustering algorithm by Zhou et
al.
[38]. It requires in input the number k of
clusters to produce. Implementation provided by
the authors.
• GBAGC: the General Bayesian framework for
Attributed Graph Clustering algorithm by Xu et
al. [36], which is the best performing approach
in the literature. It also takes k as an input.
Implementation provided by the authors.
SToC: our proposed algorithm, which takes in
input the attraction ratios αS and αT , and the
error threshold .
•
• ToC: a variant of SToC which only considers
topological information (nodes and edges). It takes
in input αT and the error threshold (τ and l are
computed as for SToC, with a dummy αS = αT ).
SC: a variant of SToC which only considers se-
mantic information (attributes). It takes in input
αS and the error threshold .
•
All tests were performed on a machine with two Intel
Xeon Processors E5-2695 v3 (35M Cache, 2.30 GHz) and
64 GB of main memory running Ubuntu 14.04.4 LTS.
SToC, ToC and SC are implemented in Java 1.8, Inc-
C and GBAGC are developed in MatLab.
Table V shows the results of SToC for αS = αT = α
varying from 0.1 to 0.9, and a fixed = 0.9. For every
dataset and α, we report the number of clusters found (k),
the evaluation metrics Q and W CSS, the running time,
and the main memory usage. As general comments, we can
observe that k and W CSS are inversely proportional to
α, Q is always non-negative and in good ranges, memory
usage is limited, and running times are negligible for DBLP
and moderate for DIRECTORS and DIRECTORS-gcc.
For every α, we executed 10 runs of the algorithm, which
α
k
Q
DBLP
0.1
0.2
0.4
0.6
0.8
25,598
(1,279)
26,724
(1,160)
6,634
(5,564)
9,041
(7,144)
11,050
(4,331)
15,041
(5,415)
0.2
0.4
0.9
DIRECTORS
2,591,184
0.1
(311,927)
2,345,680
(162,444)
1,891,075
(34,276)
1,212,440
(442,011)
682,800
(485,472)
0.6
0.8
886,427
(123,420)
901,306
(47,486)
811,152
(28,276)
664,882
(63,334)
584,739
(408,725)
0.2
0.4
0.6
0.8
DIRECTORS-gcc
0.1
W CSS Time
(s)
Space
(GB)
5,428
(520)
5,367
(534)
23,477
(3,998)
21,337
(5,839)
20,669
(3,102)
16,688
(4,986)
7,198
(5,382)
9,793
(1,977)
26,093
(1,829)
72,769
(4,129)
49,879
(8,581)
6158
(2886)
4773
(2450)
8,050
(1450)
13,555
(3,786)
49,603
(9,743)
0.627
(0.21)
0.616
(0.214)
0.272
(0.151)
0.281
(0.1)
0.267
(0.11)
0.28
(0.05)
3,698
(485)
3,213
(167.3)
2,629
(178.6)
17,443
(2,093)
8,209
(12,822)
278.4
(44.7)
274
(14.1)
239.1
(11.6)
181.6
(24.4)
5,979
(10,518)
0.65
0.64
0.67
0.7
0.69
0.64
9
8.2
8.6
8.7
9.5
10
10.4
4.3
4.2
8.8
0.269
(0.014)
0.270
(0.015)
0.189
(0.12)
0.153
(0.08)
0.238
(0.1)
0.188
(0.045)
0.1347
(0.0237)
0.1530
(0.0084)
0.22
(0.023)
0.28
(0.068)
0.1769
(0.066)
0.102
(0.016)
0.103
(0.02)
0.1257
(0.0164)
0.248
(0.0578)
0.189
(0.0711)
TABLE II.
SToC results (mean values over 10 runs,
StDev in brackets).
k
15
100
1,000
5,000
15,000
Q W CSS Time (s)
870
1,112
1305
1,273
1,450
38,009
37,939
37,051
32,905
13,521
-0.499
-0.496
-0.413
-0.136
0.083
Space (GB)
31.0
31.0
31.1
32.1
32.2
TABLE III.
Inc-C results for the DBLP dataset.
uses random seeds, and reported mean value and standard
deviation. The low values of the standard deviations of Q
and W CSS show that the random choice of the seeds does
not impact the stability of the results. The results of ToC
and SC can be found in in Appendix B: in summary, the
exploitation of both semantic and topological information
leads to a superior performance of SToC w.r.t. both Q
and W CSS.
Tables III and IV report the results for Inc-C and
GBAGC respectively. Due to the different input param-
eters of such algorithms, we can compare the results of
SToC only by looking at rows with similar k. Let us
consider Inc-C first. Running times are extremely high,
k (actual)
DBLP
10 (10)
50 (14)
100 (2)
1,000 (3)
5,000 (2)
15,000 (1)
DIRECTORS
0.0382
0.0183
1 · 10−7
6 · 10−4
2 · 10−5
0
10 (8)
50 (10)
100 (8)
500 (5)
1000 (–)
0.0305
0.0599
0.1020
0.0921
-
DIRECTORS-gcc
0.1095
0.0563
0.0534
0.0502
0.0569
–
10 (8)
50 (14)
100 (15)
500 (5)
1000 (7)
1500 (–)
Q W CSS Time (s)
Space (GB)
27,041
27,231
27,516
27,465
27,498
27,509
198797
198792
198791
198790
-
75103
75101
75101
75101
75101
–
17
25
13
37
222
663
18
63
120
8,129
-
94
161
234
1,238
3,309
–
0.5
0.6
0.7
3
14.2
50.182
4.3
12.4
22.4
64.3
out of mem
3.02
5.47
9.34
40.3
59
out of mem
TABLE IV.
GBAGC results.
even for the moderate size dataset DBLP. It was unfeasible
to obtain results for DIRECTORS. Space usage is also
high, since the algorithm is in O(n2). Values of Q are
considerably worse than SToC. W CSS tends to generally
high. Consider now GBAGC. Quality of the results is
considerably lower than SToC both w.r.t. Q and W CSS.
The space usage and elapsed time increase dramatically
with k, which is non-ideal for large graphs, where a high
number of cluster is typically expected. On our experimen-
tal machine, GBAGC reaches a limit with k = 500 for the
DIRECTORS dataset by requiring 65GB of main memory.
Even more critical is the fact that the number of clusters
actually returned by GBAGC is only a fraction of the
input k, e.g., it is 1 for k = 15, 000 for the DBLP dataset.
The user is not actually controlling the algorithm results
through the required input.
Figure 4 clarifies the main limitation of Inc-C and
GBAGC over SToC. It reports for some of the executions
the size distributions of clusters found. Inc-C (bottom
plot) tends to produce a single giant cluster including
most of the nodes. GBAGC (middle plots) produces a
small number of clusters regardless of the input parame-
ters. Instead, SToC (top plots) produces more balanced
results, typically expected in sociology [7], [24], with a size
distribution in line with common power-laws found in real-
world network and with the input graphs in particular (see
[4] for the DIRECTORS graph).
IX. Conclusions
We proposed SToC, a clustering algorithm for large at-
tributed graphs. It extracts non-overlapping clusters using
a combined distance that accounts for network topology
and semantic features, based on declarative parameters
(attraction ratios) rather than on operational ones (num-
ber of clusters) typically required by other approaches.
Experimental results showed that SToC outperforms the
[10] E. Cohen and H. Kaplan. Summarizing data using bottom-k
sketches. In PODS, pages 225–234. ACM, 2007.
[11] D. Combe, C. Largeron, E. Egyed-Zsigmond, and M. G´ery.
Combining relations and text in scientific network clustering.
In ASONAM, pages 1248–1253. IEEE, 2012.
[12] D. Combe, C. Largeron, M. G´ery, and E. Egyed-Zsigmond. I-
louvain: An attributed graph clustering method. In IDA, pages
181–192. Springer, 2015.
[13] A. Conte, R. Grossi, and A. Marino. Clique covering of
In ACM Symposium on Applied
large real-world networks.
Computing, SAC '16, pages 1134–1139. ACM, 2016.
[14] M. Coscia, F. Giannotti, and D. Pedreschi. A classification for
community discovery methods in complex networks. Statistical
Analysis and Data Mining, 4(5):512–546, 2011.
[15] P. Crescenzi, R. Grossi, L. Lanzi, and A. Marino. A comparison
of three algorithms for approximating the distance distribution
in real-world graphs. In TAPAS, pages 92–103. Springer, 2011.
[16] R. Diestel. Graph theory. 2005. Grad. Texts in Math, 2005.
[17] Y. Ding. Community detection: Topological vs. topical. Journal
of Informetrics, 5(4):498–514, 2011.
[18] K.-C. Duong, C. Vrain, et al. A filtering algorithm for con-
strained clustering with within-cluster sum of dissimilarities
criterion. In 2013 IEEE 25th International Conference on Tools
with Artificial Intelligence, pages 1060–1067. IEEE, 2013.
[19] S. Gunnemann, B. Boden, and T. Seidl. Db-csc: a density-based
approach for subspace clustering in graphs with feature vectors.
In Machine Learning and Knowledge Discovery in Databases,
pages 565–580. Springer, 2011.
I. Guy, N. Zwerdling, D. Carmel, I. Ronen, E. Uziel, S. Yogev,
and S. Ofek-Koifman. Personalized recommendation of social
software items based on social relations. In RecSys, pages 53–
60, New York, NY, USA, 2009. ACM.
[20]
[21] J. Han, M. Kamber, and J. Pei. Data Mining: Concepts and
Techniques. Morgan Kaufmann Publ. Inc., 3rd edition, 2011.
[22] T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko,
R. Silverman, and A. Y. Wu. An efficient k-means clustering
algorithm: Analysis and implementation.
IEEE T Pattern
Anal, 24(7):881–892, 2002.
[23] S. P. Lloyd. Least squares quantization in pcm. IEEE Trans-
actions on Information Theory, 28(2):129–137, 1982.
[24] D. W. McMillan and D. M. Chavis. Sense of community: A
definition and theory. J Community Psychol, 14(1):6–23, 1986.
[25] M.M. and E. Deza. Encyclopedia of distances. Springer, 2009.
I. B. Mohamad and D. Usman. Standardization and its effects
[26]
on k-means clustering algorithm. Res J Appl Sci Eng Technol,
6(17):3299–3303, 2013.
[27] A. Papadopoulos, D. Rafailidis, G. Pallis, and M. D. Dikaiakos.
Clustering attributed multi-graphs with information ranking.
In DEXA, pages 432–446. Springer, 2015.
[28] B. Perozzi, L. Akoglu, P. Iglesias S´anchez, and E. Muller.
Focused clustering and outlier detection in large attributed
graphs. In ACM SIGKDD, pages 1346–1355. ACM, 2014.
[29] M. H. Protter and C. B. Morrey. College calculus with analytic
geometry. Addison-Wesley, 1977.
[30] P. I. S´anchez, E. Muller, K. Bohm, A. Kappes, T. Hartmann,
and D. Wagner. Efficient algorithms for a robust modularity-
driven clustering of attributed graphs. In SDM. SIAM, 2015.
[31] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The
arXiv preprint
anatomy of the facebook social graph.
arXiv:1111.4503, 2011.
[32] N. Villa-Vialaneix, M. Olteanu, and C. Cierco-Ayrolles. Carte
auto-organisatrice pour graphes ´etiquet´es. In Atelier Fouilles
de Grands Graphes (FGG)-EGC, pages Article–num´ero, 2013.
[33] U. Von Luxburg. A tutorial on spectral clustering. Statistics
and computing, 17(4):395–416, 2007.
[34] D. J. Watts. Networks, dynamics, and the small-world phe-
nomenon 1. Am J Sociol, 105(2):493–527, 1999.
Fig. 4. Size distribution of clusters found by SToC, GBAGC and
Inc-C for some of the tests in Tables V, III, IV.
state of the art algorithms in both time/space usage and
in quality of the clustering found.
Acknowledgements
The authors would like to thank Andrea Marino and
Andrea Canciani for useful conversations.
References
[1] L. Akoglu, H. Tong, B. Meeder, and C. Faloutsos. Pics:
Parameter-free identification of cohesive subgroups in large
attributed graphs. In SDM, pages 439–450. SIAM, 2012.
[2] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna.
Four degrees of separation. In Proceedings of the 4th Annual
ACM Web Science Conference, pages 33–42. ACM, 2012.
[3] A. Baroni, A. Conte, M. Patrignani, and S. Ruggieri. Efficiently
clustering very large attributed graphs. In ASONAM. IEEE,
2017.
[4] A. Baroni and S. Ruggieri. Segregation discovery in a social
network of companies. In IDA, pages 37–48. Springer, 2015.
[5] P. Boldi, M. Rosa, and S. Vigna. Hyperanf: Approximating the
neighbourhood function of very large graphs on a budget. In
WWW, pages 625–634. ACM, 2011.
[6] C. Bothorel, J. D. Cruz, M. Magnani, and B. Micenkov´a.
Clustering attributed graphs: models, measures and methods.
Network Science, 3(03):408–444, 2015.
[7] J. G. Bruhn. The sociology of community connections. Springer
Science & Business Media, 2011.
[8] J. Cao, S. Wang, F. Qiao, H. Wang, F. Wang, and S. Y. Philip.
User-guided large attributed graph clustering with multiple
sparse annotations. In PAKDD, pages 127–138. Springer, 2016.
[9] A. Clauset, M. E. Newman, and C. Moore. Finding community
structure in very large networks. Phys rev E, 70(6):066111,
2004.
k
25,358
(900)
26,340
(1,492)
2 (0)
2 (0)
2 (0)
2 (0)
Q
0.278
(0.004)
0.279
(0.01)
0.0004 (0)
0.0004 (0)
0.0004 (0)
0.0004 (0)
α
0.1
0.2
0.4
0.6
0.8
0.9
W CSS
5,221 (202)
5,941 (572)
60,970
(2.98)
60,973
(1.73)
60,972
(2.95)
60,974
(0.93)
A variant of SToC that treats all attributes
TABLE VI.
as categorical on the DBLP dataset (averages of 10 runs,
StDev in brackets).
poorly w.r.t. semantic metrics compared to SC and SToC,
although semantic-only algorithm SC is competitive with
ToC on topology. The clear winner among the three
is SToC, which gives a superior performance compared
to ToC and SC for most values of α. This shows how
SToC can effectively combine semantic and topological
information to provide a better clustering. Table VII also
shows that the number k of clusters in output is inversely
proportional to α when topology plays a role, i.e., for ToC
and SToC. While it is not clear why SC does not seem to
follow this behaviour, we suspect it may be due to a small
amount of possible dS values in the DBLP dataset (see
Figure 2 in the paper, right). It is worth noting that the
WCSS metric degenerates for high values of α; this might
be due to α · n approaching the size of the graph, making
any given pair of nodes be considered similar. SC seems
more resistant to this degeneration.
[35] Z. Xu, Y. Ke, Y. Wang, H. Cheng, and J. Cheng. A model-
based approach to attributed graph clustering. In SIGMOD,
pages 505–516. ACM, 2012.
[36] Z. Xu, Y. Ke, Y. Wang, H. Cheng, and J. Cheng. Gbagc:
A general bayesian framework for attributed graph clustering.
TKDD, 9(1):5, 2014.
[37] J. Yang, J. McAuley, and J. Leskovec. Community detection
in networks with node attributes. In ICDM, pages 1151–1156.
IEEE, 2013.
[38] Y. Zhou, H. Cheng, and J. X. Yu. Clustering large attributed
In ICDM, pages
graphs: An efficient incremental approach.
689–698. IEEE, 2010.
Appendix
Appendix A
Validation of the Attribute Model
One of the main differences of the proposed approach
with respect to the state-of-the-art is that quantitative
attributes do not need to be discretized. We validate the
effectiveness of this choice by showing the loss of quality
induced by the discretization. Namely, we run the SToC
algorithm on the DBLP dataset, where the quantitative
attribute represent how prolific an author is, treating the
attribute as a categorical one. Table VI shows the results
of this process, which can be compared to the results
obtained when the quantitative attribute is addressed
properly, shown in Table V. We can see not only how
both metrics (Q and WCSS) are significantly better when
categorical attributes are considered as such, but that
ignoring the similarity between similar attributes may lead
to an insignificant result, likely due to the flattening of the
distances between nodes. This suggests that approaches
that handle quantitative attributes may have an inherent
advantage with respect to those that need to discretize
them.
α
k
Q
W CSS Time
25,598
(1,279)
26,724
(1,160)
6,634
(5,564)
9,041
(7,144)
11,050
(4,331)
15,041
(5,415)
0.1
0.2
0.4
0.6
0.8
0.9
TABLE V.
0.269
(0.014)
0.270
(0.015)
0.189
(0.12)
0.153
(0.08)
0.238
(0.1)
0.188
(0.045)
(s)
0.627
(0.21)
0.616
(0.214)
0.272
(0.151)
0.281
(0.1)
0.267
(0.11)
0.28
(0.05)
5,428
(520)
5,367
(534)
23,477
(3,998)
21,337
(5,839)
20,669
(3,102)
16,688
(4,986)
Space
(GB)
0.65
0.64
0.67
0.7
0.69
0.64
SToC on the DBLP dataset (average of 10
runs, StDev in brackets).
Appendix B
SC and ToC compared to SToC
Table VII shows, for varying α, the number of clusters k
produced, and the modularity and WCSS of the clustering
found by the three variations of our algorithm. The best
values for modularity and WCSS are marked in bold. As
one could expect, topological-only algorithm ToC performs
k
Q
SToC SC ToC SToC SC
25,598
26,724
6,634
9.041
11,050
15,041
15
1430
18
7574
15
1420
17
1174
16
314
16
1
TABLE VII.
0.269
0.270
0.189
0.153
0.238
0.188
0.0116
0.01554
-0.00256
0.01248
-0.00356
0.00378
α
0.1
0.2
0.4
0.6
0.8
0.9
ToC
0.0457
-0.03373
0.04555
-0.1582
-0.3733
-0.4831
SToC
5,428
5,367
23,477
21,337
20,669
16,688
W CSS
SC
14,699
14,891
14,453
14,944
15,077
15,073
ToC
19,723
16,634
19,377
20,713
26,342
27,505
SToC, SC and ToC on the DBLP dataset
|
1803.04742 | 1 | 1803 | 2018-03-13T12:05:58 | VERSE: Versatile Graph Embeddings from Similarity Measures | [
"cs.SI",
"cs.LG"
] | Embedding a web-scale information network into a low-dimensional vector space facilitates tasks such as link prediction, classification, and visualization. Past research has addressed the problem of extracting such embeddings by adopting methods from words to graphs, without defining a clearly comprehensible graph-related objective. Yet, as we show, the objectives used in past works implicitly utilize similarity measures among graph nodes.
In this paper, we carry the similarity orientation of previous works to its logical conclusion; we propose VERtex Similarity Embeddings (VERSE), a simple, versatile, and memory-efficient method that derives graph embeddings explicitly calibrated to preserve the distributions of a selected vertex-to-vertex similarity measure. VERSE learns such embeddings by training a single-layer neural network. While its default, scalable version does so via sampling similarity information, we also develop a variant using the full information per vertex. Our experimental study on standard benchmarks and real-world datasets demonstrates that VERSE, instantiated with diverse similarity measures, outperforms state-of-the-art methods in terms of precision and recall in major data mining tasks and supersedes them in time and space efficiency, while the scalable sampling-based variant achieves equally good results as the non-scalable full variant. | cs.SI | cs | VERSE: Versatile Graph Embeddings from Similarity Measures
Anton Tsitsulin
Hasso Plattner Institute
[email protected]
Panagiotis Karras
Aarhus University
[email protected]
Davide Mottin
Hasso Plattner Institute
[email protected]
Emmanuel Müller
Hasso Plattner Institute
[email protected]
8
1
0
2
r
a
M
3
1
]
I
S
.
s
c
[
1
v
2
4
7
4
0
.
3
0
8
1
:
v
i
X
r
a
ABSTRACT
Embedding a web-scale information network into a low-dimensional
vector space facilitates tasks such as link prediction, classification,
and visualization. Past research has addressed the problem of ex-
tracting such embeddings by adopting methods from words to
graphs, without defining a clearly comprehensible graph-related
objective. Yet, as we show, the objectives used in past works implic-
itly utilize similarity measures among graph nodes.
In this paper, we carry the similarity orientation of previous
works to its logical conclusion; we propose VERtex Similarity Em-
beddings (VERSE), a simple, versatile, and memory-efficient method
that derives graph embeddings explicitly calibrated to preserve
the distributions of a selected vertex-to-vertex similarity measure.
VERSE learns such embeddings by training a single-layer neural
network. While its default, scalable version does so via sampling
similarity information, we also develop a variant using the full infor-
mation per vertex. Our experimental study on standard benchmarks
and real-world datasets demonstrates that VERSE, instantiated with
diverse similarity measures, outperforms state-of-the-art methods
in terms of precision and recall in major data mining tasks and
supersedes them in time and space efficiency, while the scalable
sampling-based variant achieves equally good results as the non-
scalable full variant.
ACM Reference Format:
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller.
2018. VERSE: Versatile Graph Embeddings from Similarity Measures. In
WWW 2018: The 2018 Web Conference, April 23–27, 2018, Lyon, France. ACM,
New York, NY, USA, 10 pages. https://doi.org/10.1145/3178876.3186120
1 INTRODUCTION
Graph data naturally arises in many domains, including social
networks, protein networks, and the web. Over the past years,
numerous graph mining techniques have been proposed to analyze
and explore such real-world networks. Commonly, such techniques
apply machine learning to address tasks such as node classification,
link prediction, anomaly detection, and node clustering.
Machine learning algorithms require a set of expressive discrim-
inant features to characterize graph nodes and edges. To this end,
one can use features representing similarities among nodes [18].
This paper is published under the Creative Commons Attribution 4.0 International
(CC BY 4.0) license. Authors reserve their rights to disseminate the work on their
personal and corporate Web sites with the appropriate attribution.
WWW 2018, April 23–27, 2018, Lyon, France
© 2018 IW3C2 (International World Wide Web Conference Committee), published
under Creative Commons CC BY 4.0 License.
ACM ISBN 978-1-4503-5639-8/18/04.
https://doi.org/10.1145/3178876.3186120
(a) Community structure
(b) Roles
(c) Structural equivalence
Figure 1: Three node properties are highlighted on the same
graph. Can a single model capture these properties?
However, feature engineering is tedious work, and the results do
not translate well across tasks [15].
An alternative to feature design is to learn feature vectors, or
embeddings by solving an optimization problem in unsupervised
fashion. Yet devising and solving a universal and tractable optimiza-
tion problem for learning representations has withstood research
efforts [7]. One line of research [11, 42] applies classical dimension-
ality reduction methods, such as SVD, to similarity matrices over
the graph; yet these methods are burdened with constructing the
matrix. While a recent approach [33] overcomes this impediment,
it results in poor quality in prediction tasks due to its linear nature.
Another line of research aims to generate features capturing
neighborhood locality, usually through an objective that can be opti-
mized by Stochastic Gradient Descent (SGD) [37, 41]. Such methods
rely on an implicit, albeit rigid, notion of node neighborhood; yet
this one-size-fits-all approach cannot grapple with the diversity of
real-world networks and applications. Grover et al. [15] discerned
this inflexibility in the notion of the local neighborhood; to ame-
liorate it, they proposed Node2vec, which biases the exploration
strategy of [37] using two hyperparameters. Yet this hyperparame-
ter-tuned approach raises a cubic worst-case space complexity and
compels the user to traverse several feature sets and gauge the one
that attains the best performance in the downstream task. Besides,
a local neighborhood, even when found by hyperparameter tun-
ing, still represents only one locality-based class of features; hence,
Node2vec does not adequately escape the rigidity it tries to mend.
WWW 2018, April 23–27, 2018, Lyon, France
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller
We argue that features extracted by a more versatile similarity
notion than that of a local neighborhood would achieve the flexibil-
ity to solve diverse data mining tasks in a large variety of graphs.
Figure 1 makes a case for such a versatile similarity notion by ex-
posing three distinct kinds of similarity on a graph: community
structure guides community detection tasks, roles are typically used
in classification, while structural equivalence defines peer corre-
spondences in knowledge graphs. As real-world tasks rely on a mix
of such properties, a versatile feature learning algorithm should be
capable of capturing all such similarities.
In this paper, we propose VERSE, the first, to our knowledge, ver-
satile graph embedding method that explicitly learns any similarity
measures among nodes. In its learning core, VERSE stands between
deep learning approaches [12, 48] on the one hand and the direct
decomposition of the similarity matrix [11, 42] on the other hand.
Instead, VERSE trains a simple, yet expressive, single-layer neu-
ral network to reconstruct similarity distributions between nodes.
Thereby, it outperforms previous methods in terms of both runtime
and quality on a variety of large real networks and tasks.
Thanks to its ability to choose any appropriate similarity measure
for the task at hand, VERSE adjusts to that task without needing
to change its core. Thereby, it fully ameliorates the rigidity ob-
served in [15], and integrates representation learning with feature
engineering: any similarity measure, including those developed
in feature engineering, can be used as input to VERSE. For the
sake of illustration, we instantiate our generic methodology using
three popular similarity measures, namely Personalized PageRank
(PPR) [34], SimRank [21], and adjacency similarity. We also show
that versatility does not imply a new burden to the user, merely
substituting hyperparameter tuning with similarity measure tuning:
using PPR as a default choice for the similarity measure leads to
good performance in nearly all tasks and networks we examined.
We summarize our contributions as follows.
• We propose a versatile framework for graph embeddings
that explicitly learns the distribution of any vertex similarity
measure for each graph vertex.
• We interpret previous graph embeddings through the lens
of our similarity framework, and instantiate VERSE with
Personalized PageRank, SimRank, and Adjacency similarity.
• We devise an efficient algorithm, linear in graph size, based
on a single-layer neural network minimizing the divergence
from real to reconstructed similarity distributions.
• In a thorough experimental evaluation, we show that VERSE
outperforms the state-of-the-art approaches in various graph
mining tasks in quality while being even more efficient.
2 RELATED WORK
In the absence of a general-purpose representation for graphs, graph
analysis tasks require domain experts to craft features [4, 18] or
to use specialized feature selection algorithms [36, 40]. Recently,
specialized methods were introduced to learn representations of dif-
ferent graph parts [2, 31] and graphs with annotations on nodes [20,
55], or edges [19, 49]. We focus on learning representations of nodes
in graphs without any prior or additional information other than
graph structure.
Traditional feature learning learns features by compressing rep-
resentations such as the Laplacian or adjacency matrix to a low-
dimensional space. Early works in this area include spectral tech-
niques [6] and nonlinear dimensionality reduction [39, 44]. In an-
other vein, Marginal Fisher Analysis [51] analyzes the dimension-
ality reduction of a point data set as the embedding of a graph
capturing its statistic and geometric properties. Such methods can-
not be applied to large graphs, as they operate on dense matrices.
Some efforts have been made to overcome this limitation using
enhanced linear algebra tools. Ahmed et al. [3] adopt stochastic
gradient optimization for fast adjacency matrix eigendecomposi-
tion; Ou et al. [33] utilize sparse generalized SVD to generate a
graph embedding, HOPE, from a similarity matrix amenable to de-
composition into two sparse proximity matrices. HOPE is the first
to support diverse similarity measures; however, it still requires
the entire graph matrix as input and views the problem as one of
linear dimensionality reduction rather than as one of nonlinear
learning. This way, it deviates not only from current research on
graph embeddings but also from older works [51].
Neural methods for representation learning. Advances in ma-
chine learning have led to the adoption of neural methods for learn-
ing representations [7]. Building on the success of deep learning in
domains such as image processing [24] and Natural Language Pro-
cessing (NLP) [8, 29, 35], word2vec [29] builds word embeddings
by training a single-layer neural network to guess the contextual
words of a given word in a text. Likewise, GloVe [35] learns a
word space through a stochastic version of SVD in a transformed
cooccurrence matrix. While such text-based methods inherently
take neighbor relationships into account, they require conceptual
adaptations to model graphs [37].
Neural Graph Embeddings. The success of neural word embed-
dings inspired natural extensions towards learning graph repre-
sentations [11, 12, 15, 37, 46, 48]. DeepWalk [37] first proposed
to learn latent representations in a low-dimensional vector space
exploiting local node neighborhoods. It runs a series of random
walks of fixed length from each vertex and creates a matrix of d-
dimensional vertex representations using the SkipGram algorithm
of [29]. These representations maximize the posterior probability
of observing a neighboring vertex in a random walk. DeepWalk
embeddings can inform classification tasks using a simple linear
classifier such as logistic regression.
GraRep [11] suggests using Singular Value Decomposition (SVD)
on a log-transformed DeepWalk transition probability matrix of
different orders, and then concatenate the resulting representations.
Struc2vec [38] rewires the graph to reflect isomorphism among
nodes and capture structural similarities, and then derives an em-
bedding relying on the DeepWalk core. Works such as [12, 48]
investigate deep learning approaches for graph embeddings. Their
results amount to complex models that require elaborate parameter
tuning and computationally expensive optimization, leading to time
and space complexities unsuitable for large graphs.
Nevertheless, all DeepWalk-based approaches use objective
functions that are not tailored to graph structures. Some works [15,
38, 41] try to infuse graph-native principles into the learning pro-
cess. LINE [41] proposed graph embeddings that capture more
VERSE: Versatile Graph Embeddings from Similarity Measures
WWW 2018, April 23–27, 2018, Lyon, France
Algorithm
Similarity
✔
✔
✔
Versatile
Local Scalable Nonlinear Global
method
DeepWalk [37] ✔
Node2vec [15]
LINE [41]
✔
GraRep [11]
✘
SDNE [48]
✔
DNGR [12]
✘
HOPE [33]
✘
VERSE
Table 1: Outline of related work in terms of fulfilled (✔) and
missing (✘) properties of algorithm and similarity measure.
✔
✔
✔
✔
✘
✔
✘
✘
✘
✔
✘
✔
✘
✔
✔
✘
✘
✘
✘
✘
✔
✔
✔
✔
✔
✔
elaborate proximity notions. However, even LINE's notion of prox-
imity is restricted to the immediate neighborhoods of each node;
that is insufficient to capture the complete palette of node rela-
tionships [15, 33, 38]. Furthermore, Node2vec [15] introduces two
hyperparameters to regulate the generation of random walks and
thereby tailor the learning process to the graph at hand in semi-
supervised fashion. However, Node2vec remains attached to the
goal of preserving local neighborhoods and requires laborious tun-
ing for each dataset and each task.
Overview. Table 1 outlines five desirable properties for a graph
embedding, and the extent to which previous methods possess
them. We distinguish between properties of algorithms, on the one
hand, and those of any implicit or explicit similarity measure among
nodes a method may express, on the other hand.
• local: not requiring the entire graph matrix as input; GraRep,
DNGR, and HOPE fail in this respect.
• scalable: capable to process graphs with more than 106 nodes
in less than a day; some methods fail in this criterion due to the
dense matrix (GraRep), deep learning computations (SDNE), or
both (DNGR).
• nonlinear: employing nonlinear transformations; HOPE relies
on a linear dimensionality reduction method, SVD; that is detri-
mental to its performance on building graph representations, just
like linear dimensionality reduction methods fail to confer the
advantages of their nonlinear counterparts in general [26].
• global: capable to model relationships between any pair of
nodes; LINE and SDNE do not share this property as they fail
to look beyond a node's immediate neighborhood.
• versatile: supporting diverse similarity functions; HOPE does
so, yet is compromised by its linear character.
3 VERSATILE GRAPH EMBEDDING
VERSE possesses all properties mentioned in our taxonomy; it
employs nonlinear transformation, desirable for dimensionality
reduction [26]; it is local in terms of the input it requires per node,
but global in terms of the potential provenance of that input; it is
scalable as it is based on sampling, and versatile by virtue of its
generality.
(a) Similarity
(b) VERSE
(c) SVD
Figure 2: An example similarity matrix and its reconstruc-
tions by VERSE and SVD. Karate club graph [53], dimension-
ality d = 4 for both methods.
3.1 VERSE Objective
Given a graph G = (V , E), where V = (v1, . . . , vn), n = V , is
the set of vertices and E ⊆ (V × V ) the set of edges, we aim to
learn a nonlinear representation of vertices v ∈ V to d-dimensional
embeddings, where d ≪ n. Such representation is encoded into a
n × d matrix W ; the embedding of a node v is the row Wv,· in the
matrix; we denote it as Wv for compactness.
Our embeddings reflect distributions of a given graph similarity
simG : V × V → R for every node v ∈ V . As such, we require that
the similarities from any vertex v to all other vertices simG(v, ·) are
1 for all v ∈ V . We aim to devise W by a scalable method that
requires neither the V ×V stochastic similarity matrix nor its explicit
materialization.
The corresponding node-to-node similarity in the embedded
space is simE : V × V → R. As an optimization objective, we aim
to minimize the Kullback-Leibler (KL) divergence from the given
similarity distribution simG to that of simE in the embedded space:
amenable to be interpreted as a distribution with(cid:80)u∈V simG(v, u) =
(cid:88)
L = −(cid:88)
v ∈V
v ∈V
KL(simG(v, ·) simE(v, ·))
(1)
We illustrate the usefulness of this objective using a small simi-
larity matrix. Figure 2 shows (a) the Personalized PageRank matrix,
(b) the reconstruction of the same matrix by VERSE, and (c) the
reconstruction of the same matrix using SVD. It is visible that the
nonlinear minimization of KL divergence between distributions
preserves most of the information in the original matrix, while the
linear SVD-based reconstruction fails to differentiate some nodes.
3.2 VERSE Embedding Model
We define the unnormalized distance between two nodes u, v in
the embedding space as the dot product of their embeddings Wu ·
W ⊤
v . The similarity distribution in the embedded space is then
normalized with softmax:
simE(v, ·) =
(2)
By Equation 1, we should minimize the KL-divergence from simG
to simE; omitting parts dependent on simG only, this objective is
equivalent to minimizing the cross-entropy loss function [14]:
exp(WvW ⊤)
i=1 exp(Wv · Wi)
(cid:80)n
simG(v, ·) log(simE (v, ·))
(3)
WWW 2018, April 23–27, 2018, Lyon, France
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller
We can accommodate this objective by stochastic gradient de-
scent, which allows updating the model on each node singularly.
However, a naïve version of gradient descent would require the
full materialization of simE and simG. Even in case simG is easy to
compute on the fly, such as the adjacency matrix, the softmax in
Equation 2 still has to be normalized over all nodes in the graph.
We use Noise Contrastive Estimation (NCE) [16, 30], which al-
lows us to learn a model that provably converges to its objective
(see [17], Theorem 2). NCE trains a binary classifier to distinguish
between node samples coming from the empirical similarity dis-
tribution simG and those generated by a noise distribution Q over
the nodes. Consider an auxiliary random variable D for node clas-
sification, such that D = 1 for a node drawn from the empirical
distribution and D = 0 for a sample drawn from the noise distribu-
tion. Given a node u drawn from some distribution P and a node
v drawn from the distribution of simG (u, ·), we draw s ≪ n nodes
log-likelihood:
(cid:101)v from Q(u) and use logistic regression to minimize the negative
(cid:104)
LN CE =(cid:88)
sE(cid:101)v∼Q(u) log PrW (D = 0simE(u,(cid:101)v))
log PrW (D = 1simE(u, v))+
v∼simG(u,·)
u∼P
(cid:105)
where PrW is computed from W as a sigmoid σ(x) = (1 + e−x )−1 of
the dot product between vectors Wu and Wv, while we compute
simE (u, ·) without the normalization of Equation 2. As the number
of noise samples s increases, the NCE derivative provably converges
to the gradient of cross-entropy [30]; thus, by virtue of NCE's
asymptotic convergence guarantees, we are in effect minimizing
the KL-divergence from simG. NCE's theoretical guarantees depend
on s, yet small values work well in practice [30]. In our experiments,
we use s = 3. These convergence guarantees of NCE are not affected
by choice of distributions P and Q (see [17], Corollary 5); however,
its performance is empirically dependent on Q [25].
3.3 Instantiations of VERSE
While VERSE can be used with any similarity function, we choose
to instantiate our model to widely used similarities simG, namely
Personalized PageRank (PPR), Adjacency Similarity, and SimRank.
Personalized PageRank. Personalized PageRank [34] is a com-
mon similarity measure among nodes, practically used for many
graph mining tasks [15, 28].
(4)
Definition 3.1. Given a starting node distribution s, damping
factor α, and the normalized adjacency matrix A, the Personalized
PageRank vector πs is defined by the recursive equation:
πs = αs + (1 − α)πs A
The stationary distribution of a random walk with restart with
probability α converges to PPR [34]. Thus, a sample from simG(v, ·)
is the last node in a single random walk from node v. The damping
factor α controls the average size of the explored neighborhood. In
Section 3.6 we show that α is tightly coupled with the window size
parameter w of DeepWalk and Node2vec.
Adjacency similarity. A straightforward similarity measure is
the normalized adjacency matrix; this similarity corresponds to the
(cid:40)1/Out(u)
I(u)(cid:88)
I(v)(cid:88)
i=1
j=1
LINE-1 model and takes into account only the immediate neighbors
of each node. More formally, given the out degree Out(u) of node u
sim
ADJ
G (u, v) =
0
if (u, v) ∈ E
otherwise
(5)
We experimentally demonstrate that VERSE model is effective
even in preserving the adjacency matrix of the graph.
SimRank. SimRank [21] is a measure of structural relatedness
between two nodes, based on the assumption that two nodes are
similar if they are connected to other similar nodes; SimRank is
defined recursively as follows:
simSR
G (u, v) =
C
I(u) I(v)
simSR
G (Ii(u), Ij(v))
(6)
where I(v) denotes the set of in-neighbors of node v, and C is
a number between 0 and 1 that geometrically discounts the im-
portance of farther nodes. SimRank is a recursive procedure that
involves computationally expensive operations: the straightforward
method has the complexity of O(n4).
W ← N(cid:0)0, d−1(cid:1)
SimRank values can be approximated up to a multiplicative
factor dependent on C through SimRank-Aware Random Walks
(SARW) [22]. SARW computes a SimRank approximation through
two reversed random walks with restart where the damping factor
√
C. A reversed random walk traverses any edge
α is set to α =
(u, v) in the opposite direction (v, u). Since we are only interested in
G (v, ·), we can ignore the multiplicative
the distribution of each simSR
factor in the approximation [22] that has little impact on our task.
Algorithm 1 VERSE
1: function VERSE(G, simG, d)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12: function Update(u, v, D)
13:
14:
15:
until converged
return W
д ← (D − σ(Wu · Wv)) ∗ λ
Wu ← д ∗ Wv
Wv ← д ∗ Wu
u ∼ P
v ∼ simG(u)
Wu ,Wv ← Update(u, v, 1)
for i ← 1 . . . s do
(cid:101)v ∼ Q(u)
Wu ,W(cid:101)v ← Update(u,(cid:101)v, 0)
▷ Sample a node
▷ Sample positive example
▷ Sample negative example
▷ With W ∈ RV ×d
▷ Logistic gradient update
repeat
3.4 VERSE Algorithm
Algorithm 1 presents the overall flow of VERSE. Given a graph,
a similarity function simG, and the embedding space dimension-
ality d, we initialize the output embedding matrix W to N(0, 1
d ).
Then, we optimize our objective (Equation 4) by gradient descent
using the NCE algorithm discussed in the previous section. To do
so, we repeatedly sample a node from the positive distribution P,
sample the simG (e.g. pick a neighboring node), and draw s nega-
tive examples. The σ in Line 13 represents the sigmoid function
σ = (1 + e−x )−1, and λ the learning rate. We choose P and Q to be
distributed uniformly by U(1, n).
VERSE: Versatile Graph Embeddings from Similarity Measures
WWW 2018, April 23–27, 2018, Lyon, France
As a strong baseline for applications handling smaller graphs,
we also consider an elaborate, exhaustive variant of VERSE, which
computes full similarity distribution vectors per node instead of
performing NCE-based sampling. We name this variant fVERSE
and include it in our experimental study.
Figure 3 presents our measures on the ability to reconstruct a
similarity matrix for (i) VERSE using NCE; (ii) VERSE using Nega-
tive Sampling (NS) (also used in Node2vec); and (ii) the exhaustive
fVERSE variant. We observe that, while NCE approaches the ex-
haustive method in terms of matching the ground truth top-100
most similar nodes, NS fails to deliver the same quality.
1
0.8
0.6
0.4
k
@
G
C
D
N
full VERSE
NS, s = 3
NCE, s = 3
NCE, s = 100
20
40
60
80
100
Figure 3: Ranking preformance in terms of NDCG for recon-
structing PPR similarity, averaged across nodes in a graph.
k
3.5 Complexity Comparison
Table 2 presents the average (Θ) and worst-case (O) time and space
complexity of VERSE, along with those of methods in previous
works; d is the embedding dimensionality, n the number of nodes,
m the number of edges, and s the number of samples used, and t the
number of iterations in GraRep. Methods that rely on fast sampling
(VERSE and LINE) require time linear in n and space quadratic in
n in the worst case. DeepWalk requires O(n log n) time due to its
use of hierarchical softmax. Node2vec stores the neighbors-of-a-
neighbor, incurring a quadratic cost in sparse graphs, but cubic in
dense graphs. Thus, VERSE comes at the low end of complexities
compared to previous work on graph embeddings. Remarkably,
even the computationally expensive fVERSE affords complexity
comparable to some previous works.
Time
O
Space
dn log n
dn log n
Θ
method
DeepWalk
GraRep
LINE
Node2vec
HOPE
fVERSE
VERSE
Table 2: Comparison of neural embedding methods in terms
of average (Θ) and worst-case (O) time and space complexity.
tn3
dsn
dsn
d2n2
dn2
dsn
tn3
dsn
dsn
d2m
dn2
dsn
Θ
m
n2
m
m2
n
m
n2
m
O
n2
n2
n2
n3
n2
n2
n2
3.6 Similarity Notions in Previous Approaches
Here, we provide additional theoretical considerations of VERSE
compared to LINE [41], DeepWalk [37] and Node2vec [15] and
demonstrate how our general model subsumes and extends previous
research in versatility and scalability.
Comparison with DeepWalk and Node2vec. DeepWalk and
Node2vec generate samples from random walks of fixed window
size w by the word2vec sampling strategy [29]. We derive a re-
lationship between the window size w of that strategy and the
damping factor α of Personalized PageRank.
Lemma 3.2. Let Xr be the random variable that represents the
length of a random walk r sampled with parameter w by the word2vec
sampling strategy. Then for any 0 < j ≤ w
Pr(Xr = j) =
2
w(w + 1)(w − j + 1)
(7)
2
2
i=1 i = w(w+1)
each random walk amount to(cid:80)w
Proof. For each node v ∈ V , word2vec strategy samples two
random walks of length w starting from v ∈ V . These two random
walks represents the context of v, where v is the central node of
a walk of length 2w + 1. The model is then trained on increasing
context size up to w. Therefore, the number of nodes sampled for
. A node at distance
0 < j ≤ w is sampled (w − j + 1) times; thus, the final probability is
w(w+1)(w − j + 1).
□
Personalized PageRank provides the maximum likelihood esti-
mation for the distribution in Equation 7 for α = w−1
w+1 . Then, w = 10
corresponds to α = 0.82, which is close to the standard α = 0.85,
proved effective in practice [10]. On the other hand, α = 0.95, which,
for example, achieves the best performance on a task in Section 4.2,
corresponds to w = 39. Such large w prohibitively increases the
computation time for DeepWalk and Node2vec.
Comparison with LINE. LINE introduces the concept of first- and
second-order proximities to model complex node relationships. As
we discussed, in VERSE, first-order proximity corresponds to the
dot-product among the similarity vectors in the embedding space:
simE(u, v) = Wu · Wv
On the other hand, second-order proximity corresponds to let-
ting VERSE learn one more matrix W ′, so as to model asymmetric
similarities of nodes in the embedding space. We do that by defining
simE asymmetrically, using both W and W ′:
′
simE(u, v) = Wu · W
v
The intuition behind second-order proximity is the same as that
of SimRank: similar nodes have similar neighborhoods. Every pre-
vious method, except for LINE-1, used second-order proximities,
due to the word2vec interpretation of embeddings borrowed by
DeepWalk and Node2vec. In our model, second-order proximities
can be encoded by adding an additional matrix; we empirically
evaluate their effectiveness in Section 4.
WWW 2018, April 23–27, 2018, Lyon, France
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller
4 EXPERIMENTS
We evaluate VERSE against several state-of-the-art graph embed-
ding algorithms. For repeatability purposes, we provide all data sets
and the C++ source code for VERSE1, DeepWalk2 and Node2vec3.
We run the experiments on an Amazon AWS c4.8 instance with
60Gb RAM. Each method is assessed on the best possible parame-
ters, with early termination of the computation in case no result is
returned within one day. We provide the following state-of-the-art
graph embedding methods for comparison:
• DeepWalk [37]: This approach learns an embedding by sam-
pling random walks from each node, applying word2vec-based
learning on those walks. We use the default parameters described
in the paper, i.e., walk length t = 80, number of walks per node
γ = 80, and window size w = 10.
• LINE [41]: This approach learns a d-dimensional embedding
in two steps , both using adjacency similarity. First, it learns d/2
dimensions using first-order proximity; then, it learns another d/2
features using second-order proximity. Last, the two halves are
normalized and concatenated. We obtained a copy of the code4 and
run experiments with total T = 1010 samples and s = 5 negative
samples, as described in the paper.
• GraRep [11]: This method factorizes the full adjacency similarity
matrix using SVD, multiplies the matrix by itself, and repeats the
process t times. The final embedding is obtained by concatenating
the factorized vectors. We use t = 4 and 32 dimensions for each
SVD factorization; thus, the final embedding has d = 128.
• HOPE [33]: This method is a revised Singular Value Decomposi-
tion restricted to sparse similarity matrices. We report the results
obtained running HOPE with the default parameters, i.e, Katz simi-
larity (an extension of Katz centrality [23]) as the similarity measure
and β inversely proportional to the spectral radius. Since Katz simi-
larity does not converge on directed graphs with sink nodes, we
used Personalized PageRank with α = 0.85 for the CoCit dataset.
• Node2vec [15]: This is a hyperparameter-supervised approach
that extends DeepWalk by adding two parameters, p and q, so as to
control DeepWalk's random walk sampling. The special case with
parameters p = 1, q = 1 corresponds to DeepWalk; yet, sometimes
Node2vec shows worse performance than DeepWalk in our evalu-
ation, due to the fact it uses negative sampling, while DeepWalk
uses hierarchical softmax. We fine-tuned the hyperparameters p
and q on each dataset and task. Moreover, we used a large train-
ing data to fairly compare to DeepWalk, i.e., walk length l = 80,
number of walks per node r = 80, and window size w = 10.
Baselines. In addition to graph embeddings methods, we imple-
mented the following baselines.
• Logistic regression: We use the well-known logistic regression
method as a baseline for link prediction. We train the model on a set
of common node-specific features, namely node degree, number of
common neighbors, Adamic-Adar, Jaccard coefficient, preferential
attachment, and resource allocation index [27, 28].
1https://github.com/xgfs/verse
2https://github.com/xgfs/deepwalk-c
3https://github.com/xgfs/node2vec-c
4https://github.com/tangjianpku/LINE
dataset
BlogCatalog
CoCit
CoAuthor
VK
YouTube
Orkut
Statistics
Size
L Avg. degree Mod.
E
V
0.24
39
334k
10k
0.72
195k
15
44k
178k -
0.84
52k
0.47
2.7M 2
79k
0.71
1.1M
3M 47
3.1M 234M 50
0.68
64.8
8.86
6.94
34.1
5.25
70
Density
6.3 × 10−3
2.0 × 10−4
1.3 × 10−4
8.7 × 10−4
9.2 × 10−6
2.4 × 10−5
2
Table 3: Dataset characteristics: number of vertices V , num-
ber of edges E; number of node labels L; average node de-
gree; modularity [32]; density defined as E/(cid:0)V
(cid:1).
• Louvain community detection [9]: We employ a standard par-
tition method for community detection as a baseline for graph
clustering, reporting the best partition in terms of modularity [32].
Parameter settings. In line with previous research [15, 37, 41] we
set the embedding dimensionality d to 128. The learning procedure
(Algorithm 1, Line 3) is run 105 times for VERSE and 250 times for
fVERSE; the difference in setting is motivated by the number of
model updates which is O(n) in VERSE and O(n2) in fVERSE.
We use LIBLINEAR [13] to perform logistic regression with
default parameter settings. Unlike previous work [15, 37, 41] we
employ a stricter assumption for multi-label node classification: the
number of correct classes is not known apriori, but found through
the Label Powerset multi-label classification approach [45].
For link prediction and multi-label classification, we evaluated
each individual embedding 10 times in order to reduce the noise
introduced by the classifier. Unless otherwise stated, we run each
experiment 10 times, and report the average value among the runs.
Throughout our experimental study, we use the above parameters
as default, unless indicated otherwise.
Datasets. We test our methods on six real datasets; we report the
main data characteristics in Table 3.
• BlogCatalog [54] is a network of social interactions among blog-
gers in the BlogCatalog website. Node-labels represent topic cate-
gories provided by authors.
• Microsoft Academic Graph [1] is a network of academic papers,
citations, authors, and affiliations from Microsoft Academic website
released for the KDD-2016 cup. It contains 150 million papers up to
February 2016 spanning various disciplines from math to biology.
We extracted two separate subgraphs from the original network,
using 15 conferences in data mining, databases, and machine learn-
ing. The first, CoAuthor, is a co-authorship network among authors.
The second, CoCit, is a network of papers citing other papers; labels
represent conferences in which papers were published.
• VK is a Russian all-encompassing social network. We extracted
two snapshots of the network in November 2016 and May 2017 to
obtain information about link appearance. We use the gender of
the user for classification and country for clustering.
• YouTube [43] is a network of social interactions among users of
the YouTube video platform. The labels represent groups of viewers
by video genres.
• Orkut [52] is a network of social interactions among users of the
Orkut social network platform. The labels represent communities
of users. We extracted the 50 biggest communities and use them as
labels for classification.
VERSE: Versatile Graph Embeddings from Similarity Measures
WWW 2018, April 23–27, 2018, Lyon, France
Evaluation methodology. The default form of VERSE runs Per-
sonalized PageRank with α = 0.85. For the sake of fairness, we
design a hyperparameter-supervised variant of VERSE, by analogy
to the hyperparameter-tuned variant of DeepWalk introduced
by Node2vec [15]. This variant, hsVERSE, selects the best simi-
larity with cross-validation across two proximity orders (as dis-
cussed in Section 3.6) and three similarities (Section 3.3) with
α∈{0.45, 0.55, 0.65, 0.75, 0.85, 0.95} for simPPR
G and C ∈ {0.15, 0.25,
0.35, 0.45, 0.55, 0.65} for simSR
G .
Operator
Result
(a + b)/2
Average
[a1, . . . , ad , b1, . . . , bd]
Concat
[a1 ∗ b1, . . . , ad ∗ bd]
Hadamard
[a1 − b1, . . . , ad − bd ]
Weighted L1
[(a1 − b1)2, . . . , (ad − bd)2]
Weighted L2
Table 4: Vector operators used for link-prediction task for
each u, v ∈ V and corresponding embeddings a, b ∈ Rd .
Average Concat Hadamard
80.06
79.16
68.43
74.87
77.49
74.90
79.52
77.07
method
fVERSE
VERSE
DeepWalk
GraRep
LINE
HOPE
hsVERSE
Node2vec
Feature Eng.
Table 5: Link prediction results on the CoAuthor coauthor-
ship graph. Best results per method are underlined.
86.71
85.69
66.54
82.24
77.73
74.81
86.15
79.42
77.53
L1
84.49
71.93
79.06
80.03
70.55
74.34
76.45
81.25
L2
84.97
72.11
78.11
80.05
71.83
74.81
76.72
80.85
79.69
78.79
68.06
74.91
77.39
74.83
79.10
76.67
74.81
73.66
69.92
75.13
71.90
74.02
71.22
L1
78.49
74.11
78.38
63.77
71.22
73.04
78.38
Average Concat Hadamard
74.94
73.78
70.05
75.17
71.89
74.14
71.29
method
fVERSE
VERSE
DeepWalk
LINE
HOPE
hsVERSE
Node2vec
Feature Eng.
Table 6: Link prediction results on the VK social graph. Best
results per method are underlined.
80.77
79.71
69.79
72.54
70.22
80.26
72.43
78.84
L2
79.13
74.56
77.37
64.47
70.63
73.53
78.66
4.1 Link Prediction
Link prediction is the task of anticipating the appearance of a link
between two nodes in a network. Conventional measures for link
prediction include Adamic-Adar, Preferential attachment, Katz, and
Jaccard coefficient. We train a Logistic regression classifier on edge-
wise features obtained with the methods shown in Table 4. For
instance, for a pair of nodes u, v, the Concat operator returns a
vector as the sequential concatenation of the embeddings f (u) and
labelled nodes, %
method
9%
fVERSE
32.24
VERSE
31.83
31.43
DeepWalk
30.79
GraRep
28.80
LINE
28.58
HOPE
hsVERSE
31.92
32.04
Node2vec
Table 7: Multi-class classification results in CoCit dataset.
5%
31.01
30.67
30.37
30.24
27.89
27.59
30.67
30.82
3%
29.83
29.42
29.27
29.21
26.90
26.63
29.45
29.66
7%
31.68
31.32
31.04
30.23
28.49
28.19
31.38
31.54
1%
27.52
27.32
26.81
27.68
23.68
22.81
27.46
27.45
f (v). On the CoAuthor data, we predict new links for 2015 and 2016
co-authorships, using the network until 2014 for training; on VK, we
predict whether a new friendship link appears between November
2016 and May 2017, using 50% of the new links for training and 50%
for testing. We train the binary classifier by sampling non-existing
edges as negative examples. Tables 5 and 6 report the attained
accuracy. As a baseline, we use a logistic regression classifier trained
on the respective data sets' features.
VERSE with Hadamard product of vectors is consistently the
best edge representation. We attribute this quality to the explicit re-
construction we achieve using noise contrastive estimation. VERSE
consistently outperforms the baseline in the tested datasets. Be-
sides, the hyperparameter-supervised hsVERSE variant outruns
Node2vec on all datasets.
4.2 Node Classification
We now conduct an extensive evaluation on classification and report
results for all the methods, where possible, with the CoCit, VK,
YouTube, and Orkut graphs. Node classification aims to predict of
the correct node labels in a graph, as described previously in this
section.
We evaluate accuracy by the Micro-F1 and Macro-F1 percentage
measures. We report only Macro-F1, since we experience similar
behaviors with Micro-F1. For each dataset we conduct multiple
experiments, selecting a random sample of nodes for training and
leaving the remaining nodes for testing. The results for four datasets,
shown in Tables 7-10, exhibit similar trends: VERSE yields predic-
tions comparable or superior to those of the other contestants, while
it scales to large networks such as Orkut. LINE outperforms VERSE
only in VK, where the gender of users is better captured using the
direct neighborhood. The hyperparameter-supervised variant, hs-
VERSE, is on a par with Node2vec in terms of quality on CoCit and
VK; on the largest datasets YouTube and Orkut, hsVERSE keeps
outperforming unsupervised alternatives, while Node2vec depletes
the memory.
4.3 Node Clustering
Graph clustering detects groups of nodes with similar characteris-
tics [9, 32]. We assess the embedding methods, using the k-means
algorithm with k-means++ initialization [5] to cluster the embedded
points in a d-dimensional space. Table 11 reports the Normalized
Mutual Information (NMI) with respect to the original label distri-
bution. On CoAuthor, VERSE has comparable performance with
DeepWalk; yet on VK, VERSE outperforms all other methods.
WWW 2018, April 23–27, 2018, Lyon, France
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller
labelled nodes, %
method
fVERSE
VERSE
DeepWalk
LINE
HOPE
hsVERSE
Node2vec
9%
62.50
62.13
62.49
64.23
57.68
63.16
63.30
Table 8: Multi-class classification results in VK dataset.
5%
61.74
61.43
61.79
63.58
57.04
62.50
62.62
3%
61.01
60.53
60.93
62.83
56.65
61.67
61.79
7%
62.26
61.86
62.17
64.01
57.40
62.97
63.04
1%
58.32
57.89
58.22
60.39
54.88
58.87
58.85
labelled nodes, %
method
VERSE
DeepWalk
LINE
HOPE
hsVERSE
Table 9: Multi-label classification results in YouTube dataset.
5%
24.07
22.89
18.69
15.09
25.40
7%
25.07
23.64
19.84
16.18
27.38
9%
25.99
24.54
20.64
16.78
29.09
3%
22.26
21.55
17.36
13.80
22.84
1%
17.92
18.16
13.71
9.22
18.16
labelled nodes, %
method
VERSE
DeepWalk
LINE
hsVERSE
Table 10: Multi-class classification results in Orkut dataset.
5%
29.60
29.63
32.34
32.73
7%
31.46
30.60
32.92
34.00
9%
32.63
31.27
33.65
35.20
3%
28.22
27.99
30.89
30.70
1%
25.16
24.21
26.79
27.73
We also assess graph embeddings on their ability to capture the
graph community structure. We apply k-means with different k
values between 2 and 50 and select the best modularity [32] score.
Table 12 presents our results, along with the modularity obtained by
the Louvain method, the state-of-the-art modularity maximization
algorithm [9]. VERSE variants produce result almost equal that
those of Louvain, outperforming previous methods, while the three
methods that could manage the Orkut data perform similarly.
method
fVERSE
VERSE
DeepWalk
LINE
GraRep
HOPE
hsVERSE
Node2vec
Louvain
CoCit
33.22
32.93
34.33
18.79
27.43
19.05
33.24
32.84
30.73
VK
9.24
7.62
7.59
7.49
-
6.47
8.77
8.05
4.54
Table 11: Node clustering results in terms of NMI.
4.4 Graph Reconstruction
Good graph embeddings should preserve the graph structure in the
embedding space. We evaluate the performance of our method on
reconstructing the graph's adjacency matrix. Since each adjacent
YouTube Orkut
method
fVERSE
VERSE
DeepWalk
LINE
GraRep
HOPE
hsVERSE
Node2vec
Louvain
Table 12: Node clustering results in terms of modularity.
CoCit CoAuthor
70.12
69.43
70.04
60.02
67.61
42.45
69.81
70.06
72.05
VK
44.59
45.78
43.30
39.65
-
21.70
45.84
44.27
46.60
-
67.63
58.08
63.40
-
37.94
69.13
-
71.06
80.95
79.25
73.83
71.58
77.40
69.57
79.31
75.78
84.29
-
42.64
44.66
42.59
-
-
-
-
-
node should be close in the embedding space, we first sort any
node other than the one considered by decreasing cosine distance
among the vectors. Afterwards, we take a number of nodes equal
to the actual degree of the node in the graph and connect to the
considered node to create the graph structure.
Table 13 reports the relative accuracy measured as the number
of correct nodes in the neighborhood of a node in the embedding
space. Again, VERSE performs comparably well; its exhaustive
variant, fVERSE, which harnesses the full similarity does even
better; however, the top performer is hsVERSE, which achieves the
obtained result when instantiated to the Adjacency Similarity. This
result is unsurprising, given that the adjacency similarity measure
tailors hsVERSE for the task of graph reconstruction.
YouTube Orkut
method
fVERSE
VERSE
DeepWalk
LINE
GraRep
HOPE
hsVERSE
Node2vec
CoCit CoAuthor
88.96
58.73
51.54
23.32
67.61
25.88
97.53
66.35
-
18.39
19.75
10.82
-
-
28.81
-
Table 13: Graph reconstruction % for all datasets.
VK
66.45
50.18
43.04
42.80
-
12.01
78.38
53.70
98.20
74.30
68.44
62.01
77.40
49.70
98.91
72.70
-
28.64
32.21
17.76
-
33.42
38.34
-
4.5 Parameter Sensitivity
We also evaluate the sensitivity of VERSE to parameter choice.
Figures 4(a),4(b) depict node classification performance in terms of
Micro-F1 on the BlogCatalog dataset, with 10% of nodes labeled.
The dimensionality d determines the size of the embedding,
and hence the possibility to compute more fine-grained representa-
tions. The performance grows linearly as the number of dimensions
approaches 128, while with larger d we observe no further improve-
ment. Sampled VERSE instead, performs comparably better than
fVERSE in low dimensional spaces, but degrades as d becomes
larger than 128; this behavior reflects a characteristic of node sam-
pling that tends to preserve similarities of close neighborhoods in
low-dimensional embeddings, while the VERSE leverages the entire
graph structure for larger dimensionality
The last parameter we study is the damping factor α which
amounts to the inverse of the probability of restarting random
walks from the initial node. As shown in Figure 4(b), the quality
VERSE: Versatile Graph Embeddings from Similarity Measures
WWW 2018, April 23–27, 2018, Lyon, France
1
F
-
o
r
c
i
M
0.4
0.3
0.2
0.1
0
2
fVERSE
VERSE
4
8
16
32
64
128
256
512 1024
d
(a) Dimensionality d
1
F
-
o
r
c
i
M
0.4
0.3
0.2
0.1
0
fVERSE
VERSE
DeepWalk
Node2vec
LINE-2
104
s
d
n
o
c
e
s
103
fVERSE
VERSE
0.2
0.4
0.6
0.8
1
α
(b) PPR damping factor α
102
104
105
nodes
(c) Time, log scale
106
Figure 4: Classification performance of various parameters in Fig. 4(a), 4(b) and scalability of different methods in Fig. 4(c).
).
LINE, and Node2vec. For each method, we report the total wall-
clock time, with graph loading and necessary preprocessing steps
included. We used LINE-2 time for fair comparison. As Figure 4
shows, VERSE is comfortably the most efficient and scalable method,
processing 106 nodes in about 3 hours, while DeepWalk and LINE
take from 6 to 15 hours.
4.7 Visualization
Last, we show how different embeddings are visualized on a plane.
We apply t-SNE [47] with default parameters to each embedding for
a subset of 1500 nodes from the CoCit dataset, equally distributed
in 5 classes (i.e., conferences); we set the density areas for each class
by Kernel Density Estimation. Figure 5 depicts the result. VERSE
produces well separated clusters with low noise, even finding dis-
tinctions among papers of the same community, namely ICDE (
)
and VLDB (
5 CONCLUSIONS
We introduced a new perspective on graph embeddings: to be ex-
pressive, a graph embedding should capture some similarity mea-
sure among nodes. Armed with this perspective, we developed a
scalable embedding algorithm, VERSE. In a departure from previous
works in the area, VERSE aims to reconstruct the distribution of any
chosen similarity measure for each graph node. Thereby, VERSE
brings in its scope a global view of the graph, while substantially
reducing the number of parameters required for training. VERSE
attains linear time complexity, hence it scales to large real graphs,
while it only requires space to store the graph. Besides, we have
shed light on some previous works on graph embeddings, looking at
them and interpreting them through the prism of vertex similarity.
Our thorough experimental study shows that, even instantiated
with PPR as a default similarity notion, VERSE consistently out-
performs state-of-the-art approaches for graph embeddings in a
plethora of graph tasks, while a hyperparameter-supervised vari-
ant does even better. Thus, we have provided strong evidence that
embeddings genuinely based on vertex similarity address graph
mining challenges better than others.
Figure 5: Visualizations of a subset of nodes from CoCit
graph with selected conferences: VLDB,
ICDE, KDD,
WWW, and NIPS. Note that the number of nodes per
class is the same for all conferences.
of classification accurary is quite robust with respect to α for both
VERSE and fVERSE, only compromised by extreme values. An α
value close to 0 reduces PPR to an exploration of the immediate
neighborhood of the node. On the other hand, a value close to 1
amounts to regular PageRank, deeming all nodes as equally im-
portant. This result vindicates our work and distinguishes it from
previous methods based on local neighborhood expansion.
4.6 Scalability
We now present runtime results on synthetic graphs of growing size,
generated by the Watts Strogatz model [50], setting VERSE against
scalable methods with C++ implementations, namely DeepWalk,
WWW 2018, April 23–27, 2018, Lyon, France
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller
REFERENCES
[1] 2016. Microsoft Academic Graph - KDD cup 2016.
azurewebsites.net/Data. (2016). Accessed: 2016-04-30.
https://kddcup2016.
[2] Sami Abu-El-Haija, Bryan Perozzi, and Rami Al-Rfou. 2017. Learning Edge
Representations via Low-Rank Asymmetric Projections. CIKM (2017).
[3] Amr Ahmed, Nino Shervashidze, Shravan Narayanamurthy, Vanja Josifovski,
and Alexander J Smola. 2013. Distributed large-scale natural graph factorization.
In WWW. ACM, 37–48.
[4] Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2010. Oddball: Spotting
anomalies in weighted graphs. In PAKDD. 410–421.
[5] David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of
careful seeding. In SIAM. 1027–1035.
[6] Mikhail Belkin and Partha Niyogi. 2001. Laplacian eigenmaps and spectral
techniques for embedding and clustering. In NIPS. 585–591.
[7] Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation
learning: A review and new perspectives. TPAMI (2013), 1798–1828.
[8] Yoshua Bengio, Réjean Ducharme, Pascal Vincent, and Christian Jauvin. 2003. A
neural probabilistic language model. JMLR (2003), 1137–1155.
[9] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb-
vre. 2008. Fast unfolding of communities in large networks. Journal of statistical
mechanics: theory and experiment 10 (2008).
[10] Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual
Web search engine. Computer Networks and ISDN Systems (1998), 107 – 117.
[11] Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2015. GraRep: Learning Graph Repre-
sentations with Global Structural Information. In CIKM. 891–900.
[12] Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2016. Deep Neural Networks for
Learning Graph Representations. In AAAI. 1145–1152.
[13] Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, and Chih-Jen Lin.
2008. LIBLINEAR: A library for large linear classification. JMLR 9, Aug (2008),
1871–1874.
[14] Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT
[28] Linyuan Lü and Tao Zhou. 2011. Link prediction in complex networks: A survey.
Physica A: Statistical Mechanics and its Applications 390, 6 (2011), 1150–1170.
[29] Tomas Mikolov, Ilya Sutskever, Kai Chen, Gregory S. Corrado, and Jeffrey Dean.
2013. Distributed Representations of Words and Phrases and their Composition-
ality. In NIPS. 3111–3119.
[30] Andriy Mnih and Yee Whye Teh. 2012. A fast and simple algorithm for training
neural probabilistic language models. In ICML. 1751–1758.
[31] Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu, and
Santhoshkumar Saminathan. 2016. subgraph2vec: Learning distributed represen-
tations of rooted sub-graphs from large graphs. arXiv preprint arXiv:1606.08928
(2016).
[32] Mark EJ Newman. 2006. Modularity and community structure in networks. PNAS
(2006), 8577–8582.
[33] Mingdong Ou, Peng Cui, Jian Pei, Ziwei Zhang, and Wenwu Zhu. 2016. Asym-
[34] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The
metric transitivity preserving graph embedding. In KDD. 1105–1114.
PageRank citation ranking: bringing order to the web. (1999).
[35] Jeffrey Pennington, Richard Socher, and Christopher D Manning. 2014. Glove:
Global Vectors for Word Representation.. In EMNLP. 1532–1543.
[36] Bryan Perozzi, Leman Akoglu, Patricia Iglesias Sánchez, and Emmanuel Müller.
2014. Focused clustering and outlier detection in large attributed graphs. In KDD.
1346–1355.
[37] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. DeepWalk: online learning
of social representations. In KDD. 701–710.
[38] Leonardo FR Ribeiro, Pedro HP Saverese, and Daniel R Figueiredo. 2017. struc2vec:
Learning node representations from structural identity. In KDD. ACM, 385–394.
[39] Sam T Roweis and Lawrence K Saul. 2000. Nonlinear dimensionality reduction
by locally linear embedding. science 290, 5500 (2000), 2323–2326.
[40] Jiliang Tang and Huan Liu. 2012. Unsupervised Feature Selection for Linked
Social Media Data. In KDD. 904–912.
[41] Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei.
2015. LINE: Large-scale Information Network Embedding. In WWW. 1067–1077.
[42] Lei Tang and Huan Liu. 2009. Relational learning via latent social dimensions. In
[43] Lei Tang and Huan Liu. 2009. Scalable learning of collective behavior based on
sparse social dimensions. In CIKM. 1107–1116.
[44] Joshua B Tenenbaum, Vin De Silva, and John C Langford. 2000. A global geometric
framework for nonlinear dimensionality reduction. science 290, 5500 (2000), 2319–
2323.
[45] Grigorios Tsoumakas and Ioannis Katakis. 2006. Multi-label classification: An
overview. IJDWM 3, 3 (2006).
[46] Cunchao Tu, Weicheng Zhang, Zhiyuan Liu, and Maosong Sun. 2016. Max-
Margin DeepWalk: Discriminative Learning of Network Representation. In IJCAI.
3889–3895.
[47] L.J.P. van der Maaten and G.E. Hinton. 2008. Visualizing High-Dimensional Data
Using t-SNE. Journal of Machine Learning Research 9 (2008), 2579–2605.
[48] Daixin Wang, Peng Cui, and Wenwu Zhu. 2016. Structural Deep Network Em-
bedding. In KDD. 1225–1234.
[49] Suhang Wang, Charu Aggarwal, Jiliang Tang, and Huan Liu. 2017. Attributed
Signed Network Embedding. CIKM (2017).
[50] Duncan J Watts and Steven H Strogatz. 1998. Collective dynamics of 'small-world'
networks. Nature 393 (1998), 440–442.
[51] Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-Jiang Zhang, Qiang Yang, and
Stephen Lin. 2007. Graph embedding and extensions: A general framework for
dimensionality reduction. TPAMI 29, 1 (2007).
[52] Jaewon Yang and Jure Leskovec. 2015. Defining and evaluating network com-
munities based on ground-truth. Knowledge and Information Systems 42 (2015),
181–213.
[53] Wayne W Zachary. 1977. An information flow model for conflict and fission in
small groups. Journal of anthropological research 33, 4 (1977), 452–473.
[54] R. Zafarani and H. Liu. 2009. Social Computing Data Repository at ASU. (2009).
http://socialcomputing.asu.edu
[55] Daokun Zhanga, Jie Yinb, Xingquan Zhuc, and Chengqi Zhanga. 2017. User
profile preserving social network embedding. In IJCAI.
[15] Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable Feature Learning for
KDD. 817–826.
Press.
Networks. In KDD. 855–864.
[16] Michael Gutmann and Aapo Hyvärinen. 2010. Noise-contrastive estimation:
A new estimation principle for unnormalized statistical models.. In AISTATS.
297–304.
[17] Michael U Gutmann and Aapo Hyvärinen. 2012. Noise-contrastive estimation
of unnormalized statistical models, with applications to natural image statistics.
JMLR 13 (2012), 307–361.
[18] Keith Henderson, Brian Gallagher, Lei Li, Leman Akoglu, Tina Eliassi-Rad, Hang-
hang Tong, and Christos Faloutsos. 2011. It's who you know: graph mining using
recursive structural features. In KDD. 663–671.
[19] Jiafeng Hu, CK Cheng, Zhipeng Huang, Yixiang Fang, and Siqiang Luo. 2017. On
Embedding Uncertain Graphs. In CIKM. ACM.
[20] Xiao Huang, Jundong Li, and Xia Hu. 2017. Label informed attributed network
embedding. In WSDM. ACM, 731–739.
[21] Glen Jeh and Jennifer Widom. 2002. SimRank: a measure of structural-context
similarity. In KDD. 538–543.
[22] Minhao Jiang, Ada Wai-Chee Fu, and Raymond Chi-Wing Wong. 2017. READS:
a random walk approach for efficient and accurate dynamic SimRank. VLDB 10,
9 (2017), 937–948.
[23] Leo Katz. 1953. A new status index derived from sociometric analysis. Psychome-
trika 18, 1 (1953), 39–43.
[24] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classifi-
cation with deep convolutional neural networks. 1097–1105.
[25] Matthieu Labeau and Alexandre Allauzen. 2017. An experimental analysis of
Noise-Contrastive Estimation: the noise distribution matters. EACL (2017).
[26] John A. Lee and Michel Verleysen. 2007. Nonlinear Dimensionality Reduction (1st
ed.). Springer Publishing Company, Incorporated.
[27] Ryan N Lichtenwalter, Jake T Lussier, and Nitesh V Chawla. 2010. New perspec-
tives and methods in link prediction. In KDD. 243–252.
|
1505.07478 | 1 | 1505 | 2015-05-27T20:05:21 | Generalized communities in networks | [
"cs.SI",
"cond-mat.stat-mech",
"physics.soc-ph"
] | A substantial volume of research has been devoted to studies of community structure in networks, but communities are not the only possible form of large-scale network structure. Here we describe a broad extension of community structure that encompasses traditional communities but includes a wide range of generalized structural patterns as well. We describe a principled method for detecting this generalized structure in empirical network data and demonstrate with real-world examples how it can be used to learn new things about the shape and meaning of networks. | cs.SI | cs |
Generalized communities in networks
M. E. J. Newman1, 2 and Tiago P. Peixoto3
1Department of Physics and Center for the Study of Complex Systems,
University of Michigan, Ann Arbor, MI 48109, U.S.A.
2Santa Fe Institute, 1399 Hyde Park Road, Santa Fe, NM 87501, U.S.A.
3Institut fur Theoretische Physik, Universitat Bremen, Hochschulring 18, D-28359 Bremen, Germany
A substantial volume of research has been devoted to studies of community structure in networks,
but communities are not the only possible form of large-scale network structure. Here we describe
a broad extension of community structure that encompasses traditional communities but includes a
wide range of generalized structural patterns as well. We describe a principled method for detecting
this generalized structure in empirical network data and demonstrate with real-world examples how
it can be used to learn new things about the shape and meaning of networks.
The detection and analysis of large-scale structure in
networks has been the subject of a vigorous research
effort in recent years,
in part because of the highly
successful application of ideas drawn from statistical
physics [1, 2]. Particular energy has been devoted to
the study of community structure, meaning the division
of networks into densely connected subgroups, a common
and revealing feature, especially in social and biological
networks [3]. Community structure is, however, only one
of many possibilities where real-world networks are con-
cerned.
In this paper, we describe a broad generaliza-
tion of community structure that encompasses not only
traditional communities but also overlapping or fuzzy
communities, ranking or stratified structure, geometric
networks, and a range of other structural types, yet is
easily and flexibly detected using a fast, mathematically
principled procedure which we describe. We give demon-
strative applications of our approach to both computer-
generated test networks and real-world examples.
Community structure can be thought of as a division
of the nodes of a network into disjoint groups such that
the probability of an edge is higher between nodes in
the same group than between nodes in different groups.
For instance, one can generate artificial networks with
community structure using the stochastic block model, a
mathematical model that follows exactly this principle.
In the stochastic block model the nodes of a network
are divided into k groups, with a node being assigned
to group r with some probability γr for r = 1 . . . k, and
then edges are placed between node pairs independently
with probabilities prs where r and s are the groups the
nodes fall in. If the diagonal probabilities prr are larger
than the off-diagonal ones, we get traditional community
structure.
Alternatively, however, one can also look at the
stochastic block model another way: imagine that we as-
sign each node a random node parameter x between zero
and one and edges are placed between node pairs with a
probability ω(x, y) that is a function of the node param-
eters x and y of the pair. If ω(x, y) is piecewise constant
with k2 rectangular regions of size γrγs and value prs,
then this model is precisely equivalent to the traditional
block model. But this prompts us to ask what is so spe-
cial about piecewise constant functions? It is certainly
possible that some networks might contain structure that
is better captured by functions ω(x, y) of other forms.
Why not let ω(x, y) take a more general functional form,
thereby creating a generalized type of community struc-
ture that includes the traditional type as a subset but
can also capture other structures as well? This is the fun-
damental idea behind the generalized structures of this
paper: edge probabilities are arbitrary functions of con-
tinuous node parameters.
The idea is related to two threads of work in the previ-
ous literature. One, in sociology and statistics, concerns
“latent space” models, in which nodes in a network are lo-
cated somewhere in a Euclidean space and are more likely
to be connected if they are spatially close than if they are
far apart [4]. A specific functional form is typically as-
sumed for the connection probability and the model is
fitted to data using Monte Carlo methods. The other
thread, in the mathematics literature, concerns so-called
“graphon” models and does not deal with the analysis of
empirical data but with the mathematical properties of
models, showing in particular that models of a kind simi-
lar to that described here are powerful enough to capture
the properties of any theoretical ensemble of networks in
the limit of large size, at least in the case where the net-
works are dense [5, 6].
In this paper, we define a specific model of general-
ized community structure and a method for fitting it to
empirical data using Bayesian inference. The fit places
each node of the network in the “latent space” of the
node parameters x and, simultaneously, gives us an esti-
mate of the probability function ω(x, y). Between them,
these two outputs tell us a great deal about the struc-
ture a network possesses and the role each node plays
within that structure. The method is computationally
efficient, allowing for its application to large networks,
and provides significantly more insight than the tradi-
tional community division into discrete groups, or even
recent generalizations to overlapping groups [7, 8].
We begin by defining a model that generates networks
with the generalized community structure we are inter-
ested in. The model follows the lines sketched above, but
with some crucial differences. We take n nodes and for
each node u we generate a node parameter xu uniformly
at random in the interval [0, 1]. Then between each pair
of nodes u, v we place an undirected edge with probabil-
ity
puv =
dudv
2m
ω(xu, xv),
(1)
where du, dv are the degrees of the nodes, m = 1
is the total number of edges in the network, and ω(x, y)
is a function of our choosing, which we will call the edge
function. Note that ω(x, y) must be symmetric with re-
spect to its arguments for an undirected network such as
this.
2 Pu du
The inclusion of the degrees is necessary to accom-
modate the fitting of networks with broad degree dis-
tributions (which includes essentially all real-world net-
works [9, 10]). Without it, the model effectively assumes
a Poisson degree distribution, which is a poor fit to most
networks and can cause the calculation to fail [11]. The
factor dudv/2m is the probability of an edge between
nodes with degrees du, dv if edges are placed at ran-
dom [2]. Hence ω(xu, xv) parametrizes the variation of
the probability relative to this baseline level and is typ-
ically of order 1, making puv small in the limit where m
becomes large.
Given the model, we fit it to empirical network data us-
ing the method of maximum likelihood. The probability
or likelihood P (A, xω) that we generate a particular set
of node parameters x = {xu} and a particular network
structure described by the adjacency matrix A = {auv}
is
P (A, xω) = Yu<v
uv (1 − puv)1−auv .
pauv
(2)
To find the value of the edge function ω(x, y) that best fits
an observed network we want to maximize the marginal
likelihood
P (Aω) = Z P (A, xω) dnx,
(3)
or equivalently its logarithm, whose maximum falls in the
same place. Direct maximization leads to a set of implicit
equations that are hard to solve, even numerically, so
instead we employ the following trick.
For any positive-definite function f (x), Jensen’s in-
equality says that
logZ f (x) dx ≥ Z q(x) log
f (x)
q(x)
dx,
(4)
where q(x) is any probability distribution over x such
marginal likelihood, Eq. (3), we get
that R q(x) dx = 1. Applying (4) to the log of the
logZ P (A, xω) dnx ≥ Z q(x) log
dnx, (5)
P (A, xω)
q(x)
where q(x) is any probability distribution over x. It is
straightforward to verify that the exact equality is recov-
ered, and hence the right-hand side maximized, when
2
q(x) =
.
(6)
P (A, xω)
R P (A, xω) dnx
Further maximization with respect to ω then gives us
the maximum of the marginal likelihood, which is the
result we are looking for. Put another way, a double
maximization of the right-hand side of (5) with respect
to both q(x) and ω will achieve the desired result. And
this double maximization can be conveniently achieved
by alternately maximizing with respect to q(x) using (6)
and with respect to ω by differentiating.
This method, which is a standard one in statistics and
machine learning, is called an expectation–maximization
or EM algorithm [12]. It involves simply iterating these
two operations from (for instance) a random initial con-
dition until convergence. The converged value of the
probability density q(x) has a nice physical interpre-
tation. Combining Eqs. (3) and (6), we have q(x) =
P (A, xω)/P (Aω) = P (xA, ω). In other words, q(x) is
the posterior probability distribution on the node param-
eters x given the observed network and the edge func-
tion ω(x, y). It tells us the probability of any given as-
signment x of parameters to nodes. It is this quantity
that will in fact be our primary object of interest here.
Substituting from Eqs. (1) and (2) into (5), keeping
terms to leading order in small quantities and dropping
overall constants, we can write the quantity to be maxi-
mized as
ZZ 1
0 Xuv
quv(x, y)(cid:20)auv log ω(x, y) −
dudvω(x, y)
2m
(cid:21) dx dy,
(7)
where quv(x, y) = R q(x)δ(xu − x)δ(xv − y) dnx is the
posterior marginal probability that nodes u, v have node
parameters x, y respectively. The obvious next step is to
maximize (7) by functional differentiation with respect
to ω(x, y), but there is a problem.
If we allow ω to
take any form at all then it has an infinite number of
degrees of freedom, which guarantees overfitting of the
data. Put another way, physical intuition suggests that
ω(x, y) should be smooth in some sense, and we need a
way to impose that smoothness as a constraint on the op-
timization. There are a number of ways we could achieve
this, but a common one is to express the function in
terms of a finite set of basis functions. For nonnegative
functions such as ω a convenient basis is the Bernstein
polynomials of degree N :
Bk(x) = (cid:18)N
k(cid:19)xk(1 − x)N −k,
k = 0 . . . N.
(8)
The Bernstein polynomials form a complete basis for
polynomials of degree N and are nonnegative in [0, 1],
3
in the common case of a sparse network with m ∝ n.
The integrals in Eq. (13) we perform numerically, using
standard Gauss–Legendre quadrature.
This, in principle, describes a complete algorithm for
fitting the model to observed network data, but in prac-
tice the procedure is cumbersome because of the denom-
inator of Eq. (6), which involves an n-dimensional in-
tegral, where n is the number of nodes in the network,
which is typically large. The traditional solution to this
problem is to subsample the distribution q(x) approxi-
mately using Monte Carlo importance sampling. Here,
however, we use a different approach proposed recently
by Decelle et al. [13], which employs belief propagation
and returns good results while being markedly faster than
Monte Carlo. The method focuses on a function ηu→v(x),
called the belief, which represents the probability that
node u has node parameter x if node v is removed from
the network. The removal of node v allows us to write a
self-consistent set of equations whose solution gives us the
beliefs. The equations are a straightforward generaliza-
tion to the present model of those given by Decelle et al.:
ηu→v(x) =
1
Zu→v
exp(cid:18)−Xw
dudw Z 1
0
qw(y)ω(x, y) dy(cid:19)
Z 1
0
× Yw(6=v)
auw=1
ηw→u(y)ω(x, y) dy,
(14)
where qw(y) is again the marginal posterior probability
for node w to have node parameter y and as before we
have dropped terms beyond leading order in small quanti-
ties. The quantity Zu→v is a normalizing constant which
ensures that the beliefs integrate to unity:
Zu→v = Z 1
0
dudw Z 1
0
qw(y)ω(x, y) dy(cid:19)
ηw→u(y)ω(x, y) dy dx.
(15)
exp(cid:18)−Xw
Z 1
× Yw(6=v)
0
The belief propagation method consists of the iteration
of these equations to convergence starting from a suitable
initial condition (normally the current best estimate of
the beliefs). The equations are exact on networks that
take the form of trees, or on locally tree-like networks in
the limit of large network size (where local neighborhoods
of arbitrary size are trees). On other networks, they are
approximate only, but in practice give excellent results.
Once we have the values of the beliefs, the crucial two-
node marginal probability quv(x, y) is given by
quv(x, y) =
RR 1
ηu→v(x)ηv→u(y)ω(x, y)
0 ηu→v(x)ηv→u(y)ω(x, y) dx dy
.
(16)
Armed with these quantities for every node pair con-
nected by an edge, we can evaluate µ(x, y) and ν(x) from
Qjk(x, y) =
,
(12)
auw=1
cjkBj(x)Bk(y)
Pjk cjkBj(x)Bk(y)
so a linear combination PN
k=0 ckBk(x) is also nonnega-
tive provided ck ≥ 0 for all k. Our edge function ω(x, y)
is a function of two variables, so we will write it as a
double expansion in Bernstein polynomials
ω(x, y) =
N
Xj,k=0
cjkBj(x)Bk(y),
(9)
which again is nonnegative for cjk ≥ 0. Bernstein poly-
nomials have excellent stability properties under fluctu-
ations of the values of the expansion coefficients, which
makes them ideal for statistical applications such as ours.
Note that since ω(x, y) is symmetric with respect to its
arguments we must have cjk = ckj .
If ω(x, y) is constrained to take this form, then in-
stead of the unconstrained maximization of (7) we now
want to maximize with respect to the coefficients cjk.
To do this, we substitute from (9) into (7) and apply
Jensen’s inequality again, this time in its summation
form logPi fi ≥ Pi Qi log fi/Qi. Then, by the same
argument as previously, we find that the optimal coeffi-
cient values are given by the double maximization with
respect to cjk and Qjk(x, y) of
ZZ 1
0
µ(x, y)Xjk
−ZZ 1
0
ν(x)ν(y)Xjk
Qjk(x, y) log
cjkBj(x)Bk(y)
Qjk(x, y)
dx dy
cjkBj(x)Bk(y) dx dy,
(10)
where
µ(x, y) =
1
2m Xuv
auvquv(x, y),
ν(x) =
1
2m Xu
duqu(x),
(11)
and qu(x) = n−1PvR quv(x, y)dy is the marginal proba-
bility that node u has node parameter x. The maximiza-
tion with respect to Qjk(x, y) is achieved by setting
and the maximization with respect to cjk is achieved by
differentiating, which gives
cjk =
RR µ(x, y)Qjk(x, y) dx dy
R ν(x)Bj (x) dxR ν(y)Bk(y) dy
.
(13)
Since all quantities on the right of this equation are non-
negative, cjk ≥ 0 for all j, k and hence ω(x, y) ≥ 0, as
required.
The calculation of the optimal values of the cjk is a
matter of iterating Eqs. (12) and (13) to convergence,
starting from the best current estimate of the coefficients.
Note that the quantities µ and ν need be calculated only
once each time around the EM algorithm, and both can
be calculated in time linear in the size of the network
(a)
Group 1
Group 2
Group 3
ω(x, y)
(b)
Head
(c)
Tail
FIG. 1: (a) Left: density plot of the posterior marginal prob-
ability densities qu(x) that node u has node parameter x for
an application of our algorithm to a 600-node stochastic block
model with three groups. Colors indicate the probabilities
and there are 600 columns, one for each node. Right: density
plot of the edge function ω(x, y). (b) The neural network of
the worm C. elegans, drawn in real space, as it falls within
the body of the worm. Colors represent the average values of
the node parameters xu inferred for each neuron by our algo-
rithm. (c) Network representation of the interstate highways
of the contiguous United States. Again, node colors represent
the average node parameters xu.
Eq. (11) then iterate Eqs. (12) and (13) to compute new
values of the parameters cjk, and repeat.
We give three example applications of our methods,
one to a computer-generated benchmark network and
the others to real-world networks displaying nontrivial
latent-space structure that is readily uncovered by our
algorithm.
For our first example, we use a computer-generated
test network created using the standard stochastic block
model, with n = 600 nodes divided into three equally
sized groups of 200 nodes each, with probabilities pin =
cin/n and pout = cout/n for edges between nodes in the
same and different groups respectively and cin = 15,
cout = 3. Figure 1a shows a density plot of the marginal
probability distributions qu(x) on the node parameters
4
calculated by our algorithm using a degree-4 (quartic)
polynomial representation of the edge function ω. (We
also used quartic representations for the other examples
below.) The plot consists of 600 columns, one for each
node, color coded to show the value of qu(x) for the cor-
responding node. As the plot shows, the algorithm has
found the three known groups in the network, placing
them at three widely spaced points in the latent space
of the node parameters. (In this case, the first group is
placed in the middle, the second at the top, and the third
at the bottom, but all orders are equivalent.) We also
show a plot of the inferred edge function ω(x, y), which
in this case has a heavy band along the diagonal, indicat-
ing “assortative” structure, in which nodes are primarily
connected to others in the same group.
Our second example is a real-world network, the neu-
ral network of the nematode (roundworm) C. elegans,
which has been mapped in its entirety using electron mi-
croscopy [14, 15] and contains a total of 299 neurons.
The worm has a long tubular body, with neurons ar-
ranged not just in its head but along its entire length.
Neurons tend to be connected to others near to them,
so we expect spatial position to play the role of a latent
variable and our algorithm should be able to infer the po-
sitions of neurons by examining the structure of network.
Figure 1b shows that indeed this is the case. The figure
shows the network as it appears within the body of the
worm, with nodes colored according to the mean values
of the node parameters found by the algorithm, and we
can see a strong correlation between node color and posi-
tion. The largest number of nodes is concentrated in the
head, mostly colored red in the figure; others along the
body appear in blue and green. If we did not know the
physical positions of the nodes in this case, or if we did
not know the correlation between position and network
structure, we could discover it using this analysis.
Our third example, shown in Fig. 1c, is an analysis
of the network of interstate highways in the contiguous
United States. This network is embedded in geometric
space, the surface of the Earth. Again we would expect
our algorithm to find this embedding and indeed it does.
The colors of the nodes represent the mean values of their
node parameters and there is a clear correspondence be-
tween node color and position, with the inferred node
parameters being lowest in the north-east of the country
and increasing in all directions from there. (Note that
even though the portion of the network colored in red
and orange appears much larger than the rest, it is in
fact about the same size in terms of number of nodes be-
cause of the higher density of nodes in the north-east.)
The true underlying space in this case has two dimen-
sions, where our model has only one, and this suggests
a potential generalization to latent spaces with two (or
more) dimensions. It turns out that such a generalization
is possible and straightforward, but we leave the devel-
opments for future work.
To summarize, we have in this paper described a gener-
alized form of community structure in networks in which,
instead of placing network nodes in discrete groups, we
place them at positions in a continuous space and edge
probabilities depend in a general manner on those po-
sitions. We have given a computationally efficient algo-
rithm for inferring such structure from empirical network
data, based on a combination of an EM algorithm and
belief propagation, and find that it successfully uncov-
ers nontrivial structural information about both artificial
and real networks in example applications.
The authors thank Cris Moore for useful discussions.
This research was funded in part by the US National Sci-
ence Foundation under grants DMS–1107796 and DMS–
1407207 and by the University of Bremen under funding
program ZF04.
[1] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-
U. Hwang, Complex networks: Structure and dynamics.
Physics Reports 424, 175–308 (2006).
[2] M. E. J. Newman, Networks: An Introduction. Oxford
University Press, Oxford (2010).
[3] S. Fortunato, Community detection in graphs. Phys. Rep.
486, 75–174 (2010).
[4] P. D. Hoff, A. E. Raferty, and M. S. Handcock, Latent
space approaches to social network analysis. J. Amer.
Stat. Assoc. 97, 1090–1098 (2002).
[5] L. Lov´asz, Large Networks and Graph Limits, volume 60
of American Mathematical Society Colloquium Publica-
tions. American Mathematical Society, Providence, RI
5
(2012).
[6] C. Borgs, H. C. Jennifer T. Chayes and, and Y. Zhao,
An Lp theory of sparse graph convergence I: Limits,
sparse random graph models, and power law distribu-
tions. Preprint arXiv:1401.2906 (2014).
[7] G. Palla, I. Der´enyi, I. Farkas, and T. Vicsek, Uncover-
ing the overlapping community structure of complex net-
works in nature and society. Nature 435, 814–818 (2005).
[8] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P.
Xing, Mixed membership stochastic blockmodels. Jour-
nal of Machine Learning Research 9, 1981–2014 (2008).
[9] A.-L. Barab´asi and R. Albert, Emergence of scaling in
random networks. Science 286, 509–512 (1999).
[10] L. A. N. Amaral, A. Scala, M. Barth´elemy, and H. E.
Stanley, Classes of small-world networks. Proc. Natl.
Acad. Sci. USA 97, 11149–11152 (2000).
[11] B. Karrer and M. E. J. Newman, Stochastic blockmodels
and community structure in networks. Phys. Rev. E 83,
016107 (2011).
[12] G. J. McLachlan and T. Krishnan, The EM Algorithm
and Extensions. Wiley-Interscience, New York, 2nd edi-
tion (2008).
[13] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, In-
ference and phase transitions in the detection of modules
in sparse networks. Phys. Rev. Lett. 107, 065701 (2011).
[14] J. G. White, E. Southgate, J. N. Thompson, and S. Bren-
ner, The structure of the nervous system of the nema-
tode Caenorhabditis Elegans. Phil. Trans. R. Soc. Lon-
don 314, 1–340 (1986).
[15] B. Szigeti, P. Gleeson, M. Vella, S. Khayrulin,
A. Palyanov, J. Hokanson, M. Currie, M. Cantarelli,
G. Idili, and S. Larson, Openworm: An open-science ap-
proach to modeling Caenorhabditis elegans. Frontiers in
Computational Neuroscience 8, 137 (2014).
|
1802.07116 | 1 | 1802 | 2018-02-20T14:05:30 | A Social Network Analysis Framework for Modeling Health Insurance Claims Data | [
"cs.SI"
] | Health insurance companies in Brazil have their data about claims organized having the view only for providers. In this way, they loose the physician view and how they share patients. Partnership between physicians can view as a fruitful work in most of the cases but sometimes this could be a problem for health insurance companies and patients, for example a recommendation to visit another physician only because they work in same clinic. The focus of the work is to better understand physicians activities and how these activities are represented in the data. Our approach considers three aspects: the relationships among physicians, the relationships between physicians and patients, and the relationships between physicians and health providers. We present the results of an analysis of a claims database (detailing 18 months of activity) from a large health insurance company in Brazil. The main contribution presented in this paper is a set of models to represent: mutual referral between physicians, patient retention, and physician centrality in the health insurance network. Our results show the proposed models based on social network frameworks, extracted surprising insights about physicians from real health insurance claims data. | cs.SI | cs | A Social Network Analysis Framework for
Modeling Health Insurance Claims Data
Ana Paula Appel
IBM Research
[email protected]
Vagner F. de Santana
IBM Research
[email protected]
Luis G. Moyano
FCEN/CONICET, Mendoza, Argentina
[email protected]
8
1
0
2
b
e
F
0
2
]
I
S
.
s
c
[
1
v
6
1
1
7
0
.
2
0
8
1
:
v
i
X
r
a
Marcia Ito
IBM Research
[email protected]
ABSTRACT
Health insurance companies in Brazil have their data about claims
organized having the view only for providers. In this way, they
loose the physician view and how they share patients. Partner-
ship between physicians can view as a fruitful work in most of the
cases but sometimes this could be a problem for health insurance
companies and patients, for example a recommendation to visit
another physician only because they work in same clinic. (cid:140)e focus
of the work is to be(cid:138)er understand physicians activities and how
these activities are represented in the data. Our approach considers
three aspects: the relationships among physicians, the relationships
between physicians and patients, and the relationships between
physicians and health providers. We present the results of an anal-
ysis of a claims database (detailing 18 months of activity) from a
large health insurance company in Brazil. (cid:140)e main contribution
presented in this paper is a set of models to represent: mutual refer-
ral between physicians, patient retention, and physician centrality
in the health insurance network. Our results show the proposed
models based on social network frameworks, extracted surprising
insights about physicians from real health insurance claims data.
CCS CONCEPTS
•Human-centered computing →Social network analysis;
•Applied computing →Health care information systems;
•(cid:135)eory of computation →Social networks;
KEYWORDS
Social Network Analysis, Graph Mining, Healthcare, Claims
ACM Reference format:
Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito,
and Claudio Santos Pinhanez. 2018. A Social Network Analysis Frame-
work for
Modeling Health Insurance Claims Data. In Proceedings of , , , 8 pages.
DOI: 10.1145/nnnnnnn.nnnnnnn
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a
fee. Request permissions from [email protected].
,
© 2018 ACM. 978-x-xxxx-xxxx-x/YY/MM...$15.00
DOI: 10.1145/nnnnnnn.nnnnnnn
Claudio Santos Pinhanez
IBM Research
[email protected]
1 INTRODUCTION
Health insurance companies have an important piece of transac-
tional data in their ecosystem that are the claims. A claim repre-
sents a report from a physician or a healthcare service provider to
a health insurance company, requesting some form of fee related
to a patient's consultation with a physician, a clinical exam, or a
medical procedure. Even though claims data may vary, it generally
contains at least the ID of the healthcare professional involved in
the procedure (it may also be a group of professionals), the ID of the
patient, the type of procedure, and time information related to the
event. It may include other types of information such as location
of the service, CID, cost, cost payed, pre-authorization codes, etc.
Traditionally the analysis of claims data is based on applying sta-
tistics to the individual elements of the system (physicians, service
providers, patients) or to the set of claims in order to produce re-
ports of cost or quantity of procedures. With the system organized
only to pay providers that could be physicians, hospitals or clinics
the health insurance company looses almost for complete the view
of physician in this system. However, for a health insurance com-
pany is very important to know how physicians relationship among
themselves, how patiences (cid:131)ow from one physician to another and
how the patients are coming back to the physician and if all this
are compliance with health insurance company.
In practice, get the relation among physicians using claims is
di(cid:129)cult because claims are paid to a wide variety of providers,
hospitals, clinics, or even physicians registered as small companies.
A single physician may contact a patient through all those channels.
Also, there is a large variety of services that a health insurance
company o(cid:130)er combined with the problem that in Brazil a patient
can go direct to an specialist. She/He does not need to go in a
general physician before reach a cardiologist or a immunologist. In
spite of all those di(cid:129)culties, we show in this paper that meaningful
and reliable models, based on social network frameworks, about
the relationships about physicians and patients can be computed
from claim data.
(cid:140)is project was a short term project develop with a large health
insurance company in Brazil. (cid:140)e main contribution of this work
is a set of models to identify relationship-based pa(cid:138)erns related
to physicians excellence or, on the other hand, possible abusive
practices. (cid:140)ese models can therefore be used by health insurance
companies to be(cid:138)er manage the physicians they have businesses
with. It can also be used to support patients to receive more inte-
grated care from a group of physicians and service providers. (cid:140)e
proposed framework is composed of the following models:
, ,
Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez
tients to each other.
over time,
physician pairs.
• Mutual Referral: a proxy for physicians that refer pa-
• Retention: summarizes how physicians retain patients
including returning behavior in patient-
• Physician Centrality: summarizes that relative impor-
tance of physicians in the physicians-physicians network.
(cid:140)e context of this paper is the analysis of a large claims data-
base from a major Brazilian health insurance company. We use
this database to identify pa(cid:138)erns in physicians behaviors and then
model their relationships by means of social network frameworks.
(cid:140)e work on this database both inspired the development of the
proposed models and also provide empirical validation for them.
(cid:140)is paper is organized as follows: section 2 describes the related
work, section 3 details the database analyzed, section 4 presents
the proposed models, and section 5 concludes.
2 RELATED WORK
Healthcare data is heralded as the key element in the quest to
improve e(cid:129)ciency and reduce costs in healthcare systems[21]. (cid:140)is
trend is becoming more pronounced as multiscale data generated
from individuals is continuously increasing, particularly due to
new high-throughput sequencing platforms, real-time imaging, and
point-of-care devices, as well as wearable computing and mobile
health technologies [2].
In healthcare, data heterogeneity and variety arise as a result
of linking the diverse range of biomedical data sources available.
Sources of quantitative data (e.g., sensor data, images, gene arrays,
laboratory tests) and qualitative data (e.g., diagnostics, free text, de-
mographics) usually include both structured and unstructured data,
normally under the name of Electronic Health Records. Addition-
ally, the possibility to process large volumes of both structured and
unstructured medical data allows for large-scale longitudinal stud-
ies, useful to capture trends and to propose predictive models[10].
One of the most useful and commonly used datasets are claims
databases. Claims data is o(cid:137)en rich in details, as it describes im-
portant elements of the events taking place around the healthcare
professional and the patient, e.g., timestamps, geographical location,
diagnosis codes, associated expenses, among others. (cid:140)e use of
claims data in healthcare studies has been scrutinized in [6] and [7],
providing a set of good practices and outlining the shortcomings
of claims-based research.
Social network framework has proven to be a useful analysis
tool in this context, allowing for insights di(cid:129)cult to reach by tradi-
tional descriptive statistics as presented in [7]. For instance, social
network analyses has been used to study comorbidity, the simulta-
neous presence of two chronic diseases or conditions in a patient.
By structuring diseases as a network, it is possible to quantify some
of the aspects of the complex interactions between conditions in
the di(cid:130)erent patient populations. A number of studies have focused
on extensive claims datasets to examine and understand comor-
bidity networks. In [8], the authors study a di(cid:130)usion process on
a comorbidity network to model the progressive spreading of dis-
eases on a population depending on demographic data. In [12],
the authors study how a given chronic disease (diabetes) correlates
with age and gender, spanning almost 2 million patients from an
entire European country. Such comorbidity networks have also
been proposed as models to understand the connection between
genetic and environmental risk factors for individual diseases [11].
Beyond clinical purposes, claims data have also been studied
to understand the complex interactions of di(cid:130)erent organizational
structures and management relationships involved in patient care
processes. For instance, in [14], temporal pa(cid:138)erns in Electronic
Health Records were modeled in order to present useful information
for decision-making. (cid:140)e authors developed a data representation
for knowledge discovery so as to extract useful insights on latent
factors of the di(cid:130)erent processes involving a patient with the aim
to improve work(cid:131)ows.
Another important trend is the capturing the relationship be-
tween healthcare professionals, in particular the physicians. In
[13], the authors apply social network analyses to mine networks
of physicians which might be used to improve the designation of
middle-sized administrative units (accountable care organizations).
Sauter et al. [20] use social network to understand networks of
healthcare providers which share patients, giving insight in the
interplay between general practitioners, internal specialists, and
pediatricians. Also, the network structure of the di(cid:130)erent health-
care providers who care for a given individual can show important
variability of the healthcare system [15].
Social networks have also been used to understand the state of
coordination of healthcare actors. In [24] the authors describe a
complex network approach applied to health insurance claims to
understand the nature of collaboration among physicians treating
hospital in-patients and to explore the impact of collaboration on
cost and quality of care. Also, in [23], the authors study the social
network structure in hospitals among healthcare professionals to
understand which variables a(cid:130)ect patient care e(cid:129)ciency measures.
(cid:140)e idea is further developed in [22] from a statistical point of view
in a medium-sized number of hospitals, through the analysis of
temporal pa(cid:138)erns and costs.
(cid:140)e medical referral system in the Canadian healthcare system
is studied in [1], where the authors map and analyze the network
between general practitioners and specialists . In [9] the authors
describe the condition of the basic medical insurance for urban and
rural residents in China, then they demonstrate that social network
analysis can be used in the health insurance claims data to support
be(cid:138)er understanding of patients transfers among hospitals.
Finally, social network visualization methods can also be power-
ful to explore and analyze healthcare information, in particular to
depict the relationship among healthcare professionals [16].
3 THE INSURANCE CLAIMS DATABASE
(cid:140)e data used in this study was provided by a large Brazilian health
insurance company. (cid:140)e database contains information about ser-
vices and materials of 108,982,593 instances of claims paid by the
health insurance company to service providers covering 18 months
of activity, about 200,000 claims per day. (cid:140)e databased names
279,085 physicians, of which 81% are considered valid, that is, the
physician register ID is well formed. Moreover, we have informa-
tion about 2,243,198 patients and 26,033 providers. (cid:140)e claims data
contain only claims related to medical consultations performed by
A Social Network Analysis Framework for
Modeling Health Insurance Claims Data
physicians, and did not include claims related to clinical analysis,
image-based exams, or hospitalizations.
Two important aspects related to the quality of the data regarding
state information and physician specialties need to be mentioned.
First, approximately 25% of the data do not contain information
about state in which the service was performed. (cid:140)is proportion
increases when the data is modeled as a graph, since that missing
state value in one or both nodes (representing physicians) may
invalidate an important piece of the analysis. Another important
aspect of the data is related to the distribution of physicians' spe-
cialties. (cid:140)is a(cid:138)ribute is important to correlate with physicians'
relationships and crucial to the proper understanding of the results.
However, because of the large amount of missing values, the use of
this information in the data analysis had limited scope.
3.1 Mapping Claims Data as a Graph
As mentioned before, the dataset used contains only claims related
to procedures performed by physicians.
In this work we focus on the relationships between physicians
within the health insurance company network only for consulta-
tions. (cid:140)us, two physicians are considered related if they have a
common patient, that is, a patient that had a consultation with
both physicians. (cid:140)is does not indicate a direct relationship, but,
for large number of common patients (represented as an outlier),
there is a high likelihood that these physicians have some kind
of professional relationship, be it a similar pro(cid:128)le, same provider,
similar location, similar education background, etc. (cid:140)is signals
the possibility that they know each other and have referred their
patients to one another.
In order to model a physician-physician network, we build a
network model as a graph G = (V , E), where the V = N denotes
E = M denotes the
the set of nodes that represent physicians.
edges that connect physicians that have in common consultations
claim of a certain patient, ek ∈ E and eij =(cid:8)(vi , vj)vi , vj ∈ V(cid:9).
(cid:140)e advantage in using a social network to model the relation-
ships among physicians involves the several ways to quantify the
relative importance of the physicians. For example, social network
analysis allows for individualization of physicians that are in a
prominent position in the network be it due to the relationship
with her peers, due to her connections with in(cid:131)uential physicians,
or because without the physician the topology of the network would
change substantially (e.g., by increasing the number of connected
components).
Figure 1 shows the degree distribution of the physician-physician
network. As we can see, the tail of the distribution follows approxi-
mately a power-law, pointing to the fact that the relationship be-
tween physicians has a structure also commonly found in other real
networks, such as social networks [17]. Here, most physicians are
connected with only a few other physicians while a small number
of physicians are very well connected in the network.
In the next sections we describe in detail the models proposed to
be(cid:138)er understand the physicians' behavior in this type of network.
4 MODELING CLAIMS DATA
(cid:140)is section details the proposed framework for modeling health
insurance claims data. It considers healthcare service relationships
, ,
Figure 1: Physician-physician network degree distribution.
from three di(cid:130)erent perspectives: (1) how physicians refer each
other, (2) how physicians retain patients over time, and (3) how
important physicians are in the physician-physician network.
4.1 Mutual Referral
Identifying physicians that work together, especially for consul-
tations, is of great business value for health insurance companies.
Physicians working together may be due to several reasons. On the
one hand, it could be positive for medical care professionals to treat
patients together and be able to work as a team, building trust. On
the other hand, this behavior could also point to a misuse of health
insurance resources. For instance, it could be the case that every
time a patient visits a given clinic or physician, she is redirected to
another physician, even if there is no need to do so. Other situations
could involve physicians bene(cid:128)ting certain colleagues by issuing
unnecessary referrals, possibly under terms of reciprocity.
Accordingly, we set to de(cid:128)ne a model with the goal of identifying
physicians that refer each other. (cid:140)e physician-physician network
used to compute this metric is a slightly modi(cid:128)ed version of the
network proposed in Section 3.1. Here we consider the consulta-
tions timestamps, i.e., two physicians P1 and P2 are connected if
the same patient has a claim about consultation both with P1 and
with P2 but edges retain their chronological order so as to indicate
the direction of the link. As a result, we obtain a directed network,
i.e., a patient consulting (cid:128)rst P1 and then P2 generates and edge e12
and a patient consulting P2 in the (cid:128)rst place and only a(cid:137)erwards
P2 generates an edge e21.
(cid:140)us, we consider the physician-physician network G(V , E, w)
with node vi ∈ V and edges eij (cid:44) eji ∈ E. Each edge E has an
associated weight w : E → R+ equal to the number of patients that
consulted with physician P1 and subsequently with P2, denoted as
wij.
Definition 1 (Mutual Referral). (cid:138)e Mutual Referral metric
focuses on identifying pairs of nodes vi and vj (where i, j ∈ [1, N]
being N the total number of nodes in the network G) connected by
edges eij and eji , where the weights wij and wji are high (the metric
increases proportionally to the weights) and, at the same time, as
similar as possible to each other (the metric decreases as weights
, ,
di(cid:130)er):
mr(vi , vj) = wij + wji − wij − wji,
where mr(vi , vj) = mr(vj , vi). Our metric is symmetric to i, j,
as expected for a variable describing a property of a given pair of
nodes. Note that the second term in the metric mr represents a
penalty for those pairs of edges not similar to each other, thus the
metric scores higher in case of symmetrical relationships.
To allow for the possibility of a global comparison between pairs
of nodes, we de(cid:128)ned a mutual referral score (mrs), by normalizing
by the maximum value of mr across the complete graph G.
Definition 2 (Mutual Referral Score). (cid:138)e Mutual Referral
Score measures, in the unit range [0, 1], the relationship between each
pair of nodes vi and vj , relative to the maximum mutual referral
identi(cid:128)ed in the directed graph G, represented by max(mr(vs , vt)),
∀s, t ∈ [1, N]. (cid:138)us, for any pair of nodes vi and vj in G, the mutual
referral score is de(cid:128)ned as:
mrs(vi , vj) =
mr(vi , vj)
max(mr(vs , vt)) , ∀s, t ∈ [1, N],
where again mrs(vi , vj) = mrs(vi , vj).
Aiming at identifying connections among physicians when the
studied se(cid:138)ings change (e.g., population, availability of health ser-
vices, socioeconomic levels), analyses were performed considering
the top 20 and top 50 physician IDs with strongest mutual referral
scores from (cid:128)ve Brazilian states containing the most claims.
Figure 2 presents a visualization of (cid:128)ve Brazilian states that have
di(cid:130)erent characteristics not only in terms of population, but also in
per capita income and healthcare services availability. Sao Paulo
and Rio de Janeiro have the larger population numbers, per capita
income, and healthcare services o(cid:130)erings. Dots represent physi-
cians, dot size and color are related to node degree, larger/darker
dots represent degrees of higher value. (cid:140)e health insurance com-
pany has an important presence in Sao Paulo and Rio de Janeiro,
which can be observed looking at the top 20 physicians in these
states. Because of the number of physicians is larger in these states,
patients have more options to choose, but they usually choose
physicians considering which are the best ones (i.e., by reputation)
and these physicians usually work with a very particular group of
other physicians (mainly associated with regions and providers).
On the other hand, in other states such as Bahia, Pernambuco
and Distrito Federal, the presence of the health insurance company
is sparser; there are less physicians that work with this company,
meaning less options for patients and in consequence more evenly
distributed degrees, which can also be identi(cid:128)ed in the density
values of the network (see Figure 2).
We observe an unusual case in Distrito Federal, where two pairs
of heavily connected physicians have the median of days between
two consultations equal to zero days, meaning that half or more
patients consulted both physicians in the same day. (cid:140)is could
represent physicians that work in the same healthcare provider,
for example a cardiologist that executes an electrocardiogram and
another cardiologist that analyzes the result, working together in
same clinic. However, in both cases we did not have the physicians
specialty information. Actually, most of the physicians that are
strongly connected with others do not specify their specialty, which
Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez
hinders any detailed inference regarding the context in which the
connection occurred.
Table 1 shows the strongest pairs of physicians in the studied
database. Except the top pairs from Mato Grosso do Sul, PMS 028
and PMS 027, all the other physicians are from the 5 states repre-
sented in Figure 2. Physicians PMS 028 and PMS 027 have 205 same-
patient consultations ((cid:128)rst with PMS 028 and then with PMS 027)
and 196 consultations ((cid:128)rst PMS 027 and then PMS 028). None in-
formed their specialty, but with this information, subject ma(cid:138)er
experts can analyze in detail the highlighted relationships, iden-
tifying groups of physicians that work together, misuse health
insurance resources by forcing unnecessary referrals, or cases of
referral/counter-referral.
Considering the whole network, analysis of those pairs of
physicians with highest mutual referral score and with informed
specialties revealed the following common specialties referrals:
Ophthalmologist ↔ ophthalmologist; Cardiologists ↔ cardiolo-
gists/vascular surgery; Acupuncture/pediatric ↔ allergist; Cardiol-
ogy ↔ hematology/clinical pathology; Dermatology ↔ cardiology.
In Figure 3 we show the network for the top 100 mutual refer-
ral scores by the following specialties: allergist, cardiologist and
ophthalmologist. We can see that the behavior is di(cid:130)erent for each
specialty. For allergists (Figure 3 (a)) there are two main physicians
connected with several other physicians from di(cid:130)erent specialties,
most of them pediatricians. (cid:140)us, it is possible to infer that these
two allergists are recommended by most of their colleagues. For
cardiologists (Figure 3 (b)) there are two physicians that are strongly
connected with several other physicians and nine other cardiolo-
gists that have a small number of other physicians connected to
them. Finally, the network is di(cid:130)erent for ophthalmologists, we
have almost no other physician strongly connected to multiple
physicians. (cid:140)ey work mostly in pairs (usually the other ophthal-
mologist is a surgeon, or a peer responsible of running certain types
of exams). In the case of ophthalmologists, they tend to be very
specialized (e.g., surgeon, retina, cornea, etc.) and so they usually
work with a peer.
Lastly, this model suggests that some physicians consider their
own connections to indicate patients. Hence, in situations where
the health insurance company wants to improve the relationship
with physicians in their network, it could consider an approach
involving groups of doctors that already act together, increasing
P1
PMS 028
PD F 010
PS P 022
PS P 139
PD F 057
PS P 141
PS P 139
PS P 024
PS P 143
PS P 145
P2
PMS 027
PD F 009
PS P 021
PS P 138
PD F 056
PS P 140
PS P 140
PS P 023
PS P 142
PS P 144
Consultations
P1 → P2
205
267
103
92
73
72
73
92
73
70
P2 → P1 mrs(P1, P2)
1.000
0.551
0.520
0.367
0.362
0.357
0.337
0.321
0.321
0.316
196
108
102
72
71
70
66
63
63
62
Table 1: (cid:135)e top 10 mutual referral scores in the database;
physicians IDs are anonymized and state codes are used to
allow interpretation considering di(cid:130)erent Brazilian states.
A Social Network Analysis Framework for
Modeling Health Insurance Claims Data
, ,
Figure 2: Top 50 and 20 physicians with highest mutual referral score from the following Brazilian states: Bahia (BA), Pernam-
buco (PE), Distrito Federal (DF), Sao Paulo (SP) and Rio de Janeiro (RJ).
(a) Allergist
(b) Cardiologist
(c) Ophthalmologist
Figure 3: Top 100 mutual referral scores by the following specialties: cardiologist and ophthalmologist.
the involvement of the group as a whole with the health insurance
company and its services. More generally, this metric could support
decision making processes involving increasing or reducing the
network of accredited physicians/service providers.
4.2 Retention
(cid:140)e main goal of the retention model is to identify physicians
according of their patients' loyalty. To do this, we analyze the
physician-patient relationship. Generally speaking, for each patient
i there is a number of claims si related to a number of physicians Ki
that the patient has visited. We focused exclusively on consultations,
each claim corresponding to only one consultation. (cid:140)e si claims are
thus distributed among Pi physicians in such a way that physician
j has sij claims related to a patient i. (cid:140)us, the total number of
claims for patient i is equal to the sum of all the claims sij across
Ki physicians, that is:
Pi
j=1
si =
sij
Definition 3 (Relative Relationship). To capture the relative
di(cid:130)erence between patient-physician relationships, we de(cid:128)ne a model
called Relative Relationship rij = sij/si , as a measure to gauge the
strength of the relationship between patient i and physician j.
If
the patient has a large number of claims with a given physician, i.e.,
sij (cid:29) 1, there is a strong relationship between them. But if there is not
only a large number of claims with physician j, but also most of those
claims are with this speci(cid:128)c physician, i.e., rij = sij/si ≈ 1, then this
is an even stronger indication that there is a tight relative relationship
, ,
Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez
between patient i and physician j. A consistently high value of rij
for a given physician j across patients could be an indicator that
this professional provides high quality service, motivating patients to
return over time.
ij
Definition 4 (Maximum Relative Relationship). We consider
Maximum Relative Relationship rmax
as the highest value of the
relative relationship rij of patient i with physician j. Maximum
Relative Relationship singles out the most prominent physician for
patient i, the rationale being to identify physicians that can be in the
category of high quality service. (cid:138)is metric is associated to patient-
physician pairs and it is particularly signi(cid:128)cant as it approaches 1
and, simultaneously, the patient is connected to a large number of
physicians (i.e., Pi (cid:29) 1).
ij
To capture a physician's retention capacity in a single metric, we
consider a function proportional to the Maximum Relative Relation-
ship rmax
as well as proportional to the number of physicians that
the patient consulted with. If the patient consulted with multiple
physicians, a higher number of rmax
for one of them is signi(cid:128)cant.
A physician showing patients that have consistently higher val-
ues of rmax
is indicative of the physician's capacity of retaining
patients. We average all patients for a given physician and nor-
malize by the maximum value to keep the metric in the unit range,
allowing for straightforward comparison.
ij
ij
Figure 4: Relationship between number of physicians and
total number of claims of a patient (each dot represents a
patient). (cid:135)e data correspond to consultations in the state
of Sao Paulo.
Figure 4 shows how the Maximum Relative Relationship metric
is distributed across all patients in the state of Sao Paulo. In the
(cid:128)gure, each dot is a patient, the x-axis represents the number of
physicians connected to the patient, which we denote as K, and the
(logarithmic) y-axis represents the total number of claims of the
patient, denoted as s. Color intensity is proportional to the value of
, so the darker the intensity, the closer to one, which means
rmax
ij
that the patient has most claims mainly with the corresponding
physician. Solid lines represent proportional values of s vs. P,
i.e. s = cP, with c equal to 1, 5, 10, 50. (cid:140)is means that dots
above the upper solid line have more than 50 times claims than the
corresponding number of visited physicians.
Our model allows for the de(cid:128)nition of parameters to select physi-
cians that have, at the same time, higher values of Maximum Rel-
ative Relationship rmax
, total number of physicians P and total
number of claims s, meaning that the physician has patients that
have several claims and also physicians built a strong relationship
with the patient. In Figure 4, this correspond to the darker points
above the black upper line.
(cid:140)is type of information represents a summary of the relation-
ship patient-physician, where is possible to quantify which physi-
cian has in general a more loyal relationship from patients, inferred
by their returning behavior.
ij
2013
2014
Physician Q2 Q3 Q4 Q1 Q2
PBA262
PBA051
PS P 263
PS P 264
PS P 265
PBA266
PS P 142
PS P 267
PMG 268
PD F 234
PS P 269
PD F 219
PS P 270
PD F 233
PMS 271
PBA272
PS P 273
PS P 274
PS P 275
PS P 276
PS P 277
PD F 278
PS P 279
PMG 238
PS P 280
PD F 281
PS P 282
2
4
-
1
-
-
-
-
-
-
7
-
-
-
-
8
-
-
-
-
3
-
-
6
9
5
10
1
2
3
4
5
6
7
8
9
10
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
1
5
-
2
10
-
-
9
-
-
3
4
6
7
8
-
-
-
-
-
-
-
-
-
-
-
-
1
-
-
2
4
-
-
-
7
-
-
3
-
5
-
6
8
9
10
-
-
-
-
-
-
-
-
2
-
-
1
-
-
-
7
-
-
-
-
-
-
-
4
-
-
-
3
5
6
8
9
10
-
-
Table 2: Top 10 physicians with higher values for retention
for 5 consecutive quarters. We observe that Sao Paulo is not
the dominant state as opposed to the centrality metrics (See
Section 4.3). (cid:135)ere is some stability in the sense that many
physicians appear in the top 10 in more than one quarter.
Table 2 shows a comparison of the top 10 physicians from the
whole database through (cid:128)ve consecutive quarters. We can see that
the retention is stable in time since several physicians appear in
consecutive quarters systematically.
A Social Network Analysis Framework for
Modeling Health Insurance Claims Data
4.3 Physician Centrality
In this part of the analysis we focus on analyzing the in(cid:131)uence of
the physician relative to other physicians in the network. (cid:140)e goal
is to understand the physicians activity regarding other physicians,
specially from the point of view of the activity that is seen by
the health insurance company, i.e., the data present in the claims
database. (cid:140)e rationale tested here is that in(cid:131)uential (more central)
physicians will have a larger e(cid:130)ect in the topology of the network
than physicians that are in the network's periphery, for instance, an
in(cid:131)uential physician leaving the network may induce close peers
to leave as well [4, 5].
To capture the importance of each physician, the following four
centrality measures were considered: Degree: (cid:140)e importance of
the physician is proportional to the number of patients shared
with other physicians. (cid:140)e higher the number of patients shared
with other physicians, the more central the physician is regarded.
Eigenvalue: (cid:140)e higher the number of shared patients with other
important physicians, the more important the physician is consid-
ered in the network. If the physician shares a large number of
patients with physicians not considered as important, the physician
is not necessarily considered in(cid:131)uential [19]. Betweenness: Takes
into account that physicians can be in(cid:131)uential to other physicians
when they are central in the network. It is possible to de(cid:128)ne a metric
that captures this proximity e(cid:130)ect by means of the betweenness co-
e(cid:129)cient [3], which considers the shortest path a patient would take
from a given physician to another one, if they make direct referrals.
(cid:140)rough this metric, the higher the potential to connect with other
doctors, the more central the physician. Closeness: Physicians can
also be ranked by the amount of other physicians close to each
other, where proximity in this case refers to the number of links
between physicians. (cid:140)is can me modeled by means of the closeness
coe(cid:129)cient [18]. (cid:140)us, it is possible to compute a distance between
physicians by considering the (smallest) number of physicians that
are needed to connect any two physicians in the network.
(cid:140)ese four metrics were computed for the same network, includ-
ing all Brazilian states, considering also how they change over time
by dividing the complete time period in quarters. One important
characteristic is the possibility of following the physicians evolution
related to these metrics. In table 3 we show the top 10 physicians us-
ing the eigenvalue centrality measure, considering all states. As we
can see, some physicians have a stable behavior over time, meaning
that they are occupying closer positions, for example, physician
PSP 153 holds the top position during most quarters except in Q4
of 2013 when he/she moved to the second position. In other cases,
a physician has an ascendant or descendant ranking, which can
indicate a change in the physician's area or patients' behavior that
might be of interest for the health insurance company.
(cid:140)e resulting ranking depends on the used metric, but there is
still a high degree of correlation among the metrics, as expected.
For instance, for Q2 of 2014, 14 physicians from top 20 using eigen-
value as a metric are in the same position given by the other metrics,
showing that the four centrality measures are quite consistent and
indicate the importance of the physicians for the network in a
similar way. In general, we have a metric concordance between
10% and 20% of top 100 physicians, which is remarkable consid-
ering that there are more than 8,000 physicians. (cid:140)e analysis of
, ,
highest ranking physicians by eigenvalues revealed that the group
is almost exclusively composed of the same group physicians. In
addition, four of these physicians are associated geographically,
being PSP 140 (Otolaryngologist), PSP 164 (Dermatologist), PSP 154
(Endocrinologist), PSP 142 (Hematologist), suggesting that location
is a highly relevant factor for such analysis. (cid:140)e (cid:128)(cid:137)h physician,
PSP 153, is a well known cardiologist from Sao Paulo, SP.
In order to analyze the connectivity among physicians, the net-
work density was computed, i.e. that ratio of the number of existing
links to the total number of possible links. For the whole network
the density was 0.001, for the top 100 physicians the density was 0.6
and for the top 40 physicians the density was 0.9. Figure 5 shows
a representation of the network of physicians with highest eigen-
value for Q2 in 2014 considering all Brazilian states. (cid:140)e subset is
composed of 21 physicians with density 0.933, which means that
they are almost all connected to each other.
5 CONCLUSION
In this work we have shown how social networking techniques can
be applied to the analysis of health insurance claims data, mainly by
mapping physicians using shared patients as a proxy for a relation-
ship between them. (cid:140)e resulting models provided useful insights to
the health insurance company we partnered with. (cid:140)e framework
improved the understanding of important characteristics both from
physicians and from patients involved in consultations pa(cid:138)erns.
(cid:140)ose insights can have multiple business applications such as to
detect frauds or to improve the relationship between the health
insurance company and important physicians for the company (e.g.,
physicians connected with the core of the network, with high mu-
tual referral with well-known physicians, and with high retention).
We demonstrated that we can obtain useful insights from claim
data if we model as a social network supporting a structural analy-
sis as opposed to traditional transactional approaches. Moreover,
our results point out that the complex physician-physician network
2013
2014
Physician Q2 Q3 Q4 Q1 Q2
1
PS P 153
PS P 154
2
5
PS P 164
3
PS P 142
12
PS P 242
8
PS P 243
PS P 140
4
11
PS P 148
16
PS P 149
10
PS P 244
15
PS P 246
PS P 139
7
9
PS P 247
18
PS P 248
13
PS P 143
PS P 252
6
2
1
7
3
10
8
4
5
14
12
11
17
19
6
-
9
1
2
3
4
5
6
7
8
9
10
12
13
14
15
19
-
1
3
4
5
10
8
2
7
12
13
6
-
20
9
-
14
1
2
4
3
14
6
5
13
12
15
7
18
-
9
10
8
Table 3: Temporal evolution by quarters of the top 10 physi-
cians with highest centrality measures in the physician-
physician network, considering all Brazilian states.
, ,
Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez
[8] Anna Chmiel, Peter Klimek, and Stefan (cid:140)urner. 2014. Spreading of diseases
through comorbidity networks across life and gender. New Journal of Physics 16,
11 (2014), 115013.
[9] Hao Guo, Feng Wei, Shaoyin Cheng, and Fan Jiang. 2015. Find Referral Social
Networks. In Security and Privacy in Social Networks and Big Data (SocialSec),
2015 International Symposium on. IEEE, 58–63.
[10] Peter B Jensen, Lars J Jensen, and Søren Brunak. 2012. Mining electronic health
records: towards be(cid:138)er research applications and clinical care. Nature Reviews
Genetics 13, 6 (2012), 395–405.
[11] Peter Klimek, Silke Aichberger, and Stefan (cid:140)urner. 2016. Disentangling genetic
and environmental risk factors for individual diseases from multiplex comorbidity
networks. arXiv preprint arXiv:1605.09535 (2016).
[12] Peter Klimek, Alexandra Kautzky-Willer, Anna Chmiel, Irmgard Schiller-
Fruhwirth, and Stefan (cid:140)urner. 2015. (cid:139)anti(cid:128)cation of diabetes comorbidity
risks across life using nation-wide big claims data. PLoS Comput Biol 11, 4 (2015),
e1004125.
[13] Bruce E Landon, Jukka-Pekka Onnela, Nancy L Keating, Michael L Barne(cid:138),
Sudeshna Paul, A James O(cid:128)Malley, (cid:140)omas Keegan, and Nicholas A Christakis.
2013. Using administrative data to identify naturally occurring networks of
physicians. Medical care 51, 8 (2013), 715.
[14] Noah Lee, Andrew F Laine, Jianying Hu, Fei Wang, Jimeng Sun, and Shahram
Ebadollahi. 2011. Mining electronic medical records to explore the linkage
between healthcare resource utilization and disease severity in diabetic patients.
In Healthcare Informatics, Imaging and Systems Biology (HISB), 2011 First IEEE
International Conference on. IEEE, 250–257.
[15] Kenneth D Mandl, Karen L Olson, Daniel Mines, Chunfu Liu, and Fang Tian. 2014.
Provider collaboration: cohesion, constellations, and shared patients. Journal of
general internal medicine 29, 11 (2014), 1499–1505.
[16] Luis G Moyano, Ana Paula Appel, Vagner F de Santana, Marcia Ito, and (cid:140)iago D
dos Santo. 2016. GraPhys: Understanding Health Care Insurance Data through
Graph Analytics.. In Proceedings of the 25th International Conference Compan-
ion on World Wide Web. International World Wide Web Conferences Steering
Commi(cid:138)ee, 227–230.
[17] Mark Newman. 2010. Networks: an introduction. OUP Oxford.
[18] Yannick Rochat. 2009. Closeness centrality extended to unconnected graphs:
(cid:140)e harmonic centrality index. In ASNA.
22, 4 (2000), 357–365.
[19] Bri(cid:138)a Ruhnau. 2000. Eigenvector centrality a node centrality? Social networks
[20] Simone Katja Sauter, Lisa Maria Neuhofer, Go(cid:138)fried Endel, Petr Klimek, and
Georg Du(cid:137)schmid. 2014. Analyzing healthcare provider centric networks
through secondary use of health claims data. In Biomedical and Health Informatics
(BHI), 2014 IEEE-EMBS International Conference on. IEEE, 522–525.
[21] Uma Srinivasan and Bavani Arunasalam. 2013. Leveraging big data analytics to
reduce healthcare costs. IT Professional 15, 6 (2013), 21–28.
[22] Shahadat Uddin. 2016. Exploring the impact of di(cid:130)erent multi-level measures of
physician communities in patient-centric care networks on healthcare outcomes:
A multi-level regression approach. Scienti(cid:128)c reports 6 (2016).
coordination. Asia Paci(cid:128)c Journal of Health Management 9, 3 (2014), 53.
[24] Fei Wang, Uma Srinivasan, Shahadat Uddin, and Sanjay Chawla. 2014. Ap-
plication of network analysis on healthcare. In Advances in Social Networks
Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on.
IEEE, 596–603.
[23] S Uddin, L Hossain, and others. 2014. Social networks in exploring healthcare
Figure 5: Subset of 21 physicians with highest network im-
portance for Q2 2014. (cid:135)e label inside the node represents
the physicians' eigenvalue. (cid:135)e width of the edges is propor-
tional to the number of shared patients.
derived from the health insurance claims database has character-
istics similar to a social network, what opens up multiple paths
for this research to follow, in particular, considering theories and
techniques from Social Network Analysis.
(cid:140)e data analysis and the value of the models for the business of
the health insurance company we partnered with were validated
by multiple meetings with specialists from our lab and from the
company, including physicians, process analysts, and information
technology specialists. (cid:140)ose interactions with subject ma(cid:138)er ex-
perts were fundamental for the identi(cid:128)cation of the most important
cases and scenarios to be considered (e.g., cases where multiple
physicians used the same physician ID when submi(cid:138)ing a claim to
the company) and for the creation of models to support decision
making processes and with real business value.
[2]
REFERENCES
[1] Wadhah Almansoori, Omar Zarour, Tamer N Jarada, Panagiotis Karampales, Jon
Rokne, and Reda Alhajj. 2011. Applications of social network construction and
analysis in the medical referral process. In Dependable, Autonomic and Secure
Computing (DASC), 2011 IEEE Ninth International Conference on. IEEE, 816–823.
Javier Andreu-Perez, Carmen CY Poon, Robert D Merri(cid:128)eld, Stephen TC Wong,
and Guang-Zhong Yang. 2015. Big data for health. IEEE journal of biomedical
and health informatics 19, 4 (2015), 1193–1208.
[3] M. Barth´elemy. 2004. Betweenness centrality in large complex networks. (cid:138)e
European Physical Journal B - Condensed Ma(cid:136)er and Complex Systems 38, 2 (2004),
163–168. DOI:h(cid:138)p://dx.doi.org/10.1140/epjb/e2004-00111-4
[4] S. Borga(cid:138)i. 2005. Centrality and network (cid:131)ow. Social Networks 27, 1 (Jan. 2005),
55–71. DOI:h(cid:138)p://dx.doi.org/10.1016/j.socnet.2004.11.008
[5] Stephen P Borga(cid:138)i. 2005. Centrality and network (cid:131)ow. Social networks 27, 1
(2005), 55–71.
[6] Bryan Burton and Paul Jesilow. 2011. How healthcare studies use claims data.
Open Health Services and Policy Journal 4 (2011), 26–29.
[7] Varun Chandola, Sreenivas R. Sukumar, and Jack C. Schryver. 2013. Knowledge
Discovery from Massive Healthcare Claims Data. In Proceedings of the 19th
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
(KDD '13). ACM, New York, NY, USA, 1312–1320. DOI:h(cid:138)p://dx.doi.org/10.1145/
2487575.2488205
|
1806.02954 | 3 | 1806 | 2019-04-29T13:55:28 | Using Social Network Information in Bayesian Truth Discovery | [
"cs.SI",
"cs.LG",
"cs.MA",
"stat.ML"
] | We investigate the problem of truth discovery based on opinions from multiple agents who may be unreliable or biased. We consider the case where agents' reliabilities or biases are correlated if they belong to the same community, which defines a group of agents with similar opinions regarding a particular event. An agent can belong to different communities for different events, and these communities are unknown a priori. We incorporate knowledge of the agents' social network in our truth discovery framework and develop Laplace variational inference methods to estimate agents' reliabilities, communities, and the event states. We also develop a stochastic variational inference method to scale our model to large social networks. Simulations and experiments on real data suggest that when observations are sparse, our proposed methods perform better than several other inference methods, including majority voting, TruthFinder, AccuSim, the Confidence-Aware Truth Discovery method, the Bayesian Classifier Combination (BCC) method, and the Community BCC method. | cs.SI | cs | Using Social Network Information in
Community-based Bayesian Truth Discovery
Jielong Yang, Student Member, IEEE, Junshan Wang, Member, IEEE, and Wee Peng Tay, Senior Member, IEEE
1
9
1
0
2
r
p
A
9
2
]
I
S
.
s
c
[
3
v
4
5
9
2
0
.
6
0
8
1
:
v
i
X
r
a
Abstract -- We investigate the problem of truth discovery based
on opinions from multiple agents (who may be unreliable or
biased) that form a social network. We consider the case where
agents' reliabilities or biases are correlated if they belong to
the same community, which defines a group of agents with
similar opinions regarding a particular event. An agent can
belong to different communities for different events, and these
communities are unknown a priori. We incorporate knowledge of
the agents' social network in our truth discovery framework and
develop Laplace variational inference methods to estimate agents'
reliabilities, communities, and the event states. We also develop
a stochastic variational inference method to scale our model to
large social networks. Simulations and experiments on real data
suggest that when observations are sparse, our proposed methods
perform better than several other inference methods, including
majority voting, TruthFinder, AccuSim, the Confidence-Aware
Truth Discovery method, the Bayesian Classifier Combination
(BCC) method, and the Community BCC method.
Index Terms -- Truth discovery, social network clustering,
Laplace variational inference, stochastic variational inference
I. INTRODUCTION
In crowdsourcing and social sensing [1] -- [8], information
the same event often comes from different agents.
about
Agents may have their own biases and produce unreliable
opinions. A commonly used approach to fuse the agents' opin-
ions together is the majority voting method, which assumes
that all agents have the same reliability [9]. However, due to
different backgrounds and access to prior information, agents'
reliabilities or biases may vary widely.
Truth discovery methods have been proposed to jointly es-
timate event truths and agent reliabilities by aggregating noisy
information from multiple agents. For example, companies
may gather product ratings from social media to estimate the
popularity of their products [10] and regulatory agencies may
use participatory social sensing to determine if certain events
like traffic congestion have occurred by allowing the public to
report such events to them [11]. In this paper, we consider the
truth discovery problem when social network information of
the contributing agents is available.
A. Related Work
In [7], [12] -- [14], probabilistic models are proposed for truth
discovery from binary (true or false) observations. For binary
observations, the reliability of each agent is the probability an
This research is supported by the Singapore Ministry of Education Aca-
demic Research Fund Tier 1 grant 2017-T1-001-059 (RG20/17).
J. Yang, J. Wang, and W. P. Tay are with the School of Electrical and
Electronic Engineering, Nanyang Technological University, Singapore.
Emails: [email protected], [email protected], [email protected].
event is true given that the agent reports it to be true. In [12],
maximum likelihood estimation (MLE) is used to estimate
event truths and agent reliabilities. The Cramer-Rao lower
bound (CRLB) on source reliability estimation is computed
in [15]. In these papers, agents are assumed to be independent
of each other.
trees. In [7], [14],
A model proposed in [13] assumes the dependency graphs
of agents are disjoint
the dependency
relationship is extended to general graphs and represented by a
known dependency matrix. In [16], an agent can be influenced
by another agent to change its observation to match that of the
influencer. An iterative expectation maximization algorithm is
developed to infer each agent's reliability and dependency on
other agents.
Scalar reliabilities of agents are also used in truth discovery
from multi-ary observations in [17] -- [20]. In [17], the reliabil-
ity of an agent is the probability that its opinion is correct. In
this work, a Bayesian method named TruthFinder is proposed
to iteratively estimate agent reliabilities and event truths. In
[18], the authors use the same definition of reliabilities as [17]
and develop a Bayesian method named AccuSim to detect
copying relationship among agents and jointly infer agent
dependencies, agent reliabilities, and event truths.
In [19], the reliability of an agent is regarded as the variance
of the difference between the ground truth and the agent
opinion and a Confidence-Aware Truth Discovery (CATD)
method is proposed to deal with the phenomenon where most
sources only provide a few claims. In the paper, the confidence
interval of the reliability estimation is considered. In [20],
the reliability of an agent is the proportion of its opinions
that are consistent with the ground truth of the events and
the authors adopt a new constraint-aware Hidden Markov
Model to effectively infer the evolving truths of events and
the evolving reliabilities of agents.
In [21], the reliability of each agent is represented with two
parameters representing the false positive error and the false
negative error respectively. In [22], the authors further use
a confusion matrix to represent the reliability of each agent,
and proposes a method called Bayesian Classifier Combination
(BCC) for truth discovery. In [23], the authors perform an
evaluation on 17 algorithms using five datasets and draw the
conclusion that the confusion matrix formulation generally
performs better than scalar reliabilities, and BCC is among
the best methods in decision making and single-label tasks.
However,
if each agent only observes a small subset of
events, it is difficult to infer its reliability. In practice, agents
having similar background, culture, socio-economic standings,
and other factors, may form communities and share similar
confusion matrices. The reference [24] proposed an extension
of the BCC model, called the Community BCC (CBCC)
model. In this model, the confusion matrix of an agent is
a perturbation of the confusion matrix of its community.
However, both [22] and [24] estimate the confusion matrices of
agents based only on the agents' observations. The papers [6]
and [25] show that agents in a crowd are not independent, but
are instead connected through social ties, which can provide
us with important information about which community an
agent belongs to. In [26], the authors consider the fact that
the expertise (and thus the reliability) of each agent varies
across events and use MLE to jointly estimate user expertise
and event truths.
B. Main Contributions
In this paper, we consider the use of social network in-
formation and community detection to aid in truth discovery
based on agents' observations. Similar to [24], we assume
agents are clustered into communities for each observed event
(an agent can belong to different communities for different
events), and agents in the same community have similar
confusion matrices. We use both the agents' observations and
the social network connections among agents to jointly infer
the communities and the event truths.
Truth discovery on social networks often requires analyzing
massive data. However, the traditional Gibbs sampling method
used in [22] and variational inference method in [24] can not
scale to a large dataset. The reason is that the entire dataset
is used at each iteration of Gibbs sampling and variational
inference, thus each iteration can be computationally expensive
when the dataset is large. In our paper, we develop a three-
level stochastic variational inference method for our Bayesian
network model (see Chapter 3 of [27]) that can scale to
large networks. The truths and communities are estimated
iteratively. In each iteration, instead of re-analyzing the entire
dataset (which includes information about the social network
and agents' observations), we use randomly sampled sub-
datasets to update the target variables. Our main contributions
are as follows:
• We propose a model that uses both social network in-
formation and agents' observations to jointly infer agent
communities and event truths. To model the relationship
between event states and the agents' observations, we use
a mixed membership stochastic blockmodel [28] for the
community structure and confusion matrices. Our model
allows agents to switch communities when observing
different events.
• For small and medium sized networks, we develop a
Laplace variational inference method to iteratively esti-
mate the agent communities and event truths.
• We develop a three-level stochastic variational inference
method for our model that can scale to large networks.
• We perform simulations and experiments on real data,
which demonstrate that our method performs better than
majority voting, TruthFinder, AccuSim, CATD, BCC, and
CBCC.
2
The rest of this paper is organized as follows. In Section II,
we present our model and assumptions. In Section III, we de-
velop a Laplace variational inference method for our Bayesian
network model. In Section IV, we develop a three-level
stochastic variational inference method that can scale to large
networks. Simulation and experiment results are presented in
Section V, and we conclude in Section VI.
(cid:17)
, . . . , α
Ks
Ks
(cid:16) α
i=1 or (xi)i
if the index set
Notations: We use boldfaced characters to represent vectors
then A(m,·),
and matrices. Suppose that A is a matrix,
A(·, m), and A(m, n) denote its m-th row, m-th column,
and (m, n)-th element, respectively. The vector (x1, . . . , xN )
is abbreviated as (xi)N
that i
runs over is clear from the context. We use Cat (p1, . . . , pK),
, Unif (a, b), Unif (1, . . . , R), Be (g0, h0)
Dir
and N (M, V) to represent the categorical distribution with
category probabilities p1, . . . , pK, the Dirichlet distribution
, the uniform dis-
with concentration parameters α
Ks
tribution over the interval (a, b), the uniform distribution over
the discrete set {1, . . . , R}, the beta distribution with shape
parameters (g0, h0), and the normal distribution with mean M
and covariance V, respectively. We use Γ(·) and Ψ(·) to denote
the gamma function and digamma function, respectively. The
notation ∼ means equality in distribution. The notation y x
denotes a random variable y conditioned on x, and p(y x)
denotes its conditional probability density function. E is the
expectation operator and Eq is expectation with respect to
the probability distribution q. We use I(a, b) to denote the
indicator function, which equals 1 if a = b and 0 otherwise.
We use S to represent the cardinality of the set S.
, . . . , α
Ks
II. SYSTEM MODEL
In this section, we present our model and assumptions.
Suppose that N agents observe L events and each event can
be in R possible states. Each agent observes only a subset
of events, and provides its opinions of the events' states to a
fusion center. The fusion center's goal is to infer the true state
of each event from all the agents' opinions, and estimate the
confusion matrix of each agent. The (i, j)-th element of the
confusion matrix of agent n is the probability that agent n's
opinion of an event with state i is j. We adopt the Bayesian
network model shown in Fig. 1, with notations used in the
model summarized in Table I. We explain the model in details
below.
We assume that a social network connecting the N agents is
known. Agents in a social network tend to form communities
[29] whose members have similar interests or backgrounds.
Agents in the same community may be more interested in
certain events, and may share the same biases. An agent can
subscribe to the beliefs of multiple communities. Consider
an agent n who observes an event l. Suppose that it decides
to adopt the belief of community k when observing event l.
Let (cid:101)ωk be the R × R confusion matrix of the community k
whose r-th row (cid:101)ωk(r,·) is assumed to follow a log-normal
(cid:101)ωk(r,·) ∼ LogNormal (M, V),
(1)
where M and V are known hyper-parameters. The community
confusion matrices ((cid:101)ωk)k are independent and identically
distribution modeled as:
3
community confusion matrix (cid:101)ωk.
Let sl
n denote the index of community whose belief agent
n subscribes to when it observes event l. We model it as
n πn ∼ Cat (πn) ,
sl
(3)
where πn ∼ GEM(α) is i.i.d. over n, and α is a concentration
hyperparameter and GEM stands for the Griffiths, Engen and
McCloskey stick breaking process [30]. Following [31], [32],
we approximate the GEM process with its degree Ks weak
limit given by
k=1.
πn ∼ Dir (α/Ks, . . . , α/Ks) ,
Let θl be the hidden true state of event
(4)
where Ks is the maximum number of communities. Let πn =
(πn,k)Ks
l with prior
distribution θl ∼ Unif (1, . . . , R) and let yl
n denote the opinion
of agent n with respect to event l. We model the distribution
of agent n's opinion as:
n θl,{ωn,k}Ks
yl
n ∼ Cat(cid:0)ωn,sl
(θl,·)(cid:1) .
k=1, sl
(5)
n
l=1 and (ωn,k)N ;Ks
n=1;k=1 from
Our target is to estimate (θl)L
(yl
n)N ;L
n=1;l=1.
To model
the available social network information, we
suppose that the social network graph adjacency matrix D
is known, where D(n, m) = 1 if agent n and agent m
are connected, and D(n, m) = 0 otherwise. We adopt the
mixed membership stochastic blockmodel (MMSB) [28] to
model D(n, m). In this model, we use zn→m to denote the
community whose belief agent n subscribes to due to the
social influence from agent m. Under the influence of different
agents, agent n may subscribe to the beliefs of multiple
communities. If both agents n and m subscribe to the belief
of the same community, they are more likely to be connected
in the social network. We assume the following:
zn→m πn ∼ Cat (πn) ,
zm→n πm ∼ Cat (πm) ,
βk ∼ Be (g0, h0),
(6)
(7)
where g0, h0 > 0 are hyperparameters and k = 1, . . . , Ks. We
assume
(cid:40)
P (D(n, m) = 1 zn→m, zm→n, βzn→m)
βzn→m,
,
if zn→m = zm→n,
if zn→m (cid:54)= zm→n,
=
(8)
where is a small known constant. We also assume that
{zn→m}n,m and {βk}k are independent. Furthermore, con-
ditioned on (zn−>m, zm−>n), D(m, n) is independent of πn.
Combining (6) and (8), we have
p(zn→m = k πn, zm→n, D(n, m) = 1, βk)
∝ βI(zm→n,k)
(1−I(zm→n,k))πn,k,
k
(9)
and
p(zn→m = k πn, zm→n, D(n, m) = 0, βk)
∝ (1 − βk)I(zm→n,k)(1 − )(1−I(zm→n,k))πn,k.
(10)
Fig. 1: Our proposed Bayesian network model. Equation
numbers are indicated on the corresponding edges.
TABLE I: Summary of commonly-used notations.
Notation in
Fig. 1
D(n, m) =
1 (or 0)
z =
(zn→m)n,m
β = (βk)k
π =
(πn)n =
(πn,k)n,k
s = (sl
n)n,l
y = (yl
n)n,l
θ = (θl)l
(cid:101)ω = ((cid:101)ωk)k
ω =
(ωn,k)n,k
(M, V), α,
(g0, h0)
Description
There is a (or no) social
connection between agents n and
m.
zn→m is the index of the
community agent n subscribes to
under the social influence of agent
m.
βk is the social network
parameter defined in (8).
πn is the distribution of sl
n and
zn→m, which are defined in (3)
and (6).
n is the index of the community
sl
whose belief agent n subscribes
to when it observes event l.
n is the observation of agent n
yl
of event l.
θl is the hidden true state of event
l.
(cid:101)ωk is the confusion matrix of
community k.
ωn,k is the confusion matrix of
agent n when it subscribes to the
belief of community k. This is a
perturbed version of (cid:101)ωk.
Known hyper-parameters defined
in (1), (4), and (6), respectively.
Variational
Parameter in
Section III
N.A.
φ =
((φn→m,k)k)n,m
λ = (λk)k;
λk = (Gk, Hk)
γ = (γn,k)n,k
ψ =
n,k)k)n,l
((ψl
N.A.
ν = (νl)l
µ = (µk)k
ξ = (ξn,sl
n
)n,l
N.A.
distribution assumption, (cid:101)ωk(r, r(cid:48)) is positive. We suppose that
distributed (i.i.d.) for all k. Note that with the log-normal
the R × R confusion matrix ωn,k of agent n is then given by
drawing
ωn,k(r,·) ∼ Dir ((cid:101)ωk(r,·))
(2)
independently for each row r. The model (2) allows us to
correlate the individual confusion matrix ωn,k for every agent
n who subscribes to the belief of community k through the
III. LAPLACE VARIATIONAL INFERENCE METHOD
In this section, we present an approach to infer the states
of events and the confusion matrices of agents, based on
π = (πn,k)n,k, θ = (θl)l, ω = (ωn,k)n,k, (cid:101)ω = ((cid:101)ωk)k,
our model. Let β = (βk)k, z = (zn→m)n,m, s = (sl
n)n,l,
n)n,l, where n, m ∈ {1, . . . , N}, m (cid:54)= n,
and y = (yl
Ω = {β, z, s, π, θ, ω,(cid:101)ω}. As the closed-form of the posterior
k ∈ {1, . . . , Ks}, and l ∈ {1, . . . , L}. For simplicity, let
distribution p(Ω y, D) is not available, we use a variational
inference method [33] to approximate the posterior distribu-
tion. The variational inference method first posits a family of
densities, and then iteratively updates variational parameters
to select a member in the family that has minimum Kullback
Leibler (KL) divergence with the posterior distribution. Com-
pared with Markov chain Monte Carlo (MCMC) sampling,
variational inference methods solve an optimization problem
and thus tends to be computationally faster. However, unlike
MCMC, it does not guarantee that the global optimal [34]
inference is achieved. Variational inference methods are more
suitable for large datasets, while MCMC is more appropriate
for smaller ones. We describe our proposed variational method
in detail below.
We use F to denote a family of probability distributions
over Ω. Our target is to find the member in F that is closest
to p(Ω y, D) in KL divergence. We choose F to be a mean-
field variational family, so that the latent variables β, z, s, π,
θ, ω, (cid:101)ω are mutually independent and each is governed by
(cid:101)ω as λ = (λk)k, φ = ((φn→m,k)k)n,m, ψ = ((ψl
a variational parameter. We further denote the variational pa-
rameters of the variational distribution of β, z, s, π, θ, ω and
n,k)k)n,l,
γ = (γn,k)n,k, ν = (νl)l, ξ = (ξn,k)n,k, and µ = (µk)k,
respectively. Each set of parameters {λ, φ, ψ, γ, ν, ξ} corre-
sponds to a member in the mean-field variational family F. It
is noteworthy that using the mean-field family is suboptimal.
The mean-field family is expressive because it can capture any
marginal density of the latent variables. However, it cannot
capture correlations between them and thus will reduce the
fidelity of the approximation and introduce a loss of optimal-
ity. Structured variational inference method can be used to
introduce dependencies between the variables. However, the
complexity of the family determines the complexity of the
optimization. It is important to choose a family of distributions
that contains a density close to the posterior distribution of the
hidden variable, but simple enough for efficient optimization.
A distribution in F is represented as
q(Ω) = q(β; λ)q(z; φ)q(s; ψ)q(π; γ)q(θ; ν)q(ω; ξ)q((cid:101)ω; µ)
(cid:89)
·(cid:89)
q((cid:101)ωk; µk).
(cid:89)
(cid:89)
(cid:89)
(cid:89)
q(zn→m; φn→m)
q(ωn,k; ξn,k)
=
q(βk; λk)
q(sl
n; ψl
n)
q(πn; γn)
q(θl; νl)
(n,m):m(cid:54)=n
(cid:89)
n,l
k
n
l
n,k
k
(11)
To avoid cluttered notations, we omit the variational parame-
ters for simplicity, e.g., we write q(β) instead of q(β; λ). Note
that the variational density q(Ω) is used to approximate the
conditional density function p(Ω y, D), i.e., all derivations
4
and discussions throughout this section are conditioned on the
observed (y, D).
In the variational inference method, we aim to find
q∗(Ω) = arg min
q(Ω)∈F
D(q(Ω) p(Ω y, D)),
(12)
where D(· ·) is the KL divergence. From [34], finding (12)
is equivalent to maximizing the evidence lower bound
(13)
L(q) (cid:44) Eq(Ω)[log p(Ω, y, D)] − Eq(Ω)[log q(Ω)].
Since the prior distribution of (cid:101)ω and its likelihood in
[36] to approximate the variational distribution of (cid:101)ω with a
our model are not conjugate, we cannot use standard mean-
field variational inference to update its variational parameter.
Instead, we consider the Laplace variational inference ap-
proach proposed in [35], which uses Laplace approximations
normal distribution. For the other variables {β, z, s, π, θ, ω},
the posterior distribution of each variable is in the same
exponential family as its prior distribution and we choose
the variational distribution of each variable from the same
exponential family as its posterior distribution. Our target is to
solve (13) by updating these variational parameters iteratively.
We call this the Variational Inference using Social network
Information for Truth discovery (VISIT) algorithm, which is
shown in Algorithm 1. In the following, we explain VISIT
in detail by presenting our assumptions on the variational
distribution of each variable in Ω, and deriving the procedure
to iteratively update each variational parameter in our model.
Algorithm 1 VISIT (i-th iteration)
Input: Variational parameters in (i− 1)-th iteration, opinions
y, social network data D.
for each agent n in {1, . . . , N} do
Output: Variational parameters in i-th iteration.
for each agent pair (n, m) in {(n, m)}N
m=1 do
Update φn→m and φm→n using (19) and (20).
end for
Update ψn using (21).
Update γn using (22).
Update ξn using (28).
end for
Update λ using (14) and (15).
Update ν using (26).
Update µ using (32).
return φ, ψ, γ, ξ, λ, ν, and µ.
A. Social network parameter β
From our Bayesian network model
in Fig. 1, we have
the following: (i) For (n, m) (cid:54)= (n(cid:48), m(cid:48)), conditioned on
zn→m, zm→n, zn(cid:48)→m(cid:48), zm(cid:48)→n(cid:48), βk, D(n, m) and D(n(cid:48), m(cid:48))
(cid:89)
are independent. (ii) βk and z are independent. Thus, for
k = 1, . . . , Ks, the posterior distribution of βk is given by
p(βk D, z)
∝
p(D(n, m) zn→m, zm→n, βk)p(βk)
(n,m)
(n,m):zn→m=zm→n=k
βD(n,m)I(zn→m,k)I(zm→n,k)
k
∝ (cid:89)
· (1 − βk)(1−D(n,m))I(zn→m,k)I(zm→n,k)Be (g0, h0)
(cid:80)
(n,m) D(n,m)I(zn→m,k)I(zm→n,k)+g0−1
· (1 − βk)
(cid:80)
(n,m)(1−D(n,m))I(zn→m,k)I(zm→n,k)+h0−1
∝ β
k
∝ Be (ηk(D, z)) ,
where
(cid:88)
(cid:88)
(n,m)
ηk(D, z) =
D(n, m)I(zn→m, k)I(zm→n, k) + g0,
(1 − D(n, m))I(zn→m, k)I(zm→n, k) + h0
(n,m)
We choose the variational distribution of βk to be in the
same exponential family as its posterior distribution. Let λk =
(Gk, Hk) and the variational distribution of βk be q(βk) =
Be (Gk, Hk). From [34], we obtain
λk = Eq(z) [ηk(D, z)] ,
B. Community membership indicators z
5
Consider two agents n and m with D(n, m) = 1. From our
Bayesian network model in Fig. 1, for each k = 1, . . . , Ks,
we have
p(zn→m = k πn, zm→n, D(n, m) = 1, βk)
∝ p(D(n, m) = 1 zn→m = k, πn, zm→n, βk)
· p(zn→m = k πn, zm→n, βk)
k
(1−I(zm→n,k))πn,k .
= p(D(n, m) = 1 zn→m = k, zm→n, βk)p(zn→m = k πn)
= βI(zm→n,k)
Therefore, p(zn→m πn, zm→n, D(n, m) = 1, βk) is a
categorical distribution, which is an exponential family with
natural parameter
log
βI(zm→n,k)
k
(1−I(zm→n,k))πn,k
(cid:17)
(cid:32)
(cid:16)
(cid:32) Ks(cid:88)
k=1
(cid:33)(cid:33)Ks
.
k=1
− log
(βI(zm→n,k)
k
(1−I(zm→n,k))πn,k)
.
We let the variational distribution of zn−>m to be in the
same exponential family as its posterior distribution, namely
a categorical distribution. Assume its categorical probabilities
are (φn→m,k)Ks
k=1. From [34], we obtain
log
βI(zm→n,k)
k
(1−I(zm→n,k))πn,k
k(cid:48)=1
q(βk(cid:48) ,πn,zm→n)
log
(βI(zm→n,k(cid:48))
k(cid:48)
(cid:104)
(cid:16)
(cid:34)
(cid:32) Ks(cid:88)
k(cid:48)=1
(cid:33)(cid:35)
(cid:17)(cid:105)
log φn →m,k
= Eq(βk,πn,zm→n)
− E(cid:81)Ks
· (1−I(zm→n,k(cid:48)))πn,k(cid:48))
.
(18)
(14)
with
Gk = Eq(z)
(cid:88)
(cid:88)
(n,m)
(n,m)
(cid:88)
(cid:88)
D(n, m)I(zn→m, k)I(zm→n, k) + g0
=
D(n, m)φn→m,kφm→n,k + g0,
Hk = Eq(z)
(1 − D(n, m))I(zn→m, k)I(zm→n, k) + h0
(n,m)
(1 − D(n, m))φn→m,kφm→n,k + h0,
(15)
=
(n,m)
where φn→m,k = q(zn→m = k) is defined in Section III-B.
A Beta distribution is a Dirichlet distribution with two
parameters. Thus from equation (10) in [37], we also have
Eq(βk)[log(βk)] = Ψ(Gk) − Ψ(Gk + Hk), and
Eq(βk)[log(1 − βk)] = Ψ(Hk) − Ψ(Gk + Hk),
(16)
(17)
which are used in computing the variational distributions of
other parameters in our model. Recall that Ψ(·) is the digamma
function.
(cid:105)(cid:111)
,
The second term on the right-hand side of (18) is constant
k=1. Define
for every {φn→m,k}Ks
∆n→m,k
(cid:44) exp
(cid:110)Eq(βk,πn,zm→n)
(cid:104)
k
log(βI(zm→n,k)
(1−I(zm→n,k))πn,k)
which is the exponential function of the first term on the right-
hand side of (18). Then φn→m,k = ∆n→m,k · c, where c is
constant for every {φn→m,k}Ks
k=1 φn→m,k = 1,
when computing φn→m,k, we only need to compute ∆n→m,k
to obtain φn→m,k =
k=1. Since (cid:80)Ks
∆n →m,k = exp(cid:8)φm→n,kEq(βk)[log(βk)]
(cid:80)Ks
+ (1 − φm→n,k) log() + Eq(πn) [log(πn,k)](cid:9)
∝ exp(cid:8)φm→n,k
+ Eq(πn)[log(πn,k)](cid:9) ,
(cid:0)Eq(βk) [log(βk)] − log()(cid:1)
∆n→m,k
k=1 ∆n→m,k
. We have
(19)
where Eq(βk)[log(βk)] and Eq(πn)[log(πn,k)] are computed
using (16) and (23) in the sequel, respectively.
Similarly, if D(n, m) = 0, we have
D. Community weights π
6
p(zn→m = k πn, zm→n, D(n, m) = 0, βk)
∝ (1 − βk)I(zm→n,k)(1 − )(1−I(zm→n,k))πn,k,
and
∆n →m,k (cid:44) exp{Eq(βk,πn,zm→n)[log((1 − βk)I(zm→n,k)
· (1 − )(1−I(zm→n,k))πn,k)]}
= exp{φm→n,kEq(βk)[log(1 − βk)]
+ (1 − φm→n,k) log(1 − ) + Eq(πn)[log(πn,k)]}
(cid:0)Eq(βk)[log(1 − βk)] − log(1 − )(cid:1)
∝ exp{φm→n,k
+ Eq(πn)[log(πn,k)]},
(20)
where Eq(βk)[log(1 − βk)] is computed in (17) in the sequel.
C. Event community indices s
From our Bayesian network model
1, . . . , Ks, the posterior distribution of sl
in Fig. 1, for k =
n is
n = k πn, yl
p(sl
∝ p(yl
n sl
= ωn,k(θl, yl
n)πn,k.
n, θl, ωn,k)
n = k, πn, θl, ωn,k)p(sl
n = k πn)
Similar to Section III-B, we let the variational distribution of
n to be a categorical distribution with categorical probabilities
sl
n,k)Ks
(ψl
n,k ∝ exp{Eq(ωn,k(θl,·),θl,πn)[log(ωn,k(θl, yl
ψl
k=1. We then have
n)πn,k)]}
= exp(cid:8)Eq(θl)
(cid:40)
= exp
Eq(θl)
(cid:40) R(cid:88)
r=1
= exp
νl(r)
Ψ(ξn,k(θl, yl
n)) − Ψ(
(cid:2)Eq(ωn,k(θl,·))[log(ωn,k(θl, yl
n))](cid:3)
+ Eq(πn)[log(πn,k)](cid:9)
(cid:35)
(cid:34)
R(cid:88)
(cid:41)
(cid:35)
(cid:41)
+ Eq(πn)[log(πn,k)]
ξn,k(θl, r(cid:48)))
ξn,k(r, r(cid:48)))
n))−Ψ(
Ψ(ξn,k(r, yl
R(cid:88)
(cid:34)
r(cid:48)=1
r(cid:48)=1
+ Eq(πn)[log(πn,k)]
,
k=1, {sl
n}L
l=1 and
Since conditioned on πn = (πn,k)Ks
m=1,m(cid:54)=n are independent, we have
n}L
n πn)
m=1,m(cid:54)=n
p(zn→m πn)p(πn)
p(sl
(cid:1)
{zn→m}N
p(cid:0)πn {sl
∝ L(cid:89)
α
∝ Dir
l=1
N(cid:89)
l=1,{zn→m}N
N(cid:88)
m=1,m(cid:54)=n
+
Ks
m=1,m(cid:54)=n
L(cid:88)
I(zn→m, k) +
I(sl
n, k)
l=1
k=1
Ks
.
We let the variational distribution of πn to be in the same
exponential family as its posterior distribution by letting
q(πn) (cid:44) Dir (γn), where γn is a vector of Ks elements with
k-th element being
γn,k = E
q({sl
n}L
l=1,{zn→m}N
m=1,m(cid:54)=n)
N(cid:88)
+
m=1,m(cid:54)=n
N(cid:88)
=
α
Ks
+
m=1,m(cid:54)=n
I(zn→m, k) +
I(sl
n, k)
φn→m,k +
ψl
n,k.
(22)
Ks
α
L(cid:88)
L(cid:88)
l=1
l=1
From (10) in [37], we also have
Eq(πn)[log(πn,k)] = Ψ(γn,k) − Ψ(
Ks(cid:88)
γn,k),
(23)
which is used in Sections III-B and III-C.
k=1
E. Event states θ
For r = 1, . . . , R, the posterior distribution of θl is
p(cid:0)θl = r {yl
(cid:16)
∝ N(cid:89)
p
n=1
n=1, ω,{sl
n}N
n}N
n θl = r,{ωn,k}Ks
yl
n=1
(cid:1)
(cid:17)
n θl = r,{ωn,k}Ks
where p(yl
θl ∼ Unif (1, . . . , R). Thus,
k=1, sl
p(θl = r {yl
n}N
n=1, ω,{sl
n}N
(24)
(r,·)(cid:1) and
p(θl = r).
k=1, sl
n
n) = Cat(cid:0)ωn,sl
n=1) ∝ N(cid:89)
ωn,sl
n
n
(r, yl
n).
where Eq(ωn,k(θl,·))[log(ωn,k(θl, yl
n))] and Eq(πn)[log(πn,k)]
are computed in (29) and (23), respectively, and νl(r) is
defined in (25).
(21)
n=1
the variational distribution of θl be a categorical
We let
distribution, and denote
q(θl = r) (cid:44) νl(r),
(25)
where
νl(r)
∝ exp
= exp
= exp
= exp
n=1
(cid:40) N(cid:88)
(cid:40) N(cid:88)
(cid:40) N(cid:88)
(cid:40) N(cid:88)
n=1
n=1
n=1
(26)
(cid:35)(cid:41)
(cid:35)(cid:41)
n
n
n
(r,·)
(r, yl
n)(cid:1)(cid:3)(cid:41)
(cid:2)log(cid:0)ωn,sl
n)(cid:1)(cid:3)(cid:105)(cid:41)
(cid:2)log(cid:0)ωn,k(r, yl
R(cid:88)
R(cid:88)
ξn,sl
(r, yl
Ψ(ξn,sl
Eq(sl
n)
Eq(sl
n)
(r,·),sl
n)
n))−Ψ(
Eq(ωn,sl
(cid:104)Eq(ωn,sl
(cid:34)
(cid:34)
(cid:2)log(cid:0)ωn,k(r, yl
n)(cid:1)(cid:3)
R(cid:88)
Ψ(ξn,k(r, yl
Ks(cid:88)
n))−Ψ(
r(cid:48)=1
r(cid:48)=1
(r,·)
ψl
k=1
n,k
n
n
ξn,k(r, r(cid:48))),
n)) − Ψ(
= Ψ(ξn,k(r, yl
(r, r(cid:48)))
n
ξn,k(r, r(cid:48)))
Eq(ωn,sl
The penultimate equation holds because
r(cid:48)=1
the
n)-th element of the confusion matrix of agent n when
which is the expectation of logarithm of ωn,k(r, yl
(r, yl
it is in community k (see (29)).
n),
F. Agent confusion matrices ω
n}L
(cid:89)
l∈{1,...,L}:sl
p(ωn,k(r,·) {yl
∝
The posterior distribution of ωn,k(r,·) is
l=1, θ,(cid:101)ωk(r,·))
l=1,{sl
n}L
n ωn,k(r,·), sl
p(yl
· p(ωn,k(r,·) (cid:101)ωk(r,·))
L(cid:89)
n,k)I(θl,r)Dir ((cid:101)ωk(r,·))
= Dir(cid:0)ζ(r, r(cid:48))R
(cid:1) ,
where ζ(r, r(cid:48)) = (cid:101)ωk(r, r(cid:48)) +(cid:80)L
n, r(cid:48))I(sl
ωn,k(r, yl
l=1 I(yl
n)I(sl
n=k,θl=r
r(cid:48)=1
l=1
=
n, θl)
n, k)I(θl, r).
Letting the variational distribution of ω be the same as its
posterior distribution, we have
7
∂L(q)
∝ exp
we take the functional derivative of the objective function
model are not conjugate, thus we cannot use standard mean-
field variational inference to update its variational distribution
G. Community confusion matrices (cid:101)ω
The prior distribution of (cid:101)ωk(r,·) and its likelihood in our
q((cid:101)ωk(r,·)). In order to find q((cid:101)ωk(r,·)) that maximizes (13),
(13) with respect to q((cid:101)ωk(r,·)) and set it to zero, namely
∂q((cid:101)ωk(r,·)) = 0 to obtain the maximizer as
q((cid:101)ωk(r,·))
(cid:110)E(cid:81)N
(cid:2)log p({ωn,k(r,·)}N
n=1 (cid:101)ωk(r,·))
+ log p((cid:101)ωk(r,·))(cid:3)(cid:111)
(cid:40) N(cid:88)
(cid:40)
(cid:101)ωk(r, r(cid:48))) − R(cid:88)
log Γ((cid:101)ωk(r, r(cid:48)))
(cid:41)
R(cid:88)
((cid:101)ωk(r, r(cid:48))−1)[Ψ(ξn,k(r, r(cid:48)))− r(cid:88)
log(det(V)) − R(cid:88)
log((cid:101)ωk(r, r(cid:48)))
(cid:41)
(log((cid:101)ωk(r,·)) − M)T V−1(log((cid:101)ωk(r,·)) − M)
log(2π) − 1
2
Ψ(ξn,k(r, r(cid:48)))]
n=1 q(ωn,k(r,·))
R(cid:88)
− R
2
= exp
log Γ(
r(cid:48)=1
r(cid:48)=1
r(cid:48)=1
r(cid:48)=1
r(cid:48)=1
n=1
+
.
− 1
2
.
(30)
Equation (30) is difficult to analyze directly. Thus we use
Laplace approximation method introduced in [35], [38] to find
a Gaussian approximation to it, namely
(cid:18)
q((cid:101)ωk(r,·)) ≈ N
µk(r,·),−
(cid:19)
1
∇2 log (q(µk(r,·)))
log (q((cid:101)ωk(r,·))) ,
,
(31)
(32)
where µk(r,·) is given by
µk(r,·) = arg max
(cid:101)ωk(r,·)
which can be solved using the gradient descent algorithm.
(27)
(28)
(cid:35)
IV. THREE-LEVEL STOCHASTIC VARIATIONAL INFERENCE
METHOD
The traditional variational inference method uses the whole
dataset
in each iteration and thus it does not scale well
to large datasets. To mitigate this, we propose the use of
stochastic optimization and a three-level Stochastic VISIT
(S-VISIT) algorithm to update parameters using randomly
sampled subsets. The pseudo code of our top-level algorithm
is shown in Algorithm 2.
The variational parameters corresponding to the variables in
our model in Fig. 1 can be divided into three levels as follows:
(i) Agent pair level: The variational parameters (φn→m)n(cid:54)=m
corresponding to the community membership indicators
(zn→m)n(cid:54)=m provide information about the social rela-
tionships between agents.
(ii) Agent
level: The variational parameters ψn, γn, and
(ξn,k)k correspond to agent n's event community indices
{sl
n}l, community weights πn, and confusion matrices
(ωn,k)k.
q(ωn,k(r,·)) = Dir (ξn,k(r,·)) ,
where ξn,k(r,·) = (ξn,k(r, r(cid:48)))R
ξn,k(r, r(cid:48)) = Eq((cid:101)ωk(r,·),sl
L(cid:88)
n,θl)
r(cid:48)=1 and
(cid:34)(cid:101)ωk(r, r(cid:48))
+
I(yl
l=1
n, r(cid:48))I(sl
L(cid:88)
I(yl
l=1
n, k)I(θl, r)
n, r(cid:48))ψl
n,kνl(r),
= µk(r, r(cid:48)) +
and µk(r, r(cid:48)) is defined in (31).
Furthermore, we have
R(cid:88)
Eq(ωn,k)[log(ωn,k(r, r(cid:48)))]
= Ψ(ξn,k(r, r(cid:48))) − Ψ(
(cid:48)(cid:48)
r
=1
ξn,k(r, r
(cid:48)(cid:48)
)),
(29)
which is used in Section III-C and Section III-E.
(iii) Social network and event level: The variational parame-
ters {λk}k and {νl}l corresponding to the social network
parameters {βk}k and event states θ.
Algorithm 2 S-VISIT (i-th iteration)
Input: Variational parameters in (i− 1)-th iteration, opinions
Output: Variational parameters in i-th iteration.
y, social network data D.
Sample a subset Sn from agent set {1, . . . , N}.
Social network and event level start:
for each agent n in Sn do
Agent level start:
Sample a subset Sp from pair set {(n, m)N
for each agent pair (n,m) in Sp do
m=1,m(cid:54)=n}.
Agent pair level start:
Update φn→m and φm→n using (19) and (20).
Agent pair level end.
end for
Update ψn using (21).
Update γn using (34).
Update ξn = (ξn,k)k using (28).
Agent level end.
end for
Update λ using (37).
Updata ν using (38).
Update µ using (40).
Social network and event level end.
return φ, ψ, γ, ξ, λ, ν, and µ.
Consider γn,k,
the variational parameter of πn,k, as an
example. We fix the rest of variational parameters and calculate
the natural gradient [39] of (13) with respect to γn,k:
∇γn,kL(q) =
L(cid:88)
N(cid:88)
φn→m,k +
+
α
Ks
m=1,m(cid:54)=n
n,k − γn,k.
ψl
(33)
l=1
Let γ(i)
n,k be the update of γn,k at the i-th iteration. If we let
∇γn,kL(q) = 0 and update γn,k, we need to use the whole set
of {φn→m,k}N
m=1,m(cid:54)=n. Instead of using (33) to update γn,k,
we can use stochastic approximation to randomly sample a
subset Sp from the set {(n, m)N
m=1,m(cid:54)=n}, and update γn,k by
using
n,k + ρ(i)((cid:98)γ(i)
n,k = γ(i−1)
γ(i)
n,k
n,k − γ(i−1)
L(cid:88)
φ(i)
n→m,k +
),
(34)
ψl,(i)
n,k
(35)
where(cid:98)γ(i)
n,k =
α
Ks
+
N
Sp
(cid:88)
(n,m)∈Sp
and ρ(i) is the step size at i-th iteration.
In
use
only
the
instead
sampled
(35) we
{φn→m,k}(n,m)∈Sp
set
m=1,m(cid:54)=n to perform the update. If the sequence
∞(cid:88)
subset
{φn→m,k}N
of step sizes (ρ(i))i of all the iterations satisfies
(ρ(i))2 < ∞,
randomly
of
ρ(i) = ∞ and
the whole
∞(cid:88)
(36)
i=1
i=1
l=1
then we update
8
then from [40], γ(i)
n,k converges to a local optimum.
Similarly, we can update the other two variational param-
eters λk and νl(r), which correspond to the global param-
eters βk and θl respectively. At each iteration, Sn agents
are randomly selected from the agent set {1, . . . , N}. For
r = 1, . . . , R, we have the following equations:
+ ρ(i)((cid:98)G(i)
+ ρ(i)((cid:98)H (i)
k − G(i−1)
k − H (i−1)
k
k
),
),
k
k = G(i−1)
G(i)
k = H (i−1)
H (i)
λ(i)
k = [G(i)
k
where
k ]T ,
k , H (i)
νl,(i)(r) = νl,(i−1)(r) + ρ(i)((cid:98)νl,(i)(r) − νl,(i−1)(r)),
(cid:98)G(i)
(cid:98)H (i)
n∈Sn,(n,m)∈Sp
D(n, m)φ(i)
n→m,kφ(i)
(cid:88)
N
Sn
N
Sp
k =
k
m→n,k +g0,
(37)
(38)
(1−D(n, m))φ(i)
n→m,kφ(i)
m→n,k +h0,
(cid:88)
=
N
Sn
N
Sp
(cid:98)νl,(i)(r) ∝ exp
(cid:40)
n∈Sn,(n,m)∈Sp
N
Sn
Ks(cid:88)
k=1
(cid:88)
(cid:33)(cid:41)
n∈Sn
.
− Ψ(
n,k(r, r(cid:48)))
ξ(i)
R(cid:88)
r(cid:48)=1
(cid:32)
ψl,(i)
n,k
Ψ(ξ(i)
n,k(r, yl
n))
r(cid:48)=1
log Γ(
n∈Sn
(cid:40)
N
Sn
When updating µ(i)
the variational parameter of
k (r,·),
(cid:40)
estimator, which is given by
(cid:88)
(cid:101)ωk(r,·), instead of using (30), we use its noisy but unbiased
(cid:98)q(i)((cid:101)ωk(r,·)) = exp
R(cid:88)
− R(cid:88)
n,k(r, r(cid:48)))− r(cid:88)
log(det(V)) − R(cid:88)
(cid:101)ωk(r, r(cid:48)))
log Γ((cid:101)ωk(r, r(cid:48)))
(cid:41)
n,k(r, r(cid:48)))]
log((cid:101)ωk(r, r(cid:48)))
(cid:41)
(log((cid:101)ωk(r,·)) − M)T V−1(log((cid:101)ωk(r,·)) − M)
((cid:101)ωk(r, r(cid:48))−1)[Ψ(ξ(i)
R(cid:88)
r(cid:48)=1
+
log(2π) − 1
2
− R
2
Ψ(ξ(i)
r(cid:48)=1
r(cid:48)=1
r(cid:48)=1
− 1
2
log[(cid:98)q(i)((cid:101)ωk(r,·))],
(39)
(40)
k (r,·) = arg max
(cid:101)ωk(r,·)
µ(i)
k (r,·) in (40).
We use the gradient descent algorithm to find µ(i)
At each iteration, multiple gradient descent steps are conducted
k (r,·), which is then set as
using the sub-dataset to update µ(i)
the initial value in the next iteration.
V. SIMULATION AND EXPERIMENT RESULTS
In this section, we present simulations and real data ex-
periments to evaluate VISIT and S-VISIT methods. For com-
parison, we adopt three state-of-the-art methods as the base-
line methods, namely majority voting, TruthFinder, AccuSim,
CATD, BCC, and CBCC. We demonstrate that our methods
outperform the baseline methods for inferring event states
as well as confusion matrices when agents either remain in
the same community or switch communities when observing
different events.
A. Agents remain in the same community when observing
different events
As both BCC and CBCC require each agent have a unique
confusion matrix when observing different events, we first con-
sider the scenario where agents remain in the same community
for all the events.
9
Fig. 2: Accuracy scores when agents remain in the same
community.
10 , 1
30 , 1
30 , 1
30 , 1
30 , 1
30 , 9
30 , 9
10 , 1
1) Synthetic Data Generation: The event states are selected
from a set of R = 6 states. We use both opinions from
agents and the social network to infer the event states. We set
the number of agents, events, and communities to N = 80,
L = 200, and K = 4, respectively. We set βk = 0.9 for
k = 1, . . . , K. Note that K is used here to generate the
synthetic dataset and is smaller than the maximum number
of communities Ks we set
in our inference method. For
agents 1 : 20, 21 : 40, 41 : 60 and 61 : 80, we set πn
30 ), and
to be ( 9
10 , 1
10 , 0), respectively. We sample zn→m, sn, D(n, m),
(0, 3
10 , 7
n from (6), (3), (8), and (5), respectively.
and yl
30 ), ( 1
30 ), ( 1
n = . . . = sL
It is worth emphasizing that we keep agents in the same
community for all the events as required by both BCC and
n and sample their common
CBCC. Thus, we let s1
value from a categorical distribution with parameter πn, which
means the confusion matrix of each agent remains the same
across different events. Let the confusion matrix ωk have
the same value dk on its diagonal and every non-diagonal
element be 1 − dk
, where dk equals 0.05, 0.1, 0.5, 0.2 for
R − 1
k = 1, . . . , 4. Let A be an N × L observation matrix, whose
(i, j)-th element A(i, j) is equal to 1 if agent i observes event
j, and A(i, j) is equal to 0 otherwise. Let ℵ be the proportion
of zero elements in A. We call ℵ the sparsity of A. We
generate synthetic datasets for 5 sparsity values, which are
0.7, 0.75, 0.8, 0.85, and 0.9, respectively.
methods model the reliabilities or the confusion matrices of
agents and can better explain the quality of observations.
VISIT, S-VISIT and CBCC have better performance than BCC
because they take into account the community of the agents
and can thus better estimate the confusion matrix when the
observation matrix is sparse. VISIT outperforms CBCC by
almost 20% because VISIT uses information about the social
network, which improves the clustering performance. The
accuracy score of S-VISIT is lower than VISIT, as expected. It
is noteworthy that when the observation matrix is very sparse,
the performance of all the methods can be worse than majority
voting.
3) Estimation of the confusion matrices: Let ω∗
n be the true
confusion matrix of agent n. The mean square error (MSE) in
estimating ω∗
n is defined as:
(cid:80)N
(cid:80)L
(cid:80)R
n=1
l=1
r=1
(cid:80)R
r(cid:48)=1ωn,sl
N · L · R · R
n
MSE =
(r, r(cid:48)) − ω∗
n(r, r(cid:48))2
.
(41)
For CBCC and BCC, as the community indices remain the
same when observing different events, we denote the estimated
confusion matrix as ω(cid:48)
n and calculate the MSE as
(cid:80)N
(cid:80)R
(cid:80)R
r(cid:48)=1ω(cid:48)
N · R · R
MSE =
n=1
r=1
n(r, r(cid:48)) − ω∗
n(r, r(cid:48))2
.
(42)
2) Truth discovery accuracy: In the simulation, we set the
maximum number of communities Ks to be 10. We set hyper-
parameters g0, h0, M, V and α to be 1, 1, (2, 2, 2, 2, 2, 2), 0.7I
and 0.1 respectively, where I is a 6 × 6 identity matrix. For
different sparsity values, we generate different data sets and
conducted 50 Monte Carlo experiments for each method and
each sparsity value of the observation matrices. We define
the accuracy score as the number of correct estimated events,
divided by the total number of events and then averaged over
all Monte Carlo experiments.
The result is shown in Fig. 2. We observe that BCC, CBCC,
TruthFinder, AccuSim, CATD, VISIT and S-VISIT have better
performance than the majority voting method because these
We then take the average of the MSEs over 50 Monte Carlo
experiments. As TruthFinder, AccuSim and CATD do not
use confusion matrices, we do not consider them in this
comparison. The result
is shown in Fig. 3. Our methods
have better performance than BCC and CBCC. When the
observation matrix is sparse, our methods and CBCC collect
the observations in the same community to estimate the
community confusion matrix, which is then used to estimate
confusion matrices for the agents belonging to that community.
This yields better results than BCC, which does not assume
any community structure. Compared with CBCC, our methods
are better able to estimate the communities because we use
social network information to aid in the procedure.
performance of our S-VISIT method is also better than the
three baseline methods.
10
Fig. 5: Confusion matrix MSEs when agents switch commu-
nities.
C. Real data
We next compare the performance of our proposed methods
on two real datasets against the three baseline methods.
1) Movie ranking dataset: The real dataset consists of
movie evaluations from IMDB,1 which provides a platform
where individuals can evaluate movies on a scale of 1 to
10. If a user rates a movie and clicks the share button, a
Twitter message is generated. We then extract the rating from
the Twitter message. In our first experiment, we divide the
movie evaluations into 4 levels: bad (0-4), moderate (5,6),
good (7,8), and excellent (9,10). In our second experiment,
we divide the movie evaluations into 2 levels: bad (0-5), good
(6-10). We treat the ratings on the IMDB website as the event
truths, which are based on the aggregated evaluations from
all users, whereas our observations come from only a subset
of users who share their ratings on Twitter. Using the Twitter
API, we collect information about the follower and following
relationships between individuals that generate movie evalua-
tion Twitter messages. To better show the influence of social
network information on event truth discovery, we delete small
subnetworks that consist of less than 5 agents. The final dataset
[41] we use consists of 2266 evaluations from 209 individuals
on 245 movies (events) and also the social network between
these 209 individuals. Similar to [42], [43], we regard the
social network to be undirected as both follower or following
relationships indicate that the two users have similar taste. The
social network is shown in Fig. 6.
The performance of different methods are shown in Table
II. We observe that our proposed methods perform better than
the other benchmark methods in both experiments.
2) Russian president rumor dataset: The dataset from [14]
contains rumors regarding the Russian president Vladimir V.
Putin, who had not appeared in public for more than one
week up to 14 March 2015. Various speculations including
false reports were posted on Twitter. The Twitter following
1http://www.imdb.com/
Fig. 3: Confusion matrix MSEs when agents remain in the
same community.
B. Agents switch communities when observing different events
In some applications, agents may subscribe to the beliefs
of different communities when observing different events. In
this subsection, we evaluate the performance of our proposed
methods when agents switch communities when observing
different events.
1) Synthetic Data Generation: We use the same settings as
Section V-A1 except when sampling the community indices.
In Section V-A1, we let s1
n and sample their
common value from a categorical distribution with parameter
n independently from
πn. In this subsection, we sample each sl
πn. Therefore, the confusion matrices of an agent may vary
across different events.
n = . . . = sL
2) Truth discovery accuracy: From Fig. 4, we observe that
the performance of S-VISIT and VISIT are better than the six
baseline methods. This is because our methods account for
the agents switching community beliefs over different events,
while CBCC assume that agents do not switch communities.
The other baseline methods do not consider agent communi-
ties.
Fig. 4: Accuracy scores when agents switch communities.
3) Estimation of
the confusion matrices: From Fig. 5,
we observe that VISIT method performs the best, and the
11
network into the truth discovery framework to improve the
truth discovery performance and accuracy of estimating the
agents' confusion matrices. We have developed a Laplace vari-
ational method and a three-level stochastic variational infer-
ence method to infer our non-conjugate model, with simulation
and experimental results suggesting that the performance of
our proposed approaches are better than several other inference
methods, including majority voting, TruthFinder, AccuSim,
CATD, BCC and CBCC methods. Unlike the other methods, in
our model, each agent can subscribe to the beliefs of different
communities when observing different events.
REFERENCES
[1] D. R. Karger, S. Oh, and D. Shah, "Efficient crowdsourcing for multi-
class labeling," ACM SIGMETRICS Performance Evaluation Review,
vol. 41, no. 1, pp. 81 -- 92, 2013.
[2] Q. Kang and W. P. Tay, "Sequential multi-class labeling in crowdsourc-
ing: A Ulam-Renyi game approach," in IEEE/WIC/ACM Int. Conf. on
Web Intelligence, Leipzig, Germany, Aug. 2017.
[3] D. Acemoglu, M. A. Dahleh, I. Lobel, and A. Ozdaglar, "Bayesian
learning in social networks," Review of Economic Studies, vol. 78, no. 4,
pp. 1201 -- 1236, Mar. 2011.
[4] J. Ho, W. P. Tay, T. Q. S. Quek, and E. K. P. Chong, "Robust
decentralized detection and social learning in tandem networks," IEEE
Trans. Signal Process., vol. 63, no. 19, pp. 5019 -- 5032, Oct. 2015.
[5] W. P. Tay, "Whose opinion to follow in multihypothesis social learning?
A large deviations perspective," IEEE J. Sel. Topics Signal Process.,
vol. 9, no. 2, pp. 344 -- 359, Mar. 2015.
[6] M. L. Gray, S. Suri, S. S. Ali, and D. Kulkarni, "The crowd is a
collaborative network," in ACM Conf. Computer-Supported Cooperative
Work & Social Computing, 2016, pp. 134 -- 147.
[7] C. Huang and D. Wang, "Topic-aware social sensing with arbitrary
source dependency graphs," in ACM/IEEE Int. Conf. Inform. Process.
Sensor Networks, 2016, pp. 1 -- 12.
[8] Q. Kang and W. P. Tay, "Sequential Multi-Class labeling in crowdsourc-
ing," IEEE Trans. Knowl. Data Eng., 2018.
[9] Y. Li, J. Gao, C. Meng, Q. Li, L. Su, B. Zhao, W. Fan, and J. Han, "A
survey on truth discovery," arXiv:1505.02463, 2015.
[10] J. Marshall and D. Wang, "Mood-sensitive truth discovery for reliable
recommendation systems in social sensing," in Proc. ACM Conf. Rec-
ommender Syst., 2016, pp. 167 -- 174.
[11] D. A. Garcia-Ulloa, L. Xiong, and V. Sunderam, "Truth discovery for
spatio-temporal events from crowdsourced data," Proceedings of the
VLDB Endowment, vol. 10, no. 11, pp. 1562 -- 1573, 2017.
[12] D. Wang, L. Kaplan, H. Le, and T. Abdelzaher, "On truth discovery
in social sensing: A maximum likelihood estimation approach," in
ACM/IEEE Int. Conf. Inform. Process. Sensor Networks, 2012, pp. 233 --
244.
[13] D. Wang, M. T. Amin, S. Li, T. Abdelzaher, L. Kaplan, S. Gu, C. Pan,
H. Liu, C. C. Aggarwal, and R. Ganti, "Using humans as sensors:
an estimation-theoretic perspective," in ACM/IEEE Int. Conf. Inform.
Process. Sensor Networks, 2014, pp. 35 -- 46.
[14] S. Yao, S. Hu, S. Li, Y. Zhao, L. Su, L. Kaplan, A. Yener, and
T. Abdelzaher, "On source dependency models for reliable social sens-
ing: Algorithms and fundamental error bounds," in IEEE Int. Conf.
Distributed Computing Syst., 2016, pp. 467 -- 476.
[15] D. Wang, L. Kaplan, T. Abdelzaher, and C. C. Aggarwal, "On credibility
estimation tradeoffs in assured social sensing," IEEE J. Sel. Areas
Commun., vol. 31, no. 6, pp. 1026 -- 1037, 2013.
[16] L. Ma, W. P. Tay, and G. Xiao, "Iterative expectation maximization for
reliable social sensing with information flows," Information Sciences,
2018.
[17] X. Yin, J. Han, and S. Y. Philip, "Truth discovery with multiple
conflicting information providers on the web," IEEE Trans. Knowl. Data
Eng., vol. 20, no. 6, pp. 796 -- 808, 2008.
[18] X. L. Dong, L. Berti-Equille, and D. Srivastava, "Integrating conflicting
data: the role of source dependence," Proc. VLDB Endowment, vol. 2,
no. 1, pp. 550 -- 561, 2009.
[19] Q. Li, Y. Li, J. Gao, L. Su, B. Zhao, M. Demirbas, W. Fan, and J. Han,
"A confidence-aware approach for truth discovery on long-tail data,"
Proc. VLDB Endowment, vol. 8, no. 4, pp. 425 -- 436, 2015.
Fig. 6: The social network of users in IMDB movie ranking
.
TABLE II: Truth discovery accuracy on movie ranking dataset.
Method
4 Levels
2 Levels
Majority Voting
TruthFinder
AccuSim
CATD
BCC
CBCC
S-VISIT
VISIT
0.50
0.52
0.53
0.49
0.51
0.53
0.55
0.55
0.71
0.71
0.70
0.70
0.69
0.71
0.73
0.75
relationships are provided in the dataset. We select the Twitter
users with more than two followers to form the social network.
As a Twitter user only reports an event to be true if he believes
that it has occurred, to enhance the complexity of the dataset,
for each event we randomly choose 20% of users in the social
network who did not post any report about that event, and set
their observations about the event to be opposite of the ground
truth. The performance of the different methods are shown in
Table III. We observe that VISIT has the best performance,
followed by CBCC.
TABLE III: Truth discovery accuracy on Russian president
rumor dataset.
Method
Majority Voting
TruthFinder
AccuSim
CATD
BCC
CBCC
S-VISIT
VISIT
Accuracy
0.985
0.985
0.985
0.985
0.985
0.991
0.985
0.992
VI. CONCLUSION
In this paper, we have proposed a truth discovery method
based on social network communities. Similar to other com-
munity based methods, our method performs better than meth-
ods without considering communities when the observation
matrix is sparse. We incorporate information about the social
[20] D. Y. Zhang, D. Wang, and Y. Zhang, "Constraint-aware dynamic truth
discovery in big data social media sensing," in IEEE Int. Conf. Big Data,
2017, pp. 57 -- 66.
[21] B. Zhao, B. I. P. Rubinstein, J. Gemmell, and J. Han, "A Bayesian ap-
proach to discovering truth from conflicting sources for data integration,"
Proc. VLDB Endowment, vol. 5, no. 6, pp. 550 -- 561, 2012.
[22] H. C. Kim and Z. Ghahramani, "Bayesian classifier combination," in
Artificial Intell. and Stat., 2012, pp. 619 -- 627.
[23] Y. Zheng, G. Li, Y. Li, C. Shan, and R. Cheng, "Truth inference
in crowdsourcing: is the problem solved?" Proc. VLDB Endowment,
vol. 10, no. 5, pp. 541 -- 552, 2017.
[24] M. Venanzi, J. Guiver, G. Kazai, P. Kohli, and M. Shokouhi,
"Community-based Bayesian aggregation models for crowdsourcing,"
in Int. Conf. World Wide Web, 2014, pp. 155 -- 164.
[25] M. Yin, M. L. Gray, S. Suri, and J. W. Vaughan, "The communication
network within the crowd," in Int. Conf. World Wide Web, 2016, pp.
1293 -- 1303.
[26] X. Zhang, Y. Wu, L. Huang, H. Ji, and G. Cao, "Expertise-aware truth
analysis and task allocation in mobile crowdsourcing," in IEEE Int. Conf.
Distributed Computing Syst., 2017, pp. 922 -- 932.
[27] D. Koller and N. Friedman, Probabilistic Graphical Models: Principles
and Techniques (Adaptive Computation and Machine Learning series).
The MIT Press, 2009.
[28] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P. Xing, "Mixed
membership stochastic blockmodels," J. Mach. Learning Research,
vol. 9, no. Sep, pp. 1981 -- 2014, 2008.
[29] S. Fortunato and D. Hric, "Community detection in networks: A user
guide," Physics Rep., vol. 659, pp. 1 -- 44, 2016.
[30] Y. W. Teh, M. I. Jordan, M. J. Beal, and D. M. Blei, "Hierarchical
Dirichlet processes," J. Am. Stat. Assoc., 2012.
[31] H. Ishwaran and M. Zarepour, "Exact and approximate sum represen-
tations for the Dirichlet process," Canadian J. Stat., vol. 30, no. 2, pp.
269 -- 283, 2002.
[32] E. B. Fox, E. B. Sudderth, M. I. Jordan, and A. S. Willsky, "A sticky
HDP-HMM with application to speaker diarization," Ann. Appl. Stat.,
pp. 1020 -- 1056, 2011.
[33] M. D. Hoffman, D. M. Blei, C. Wang, and J. Paisley, "Stochastic
variational inference," J. Mach. Learning Research, vol. 14, no. 1, pp.
1303 -- 1347, 2013.
[34] D. M. Blei, A. Kucukelbir, and J. D. McAuliffe, "Variational inference:
A review for statisticians," J. Amer. Stat. Assoc., 2017.
[35] C. Wang and D. M. Blei, "Variational inference in nonconjugate mod-
els," J. Mach. Learning Research, vol. 14, no. Apr, pp. 1005 -- 1031,
2013.
[36] L. Tierney, R. E. Kass, and J. B. Kadane, "Fully exponential Laplace
approximations to expectations and variances of nonpositive functions,"
J. Amer. Stat. Assoc., vol. 84, no. 407, pp. 710 -- 716, 1989.
[37] T. Minka, Bayesian
the multinomial
distribution, 2003. [Online]. Available: https://tminka.github.io/papers/
minka-multinomial.pdf
inference,
entropy,
[38] C. M. Bishop, Pattern Recognition and Machine Learning. Springer,
and
no. 3, pp. 75 -- 174, 2010.
[43] P. K. Gopalan and D. M. Blei, "Efficient discovery of overlapping
communities in massive networks," Proc. Nat. Academy Sci., vol. 110,
no. 36, pp. 14 534 -- 14 539, 2013.
2006.
[39] S. I. Amari, "Natural gradient works efficiently in learning," Neural
Computation, vol. 10, no. 2, pp. 251 -- 276, 1998.
[40] H. Robbins and S. Monro, "A stochastic approximation method," Ann.
Math. Stat., pp. 400 -- 407, 1951.
[41] J. Yang and W. P. Tay. (2018) Using social network information
[Online]. Available: https:
truth of movie ranking.
to discover
//doi.org/10.21979/N9/L5TTRW
[42] S. Fortunato, "Community detection in graphs," Physics Rep., vol. 486,
12
Jielong Yang received the B.Eng. and M.Sc. de-
gree in Mechanical Engineering from Xi'an Jiaotong
University in 2012 and 2014, respectively. He is cur-
rently a Ph.D. candidate at the School of Electrical
and Electronic Engineering, Nanyang Technological
University. His research interests include Bayesian
network and Deep Neural Network.
Junshan Wang received the B.S. and Ph.D. degrees
in Statistics from Wuhan University and National
University of Singapre (NUS), CN and SG, in 2011
and 2015, respectively. She spent two years in NUS
as an instructor and worked as a research fellow
in 2017 at Nanyang Technological University, Sin-
gapore. Currently she is a data scientist at Grab.
Her recent interests are real world applications of
Machine Learning and Deep Learning algorithms
and techniques, in detecting fraud activity and risk
control.
Wee Peng Tay (S'06 M'08 SM'14) received the B.S.
degree in Electrical Engineering and Mathematics,
and the M.S. degree in Electrical Engineering from
Stanford University, Stanford, CA, USA, in 2002. He
received the Ph.D. degree in Electrical Engineering
and Computer Science from the Massachusetts Insti-
tute of Technology, Cambridge, MA, USA, in 2008.
He is currently an Associate Professor in the School
of Electrical and Electronic Engineering at Nanyang
Technological University, Singapore. His research
interests include information and signal processing
information privacy,
over networks, distributed inference and estimation,
machine learning, information theory, and applied probability. Dr. Tay received
the Tan Chin Tuan Exchange Fellowship in 2015. He is a coauthor of the best
student paper award at the Asilomar conference on Signals, Systems, and
Computers in 2012, and the IEEE Signal Processing Society Young Author
Best Paper Award in 2016. He is currently an Associate Editor for the IEEE
Transactions on Signal Processing, an Editor for the IEEE Transactions on
Wireless Communications, and serves on the MLSP TC of the IEEE Signal
Processing Society. He has also served as a technical program committee
member for various international conferences.
|
1905.13649 | 6 | 1905 | 2019-07-27T11:54:07 | Spotting Collective Behaviour of Online Frauds in Customer Reviews | [
"cs.SI",
"cs.CL"
] | Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortunately, spammers often take advantage of online review forums by writing fraud reviews to promote/demote certain products. It may turn out to be more detrimental when such spammers collude and collectively inject spam reviews as they can take complete control of users' sentiment due to the volume of fraud reviews they inject. Group spam detection is thus more challenging than individual-level fraud detection due to unclear definition of a group, variation of inter-group dynamics, scarcity of labeled group-level spam data, etc. Here, we propose DeFrauder, an unsupervised method to detect online fraud reviewer groups. It first detects candidate fraud groups by leveraging the underlying product review graph and incorporating several behavioral signals which model multi-faceted collaboration among reviewers. It then maps reviewers into an embedding space and assigns a spam score to each group such that groups comprising spammers with highly similar behavioral traits achieve high spam score. While comparing with five baselines on four real-world datasets (two of them were curated by us), DeFrauder shows superior performance by outperforming the best baseline with 17.11% higher NDCG@50 (on average) across datasets. | cs.SI | cs | Spotting Collective Behaviour of Online Frauds in Customer Reviews
Sarthika Dhawan1 , Siva Charan Reddy Gangireddy1 ,
Shiv Kumar2 and Tanmoy Chakraborty1
1Indraprastha Institute of Information Technology Delhi (IIITD), India
2Netaji Subhas University of Technology (NSUT), Delhi, India
{sarthika15170, sivag}@iiitd.ac.in, [email protected], [email protected]
Abstract
Online reviews play a crucial role in deciding the
quality before purchasing any product. Unfortu-
nately, spammers often take advantage of online
review forums by writing fraud reviews to pro-
mote/demote certain products. It may turn out to
be more detrimental when such spammers collude
and collectively inject spam reviews as they can
take complete control of users' sentiment due to the
volume of fraud reviews they inject. Group spam
detection is thus more challenging than individual-
level fraud detection due to unclear definition of a
group, variation of inter-group dynamics, scarcity
of labeled group-level spam data, etc. Here, we
propose DeFrauder, an unsupervised method to de-
tect online fraud reviewer groups.
It first detects
candidate fraud groups by leveraging the underly-
ing product review graph and incorporating sev-
eral behavioral signals which model multi-faceted
collaboration among reviewers.
It then maps re-
viewers into an embedding space and assigns a
spam score to each group such that groups compris-
ing spammers with highly similar behavioral traits
achieve high spam score. While comparing with
five baselines on four real-world datasets (two of
them were curated by us), DeFrauder shows supe-
rior performance by outperforming the best base-
line with 17.11% higher NDCG@50 (on average)
across datasets.
9
1
0
2
l
u
J
7
2
]
I
S
.
s
c
[
6
v
9
4
6
3
1
.
5
0
9
1
:
v
i
X
r
a
1 Introduction
Nowadays, online reviews are becoming highly important for
customers to take any purchase-related decisions. Driven by
the immense financial profits from product reviews, several
blackmarket syndicates facilitate to post deceptive reviews to
promote/demote certain products. Groups of such fraud re-
viewers are hired to take complete control of the sentiment
about products. Collective behaviour is therefore more sub-
tle than individual behaviour. At individual level, activities
might be normal; however, at the group level they might be
substantively different from the normal behavior. Moreover,
it is not possible to understand the actual dynamics of a group
by aggregating the behaviour of its members due to the com-
plicated, multi-faceted, and evolving nature of inter-personal
dynamics. Spammers in such collusive groups also adopt
intelligent strategies (such as paraphrasing reviews of each
other, employing a subset of their resources to one product,
etc.) to evade detection.
Previous studies mostly focused on individual-level fraud
detection [Lim et al., 2010; Fei et al., 2013; Akoglu et al.,
2013]. Few other studies which realized the detrimental effect
of such collective activities detected groups simply based on
Frequent Itemset Mining (FIM) [Mukherjee et al., 2012; Xu
et al., 2013; Allahbakhsh et al., 2013]. They thus focused
more on ranking fraud groups, paying less attention to judge
the quality of the detected groups.
[Wang et al., 2016] pointed out several limitations of FIM
for group detection -- high computational complexity at low
minimum support, absence of temporal information, unable
to capture overlapping groups, prone to detect small and
tighter groups, etc.
In this paper, we propose DeFrauder1, a novel architecture
for fraud reviewer group detection. DeFrauder contributes
equally to (i) the detection of potential fraud groups by incor-
porating several coherent behavioral signals of reviewers, and
(ii) the ranking of groups based on their degree of spamicity
by proposing a novel ranking strategy. Experiments on four
real-world labeled datasets (two of them were prepared by us)
show that DeFrauder significantly outperforms five baselines
-- it beats the best baseline by 11.35% higher accuracy for
detecting groups, and 17.11% higher NDCG@50 for ranking
groups (averaged over all datasets).
In short, our contributions are fourfold:
(i) two novel
datasets, (ii) novel method for reviewer group detection, (iii)
novel method for ranking groups, and (iv) a comprehensive
evaluation to show the superiority of DeFrauder.
2 Related Work
Due to the abundance of literature [Kou et al., 2004] on on-
line fraud detection, we restrict our discussion to fraud user
detection on product review sites, which we deem as pertinent
to this paper.
1DeFrauder: Detecting Fraud Reviewer Groups, Code is avail-
able in [Dhawan et al.].
Figure 1: (a) Workflow of DeFrauder. (b) Coherent review patterns of a fraud reviewer group on two products. To evade detection, four
reviewers in a group paraphrase reviews of each other keeping the underlying sentiment same.
In user-level fraud detection, notable studies include [Lim
et al., 2010] which proposed scoring methods to measure
the degree of spamicity of a reviewer based on rating be-
haviors; [Wang et al., 2011] which developed a graph-based
fraud reviewer detection model; [Fei et al., 2013] which ex-
ploited burstiness in reviews to detect fake reviewers. SpEa-
gle [Akoglu et al., 2013] utilizes clues from all metadata as
well as relational data and harnesses them collectively under a
unified framework. ASM [Mukherjee et al., 2013a] facilitates
modeling spamicity as latent factor and allows to exploit var-
ious behavioral footprints of reviewers. [Wang et al., 2012]
argued that the dynamic behavioral signals can be captured
through a heterogeneous reviewer graph by considering re-
viewers, reviews and products together. FraudEagle [Akoglu
et al., 2013] spots fraudsters and fake reviews simultaneously.
[Dutta et al., 2018; Chetan et al., 2019] discussed about col-
lusion in social media.
Few studies attempted to detect group-level fraud reviewer
groups. GSRank [Mukherjee et al., 2012] was the first
method of this kind, which identifies spam reviewer groups
using FIM, and ranks groups based on the relationship among
groups, products, and individual reviewers. [Mukherjee et al.,
2012] argued that due to the scarcity of data, unsupervised
method should be used to tackle this problem. Other studies
largely focused on improving the ranking algorithm, ignor-
ing the performance of the group detection method (they also
used FIM for detecting groups) [Xu et al., 2013; Allahbakhsh
et al., 2013; Mukherjee et al., 2013b; Ott et al., 2011]. [Xu
and Zhang, 2015] proposed an Expectation Maximization al-
gorithm to compute the collusive score of each group detected
using FIM. [Wang et al., 2016] argued that FIM tends to de-
tect small-size and tighter groups. They proposed GSBP, a
divide-and-conquer algorithm which emphasizes on the topo-
logical structure of the reviewer graph. GGSpam [Wang et
al., 2018b] directly generates spammer groups consisting of
group members, target products, and spam reviews.
We propose DeFrauder that leverages temporal pattern,
content similarity and underlying graph structure to detect
collusive fraud groups in review forums (see Table 1 for a
comparison). Unlike others, DeFrauder contributes equally
to both the components -- group detection and ranking.
GSBP GGSpam GSRank DeFrauder
Temporal
Content
Graph
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
Table 1: DeFrauder captures all three signals obtained from users
attributes and underlying graph structure.
3 Proposed DeFrauder Framework
In this section, we explain DeFrauder which is a three-
stage algorithm -- detecting candidate fraud groups, measur-
ing different fraud indicators of candidate groups, and rank-
ing groups based on the group spam score.
3.1 Group Fraud Indicators
Here we present six fraud indicators which measure the spam-
icity of a group [Mukherjee et al., 2012; Wang et al., 2018b,
2016] by taking into account linguistic, behavioral, structural
and temporal signals. All indicators are normalized to [0, 1] --
larger value indicates more spamming activity. Let R and P
be the entire set of reviewers and products. Let R(g) be the
set of reviewers in a group g, and P (g) be the set of target
products reviewed by the reviewers in R(g). Each reviewer i
reviewed a set of products Pi.
To reduce the contingency of small groups, we use a
penalty function L(g) which is a logistic function Wang et
al. [2016]: L(g) = 1/(1 + e-(R(g)+P (g)-3)). We subtract 3
from the sum since we consider minimum number of review-
ers and products within a group to be 2 and 1, respectively;
therefore L(g) ∈ [0.5, 1) Wang et al. [2018a].
Review tightness(RT).
It is the ratio of the number of re-
views in g (assuming each reviewer is allowed to write one
review to each product) to the product of the size of reviewer
set and product set in g.
RT (g) =
(1)
If significant proportion of people co-reviewed several prod-
ucts, then it may imply a spam group activity.
(cid:80)
i∈R(g) Pi
R(g)P (g) · L(g)
Neighbor tightness(NT).
It is defined as the average value
of the Jaccard similarity (JS) of the product sets of each re-
viewer pair.
N T (g) =
i,j∈R(g) JS(Pi, Pj)
· L(g)
(2)
(cid:80)
(cid:0)R(g)
(cid:1)
2
If the product sets are highly similar, both the reviewers are
then highly likely to be together in a collusive group.
Product tightness(PT).
It is the ratio of the number of
common products to the number of products reviewed by all
the members in g Wang et al. [2016].
i∈R(g) Pi
i∈R(g) Pi L(g)
(cid:84)
(cid:83)
P T (g) =
(3)
Group members reviewing certain number of products and
not reviewing any other products are more likely to indulge
in fraud activities.
Rating variance(RV). Group spammers tend to give sim-
ilar ratings while reviewing any product. Let S2(p, g) be
the variance of the rating scores of product p by reviewers in
g. We take the average variance for all target products. The
variance degree [0.5, 1) is converted into spam score between
(0, 1].
(cid:32)
(cid:33)
RV (g) = 2L(g)
1 −
(cid:80)
1
p∈P (g) S2(p,g)
P (g)
−
1 + e
Product reviewer ratio(RR).
It is defined as the maximum
value of the ratio of the number of reviewers in R(g) who
reviewed product p ∈ P (g) to the number of all the reviewers
of p, denoted by Rev(p):
(cid:80)
i∈R(g){1 : p ∈ Pi}
Rev(p)
RR(g) = max
p∈P (g)
If a product is mainly reviewed by the reviewers in g, then the
group is highly likely to be a spammer group.
Time window(TW). Fraudsters in a group are likely to post
fake reviews during a short-time interval. Given a group g,
and a product p ∈ Pg, we define the time-window based
spamicity as
(cid:40)
(cid:80)
T W (g, p) =
T W (g) =
1 − SDp
T ,
0,
if SDp <= T
SDp > T
pP g T W (g, p)
P (g)
· L(g),
(6)
where SDp is the standard deviation of review time for a
product p reviewed by reviewers in group g. T is a time
threshold (set to 30 days in our experiments as suggested in
Wang et al. [2018b]).
(4)
(5)
(cid:46) Set of candidate groups
(cid:46) Potential merged groups
Algorithm 1 ExtractGroups
1: Initialize:
2: CCgroups ← set()
3: G(V, E) ← Edge attributed graph
4: CSet ← {}
5: G, CCgroups ← GroupDetector(G, CCgroups)
6: Iterate:
7: G(cid:48)(V (cid:48), E(cid:48)) ← Attributed line graph of G
8: G(cid:48), CCgroups = GroupDetector(G(cid:48), CCgroups)
9: G ← G(cid:48)
10: until E > 1
11: return CCgroups
12: function GR O U PDE T E C T O R(G, CCgroups)
13:
14:
15:
16:
for each isolated node vi in G do
for each pair (ei, ej) ∈ E × E do
CCgroups.add(vi) and remove vi from G
(cid:84)
i ⊂ ae
if ae
(cid:83)
if
j then
Pm
m∈ae
j
Pm
m∈ae
j
CSet(ae
(cid:84)
(cid:83)
else
if
> 0.5 then
i ) = CSet(ae
i ) ∪ ae
j
\ae
i
\ae
i
} Pm
} Pm
m∈{ae
j
m∈{ae
j
CCgroups.add(ae
> 0.5 then
j \ ae
i )
for each ei ∈ E do
k=CSet(ae
i )
CCgroups.add(k) and remove k from G
for each connected component c with c > 2 do
for each group g ∈ CCgroups do
CCgroups.add(c) and remove c from G
if CollectiveScore(g) <= τspam then
CCgroups.remove(g)
return G, CCgroups
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
3.2 Detection of Candidate Fraud Groups
We propose a novel graph-based candidate group detection
method based on the "coherence principle".
Hypothesis 1 (Coherence Principle) Fraudsters in a group
are coherent in terms of -- (a) the products they review, (b)
ratings they give to the products, and (c) the time of reviewing
the products.
We show that each component of this hypothesis is statis-
tically significant (see Sec. 5). We incorporate these three
factors into a novel attributed product-product graph con-
struction -- G(V, E) such that each vij ∈ V indicates a
product-rating pair (pi, rj) and its attribute av
ij consists of the
set of reviewers who rated pi with rj. An edge e(ij,mn) =
(cid:104)uij, vmn(cid:105) ∈ E indicates the co-reviewing and co-rating pat-
terns of two products pi and pm with rating rj and rn, re-
spectively. The edge attribute ae
(ij,mn) indicates the set of co-
reviewers R(ij,mn) who reviewed both pi and pm and gave
same ratings rj and rn respectively within the same time τt
(defined in Sec. 3.3). Note that edge e(ij,in) connecting same
product with different ratings wont exist in G as we assume
that a reviewer is not allowed to give multiple reviews/ratings
to a single product.
We then propose ExtractGroups (pseudecode in
Algo 1, a toy example in Supplementary [Dhawan et al.]), a
novel group detection algorithm that takes G as an input and
executes a series of operations through GroupDetector()
(Line 12) -- isolated nodes are first removed (Lines 13-14),
edge attributes are then merged and removed if Jaccard sim-
ilarity (JS) of product sets that the corresponding reviewers
reviewed is greater than a threshold (set as 0.5). Any group
of reviewers eliminated due to the consideration of only com-
mon reviewers during the creation of edges is also checked
through JS in order to avoid loosing any potential candidate
groups (Lines 15-24). Before proceeding to the next iteration,
connected components containing more than two nodes are
removed (Lines 25-26). We define CollectiveScore as the
average of six group level indicators defined in Sec. 3.1, and
consider those as potential groups whose CollectiveScore
exceeds τspam (Lines 27-29, defined in Sec. 5.2).
(ij,mn) ∩ ae
It then converts the remaining structure of G into an at-
tributed line graph (edges converted into vertices and vice
(ij,mn) ∈ V (cid:48) corresponds to
versa) G(cid:48)(V (cid:48), E(cid:48)) as follows: v(cid:48)
(ij,mn); an edge e(cid:48)
e(ij,mn) in G and av(cid:48)
(ij,mn) = ae
(ij,mn,ab) =
(ij,ab)(cid:105) represents co-reviewing and co-rating pat-
(cid:104)v(cid:48)
(ij,mn), v(cid:48)
terns of products pi, pm and pa; the corresponding edge at-
(ij,ab). G(cid:48) is again fed
tribute is a(ij,mn,ab) = ae
into GroupDetector in the next iteration. Essentially, in
each iteration, we keep clubbing reviewers together, who ex-
hibit coherent reviewing patterns. The iteration continues un-
til none of the edges remain in the resultant graph, and a set
of candidate fraud groups are returned.
The worst case time complexity of ExtractGroups is
O(kE2), where k is the number of iterations, and E is the
number of edges in G (see Supplementary [Dhawan et al.]
for more details).
Theorem 3.1 (Theorem of convergence)
ExtractGroups will converge within a finite number of
iterations.
See Supplementary [Dhawan et al.] for the proof.
3.3 Ranking of Candidate Fraud Groups
Once candidate fraud groups are detected, DeFrauder ranks
these groups based on their spamicity. It involves two steps --
mapping reviewers into an embedding space based on their
co-reviewing patterns, and ranking groups based on how
close the constituent reviewers are in the embedding space.
Reviewer2Vec: Embedding Reviewers
Our proposed embedding method, Reviewer2Vec is moti-
vated by [Wang et al., 2018b]. Given two reviewers i and j
co-reviewing a product p ∈ P by writing reviews ci
p and cj
p
with the rating ri
p respectively, we
define the collusive spamicity of i, j w.r.t. p as:
j > τt ∨ rp
p at time ti
j ≥ τr
p and rj
p and tj
i − rp
(cid:40)
0,
ζ(i, j, p),
tp
i − tp
otherwise
Coll(i, j, p) =
(7)
where,
(cid:34)
(cid:32)
ζ(i, j, p) =sp
α
1 − ti
p − tj
p
τt
(cid:33)
(cid:35)
(cid:32)
1 − ri
p − rj
p
τr
(cid:33)
+ β
+ γ.Cosine(ci
p, cj
p)
2
1+e
−(max
q∈P
Where sp =
Rev(q)−Rev(p))θ +2θ −1. Coefficients α, β
and γ control the importance of time, rating and the similarity
of review content, respectively (0 ≤ α, β, γ ≤ 1 and α + β +
γ = 1). We set γ > α, β as same review content signifies
more collusion as compared to the coherence in ratings and
time [Wang et al., 2018b].
sp is the degree of suspicion of product p. τt, τr and θ are
the parameters of the model. If the posting time difference
among reviewers i and j on p is beyond τt or their rating on
p deviates beyond τr (where τr = (max− min)x%, where
max and min are the maximum and minimum ratings that a
product can achieve respectively), we do not consider this co-
reviewing pattern. ExtractGroups achieves best results
with τt = 20 and τr = (max− min)20% (see Sec. 5.3).
ζ(i, j, p) is the collusiveness between two reviewers w.r.t.
product p they co-reviewed; however there might be other
reviewers who reviewed p as well. Lesser the number of re-
viewers of p, more is the probability that i and j colluded.
This factor is handled by sp after passing it through a sigmoid
function. θ is a normalizing factor which ranges between
[0, 1] (set as 0.4 [Wang et al., 2018b]). We take the cosine
similarly of two reviews ci
p after mapping them into
embedding space using Word2Vec [Mikolov et al., 2013].
p and cj
Combining the collusive spamicity of a pair of reviewers
across all the products they co-reviewed, we obtain the overall
collusive spamicity between two reviewers:
Φ(i, j) =
where σ(i, j) =
2
(cid:34) (cid:88)
1 + e−σ(i,j) − 1
p∈{Pi∩Pj}
Coll(i, j, p)
(cid:35)Pi ∩ Pj
Pi ∪ Pj
We then create a reviewer-reviewer spammer graph [Wang
et al., 2018b] which is a bi-connected and weighted graph
Gs = (Vs, Es), where Vs corresponds to the set of reviewers
ij ∈
R, and two reviewers i and j are connected by an edge es
Es with the weight W s
ij = Φ(i, j). Once Gs is created, we
use state-of-the-art node embedding method to generate node
(reviewer) embeddings (see Sec. 5.3).
Ranking Groups
For each detected group, we calculate the density of the group
based on (Euclidean) distance of each reviewer in the group
with the group's centroid in the embedding space. An aver-
age of all distances is taken as a measure of spamicity of the
group. Let (cid:126)i be the vector representation of reviewer i in the
embedding space. The group spam score Spam(g) of group
g is measured as:
Spam(g) =
1
R(g)
1
R(g)
(8)
(cid:34)
(cid:126)i −(cid:2)
(cid:88)
i∈R(g)
(cid:126)i(cid:3)(cid:35)2
(cid:88)
i∈R(g)
Dataset
YelpNYC
YelpZIP
Amazon
Playstore
# Reviews
359052
608598
10261
325424
# Reviewers
160225
260227
1429
321436
# Products
923
5044
900
192
Table 2: Statistics of four datasets.
aggregation of
4 Datasets
We collected four real-world datasets -- YelpNYC: ho-
tel/restaurant reviews of New York city Rayana and Akoglu
[2015]; YelpZip:
reviews on restau-
rants/hotels from a number of areas with continuous zip codes
starting from New York city Rayana and Akoglu [2015];
Amazon: reviews on musical instruments He and McAuley
[2016], and Playstore:
reviews of different applications
available on Google Playstore. Fake reviews and spammers
are already marked in both the Yelp datasets Rayana and
Akoglu [2015]. For the remaining datasets, we employed
three human experts2 to label spammers based on the in-
structions mentioned in Shojaee et al. [2015]; Mukherjee et
al. [2013a]3. The inter-rater agreement was 0.81 and 0.79
(Fleiss' multi-rater kappa) for Amazon and Playstore, respec-
tively. Table 2 shows the statistics of the datasets.
5 Experimental Results
Statistical validation. To measure the statistical signifi-
cance of each component (say, products reviewed by the
group members) of Hypothesis 1 (Sec. 3.2), we randomly
generate pairs of reviewers (irrespective of the groups they
belong to) and measure how their co-reviewing patterns (cu-
mulative distribution) are different from the case if a pair of
reviewers co-occur together in the same group. We hypoth-
esize that both these patterns are different (whereas null hy-
pothesis rejects our hypothesis). We observe that the differ-
ence is statistically significant as p < 0.01 (Kolmogorov-
Smirnov test). See Supplementary Dhawan et al. for more
discussion. We then perform evaluation in two stages -- qual-
ity of the detected groups, and quality of the ranking algo-
rithms.
5.1 Baseline Methods
We consider three existing methods (see Sec. 2 for their
details) as baselines for both the evaluations -- (i) GSBP
Wang et al. [2016],(ii) GGSpam Wang et al. [2018b],and (iii)
GSRank Mukherjee et al. [2012].
5.2 Evaluating Candidate Groups
Along with the three baselines mentioned above, we also
consider two variations of DeFrauder as baselines for group
detection: DeFrauderR constructs the attributed product-
product graph G based only on co-rating without consider-
ing the time of reviewing; and DeFrauderT constructs G
2They were social media experts, and their age ranged between
25-35.
3https://www.marketwatch.com/story/
Figure 2: CDF of (a) GS and (b) RCS for YelpNYC. The more the
distance of a CDF (corresponding to a method) from y-axis, the bet-
ter the performance of the method.
1
p, cj
1
R(g)2
based only on same co-reviewing time without considering
co-rating. This also helps in justifying why both time and
rating are important in constructing G for group detection.
Mukherjee et al. [2012] suggested to use cumulative distribu-
tion (CDF) of group size (GS) and review content similarity
(RCS) to evaluate the quality of the spam groups. Here we
discard groups with size less than 2. Group Size (GS) favors
large fraud groups as large groups are more damaging than
1+e-(R(g)−2) . Review Content Sim-
smaller ones: GS(g) =
ilarity (RCS) captures inter-reviewer review content similar-
ity (as spammers copy reviews of each other): RCS(g) =
maxp∈P (g){
(i,j)∈R(g)×R(g) cosine(ci
(cid:80)
p)}.
The larger the deviation of each distribution from the
vertical axis (measured in terms of Earth Mover's Dis-
tance (EMD)), the better the quality of the detected method
Mukherjee et al. [2012].
Comparison. We choose the following parameter values as
default based on our parameter selection strategy (Fig. 4): τt:
20 days, τspam = 0.4. The number of groups we obtain from
different datasets is reported in Table 3. Fig. 2 shows the
CDF of GS and RCS for all the competing methods on Yelp-
NYC4, which is further summarized quantitatively (in terms
of EMD) in Table 3. DeFrauder outperforms the best baseline
by 11.35% and 4.67% higher relative EMD (averaged over
four datasets) for GS and RCS, respectively. We also notice
that DeFrauderT performs better than DeFrauderR, indicating
that temporal coherence is more important than rating coher-
ence in detecting potential groups.
5.3 Evaluating Ranking Algorithm
We use NDCG@k, a standard graded evaluation met-
ric.
Since each reviewer was labeled as fraud/genuine,
we consider the graded relevance value (ground-truth rele-
vance score used in Normalized Discounted Cumulative Gain
(NDCG) Manning et al. [2010]) for each group as the fraction
of reviewers in a group, who are marked as fraud. The candi-
date groups are then ranked by each competing method, and
top k groups are judged based on NDCG.
Comparison. We choose the following parameter values as
default based on our parameter selection strategy (Fig. 4):
10-secrets-to-uncovering-which-online-reviews-are-fake-2018-09-21
4Results are similar on the other datasets, and thus omitted.
Method
GGSpam
GSBP
GSRank
DeFrauderR
DeFrauderT
DeFrauder
G
1218
809
998
4399
152
1118
ND
0.567
0.521
0.569
YelpNYC
G
GS RCS
1167
0.218
807
0.173
0.313
1223
0.021 -- 6815
0.069 -- 3666
0.348
4574
0.574
0.562
0.102
0.124
0.237
0.731
0.603
YelpZIP
ND
GS RCS
0.563
0.219
0.520
0.265
0.706
0.054
0.031 --
0.271 --
0.287
0.629
0.478
0.132
0.139
0.648
0.667
0.602
G
144
115
2922
197
807
713
ND
0.230
0.689
0.144
Amazon
GS RCS
0.250
0.260
0.309
0.290 --
0.207 --
0.314
0.768
0.131
0.416
0.293
0.234
0.698
0.718
G
1213
250
994
385
200
940
ND
0.464
0.474
0.476
Playstore
GS RCS
0.010
0.016
0.018
0.005 --
0.007 --
0.018
0.789
0.749
0.744
0.577
0.372
0.458
0.841
Table 3: Performance of the competing methods: GGSpam Wang et al. [2018b], GSBP Wang et al. [2016], GSRank Mukherjee et al. [2012],
DeFrauderR, DeFrauderT, and DeFrauder. Number of groups detected (G) are mentioned after removing groups of size less than 2 (cyan
regions). Accuracy for the group detection (white regions) and ranking (gray regions) is reported in terms of EMD (the higher, the better),
and NDCG@50 (ND) respectively. DeFrauderR and DeFrauderT are used only for group detection. The ranking methods of all baselines are
run on the groups detection by DeFrauder.
Figure 3: Performance on YelpNYC. Baselines are run with their de-
tected groups as well as with the groups (+D) detected by DeFrauder
(same naming convention as in Table 3).
α = β = 0.3, γ = 0.4, τt = 20 days, τr = (max− min)20%
τspam = 0.4. We use Node2Vec Grover and Leskovec [2016]
for embedding5. Fig. 3 shows the performance of the compet-
ing methods for different values of k (top k groups returned
by each method). Since DeFrauder produces better groups
(Sec. 5.2), we also check how the ranking method of each
baseline performs on the groups detected of DeFrauder. Fig.
3 shows that with DeFrauder's group structure, GGSpam and
GSBP show better performance than DeFrauder till k = 40;
after that DeFrauder dominates others. However, all the base-
lines perform poor with their own detected groups. This result
also indicates the efficiency of our group detection method.
Table 3 reports that DeFrauder beats other methods across all
the datasets except YelpZIP on which GSRank performs bet-
ter with DeFrauder's detected groups. Interestingly, no single
baseline turns out to be the best baseline across datasets. Nev-
ertheless, DeFrauder outperforms the best baseline (varies
across datasets) by 17.11% higher relative NDCG@50 (av-
eraged over all the datasets).
5We tried with DeepWalk Perozzi et al. [2014] and LINE Tang
et al. [2015] and obtained worse results compared to Node2Vec.
Figure 4: Parameter selection on YelpNYC. We vary each parameter
keeping others as default. Since τt = 20 produces best results for
group detection, we kept this value for ranking as well.
6 Conclusion
In this paper, we studied the problem of fraud reviewer group
detection in customer reviews. We established the principle
of coherence among fraud reviewers in a group in terms of
their co-reviewing patterns. This paper contributed in four
directions: Datasets: We collected and annotated two new
datasets which would be useful to the cybersecurity commu-
nity; Characterization: We explored several group-level be-
havioral traits to model inter-personal collusive dynamics in a
group; Method: We proposed DeFrauder, a novel method to
detect and rank fraud reviewer groups; Evaluation: Exhaus-
tive experiments were performed on four datasets to show the
superiority of DeFrauder compared to five baselines.
Acknowledgements
The work was partially funded by Google Pvt. Ltd., DST
(ECR/2017/00l691) and Ramanujan Fellowship. The authors
also acknowledge the support of the Infosys Centre of AI,
IIIT-Delhi, India.
Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Na-
talie Glance. What yelp fake review filter might be doing?
In ICWSM, pages 1 -- 12, 2013.
Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T Hancock.
Finding deceptive opinion spam by any stretch of the imag-
ination. In ACL-HLT, pages 309 -- 319, 2011.
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk:
In SIGKDD,
Online learning of social representations.
pages 701 -- 710, 2014.
Shebuti Rayana and Leman Akoglu. Collective opinion spam
detection: Bridging review networks and metadata.
In
SIGKDD, pages 985 -- -994, Sydney, NSW, Australia, Au-
gust 2015.
Somayeh Shojaee, Azreen Azman, Masrah Murad, Nur-
fadhlina Sharef, and Nasir Sulaiman. A framework for
fake review annotation. In UKSIM-AMSS, pages 153 -- 158,
2015.
Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan,
and Qiaozhu Mei. Line: Large-scale information network
embedding. In WWW, pages 1067 -- 1077, 2015.
Guan Wang, Sihong Xie, Bing Liu, and S Yu Philip. Re-
view graph based online store review spammer detection.
In ICDM, pages 1242 -- 1247. IEEE, 2011.
Guan Wang, Sihong Xie, Bing Liu, and Philip S Yu. Iden-
tify online store review spammers via social review graph.
ACM TIST, 3(4):61:1 -- 61:21, 2012.
Zhuo Wang, Tingting Hou, Dawei Song, Zhun Li, and Tianqi
Kong. Detecting review spammer groups via bipartite
graph projection. The Computer Journal, 59(6):861 -- 874,
2016.
Zhuo Wang, Songmin Gu, and Xiaowei Xu. Gslda: Lda-
based group spamming detection in product reviews. Ap-
plied Intelligence, 48(9):3094 -- 3107, 2018.
Zhuo Wang, Songmin Gu, Xiangnan Zhao, and Xiaowei
Xu. Graph-based review spammer group detection. KIAS,
55(3):571 -- 597, Jun 2018.
Chang Xu and Jie Zhang. Towards collusive fraud detection
in online reviews. In ICDM, pages 1051 -- 1056, 2015.
Chang Xu, Jie Zhang, Kuiyu Chang, and Chong Long. Un-
covering collusive spammers in chinese review websites.
In CIKM, pages 979 -- 988, 2013.
References
Leman Akoglu, Rishi Chandy, and Christos Faloutsos. Opin-
ion fraud detection in online reviews by network effects. In
ICWSM, pages 985 -- -994, 2013.
Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem
Benatallah, Elisa Bertino, Norman Foo, et al. Collusion
In Asia-Pacific Web
detection in online rating systems.
Conference, pages 196 -- 207. Springer, 2013.
Aditya Chetan, Brihi Joshi, Hridoy Sankar Dutta, and Tan-
moy Chakraborty. Corerank: Ranking to detect users in-
volved in blackmarket-based collusive retweeting activi-
ties. In WSDM, pages 330 -- 338, 2019.
Sarthika Dhawan, Siva Charan Reddy Gangireddy, Shiv Ku-
mar, and Tanmoy Chakraborty. Defrauder: Supplementary.
https://github.com/LCS2-IIITD/DeFrauder, 2019.
Hridoy Sankar Dutta, Aditya Chetan, Brihi Joshi, and Tan-
moy Chakraborty. Retweet us, we will retweet you: Spot-
ting collusive retweeters involved in blackmarket services.
In ASONAM, pages 242 -- 249, 2018.
Geli Fei, Arjun Mukherjee, Bing Liu, Meichun Hsu, Malu
Castellanos, and Riddhiman Ghosh. Exploiting burstiness
in reviews for review spammer detection. In ICWSM, 2013.
Aditya Grover and Jure Leskovec. Node2vec: Scalable fea-
ture learning for networks. In SIGKDD, pages 855 -- 864,
2016.
Ruining He and Julian McAuley. Ups and downs: Modeling
the visual evolution of fashion trends with one-class col-
laborative filtering. In WWW, pages 507 -- 517, 2016.
Catey Hill. 10 secrets to uncovering which online reviews are
https://www.marketwatch.com/story/10-secrets-to-
fake.
uncovering-which-online-reviews-are-fake-2018-09-21,
2018.
Yufeng Kou, Chang-Tien Lu, Sirirat Sirwongwattana, and
Yo-Ping Huang. Survey of fraud detection techniques. In
ICNSC, pages 749 -- 754, 2004.
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Liu, and
Hady Wirawan Lauw. Detecting product review spammers
using rating behaviors. In CIKM, pages 939 -- 948. ACM,
2010.
Christopher Manning, Prabhakar Raghavan, and Hinrich
Introduction to information retrieval. Natural
Schutze.
Language Engineering, 16(1):100 -- 103, 2010.
Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and
Jeffrey Dean. Distributed representations of words and
phrases and their compositionality. In NIPS, pages 3111 --
3119, 2013.
Arjun Mukherjee, Bing Liu, and Natalie Glance. Spotting
fake reviewer groups in consumer reviews. In WWW, pages
191 -- -200, New York, April 2012.
Arjun Mukherjee, Abhinav Kumar, Junhui Liu, Bing Wang,
Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh.
Spotting opinion spammers using behavioral footprints. In
SIGKDD, Chicago,USA, August 2013.
|
1712.04823 | 2 | 1712 | 2019-05-16T08:14:17 | Krylov Subspace Approximation for Local Community Detection in Large Networks | [
"cs.SI"
] | Community detection is an important information mining task to uncover modular structures in large networks. For increasingly common large network data sets, global community detection is prohibitively expensive, and attention has shifted to methods that mine local communities, i.e. identifying all latent members of a particular community from a few labeled seed members. To address such semi-supervised mining task, we systematically develop a local spectral subspace-based community detection method, called LOSP. We define a family of local spectral subspaces based on Krylov subspaces, and seek a sparse indicator for the target community via an $\ell_1$ norm minimization over the Krylov subspace. Variants of LOSP depend on type of random walks with different diffusion speeds, type of random walks, dimension of the local spectral subspace and step of diffusions. The effectiveness of the proposed LOSP approach is theoretically analyzed based on Rayleigh quotients, and it is experimentally verified on a wide variety of real-world networks across social, production and biological domains, as well as on an extensive set of synthetic LFR benchmark datasets. | cs.SI | cs |
Krylov Subspace Approximation for Local Community
Detection in Large Networks
KUN HE, Huazhong University of Science and Technology, China
PAN SHI, Huazhong University of Science and Technology, China
DAVID BINDEL, Cornell University, USA
JOHN E. HOPCROFT, Cornell University, USA
Community detection is an important information mining task to uncover modular structures in large networks.
For increasingly common large network data sets, global community detection is prohibitively expensive, and
attention has shifted to methods that mine local communities, i.e. identifying all latent members of a particular
community from a few labeled seed members. To address such semi-supervised mining task, we systematically
develop a local spectral subspace-based community detection method, called LOSP. We define a family of
local spectral subspaces based on Krylov subspaces, and seek a sparse indicator for the target community
via an ℓ1 norm minimization over the Krylov subspace. Variants of LOSP depend on type of random walks
with different diffusion speeds, type of random walks, dimension of the local spectral subspace and step of
diffusions. The effectiveness of the proposed LOSP approach is theoretically analyzed based on Rayleigh
quotients, and it is experimentally verified on a wide variety of real-world networks across social, production
and biological domains, as well as on an extensive set of synthetic LFR benchmark datasets.
CCS Concepts: • Computing methodologies → Spectral methods; • Information systems → Cluster-
ing and classification; Social networks; Web searching and information discovery;
Additional Key Words and Phrases: Local community detection, spectral clustering, Krylov subspace, Rayleigh
quotient, sparse linear coding
ACM Reference Format:
Kun He, Pan Shi, David Bindel, and John E. Hopcroft. 2019. Krylov Subspace Approximation for Local
Community Detection in Large Networks. 1, 1 (May 2019), 30 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn
1 INTRODUCTION
Community detection has arisen as one of the significant topics in network analysis and graph
mining. Many problems in information science, social science, biology and physics can be formulated
as problems of community detection. With the rapid growth of the network scale, however, exploring
the global community structure [3, 39] becomes prohibitively expensive in such networks with
millions or billions of nodes. While most of the time people are just interested in the local structure
of the graph neighborhood. Hence, attention has shifted to methods that mine local community
structure without processing the whole large network [23, 25, 28, 42, 50, 52].
Authors' addresses: Kun He, Huazhong University of Science and Technology, Wuhan, China, 430074, brooklet60@hust.
edu.cn,[email protected]; Pan Shi, Huazhong University of Science and Technology, Wuhan, China, 430074, panshi@
hust.edu.cn; David Bindel, Cornell University, Ithaca, NY, USA, 14853, [email protected]; John E. Hopcroft, Cornell
University, Ithaca, NY, USA, 14853, [email protected].
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the
full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from [email protected].
© 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM.
XXXX-XXXX/2019/5-ART $15.00
https://doi.org/10.1145/nnnnnnn.nnnnnnn
, Vol. 1, No. 1, Article . Publication date: May 2019.
:2
K. He et al.
In many situations, instead of finding all communities in a large network in an unsupervised
manner, we just want to quickly find communities from a small set of members labeled by a domain
expert. For example, in political participation networks, one might discover the membership of
a political group from a few representative politicians [47]; sales websites might use clusters in
co-purchase networks to generate product recommendations for a customer based on previous
purchases; and starting from a few well-studied genes, biologists may seek functionally similar
genes via genetic interaction networks.
Communities in real-world networks are often small, comprising dozens or hundreds of mem-
bers [20, 32]. Intuitively, the latent members in these small communities should be very close to any
seed members chosen from the target communities. The seed set expansion approach to community
detection [31, 39, 48] starts from "seed" nodes, or labeled members of a target community [27, 28, 52],
and incrementally grows the set by locally optimizing a community scoring function.
A common theme in seed set expansion methods is to diffuse probability from the seeds. PageR-
ank [5, 28], heat kernel [16, 27] and local spectral approximation [24, 33, 34] are three main
techniques for the probability diffusion. Among these, the local spectral method is a newly pro-
posed technique that exhibits high performance for the local community detection task. Motivated
by standard spectral clustering methods that find disjoint global communities from the leading
eigenvectors of the graph Laplacian, local spectral algorithms can handle local communities by
seeking a sparse indicator vector that contains the seeds and lies in a local spectral subspace rather
than in the global eigenspace. Moreover, starting from different seed sets, local spectral algorithms
can uncover overlapping communities.
In this paper, we propose a local spectral (LOSP) algorithm to identify the members of small
communities [24], and systematically build the LOSP family based on various Krylov subspace
approximation. Theoretical analysis and empirical analysis are provided to show the soundness
and effectiveness of the proposed approach. LOSP differs from standard spectral clustering in two
ways:
• Handling overlapping communities. Standard spectral methods partition a graph into
disjoint communities by k-means clustering in a coordinate system defined by eigenvectors
or by recursive spectral bisection. We instead use ℓ1-norm optimization to search an (ap-
proximate) invariant subspace for an indicator vector for a sparse set containing the seeds.
Overlapping communities correspond to different seed sets.
• Defining a local spectral subspace. To determine the local structure around the seeds of
interest, we calculate a local approximate invariant subspace via a Krylov subspace associated
with short random walks.
Starting from a few random seeds, we sample locally in the graph to get a comparatively small
subgraph containing most of the latent members, so that the follow-up membership identification
can focus on a local subgraph instead of the whole network. The LOSP methods are then used
to extract the local community from the sampled subgraph via a Krylov subspace formed by
short-random-walk diffusion vectors.
Our main contributions include:
• Sampling to reduce the complexity. We sample locally in the graph as a pre-processing
to get a much smaller subgraph containing most of the latent members around the seeds. The
follow-up calculation has a low complexity while maintaining an accurate covering on the
target community. In this way, the proposed method is applicable to large-scale networks.
• Building a rich LOSP family. We systematically develop a family of local spectral methods
based on random walk diffusion. We thoroughly investigate a rich set of diffusion methods;
and we find that light lazy random walk, lazy random walk and personalized PageRank are
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:3
robust for different parameters, and outperform the standard random walk diffusions. In
general, light lazy random walk performs slightly better. We also study the regular random
walk diffusions spreading out from the seeds and the inverse random walk diffusions ending
around the seeds.
• Extensive demonstration of LOSP. We provide a diverse set of computational experiments
on 28 synthetic benchmark graphs and eight real-world social and biological networks to show
that the proposed methods are much more accurate than previous local spectral approach
LEMON [34], projected gradient descent algorithm PGDc-d [45], the well-known personalized
PageRank diffusion algorithm pprpush [5] and heat kernel algorithm hk-relax [27].
This work is a significant extension and improvement based on our initial LOSP method [24]. By
removing some costly seed-strengthen preprocessing and iterative post-processing of the initial
LOSP [24], the current LOSP costs only one third of the running time of the initial LOSP after the
sampling. We also improve the key component of LOSP based on the Krylov subspace, and extend
it to an integrated LOSP family.
2 RELATED WORK
Communities are densely intra-linked components with sparser inter-connections, typically defined
by means of metrics like modularity [37] or conductance [41]. There are many different research
directions as well as approaches for the community detection [7, 18, 22, 40, 51]. Early works
focused on global structure mining [3, 17, 39] while an increasing body of recent work focuses on
local structure mining [28, 35, 45]. We will focus on seed set expansion methods that uncover a
local community from a few seed members; these were initially designed for global community
detection, but have since been extensively used in local community mining. We could regard global
community detection as an unsupervised method for finding global community structure, and
regard local community detection as a semi-supervised approach for mining local community
structure supervised by the seed set in the target community we want to find.
2.1 Global Community Detection
Global community detection is an important topic in data mining. Global community detection
methods include modularity optimization [9, 11, 36], stochastic block models [1], nonnegative
matrix factorization [53, 55], spectral methods [38, 46], global seed set expansion [39, 43, 49], and
many other techniques [12, 21]. In this subsection, we highlight a few lines of works in the literature
that are related to our method.
Spectral-based method. Spectral method is a main technique for global community detection.
Von Luxburg [46] introduces the most common spectral clustering algorithms based on different
graph Laplacians, and discusses the advantages and disadvantages of different spectral clustering
algorithms in details. Using spectral algorithms, Newman studies the three related problems of
detection by modularity maximization, statistical inference or normalized-cut graph partitioning,
and finds that with certain choices of the free parameters in the spectral algorithms the three
problems are identical [38]. As the classic spectral clustering method could only find disjoint
communities, Zhang et al. [54] propose a new algorithm to identify overlapping communities in
small networks by combining a generalized modularity function, an approximated spectral mapping
of network nodes into Euclidean space and fuzzy c−means clustering. Ali and Couillet [4] propose
a spectral algorithm based on the family of "α-normalized" adjacency matrices A, which is in the
type of D−α AD−α with D the degree matrix, to find community structure in large heterogeneous
networks.
, Vol. 1, No. 1, Article . Publication date: May 2019.
:4
K. He et al.
Global seed set expansion. Many global community detection algorithms are based on seed
set expansion. Clique Percolation [39], the most classic method, starts from maximal k−cliques and
merges cliques sharing k − 1 nodes to form a percolation chain. OSLOM [31], starts with each node
as the initial seed and optimizes a fitness function, defined as the probability of finding the cluster
in a random null model, to join together small clusters into statistically significant larger clusters.
Seed Set Expansion (SSE) [48, 49] identifies overlapping communities by expanding different types
of seeds by a personalized PageRank diffusion. DEMON [17] and another independent work in [43]
identify very small, tightly connected sub-communities, create a new network in which each node
represents such a sub-community, and then identify communities in this meta-network. Belfin
et al. [8] propose a strategy for locating suitable superior seed set by applying various centrality
measures in order to find overlapping communities.
2.2 Local Community Detection
Local seed set expansion. Random walks have been extensively adopted as a subroutine for
locally expanding the seed set [6], and this approach is observed to produce communities correlated
highly to the ground-truth communities in real-world networks [2]. PageRank, heat kernel and
local spectral diffusions are three main techniques for probability diffusion.
Spielman and Teng use the degree-normalized personalized [44] PageRank (DN PageRank)
with truncation of small values to expand a starting seed. DN PageRank has been used in several
subsequent PageRank-based clustering algorithms [6, 52], including the popular PageRank Nibble
method [5]. However, a study evaluating different variations of PageRank finds that standard
PageRank yields better performance than DN PageRank [28].
The heat kernel method provides another local graph diffusion. Based on a continuous-time
Markov chain, the heat kernel diffusion involves the exponential of a generator matrix, which may
be approximated via a series of expansion. Chung et al. have proposed a local graph partitioning
based on the heat kernel diffusion [14, 15], and a Monte Carlo algorithm to estimate the heat kernel
process [16]. Another approach is described in [27], where the authors estimate the heat kernel
diffusion via coordinate relaxation on an implicit linear system; their approach uncovers smaller
communities with substantially higher F1 measures than those found through the personalized
PageRank diffusion.
Spectral methods are often used to extract disjoint communities from a few leading eigenvectors
of a graph Laplacian [26, 46]. Recently, there has been a growing interest in adapting the spectral
approach to mine the local structure around the seed set. Mahoney, Orecchia, and Vishnoi [35]
introduce a locally-biased analogue of the second eigenvector for extracting local properties of data
graphs near an input seed set by finding a sparse cut, and apply the method to semi-supervised image
segmentation and local community extraction. In [24, 33, 34], the authors introduce an algorithm to
extract the local community by seeking a sparse vector from the local spectral subspaces using ℓ1
norm optimization. They apply a power method for the subspace iteration using a standard random
walk on a modified graph with a self loop on each node, which we call the light lazy random walk.
They also apply a reseeding iteration to improve the detection accuracy.
Bounding the local community. All seed set expansion methods need a stopping criterion,
unless the size of the target community is known in advance. Conductance is commonly recognized
as the best stopping criterion [27, 48, 49, 52]. Yang and Leskovec [52] provide widely-used real-
world datasets with labeled ground truth, and find that conductance and triad-partition-ratio (TPR)
are the two stopping rules yielding the highest detection accuracy. He et al. [24] propose two new
metrics, TPN and nMod, and compare them with conductance, modularity and TPR; and they show
that conductance and TPN consistently outperform other metrics. Laarhoven and Marchiori [45]
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:5
study a continuous relaxation of conductance by investigating the relation of conductance with
weighted kernel k-means.
Local seeding strategies. The seeding strategy is a key part of seed set expansion algorithms.
Kloumann and Kleinberg [28] argue that random seeds are superior to high degree seeds, and
suggest domain experts provide seeds with a diverse degree distribution. Our initial LOSP paper [24]
compares low degree, random, high triangle participation (number of triangles inside the community
containing the seed) and low escape seeds (judged by probability retained on the seeds after short
random walks), and find all four types of seeds yield almost the same accuracy. Our initial LOSP
work shows that low degree seeds spread out the probabilities slowly and better preserve the
local information, and random seeds are similar to low degree seeds due to the power law degree
distribution. High triangle participation seeds and low escape seeds follow another philosophy:
they choose seeds more cohesive to the target community.
3 PRELIMINARIES
3.1 Problem Formulation
The local community detection problem can be formalized as follows. We are given a connected,
undirected graph G = (V , E) with n nodes and m edges. Let A ∈ {0, 1}n×n be the associated
adjacency matrix, and D the diagonal matrix of node degrees. Let S be the seed set of a few
exemplary members in the target ground-truth community, denoted by a set of nodes T (S ⊂ T ,
T ≪ V ). And let s ∈ {0, 1}n×1 be a binary indicator vector representing the exemplary members
in S. We are asked to identify the remaining latent members in the target community T .
3.2 Datasets
We consider four groups with a total of 28 synthetic datasets, five SNAP datasets in social, product,
and collaboration domains, and three biology networks for a comprehensive evaluation on the
proposed LOSP algorithms.
3.2.1 LFR Benchmark. For synthetic datasets, we use the LFR standard benchmark networks
proposed by Lancichinetti et al. [29, 30]. The LFR benchmark graphs have a built-in community
structure that simulates properties of real-world networks accounting for heterogeneity of node
degrees and community sizes that follow power law distribution.
We adopt the same set of parameter settings used in [51] and generate four groups with a total of
28 LFR benchmark graphs. Table 1 summarizes the parameter settings we used, among which the
mixing parameter µ has a big impact on the network topology. Parameter µ controls the average
fraction of neighboring nodes that do not belong to any community for each node, two ranges of
typical community size, big and small, are provided by b and s. Each node belongs to either one
community or om overlapping communities, and the number of nodes in overlapping communities
is specified by on. A larger om or on indicates more overlaps that are harder for the community
detection task.
For four groups of configurations based on the community size and on, we vary om from 2
to 8 to get seven networks in each group, denoted as: LFR_s_0.1 for {s : [10, 50], on = 500},
LFR_s_0.5 for {s : [10, 50], on = 2500}, LFR_b_0.1 for {b : [20, 100], on = 500}, and LFR_b_0.5
for {b : [20, 100], on = 2500}. The average conductance for four groups of datasets are 0.522, 0.746,
0.497 and 0.733, respectively. We see more overlapping on the communities (a bigger on) leads to a
higher conductance.
, Vol. 1, No. 1, Article . Publication date: May 2019.
:6
K. He et al.
Table 1. Parameters for the LFR benchmarks.
Parameter
n = 5000
µ = 0.3
¯d = 10
dmax = 50
s : [10, 50], b : [20, 100]
τ1 = 2
τ2 = 1
om ∈ {2, 3..., 8}
on ∈ {500, 2500}
Description
number of nodes in the graph
mixing parameter
average degree of the nodes
maximum degree of the nodes
range of the community size
node degree distribution exponent
community size distribution exponent
overlapping membership
number of overlapping nodes
3.2.2 Real-world Networks. We consider five real-world network datasets with labeled ground
truth from the Stanford Network Analysis Project (SNAP)1 and three genetic networks with labeled
ground truth from the Isobase website2.
• SNAP: The five SNAP networks, Amazon, DBLP, LiveJ, YouTube, Orkut, are in the do-
mains of social, product, and collaboration [52]. For each network, we adopt the top 5000
annotated communities with the highest quality evaluated with 6 metrics [52]: Conductance,
Flake-ODF, FOMD, TPR, Modularity and CutRatio. Our algorithm adopts the popular metric
of conductance to automatically determine the community boundary. To make a fair compar-
ison, we choose four state-of-the-art baselines that also adopt conductance to determine the
community boundary.
• Biology: The three genetic networks from the Isobase website describe protein interactions.
HS describes these interactions in humans, SC in S. cerevisiae, a type of yeast, and DM
in D. melanogaster, a type of fruit fly. Such networks are interesting as communities may
correspond to different genetic functions.
Table 2 summarizes the networks and their ground truth communities. We calculate the average
and standard deviation of the community sizes, and the average conductance, where low conduc-
tance gives priority to communities with dense internal links and sparse external links. We also
define and calculate the roundness of communities.
Definition 3.1. Roundness of a subgraph. The roundness of a subgraph G′ = (V ′, E′) is the
average shortest path among all pair-wise nodes divided by the longest shortest path in the
subgraph.
3(V ′−1) ≈ 1
The roundness value R is 1 for a clique, and R = V ′+1
3 if the subgraph is a straight line.
Because large roundness value indicates a "round" subgraph and small roundness value indicates a
"long and narrow" subgraph, the roundness reveals some information on the topology structure of
the subgraph. Table 2 shows that communities in the above real-world networks have an average
roundness of about 0.67. If we normalize the roundness value from [1/3, 1] to [0,1], then we get
Rnorm = R−1/3
1−1/3 .
3.3 Evaluation Metric
For the evaluation metric, we adopt F1 score to quantify the similarity between the detected local
community C and the target ground truth community T . The F1 score for each pair of (C,T) is
1http://snap.stanford.edu
2http://groups.csail.mit.edu/cb/mna/isobase/
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:7
Table 2. Statistics for real-world networks and their ground truth communities.
Name
Amazon
Domain
Product
Collaboration DBLP
LiveJ
Social
YouTube
Social
Orkut
Social
DM
Biology
HS
Biology
Biology
SC
Network
# Nodes
334,863
317,080
3,997,962
1,134,890
3,072,441
15,294
10,153
5,523
defined by:
# Edges Avg. ± Std. Size Avg. Cond. Roundness R
925,872
1,049,866
34,681,189
2,987,624
117,185,083
485,408
54,570
82,656
13 ± 18
22 ± 201
28 ± 58
21 ± 73
216 ± 321
440 ± 2096
113 ± 412
67 ± 110
0.07
0.41
0.39
0.84
0.73
0.88
0.88
0.90
Ground truth communities
0.69
0.74
0.65
0.69
0.50
0.68
0.58
0.63
Rnorm
0.54
0.61
0.48
0.54
0.25
0.52
0.37
0.45
F1(C,T) =
2C ∩ T
C + T .
4 KRYLOV SUBSPACE CLUSTERING
It is well known that there is a close relationship between the combinatorial characteristics of
a graph and the algebraic properties of its associated matrices [13]. In this section, we present
a local community detection method of finding a linear sparse coding on the Krylov subspace,
which is a local approximation of the spectral subspace. We first present the local sampling method
starting from the seeds to reach a comparatively small subgraph Gs, and provide the theoretical
base that finding a local community containing the seeds corresponds to finding a sparse linear
coding in the invariant subspace spanned by the dominant eigenvectors of the transition matrix.
Then we propose a family of local spectral subspace definitions based on various short random
walk diffusions, and do local community detection by finding a sparse relaxed indicator vector that
lies in a local spectral subspace representing the subordinative probability of the corresponding
nodes.
4.1 Local Sampling
We first do a local sampling from the seeds for large networks to reduce the computational
complexity. According to the small world phenomenon and "six degrees of separation", most
members should be at most two or three steps far away from the seed members if we want to
identify a small community of size hundreds. Thus, we mainly use a few steps of Breadth-First
Search (BFS) to expand nodes for the sampling method. To avoid BFS to expand too fast, we adopt
a strategy to filter some very popular nodes during the BFS expansion. The detailed description for
the sampling method is as follows.
Starting from each seed, we do a one-round BFS. The BFS(·) operation achieves a set of nodes
containing the source node and its neighbor nodes by breadth-first search. For the current subgraph
expanded by the BFS, we define the inward ratio of a node as the fraction of inward edges to the
out-degree. If the sampled subgraph is no greater than the lower bound N1, then we do one more
round of BFS to contain more neighbor nodes. To avoid the next round of BFS to expand too fast, we
first filter low inward ratio frontier nodes which may contain some inactive nodes or very popular
nodes. The Filter(·) operation chooses high inward ratio nodes until the total out-degree is no less
than 3000. In the end, we union all BFS subgraphs obtained from each seed. If the amalgamated
subgraph scale is larger than the upper bound N2, we then conduct a k-step short random walk
from the seeds to remove some low probability nodes. Details of the sampling are as shown in
Algorithm 1.
, Vol. 1, No. 1, Article . Publication date: May 2019.
:8
K. He et al.
subgraph size N2, upper bound of BFS rounds t, and steps of random walks k for postprocessing
ALGORITHM 1: Sampling
Input: Graph G = (V , E), seed set S ⊆ V , lower bound of sampled size from each seed N1, upper bound of the
Output: Sampled subgraph Gs = (Vs , Es)
Vs ← S
for each si ∈ S do
Vi ← BFS(si)
V ′
i ← Vi
while (Vi < N1 and BFS rounds ≤ t) do
i ← Filter(V ′
V ′
i )
V ′
i ← BFS(V ′
i )
Vi = Vi ∪ V ′
i
end
Vs = Vs ∪ Vi
end
Gs = (Vs , Es) is the induced subgraph from Vs
if Vs > N2 then
Conduct a k-steps of random walk from S in Gs
Vs ← N2 nodes with higher probability
Gs = (Vs , Es) is the induced subgraph from Vs
end
Denote the sampled subgraph as Gs = (Vs , Es) with ns nodes and ms edges in the following
discussion. We then identify the local community from this comparatively small subgraph instead
of the original large network. The complexity is only related to the degrees of the nodes and it
is very quick in seconds for the datasets we considered. The sampling quality, evaluated by the
coverage ratio of the labeled nodes, plays a key role for the follow-up membership identification.
This pre-processing procedure significantly reduces the membership identification cost.
4.2 Spectra and Local Community
In this subsection, we provide the necessary theoretical base that finding a low-conductance
community corresponds to finding a sparse indicator vector in the span of dominant eigenvectors
of the transition matrix with larger eigenvalues.
Let L = Ds − As be the Laplacian matrix of Gs where As and Ds denote the adjacency matrix and
the diagonal degree matrix of Gs. We define two normalized graph Laplacian matrices:
Lrw = D−1
− 1
s L = I − Nrw, Lsym = D
s LD
2
− 1
s = I − Nsym,
2
− 1
− 1
−1As is the transition matrix, and Nsym = D
s AsD
2
2
s
is the
where I is the identity matrix, Nrw = Ds
normalized adjacency matrix.
For a community C, the conductance [41] of C is defined as
min{vol(C), vol(C)} ,
cut(C, C)
Φ(C) =
where C consists of all nodes outside C, cut(C, C) denotes the number of edges between C and C,
and vol(·) calculates the "edge volume", i.e. for the subset nodes, we count their total node degrees
in graph Gs. Low conductance gives priority to a community with dense internal links and sparse
external links.
Let y ∈ {0, 1}ns×1 be a binary indicator vector representing a small community C in the sampled
2vol(Vs). As yTDsy equals
graph Gs = (Vs , Es). Here for "small community", we mean vol(C) ≤ 1
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:9
the total node degrees of C, and yTAsy equals two times the number of internal edges of C, the
conductance Φ(C) could be written as a generalized Rayleigh quotient
Φ(C) =
yTLy
yTDsy
=
(D
1
2
1
2
s y)TLsym(D
s y)
s y)
(D
s y)T(D
1
2
1
2
.
Theorem 4.1. Let λ2 be the second smallest eigenvalue of Lsym, then conductance Φ(C) of a small
community C in graph Gs = (Vs , Es) ("small" means vol(C) ≤ 0.5vol(Vs)) is bounded by
λ2
2 ≤ Φ(C) ≤ 1,
where vol(C) denotes for all nodes inside C ⊆ Vs, we count the total degree in graph Gs.
Let Lsym = QΛQT be the eigendecomposition, where Q = (cid:2)q1 · · · qns
The proof omits here, and we attach the details in Appendix A.
(cid:3) is an orthonormal
matrix and Λ = diag(λ1, λ2, ..., λns), λ1 ≤ λ2 ≤ ... ≤ λns
Φ(C) =
Let xi = qT
i D
1
2
s y be the projection of D
1
2
. Then
s y)TΛ(QTD
s y)
s y) .
s y)T(QTD
(QTD
(QTD
s y on the ith eigenvector qi of Lsym, we have
1
2
1
2
1
2
1
2
ns
ns
ns
2
i
ins
where wi = x 2
i =1 x 2
eigenvalue λ1, then most of the weight on average must be on the eigenvalues close to λ1.
(1)
is the weighting coefficient of the eigenvalues. If Φ(C) is close to the smallest
wi λi ,
i =1
=
i =1 λix
2
i =1 x
i
Φ(C) =
i
Theorem 4.2. Let ϵ be a small positive real number, if Φ(C) < λ1 + ϵ, then for any positive real
number t,
□
Note that λ1 = 0 for the Laplacian matrix Lsym [46], however, Theorem 4.2 holds for any real
number λ1. Theorem 4.2 indicates for a low conductance Φ(C) close to the smallest value λ1, the
ins
smaller eigenvalues of Lsym contribute most of the weights. As wi = x 2
, if we want to find a low
i =1 x 2
i
, Vol. 1, No. 1, Article . Publication date: May 2019.
i:λi <λ1+tϵ
Φ(C) =
i:λi <λ1+tϵ
≥ λ1
i:λi <λ1+tϵ
= λ1 + tϵ
.
t
wi > 1 − 1
wi λi +
wi + (λ1 + tϵ)
j:λj ≥λ1+tϵ
j:λj ≥λ1+tϵ
wj λj
wj .
wj < λ1 + ϵ .
j:λj ≥λ1+tϵ
λ1 + tϵ
wj <
1
t
,
j:λj ≥λ1+tϵ
i:λi <λ1+tϵ
wi > 1 − 1
t
.
wj
j:λj ≥λ1+tϵ
Proof. By Eq. (1) we have
As Φ(C) < λ1 + ϵ, we get
Therefore,
1
2
1
2
i D
:10
K. He et al.
conductance Φ(C), wi and hence xi should be larger on smaller eigenvalues λi (1 ≤ i ≤ k ≪ ns). As
s y and eigenvector qi. When we relax
xi = qT
y from {0, 1}ns×1 to [0, 1]ns×1, the relaxed scaled indicator vector D
s y should be well approximated
by a linear combination of the dominant eigenvectors with smaller eigenvalues. As
s v),
s v) = λ(D
s y, a larger xi indicates a smaller angle between D
Lrwv = λv ⇔ Lsym(D
Lrwv = (I − Nrw)v = λv ⇔ Nrwv = (1 − λ)v,
where v is a nonzero vector. It shows that the relaxed indicator vector y should be well approximated
by a linear combination of the dominant eigenvectors of Lrw with smaller eigenvalues. Also,
(2)
it follows that Lrw and Nrw share the same set of eigenvectors and the corresponding eigenvalue of
Nrw is 1 − λ where λ is the eigenvalue of Lrw. Equivalently, the relaxed indicator vector y should
be well approximated by a linear combination of the eigenvectors of Nrw with larger eigenvalues.
This leads to our idea of finding a relaxed sparse indicator vector y containing the seeds in the
span of the dominant eigenvectors with larger eigenvalues of Nrw.
1
2
1
2
1
2
min ∥y∥1 = eTy
s.t. (1) y = Vu,
(2) yi ∈ [0, 1],
(3) yi ≥ 1
S , i ∈ S,
(3)
(6)
where the column vectors of V are formed by the dominant eigenvectors of Nrw with larger values
and e is the vector of all ones. u is the coefficient vector, and yi denotes the ith element of the
relaxed indicator vector y. The constraint y = Vu indicates that y lies in the eigenspace spanned by
the column vectors of V. Vector y indicates the local community with low conductance containing
the labeled seeds.
4.3 Krylov Subspace Approximation
4.3.1 Variants of Random Walk Diffusion. Instead of using the eigenvalue decomposition on
Nrw, we consider short random walks for the probability diffusion starting from the seed set to get
the "local spectral subspace". We define several variants of the spectral diffusion based on different
transition matrices for the random walks.
1) Standard Random Walk (SRW) uses the transition matrix Nrw for the probability diffusion.
(4)
2) Light Lazy Random Walk (LLRW) retains some probability at the current node for the random
(5)
0+. α = 0 degenerates to the standard random walk and α = 1, 2, 3, ... corresponds to a
walks.
where α ∈ N
random walk in the modified graph with 1, 2, 3, ... loops at each node.
Nrw = (Ds + αI)−1(αI + As),
Nrw = Ds
−1As.
3) Lazy Random Walk (LRW) is defined by
Nrw = (Ds + αDs)−1(αDs + As)
−1As,
I +
Ds
= α
1 + α
1
1 + α
where α ∈ [0, 1]. E.g. α = 0.1 corresponds to a random walk that always retains 0.1
1+0.1 probability
on the current node during the diffusion process. α = 0 degenerates to the standard random walk.
(7)
4) Personalized PageRank (PPR) is defined by
Nrw = αS + (1 − α)Ds
−1As,
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:11
where α ∈ [0, 1] and S the diagonal matrix with binary indicators for the seed set S. E.g. α = 0.1
corresponds to a random walk that always retains 10% of the probability on the seed set. α = 0 is
the standard random walk.
one step of random walk is defined as NT
density for a random walk of length k is given by a Markov chain:
4.3.2 Regular and Inverse Random Walks. Based on the above random walk diffusion definition,
rwp for a probability column vector p, and the probability
(8)
pk = NT
rwpk−1 = (NT
rw)k p0,
where p0 is the initial probability density evenly assigned on the seeds.
We can also define an "inverse random walk":
pk = Nrwpk−1 = (Nrw)k p0.
(9)
Here pk indicates a probabilty density such that the probability concentrates to the seed set as p0
after k steps of short random walks. The value of pk also shows a snapshot of the probability distri-
bution for the local community around the seed set, and follow-up experiments also demonstrates
the effectiveness of the "inverse random walk", which has a slightly lower accuracy as compared
with the "regular random walk".
4.3.3 Local Spectral Subspace. Then we define a local spectral subspace as a proxy of the
invariant subspace spanned by the leading eigenvectors of Nrw. The local spectral subspace is
defined on an order-d Krylov matrix and k is the number of diffusion steps:
(10)
Here k and d are both some modest numbers. Then the Krylov subspace spanned by the column
(k)
vectors of V
d
to the local spectral subspace V(k)
In the following discussion, we provide some theoretical analysis to relate the spectral property
is called the local spectral subspace, denoted by V(k)
= [pk , pk +1, ..., pk +d−1].
(k)
V
d
d
.
.
d
Lemma 4.3. Let Gs = (Vs , Es) be a connected and non-bipartite graph with ns nodes and ms
edges, Nrw (defined by Eq. (4)) the transition matrix of Gs with eigenvalues σ1 ≥ σ2 ≥ ... ≥ σns ,
and the corresponding normalized eigenvectors are u1, u2, . . . , uns . Then u1, u2, . . . , uns are linearly
independent, and
1 = σ1 > σ2 ≥ ... ≥ σns > −1, u1 = e
∥e∥2
,
where e is a vector of all ones.
the corresponding eigenvalues of Lrw are λ1 ≤ λ2 ≤ ... ≤ λns
λ2 ≤ ... ≤ λns
Proof. By Eq. (2), we know that Lrw and Nrw share the same eigenvectors u1, u2, . . . , uns
and
where λi = 1 − σi (1 ≤ i ≤ ns).
According to Proposition 3 of [46], Lsym and Lrw share the ns non-negative eigenvalues 0 ≤ λ1 ≤
From Theorem 8.1.1 of [19], there exists an orthogonal matrix Q = [q1, q2, ..., qns] such that
and the corresponding eigenvectors of Lsym are D
QTLsymQ = diaд(λ1, λ2, ..., λns).
s u2, . . . , D
s u1, D
s uns
1
2
1
2
1
2
.
It shows that q1, q2, ..., qns
1
are linearly independent. As Gs is a connected graph, D
2
s
u1, u2, . . . , uns
are linearly independent.
are linearly independent eigenvectors of Lsym, so D
s uns
is invertible, and it is obvious that
s u2, . . . , D
s u1, D
Additionally, as Lrw
As Gs is a connected and non-bipartite graph, by Lemma 1.7 of [13], we have 1 − σ2 = λ2 > 0
□
= 0, we have 1 − σ1 = λ1 = 0 and u1 = e∥e∥2
= λns < 2. Therefore, σ2 < 1 and σns > −1.
, so σ1 = 1.
and 1 − σns
e∥e∥2
1
2
1
2
1
2
, Vol. 1, No. 1, Article . Publication date: May 2019.
:12
K. He et al.
Theorem 4.4. Let Gs = (Vs , Es) be a connected and non-bipartite graph with ns nodes and ms
edges, when k → ∞, pk defined by Eq. (9) converges to α1u1 where α1 is the nonzero weighting portion
of p0 on the eigenvector u1.
Proof. By Lemma 4.3, u1, u2, . . . , uns
As u1 = e∥e∥2
are linearly independent normalized eigenvectors of Nrw,
so there exist α1, α2, ..., αns
and p0 is the initial probability density evenly assigned on the seeds, u1 and p0 are
not orthogonal. It shows that α1 is the nonzero weighting portion of p0 on the eigenvector u1. Then
i =1 αiui.
such that p0 =ns
ns
pk = (Nrw)k p0 =
αiσ k
i ui = σ k1
i =1
αi( σi
σ1
)k ui .
Since 1 = σ1 > σ2 ≥ ... ≥ σns > −1 and α1 (cid:44) 0, for all i = 2, 3, ..., ns, we have
ns
i =1
and
( σi
σ1
)k = 0,
lim
k→∞
lim
k→∞ pk = lim
k→∞ α1σ k1 u1 = α1u1.
transition matrix of modified graph with a weighting loop at each node.
□
Obviously, Lemma 4.3 and Theorem 4.4 also hold for Nrw based on Eq. (5) or Eq. (6), which is the
By Theorem 4.4, we have the following corollary.
Corollary 4.5. Suppose matrix Nrw defined by Eq. (7) has ns eigenvalues µ1, µ2, ..., µns with an
associated collection of linearly independent eigenvectors {v1, v2, ..., vns }. Moreover, we assume that
µ1 > µ2 ≥ ... ≥ µns . Then we have
k→∞ pk = lim
lim
k→∞ β1µk1 v1,
where pk defined by Eq. (9) and β1 is the weighting portion of p0 on the eigenvector v1.
Corollary 4.5 indicates that pk converges to β1v1 if µ1 = 1 and β1 (cid:44) 0.
Below, we provide some discussion on the convergence of pk defined by Eq. (8). Firstly, we give
the following theorem.
Theorem 4.6. Every real square matrix X is a product of two real symmetric matrices, X = YZ
where Y is invertible.
We will not include the proof of Theorem 4.6 here. The interested reader is referred to [10].
By Theorem 4.6, we have Nrw = PU where P and U are symmetric matrices, and P is invertible.
(11)
Then,
Nrw = PU = P(UP)P−1 = P(PU)TP−1 = PNT
rw(P−1v) = λ(P−1v),
Nrwv = λv ⇔ NT
rwP−1.
(12)
rw share the same set of eigenvalues and the
By Lemma 4.3, we know that Nrw defined by Eq. (4) has ns linearly independent normal-
rw has ns linearly independent eigenvectors
where v is a nonzero vector. It shows that Nrw and NT
corresponding eigenvector of NT
ized eigenvectors u1, u2, . . . , uns
P−1u1, P−1u2, . . . , P−1uns
rw is P−1v where v is the eigenvector of Nrw.
. Then by Eq. (12), NT
. By Theorem 4.4, we have the following theorem.
Theorem 4.7. Let Gs = (Vs , Es) be a connected and non-bipartite graph with ns nodes and ms
edges, when k → ∞, pk defined by Eq. (8) converges to γ1P−1u1 where γ1 is the nonzero weighting
portion of p0 on the eigenvector P−1u1.
According to Eq. (11), we have
The proof of Theorem 4.7 is similar to Theorem 4.4, hence we omit the details here.
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:13
matrix of modified graph with a weighting loop at each node.
Obviously, Theorem 4.7 also holds for Nrw based on Eq. (5) or Eq. (6), which is the transition
By Eq. (12) and Theorem 4.7, we have the following corollary.
Corollary 4.8. Suppose matrix Nrw defined by Eq. (7) has ns eigenvalues µ1, µ2, ..., µns with an
associated collection of linearly independent eigenvectors {v1, v2, ..., vns }. Moreover, we assume that
µ1 > µ2 ≥ ... ≥ µns . Then we have
lim
k→∞ pk = lim
where pk defined by Eq. (8) and δ1 is the weighting portion of p0 on the eigenvector P−1v1 of NT
rw.
k→∞ δ1µk1 P−1v1,
Corollary 4.8 indicates that pk converges to δ1P−1v1 if µ1 = 1 and δ1 (cid:44) 0.
When k → ∞, Theorem 4.4 and Corollary 4.5 state that the local spectral subspace V(k)
built
on "inverse random walk" approaches the eigenspace associated with eigenvector of Nrw with the
largest eigenvalue, and Theorem 4.7 and Corollary 4.8 indicate that the local spectral subspace V(k)
d
built on "regular random walk" approaches the eigenspace associated with eigenvector of NT
rw with
the largest eigenvalue. Our interest now, though, is not in the limiting case when k is large, but for
a much more modest number of diffusion steps to reveal the local property around the seeds. Based
on different local spectral diffusions in Eq. (4) - Eq. (7), we have a set of local spectral subspace
definitions. Based on Eq. (8) and Eq. (9), we have two sets of local spectral subspace definitions.
rw, which is on the regular random walk,
is considerably better than that on Nrw for the detection accuracy. However, the definitions on
Nrw corresponding to the inverse random walk also show high accuracy as compared with the
baselines. Our results show that the local approximation built on "regular random walk" shows
higher accuracy than that built on "inverse random walk".
Experiments in Section 5 show that the definitions on NT
d
4.4 Local Community Detection
We modify the optimization problem shown in Eq. (3) by relaxing each element in the indicator
vector y to be nonnegative, and approximating the global spectral subspace by the local spectral
subspace. Thus, we seek a relaxed sparse vector in the local spectral subspace by solving a linear
programming problem.
min ∥y∥1 = eTy
(k)
s.t. (1) y = V
d u,
(2) y ≥ 0,
(3) yi ≥ 1
S , i ∈ S.
(13)
This is an ℓ1 norm approximation for finding a sparse linear coding that indicates a small
community containing the seeds with y in the local spectral subspace spanned by the column
(k)
vectors of V
. The ith entry yi indicates the likelihood of node i belonging to the target community.
1) If T is known, we then sort the values in y in non-ascending order and select the corresponding
d
T nodes with the higher belonging likelihood as the output community.
2) If T is unknown, we use a heuristic to determine the community boundary. We sort the
nodes based on the element values of y in the decreasing order, and find a set Sk∗ with the first k∗
nodes having a comparatively low conductance. Specifically, we start from an index k0 where set
Sk0 contains all the seeds. We then generate a sweep curve Φ(Sk) by increasing index k. Let k∗ be
, Vol. 1, No. 1, Article . Publication date: May 2019.
:14
K. He et al.
the value of k where Φ(Sk) achieves a first local minimum. The set Sk∗ is regarded as the detected
community.
We determine a local minima as follows. If at some point k∗ when we are increasing k, Φ(Sk)
stops decreasing, then this k∗ is a candidate point for the local minimum. If Φ(Sk) keeps increasing
after k∗ and it eventually becomes higher than βΦ(Sk∗), then we take k∗ as a valid local minimum.
We experimented with several values of β on a small trial of data and found that β = 1.02 gives
good performance across all the datasets.
Denote the corresponding local community detection methods based on Eq. (4) - Eq. (7) as: LRw
(LOSP based on Standard Random Walk), LLi (LOSP based on Light Lazy Random Walk), LLa (LOSP
based on Lazy Random Walk) and LPr (LOSP based on PPR).
5 EXPERIMENTS AND RESULTS
We implement the family of local spectral methods (LOSPs) in Matlab3, 4 and thoroughly compare
them with state-of-the-art localized community detection algorithms on the 28 LFR datasets as
well as the 8 real-world networks across multiple domains. For the 5 SNAP datasets, we randomly
locate 500 labeled ground truth communities on each dataset, and randomly pick three exemplary
seeds from each target community. For the 28 LFR datasets and the 3 Biology datasets, we deal
with every ground truth community and randomly pick three exemplary seeds from each ground
truth community. We pre-process all real-world datasets by sampling, and apply the local spectral
methods for each network.
5.1 Statistics on Sampling
In order to evaluate the effectiveness of the sampling method in Algorithm 1, we empirically set
(N1, N2, k) = (300, 5000, 3) to control the subgraph size and experiment with the upper bound of
BFS rounds t from 1 to 5 to extract different sampling rate on Amazon, as shown in Table 3. For
notations, the coverage indicates the average fraction of ground truth covered by the sampled
subgraph, and ns/n indicates the sampling rate which is the average fraction of subgraph size as
compared with the original network scale.
Table 3 shows that there is a 7.2% significant improvement on coverage when we increase the
upper bound of BFS rounds t from 1 to 2, but there is only 0.4% improvement when t continue
increases from 2 to 5. On the other hand, the sampling rate is only 0.1% and the sampling procedure
is very fast in 0.730 seconds for t = 2. For these reasons, we set (N1, N2, t, k) = (300, 5000, 2, 3) to
trade off among the coverage, sampling rate and running time for the sampling method in our
experiments.
Table 4 provides statistics on real-world networks for the sampling method in Algorithm 1. For
SNAP datasets, our sampling method has a high coverage with reasonable sample size, covering
about 96% ground truth with a small average sampling rate of 0.1%, and the sampling procedure
is within 14 seconds. For the Biology networks, which are comparatively denser, the sampled
subgraph covers about 91% ground truth with a relatively high sampling rate, and the sampling
procedure is very fast in less than 0.2 seconds.
5.2 Parameter Setup
To remove the impact of different local spectral methods in finding a local minimum for the
community boundary, we use the ground truth size as a budget for parameter testing on the family
rw Krylov
of LOSP methods. When we say LOSP, we mean the family of LOSP defined on the NT
3https://github.com/PanShi2016/LOSP_Plus
4https://github.com/JHL-HUST/LOSP_Plus
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:15
Table 3. Test parameter t (upper bound of BFS rounds) for the sampling on Amazon.
1
0.918
13
Statistics
Coverage
ns
ns/n
Time (s)
Upper bound of BFS rounds
2
3
0.990
34
0.991
70
0.993
184
4
5
0.994
312
0.00004
0.374
0.00010
0.730
0.00021
2.208
0.00055
4.361
0.00093
7.028
Table 4. Statistics on average values for the sampling on real-world networks.
SNAP
ns/n Time (s)
Networks Coverage
ns
0.730
0.0001
34
0.990
Amazon
0.720
0.0006
198
0.980
DBLP
19.050
0.0002
629
1.000
LiveJ
0.0028
3.760
3237
0.950
YouTube
44.430
0.0013
0.870
4035
Orkut
13.738
0.001
0.958 1627
Average
0.1880
0.256
0.910
2875
0.125
0.2692
2733
0.876
0.076
0.947
0.6049
3341
0.911 2983 0.3540
0.152
Biology DM
HS
SC
Average
subspace, which is the normal case for random walk diffusion. A comparison in subsection 5.3
will show that in general, LOSP defined on NT
rw Krylov subspace outperforms that on Nrw Krylov
subspace with respect to the accurate detection.
Dimension of the subspace and diffusion steps. For local spectral subspace, we need to
choose some modest numbers for the step k of random walks and the subspace dimension d such
that the probability diffusion does not reach the global stationary. We did a small trial parameter
study on all datasets, and found that d = 2 and k = 2 perform the best in general.
Parameters for the random walk diffusion. We thoroughly evaluate different spectral dif-
fusion methods on all datasets, as shown in Fig. 1 and Fig. 2. The three columns correspond to
light lazy random walk, lazy random walk and personalized pagerank with different α parameters.
All three variants degenerate to the standard random walk when α = 0. The results show that
light lazy random walk, lazy random walk and personalized pagerank are robust for different α
parameters. The personalized pagerank declines significantly when α = 1 as all probability returns
to the original seed set.
During the probability diffusion, light lazy random walk and lazy random walk always retain a
ratio of probability on the current set of nodes to keep the detected structure to be "local". The
personalized pagerank always returns a ratio of probability from the current set of nodes to the seed
set. Instead of retaining some probability distribution on the current set of nodes, the personalized
, Vol. 1, No. 1, Article . Publication date: May 2019.
:16
K. He et al.
Fig. 1. Evaluation of different diffusion parameters α on real-world datasets (Defined on NT
rw Krylov subspace,
community size truncated by truth size). The three diffusions are robust for different α parameters, except for
α = 1 on personalized pagerank, in which case all probability returns to the original seed set.
pagerank "shrinks" some probability to the original seed set. Such process also wants to keep the
probability distribution "local" but it is not continuous as compared with the previous two methods.
In the following discussion, we set α = 1 for light lazy random walk and lazy random walk, and
set α = 0.1 for personalized pagerank.
5.3 Evaluation on Local Spectral Methods
To remove the impact of different methods in finding a local minimum for the community boundary,
we use the ground truth size as a budget for the proposed four LOSP variants: LRw (standard), LLi
(light lazy), LLa (lazy) and LPr (pagerank). We first compare the four LOSP variants defined on the
standard NT
rw Krylov subspace, then compare the general performance on subspaces defined on
either NT
rw Krylov subspace. Fig. 3 illustrates the average detection accu-
racy on the eight real-world datasets. LLi, LPr, LLa and LRw achieve almost the same performance
on almost all datasets. One exception is on YouTube that LLi, LLa and LPr considerably outperform
LRw. LLi achieves slightly better performance on four out of eight real-world networks.
Evaluation on variants of NT
rw or Nrw.
Fig. 4 illustrates the average detection accuracy on the four sets with a total of 28 LFR networks.
For on = 500, Fig. 4 (a) and Fig. 4 (c) show that LLi, LPr and LRw achieve almost the same
performance and outperform LLa on average. For on = 2500, Fig. 4 (b) and Fig. 4 (d) show that LLi,
LPr and LLa achieve almost the same performance and outperform LRw on average. On both cases,
LLi, LOSP with light lazy, demonstrates slightly higher accuracy on LFR datasets.
For the running time on the sampled subgraphs of all datasets, LLi, LPr, LLa and LRw take almost
the same time, and run within 1.1 seconds, as shown in Fig. 5 and Fig. 6.
Comparison on NT
rw and Nrw Krylov subspace. We compare the average F1 score on each
group of networks: SNAP, Biology and the four groups of LFR. Table 5 shows the comparison
of detection accuracy where the community is truncated on truth size for subspace definitions
on NT
rw and Nrw respectively (The best three values on each row appear in bold). In general, NT
rw
outperforms Nrw, especially on real-world datasets. When comparing with the LOSP variant defined
on Nrw, the four variants defined on NT
rw have about 15% or 5% higher F1 scores on SNAP and
rw performs slightly better
Biology respectively. As for the synthetic LFR datasets, in general, NT
than Nrw on the small ground truth communities, while Nrw performs slightly better than NT
rw on
rw is always on top
the big ground truth communities. Among all the variants of LOSP, LLi on NT
three for all datasets. In summary, LLi on NT
rw performs better than other variants of LOSP.
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:17
Fig. 2. Evaluation of different diffusion parameters α on LFR datasets (Defined on NT
rw Krylov subspace,
community size truncated by truth size). The three diffusions are robust for different α parameters, except for
α = 1 on personalized pagerank, in which case all probability returns to the original seed set.
, Vol. 1, No. 1, Article . Publication date: May 2019.
:18
K. He et al.
Fig. 3. Accuracy evaluation of LOSP on real-world networks (Defined on NT
rw Krylov subspace, community
size truncated by truth size). LOSPs based on the four diffusions show similar accuracy over all datasets. LLi,
LOSP with light lazy, demonstrates slightly higher accuracy on half of the datasets.
(a) LFR_s_0.1
(b) LFR_s_0.5
(c) LFR_b_0.1
(d) LFR_b_0.5
Fig. 4. Accuracy evaluation of LOSP on LFR networks (Defined on NT
rw Krylov subspace, community size
truncated by truth size). The accuracy decays when the overlapping membership, om, increases from 2 to
8. LOSPs based on the four diffusions show similar accuracy over all datasets. LLi, LOSP with light lazy,
demonstrates slightly higher accuracy.
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:19
Fig. 5. Running time evaluation of LOSP on real-world networks (Defined on NT
rw Krylov subspace, community
size truncated by truth size). LOSPs based on the four diffusions show similar running time over all datasets,
which are within 1.1 seconds.
(a) LFR_s_0.1
(b) LFR_s_0.5
(c) LFR_b_0.1
(d) LFR_b_0.5
Fig. 6. Running time evaluation of LOSP on LFR networks (Defined on NT
rw Krylov subspace, community
size truncated by truth size). LOSPs based on the four diffusions show similar running time over all datasets,
which are around 0.4 seconds.
, Vol. 1, No. 1, Article . Publication date: May 2019.
:20
K. He et al.
Table 5. Comparison of average F1 score for subspaces on NT
the variants of LOSP, LLi on NT
rw is always on top three for all datasets.
rw and Nrw (Truncated on truth size). Among all
Subspace on Nrw
Datasets
Subspace on NT
rw
LLa
LPr
SNAP
Biology
LFR_s_0.1
LFR_s_0.5
LFR_b_0.1 0.536
LFR_b_0.5 0.273
LLi
0.757 0.757 0.749 0.729
0.328 0.335 0.331 0.315
0.675 0.677
0.381 0.371
0.526
0.260
LPr
LRw LLi
0.601
0.578
0.284
0.287
0.660
0.660 0.673
0.351
0.341 0.373
0.515 0.568 0.550
0.238 0.272
0.254
0.570
0.356
0.488
0.265
LRw
LLa
0.556
0.594
0.266
0.246
0.628
0.600
0.317
0.364
0.516
0.523
0.272 0.230
Table 6. Comparison of average F1 score for subspaces on NT
tance). Among all the variants of LOSP, LLi on NT
rw and Nrw (Truncated on local minimal conduc-
rw is always on top three for all datasets.
Subspace on Nrw
Datasets
Subspace on NT
rw
LLa
LPr
LRw LLi
0.518
0.146
LLi
0.620 0.604 0.599 0.593
SNAP
0.182 0.171 0.206 0.150
Biology
0.574 0.561
LFR_s_0.1
0.291
LFR_s_0.5
0.334
0.365
LFR_b_0.1 0.387
0.169
LFR_b_0.5 0.198
LLa
LPr
0.526
0.514
0.166
0.160
0.554 0.576 0.546
0.518
0.232 0.332 0.311 0.337
0.358 0.406 0.348
0.353
0.134 0.217 0.186 0.214
0.443
0.265
0.296
0.168
LRw
0.503
0.135
0.539
0.217
0.393
0.131
It is interesting that the results on Nrw is reasonably good. Even if we use the first local conduc-
tance to do the truncation, as shown in Table 6 (The best three values on each row appear in bold),
the accuracy decays by about 5% to 15% as compared with that of the truncation on truth size (in
Table 5). Nevertheless, the results of Table 6 are still much better than that of state-of-the-art local
community detection algorithms, heat kernel (HK) and pagerank (PR), whose results are listed in
Table 7 and Table 9.
Comparison on Krylov subspace and eigenspace for Nrw. In order to evaluate the effective-
ness of Krylov subspace approximation, we compare Krylov subspace with the actual eigenspace.
To make a fair comparison, we choose LRw defined on Nrw Krylov subspace and adopt our method
on the actual eigenspace associated with two leading eigenvectors of standard transition matrix
Nrw with larger eigenvalues, denoted as GLOSP (GLObal SPectral).
Fig. 7 illustrates the average detection accuracy on real-world networks and LFR datasets. For
real-world networks, Fig. 7 (a) shows that LRw considerably outperforms GLOSP. For LFR datasets,
Fig. 7 (b) illustrates that LRw is much better than GLOSP on each dataset. These experiments show
that it is not good if we use the actual eigenspace that embodies the global structure, even on the
comparatively small subgraph.
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:21
(a)
(b)
Fig. 7. Accuracy comparison with GLOSP based on actual eigenspace on real-world networks and LFR
datasets (Community size truncated by truth size). In (b), the overlapping membership (om) starts from 2 to 8
for each group of LFR datasets. Note that the bars for GLOSP and LRw both start from zero to the height.
5.4 Final Comparison
For the final comparison, we find a local minimum of conductance to automatically determine the
community boundary. Subsection 5.3 shows that LLi, LOSP with light lazy, is on average the best
LOSP method defined on NT
rw Krylov subspace on all datasets. In this subsection, we just compare
LLi defined on the NT
rw Krylov subspace with four state-of-the-art local community detection
algorithms, LEMON [34], PGDc-d [45], HK for hk-relax [27] and PR for pprpush [5], which also
use conductance as the metric to determine the community boundary. LEMON is a local spectral
approach based on normalized adjacency matrix iteration, PGDc-d is a projected gradient descent
algorithm for optimizing σ-conductance, and HK is based on heat kernel diffusion while PR is
based on the pagerank diffusion. To make a fair comparison, we use the default parameter settings
for baselines as they also test on SNAP datasets, and run the five algorithms on the same three
seeds randomly chosen from the ground truth communities.
5.4.1 Comparison on Real-world Datasets. For each of the real-world networks, Table 7 shows
the average detection accuracy (The best value appears in bold in each row) and the average running
time, Table 8 shows the average community size and the average conductance of the detected
communities.
For the SNAP datasets in product, collaboration and social domains, LLi yields considerably
higher accuracy on the first three datasets (Amazon, DBLP, and LiveJ), and yields slightly lower
accuracy on YouTube and Orkut. To have a better understanding on the results, we compare the
property of the detection with the property of the ground truth communities, as shown in Table 2.
• For the first three datasets, the average size of the ground truth is small between 10 to 30,
and the conductance is diverse (very low in Amazon and with reasonable value around 0.4
in DBLP and LiveJ). In general, the size and conductance of our detected communities are
closest to the ground truth. This may explain why our detection accuracy is considerably
higher than the baselines.
• For the last two datasets YouTube and Orkut, the average conductance of ground truth is very
high with 0.84 and 0.73, respectively, and the size is diverse (very small of 21 on average in
YouTube and large of 216 on average in Orkut). We found much larger communities with close
conductance on YouTube (0.736) and Orkut (0.791). PGDc-d found much smaller communities
, Vol. 1, No. 1, Article . Publication date: May 2019.
:22
K. He et al.
with close conductance on YouTube, and HK found reasonable-size communities with lower
conductance on Orkut. This may explain why our detection accuracy on YouTube and Orkut
is slightly lower than PGDc-d and HK, respectively.
For the three Biology datasets, LLi outperforms HK and PR, and yields slightly lower accuracy
compared with LEMON and PGDc-d. Also, the conductance of the communities detected by LEMON
(around 0.88) and PGDc-d (around 0.98) are very close to that of the ground truth (around 0.88, as
shown in Table 2), compared with LLi (around 0.74), HK (around 0.37) and PR (around 0.20). As for
the community size, we detected larger communities as compared to the ground truth, LEMON
and PGDc-d detect much smaller communities, while HK and PR detect even larger communities.
For the running time, as shown in Table 7, LLi is fast in 4 seconds on SNAP and in 16 seconds on
Biology datasets. The four baselines, LEMON, PGDc-d, HK and PR, are faster in less than 1.2 seconds.
This may due to that LLi is implemented in Matlab while the most baselines are implemented in
C++.
Table 7. Comparison on detection accuracy and running time with baselines on real-world networks.
SNAP
Datasets
Amazon
DBLP
LiveJ
YouTube
Orkut
Average
Biology DM
HS
SC
Average
LLi
0.800
0.779
0.797
0.445
0.279
0.620
0.221
0.206
0.120
0.182
F1 score
Time (s)
PR
LEMON PGDc-d HK
0.531
0.751
0.388
0.413
0.525
0.573
0.091
0.143
0.357 0.303
0.378
0.437
0.035
0.219
0.020
0.025
0.036
0.034
0.030
0.093
0.576
0.523
0.388
0.447
0.117
0.410
0.274
0.213
0.238
0.242
0.723
0.590
0.519
0.351
0.096
0.456
0.322
0.200
0.239
0.254
LLi
0.011
0.099
0.756
9.268
12.235
4.474
33.535
3.823
11.119
16.159
LEMON PGDc-d HK
0.008
0.025
0.029
0.038
0.027
0.025
0.015
0.071
0.034
0.040
0.039
0.271
0.553
1.458
1.328
0.730
1.151
0.462
0.950
0.854
0.058
0.063
1.759
0.329
3.212
1.084
0.007
0.003
0.002
0.004
PR
0.015
0.075
0.264
0.955
1.392
0.540
1.394
1.048
0.979
1.140
Table 8. Comparison on community size and conductance with baselines on real-world networks.
SNAP
Datasets
Amazon
DBLP
LiveJ
YouTube
Orkut
Average
Biology DM
HS
SC
Average
LLi
8
10
35
588
1733
475
992
465
1623
1027
Size
Conductance
LEMON PGDc-d HK
48
87
119
122
341
143
606
4360
2604
2523
13
20
26
18
9
17
19
13
14
15
3
4
3
12
3
5
3
5
3
4
PR LLi
0.300
4485
0.396
9077
0.305
512
13840
0.736
0.791
1648
0.506
5912
0.772
15120
10144
0.758
0.696
2673
9312
0.742
LEMON PGDc-d HK
0.042
0.110
0.083
0.175
0.513
0.185
0.571
0.229
0.322
0.374
0.605
0.751
0.817
0.723
0.976
0.774
0.980
0.966
0.990
0.979
0.850
0.559
0.637
0.748
0.934
0.746
0.909
0.836
0.903
0.883
PR
0.030
0.114
0.086
0.302
0.546
0.216
0.181
0.080
0.343
0.201
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:23
Table 9. Comparison on detection accuracy and running time with baselines on LFR networks.
Datasets
LFR s_0.1_2
s_0.1_3
s_0.1_4
s_0.1_5
s_0.1_6
s_0.1_7
s_0.1_8
Average
s_0.5_2
s_0.5_3
s_0.5_4
s_0.5_5
s_0.5_6
s_0.5_7
s_0.5_8
Average
b_0.1_2
b_0.1_3
b_0.1_4
b_0.1_5
b_0.1_6
b_0.1_7
b_0.1_8
Average
b_0.5_2
b_0.5_3
b_0.5_4
b_0.5_5
b_0.5_6
b_0.5_7
b_0.5_8
Average
LLi
0.673
0.621
0.583
0.555
0.548
0.536
0.503
0.574
0.496
0.388
0.336
0.313
0.284
0.260
0.260
0.334
0.461
0.417
0.392
0.361
0.374
0.353
0.349
0.387
0.309
0.236
0.198
0.177
0.170
0.150
0.149
0.198
F1 score
Time (s)
LEMON PGDc-d HK
0.051
0.028
0.027
0.044
0.026
0.041
0.029
0.035
0.019
0.020
0.019
0.018
0.017
0.017
0.016
0.018
0.094
0.064
0.092
0.073
0.060
0.047
0.051
0.069
0.040
0.039
0.035
0.033
0.031
0.031
0.030
0.034
0.261
0.261
0.263
0.258
0.255
0.260
0.252
0.259
0.266
0.253
0.257
0.261
0.257
0.257
0.261
0.259
0.140
0.135
0.141
0.134
0.144
0.143
0.143
0.140
0.135
0.135
0.138
0.135
0.141
0.134
0.137
0.136
0.458
0.452
0.445
0.436
0.435
0.441
0.429
0.442
0.389
0.310
0.295
0.281
0.268
0.249
0.247
0.291
0.279
0.260
0.268
0.255
0.272
0.267
0.269
0.267
0.207
0.197
0.176
0.154
0.151
0.144
0.149
0.168
PR LLi
0.918
0.969
1.022
1.123
1.269
1.342
1.371
1.145
1.232
1.626
1.708
1.949
1.899
1.914
2.037
1.766
1.089
1.253
1.424
1.595
1.640
1.608
1.597
1.458
1.579
1.858
2.026
1.818
2.079
2.123
2.116
1.943
0.025
0.025
0.024
0.024
0.024
0.026
0.024
0.025
0.020
0.022
0.020
0.019
0.018
0.018
0.017
0.019
0.040
0.043
0.039
0.042
0.038
0.039
0.038
0.040
0.042
0.041
0.037
0.036
0.033
0.033
0.032
0.036
LEMON PGDc-d HK
0.025
0.025
0.025
0.026
0.025
0.025
0.025
0.025
0.028
0.026
0.028
0.028
0.027
0.027
0.025
0.027
0.026
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
0.025
1.282
1.031
1.470
1.814
1.666
1.703
1.502
1.495
1.222
1.160
1.032
1.052
0.896
0.928
0.939
1.033
0.924
0.779
0.931
0.963
0.923
1.019
0.902
0.920
0.793
0.896
0.883
0.949
1.029
1.142
0.968
0.951
0.207
0.201
0.201
0.202
0.207
0.197
0.205
0.203
0.209
0.212
0.232
0.217
0.214
0.216
0.216
0.217
0.189
0.189
0.195
0.194
0.194
0.207
0.209
0.197
0.210
0.205
0.200
0.205
0.216
0.200
0.203
0.206
PR
0.692
0.693
0.690
0.675
0.682
0.677
0.678
0.684
0.680
0.686
0.683
0.687
0.690
0.694
0.696
0.688
0.737
0.720
0.717
0.713
0.718
0.714
0.721
0.720
0.718
0.706
0.701
0.689
0.705
0.704
0.703
0.704
5.4.2 Comparison on LFR Datasets. For each of the synthetic LFR datasets (Properties described
in subsection 3.2.1. Recall that the ground truth communities are in size [10,50] for s and [20,100]
for b), Table 9 shows the average detection accuracy (The best value appears in bold in each row)
and the average running time, Table 10 further shows the average community size and the average
conductance of the detected communities.
For the four groups with a total of 28 LFR datasets, LLi clearly outperforms the state-of-the-art
baselines, LEMON, PGDc-d, HK and PR, as evaluated by F1 score in Table 9. On further analysis of
each group, shown in Table 10, we see that:
, Vol. 1, No. 1, Article . Publication date: May 2019.
:24
K. He et al.
Table 10. Comparison on community size and conductance with baselines on LFR networks.
Datasets
Size:
[10, 50]
Cond.:
0.746
Cond.:
0.522
LFR
Size:
[10, 50]
s_0.1_2
s_0.1_3
s_0.1_4
s_0.1_5
s_0.1_6
s_0.1_7
s_0.1_8
Average
s_0.5_2
s_0.5_3
s_0.5_4
s_0.5_5
s_0.5_6
s_0.5_7
s_0.5_8
Average
b_0.1_2
Size:
b_0.1_3
[20, 100] b_0.1_4
b_0.1_5
b_0.1_6
b_0.1_7
b_0.1_8
Average
b_0.5_2
Size:
b_0.5_3
[20, 100] b_0.5_4
b_0.5_5
b_0.5_6
b_0.5_7
b_0.5_8
Average
Cond.:
0.497
Cond.:
0.733
Size
Conductance
LLi LEMON PGDc-d HK
2279
13
2356
12
11
2354
2363
11
2387
34
2349
22
39
2371
2351
20
2420
49
2456
76
121
2459
2463
129
2384
210
2374
213
220
2304
2409
145
2258
16
2368
15
22
2267
2354
25
2374
50
2417
29
40
2374
2344
28
2465
33
2430
106
237
2440
2473
184
2425
196
2415
247
268
2406
2436
182
20
17
20
19
20
20
19
19
14
15
15
16
16
17
17
16
16
14
16
18
17
17
16
16
14
16
16
18
15
19
17
16
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
PR LLi
0.557
2327
0.598
2317
2318
0.619
0.636
2328
0.627
2302
0.644
2272
2278
0.666
0.621
2306
0.741
2313
0.789
2281
2258
0.801
0.814
2246
0.813
2242
0.817
2231
2230
0.812
0.798
2257
0.666
2344
0.688
2340
2343
0.702
0.716
2334
0.698
2323
0.710
2326
2330
0.714
0.699
2334
0.792
2299
0.808
2280
2252
0.813
0.815
2242
0.817
2240
0.810
2224
2221
0.804
0.808
2251
LEMON PGDc-d HK
0.276
0.289
0.294
0.300
0.295
0.300
0.305
0.294
0.333
0.348
0.359
0.362
0.355
0.358
0.368
0.355
0.303
0.307
0.308
0.301
0.296
0.296
0.312
0.303
0.343
0.340
0.353
0.373
0.359
0.363
0.363
0.356
0.938
0.945
0.954
0.957
0.954
0.959
0.968
0.954
0.956
0.966
0.972
0.978
0.981
0.986
0.985
0.975
0.977
0.975
0.981
0.976
0.974
0.980
0.980
0.978
0.982
0.986
0.990
0.989
0.991
0.994
0.994
0.989
0.537
0.563
0.534
0.556
0.548
0.555
0.568
0.552
0.643
0.675
0.695
0.699
0.714
0.715
0.721
0.695
0.660
0.686
0.656
0.659
0.647
0.638
0.664
0.659
0.711
0.695
0.711
0.692
0.733
0.696
0.720
0.708
PR
0.269
0.281
0.286
0.290
0.294
0.297
0.302
0.288
0.324
0.346
0.357
0.363
0.368
0.371
0.374
0.358
0.286
0.295
0.295
0.300
0.301
0.301
0.304
0.297
0.336
0.355
0.362
0.365
0.368
0.369
0.370
0.361
• LFR_s_0.1. The size of the ground truth is in [10, 50], and the average conductance of the
ground truth is 0.522. The average community size of LLi over the seven LFR_s_0.1 datasets
is 20, while the baselines detect either much smaller communities in size 3 (PGDc-d) or
much larger communities in size 2300 (HK and PR). Due to the difference on the detected
community size, LLi has a stable conductance of around 0.62 while the baselines have a high
conductance of around 0.95 (PGDc-d) or a low conductance of around 0.29 (HK and PR).
• LFR_s_0.5. The size of the ground truth is in [10, 50], and the average conductance of the
ground truth is 0.746. The average community size of LLi is considerably larger in 145, and the
average conductance of 0.798 is close to that of the ground truth. LEMON and PGDc-d achieve
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:25
Fig. 8. Accuracy comparison with HKL and PRL on real-world networks (Community size truncated by local
minimal conductance).
(a) LFR_s_0.1
(b) LFR_s_0.5
(c) LFR_b_0.1
(d) LFR_b_0.5
Fig. 9. Accuracy comparison with HKL and PRL on LFR datasets (Community size truncated by local minimal
conductance).
smaller communities with higher conductance. HK and PR find much larger communities,
leading to apparently smaller conductance.
, Vol. 1, No. 1, Article . Publication date: May 2019.
:26
K. He et al.
• LFR_b_0.1. The size of the ground truth is in [20, 100], and the average conductance of the
ground truth is 0.497. The average community size of LLi is suitable in 28. The baselines
detect much smaller communities of size around 3 (PGDc-d) or much larger communities
of size around 2300 (HK and PR). Due to the difference on the detected community size,
LLi has a stable conductance of around 0.70, while the baselines have either much higher
conductance of around 0.98 (PGDc-d) or much lower conductance of around 0.30 (HK and
PR).
• LFR_b_0.5. The size of the ground truth is in [20, 100], and the average conductance of the
ground truth is 0.733. The average community size of LLi is considerably larger in 182, and the
average conductance of 0.808 is close to that of the ground truth. LEMON and PGDc-d achieve
smaller communities with higher conductance. HK and PR find much larger communities,
leading to apparently smaller conductance.
It is reasonable that the detection accuracy decays on graphs where there exist more overlapings
indicated by higher om and on. LLi is adaptive to find suitable size of communities for different
configurations, and substantially outperforms the baselines. LEMON and PGDc-d tend to find much-
smaller-size communities with higher-conductance, while HK and PR tend to find much-larger-size
communities with lower-conductance and their detection accuracy is very low in less than 0.1 on
average on each of the four groups of datasets.
For the running time, as shown in Table 9, LLi is fast in 1 to 2 seconds while the four baselines,
LEMON, PGDc-d, HK and PR, are slightly faster in less than 1.5 seconds. This may due to the
implementation difference on programming language.
5.4.4
5.4.3 More Comparison on the variants of HK and PR. In order to evaluate the effectiveness of
using the local minimal conductance for determining the community boundary, we compare LLi
with the modification versions of HK and PR, based on local minimal conductance rather than
global minimal conductance, denoted by HKL and PRL.
Fig. 8 and Fig. 9 illustrate the average detection accuracy on real-world networks and LFR
datasets, respectively. For real-world networks, Fig. 8 shows that HKL yields higher accuracy on
each dataset compared with HK, while PRL achieves lower accuracy compared with PR on Amazon,
DBLP, LiveJ and Orkut. On average, LLi still outperforms HKL and PRL. For LFR datasets, Fig. 9
shows that LLi outperforms HKL and PRL on each LFR network. HKL and PRL yield considerably
higher accuracy on each LFR dataset compared with HK and PR, respectively. These experiments
show that it is useful for improving performance based on local minimal conductance truncation.
Summary on the Proposed Algorithm. For all comparisons of LLi, LOSP with light lazy,
with four baselines, we see that LLi is adaptive for different configurations of the synthetic LFR
datasets. LLi could find small communities with dozens of members for s: [10,50] and medium
communities with hundreds of members for b: [20,100].
For well-defined community structure (low conductance, less overlapping, reasonably small), LLi
has a high detection accuracy (LFR_s_0.1, LFR_b_0.1). When the overlapping membership (om)
or the number of overlapping nodes (on) increases, the community structure becomes more mixed,
and the detection accuracy decays. Nevertheless, LLi always yields the best accuracy for different
parameter settings. By comparison, LEMON always finds communities of size around 20, PGDc-d
always finds communities of size less than 10, and HK as well as PR always find large communities
of size around 2300. Thus, they are not very scalable to networks with diverse community structure.
Comparisons on real-world datasets also show that LLi is very good for finding small communities
with reasonably low conductance (Amazon, DBLP and LiveJ). If the community structure is not
very clear, for example, with high conductance of around 0.90 on the Biology datasets, LLi tends to
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:27
find larger communities using longer time due to the sweep search, and it does not yield the best
accuracy.
Therefore, our method can be used for large-scale real-world complex networks, especially when
the communities are in reasonable size of no greater than 500, and the network has a reasonable
clear community structure.
6 CONCLUSION
This paper systematically explores a family of local spectral methods (LOSP) for finding members
of a local community from a few randomly selected seed members. Based on a Krylov subspace
approximation, we define "approximate eigenvectors" for a subgraph including a neighborhood
around the seeds, and describe how to extract a community from these approximate eigenvectors.
By using different seed sets that generate different subspaces, our method is capable of finding
overlapping communities. Variants of LOSP are introduced and evaluated. Four types of random
walks with different diffusion speeds are studied, regular random walk and inverse random walk are
compared, and analysis on the link between Krylov subspace and eigenspace is provided. For this
semi-supervised learning task, LOSP outperforms prior state-of-the-art local community detection
methods in social and biological networks as well as synthetic LFR datasets.
A THE PROOF OF THEOREM 4.1
Before given the proof of Theorem 4.1, we first give the following theorem.
Theorem A.1. (Courant-Fischer Formula) Let H be an n × n symmetric matrix with eigenvalues
(H)
1 ≤ λ
(H)
n and corresponding eigenvectors v1, v2, . . . , vn. Then
(H)
2 ≤ . . . ≤ λ
λ
(H)
1 = min
∥x∥2=1
(H)
2 = min
∥x∥2 =1
x⊥v1
(H)
n = max
∥x∥2=1
λ
λ
λ
xTHx = min
x(cid:44)0
xTHx = min
x(cid:44)0
x⊥v1
xTHx = max
x(cid:44)0
xTHx
xTx
xTHx
xTx
xTHx
xTx
,
,
.
(zi − zj)2
2
referred to [19].
We will not include the proof of the Courant-Fischer Formula here. The interested reader is
Let Lsym be the normalized graph Laplacian matrix of Gs with eigenvalues λ1 ≤ λ2 ≤ ... ≤ λns
. According to Proposition 3 of [46], Lsym has ns
s e) = 0 where e is the vector of all ones, we have λ1 = 0,
and corresponding eigenvectors q1, q2, . . . , qns
non-negative eigenvalues. As Lsym(D
q1 = D
∥D
1
2
.
1
2
s e
1
s e∥2
2
By Theorem A.1, we have
xTLsymx
s x, di is the degree of the ith node and
λ2 = min
x(cid:44)0
x⊥q1
= min
z(cid:44)0
z⊥Dse
zTLz
zTDsz
xTx
− 1
2
i∼j
where z = D
{i, j} for which i and j are adjacent.
i∼j
= min
z(cid:44)0
z⊥Dse
denotes the sum over all unordered pairs
i dizi
(14)
,
Proof of Theorem 4.1. Let z = y − σe, where y ∈ {0, 1}ns×1 is a binary indicator vector
representing community C in graph Gs, e the vector of all ones, and σ =
vol(C)
vol(Vs).
, Vol. 1, No. 1, Article . Publication date: May 2019.
:28
K. He et al.
We can check that z ⊥ Dse:
We also know
It remains to compute
vol(Vs)vol(Vs) = 0.
zTDse = yTDse − σeTDse = vol(C) − vol(C)
zTLz = (y − σe)TL(y − σe) = yTLy.
zTDsz = (y − σe)TDs(y − σe)
= yTDsy − 2σyTDse + σ
= vol(C) − 2σvol(C) + σ
2eTDse
2vol(Vs)
vol(C)vol(Vs − C)
vol(Vs)
.
By Eq. (14), we have
=
λ2 ≤ zTLz
zTDsz
=
yTLy · vol(Vs)
vol(C)vol(Vs − C) .
As the larger value of vol(C) and vol(Vs − C) is at least half of vol(Vs),
vol(C) = 2 yTLy
min(vol(C), vol(Vs − C)) = 2 yTLy
λ2 ≤ 2
yTLy
yTDsy
Therefore,
= 2Φ(C).
(15)
(16)
□
And it is obvious that
λ2
2 ≤ Φ(C).
yTLy
yTDsy
Φ(C) =
≤ 1.
ACKNOWLEDGMENTS
This work was supported by National Natural Science Foundation of China (61772219, 61702473,
61572221).
arXiv:1703.10146 (2017).
REFERENCES
[1] Emmanuel Abbe. 2017. Community detection and stochastic block models: recent developments. arXiv preprint
[2] Bruno Abrahao, Sucheta Soundarajan, John E. Hopcroft, and Robert Kleinberg. 2014. A separability framework for
analyzing community structure. ACM Transactions on Knowledge Discovery from Data (TKDD) 8, 1 (2014), 5.
[3] Yong-Yeol Ahn, James P. Bagrow, and Sune Lehmann. 2010. Link communities reveal multiscale complexity in networks.
Nature 466, 7307 (2010), 761 -- 764.
[4] Hafiz Tiomoko Ali and Romain Couillet. 2017.
Improved spectral community detection in large heterogeneous
networks. The Journal of Machine Learning Research 18, 1 (2017), 8344 -- 8392.
[5] Reid Andersen, Fan Chung, and Kevin Lang. 2006. Local graph partitioning using PageRank vectors. In FOCS. 475 -- 486.
[6] Reid Andersen and Kevin J Lang. 2006. Communities from seed sets. In WWW. ACM, 223 -- 232.
[7] Seung-Hee Bae, Daniel Halperin, Jevin D. West, Martin Rosvall, and Bill Howe. 2017. Scalable and Efficient Flow-Based
Community Detection for Large-Scale Graph Analysis. TKDD 11, 3 (2017), 32:1 -- 32:30.
[8] RV Belfin, Piotr Bródka, et al. 2018. Overlapping community detection using superior seed set selection in social
networks. Computers & Electrical Engineering (2018).
[9] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities
in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008), P10008.
[10] A. J. Bosch. 1986. The factorization of a square matrix into two symmetric matrices. The American Mathematical
Monthly 93, 6 (1986), 462 -- 464.
[11] Jie Cao, Zhan Bu, Guangliang Gao, and Haicheng Tao. 2016. Weighted modularity optimization for crisp and fuzzy
community detection in large-scale networks. Physica A: Statistical Mechanics and its Applications 462 (2016), 386 -- 395.
, Vol. 1, No. 1, Article . Publication date: May 2019.
Krylov Subspace Approximation for Local Community Detection in Large Networks
:29
[12] Jinxin Cao, Di Jin, Liang Yang, and Jianwu Dang. 2018. Incorporating network structure with node contents for
community detection on large networks using deep learning. Neurocomputing 297 (2018), 71 -- 81.
[13] Fun Chung. 1997. Spectral graph theory. American Mathematical Soc.
[14] Fan Chung. 2007. The heat kernel as the PageRank of a graph. PNAS 104, 50 (2007), 19735 -- 19740.
[15] Fun Chung. 2009. A local graph partitioning algorithm using heat kernel PageRank. Internet Mathematics 6, 3 (2009),
315 -- 330.
490 -- 512.
[16] Fan Chung and Olivia Simpson. 2013. Solving linear systems with boundary conditions using heat kernel PageRank.
In Algorithms and Models for the Web Graph (WAW). 203 -- 219.
[17] Michele Coscia, Giulio Rossetti, Fosca Giannotti, and Dino Pedreschi. 2012. Demon: a local-first discovery method for
overlapping communities. In KDD. ACM, 615 -- 623.
[18] Santo Fortunato and Claudio Castellano. 2012. Community Structure in Graphs. Computational Complexity (2012),
[19] Gene H. Golub and Charles F. Van Loan. 1996. Matrix computations (3. ed.). Johns Hopkins University Press.
[20] Yu Han and Jie Tang. 2015. Probabilistic community and role model for social networks. In Proceedings of the 21th
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 407 -- 416.
[21] Dongxiao He, Xinxin You, Zhiyong Feng, Di Jin, Xue Yang, and Weixiong Zhang. 2018. A Network-Specific Markov
Random Field Approach to Community Detection. In Thirty-Second AAAI Conference on Artificial Intelligence.
[22] Kun He, Yingru Li, Sucheta Soundarajan, and John E. Hopcroft. 2018. Hidden community detection in social networks.
Inf. Sci. 425 (2018), 92 -- 106.
[23] Kun He, Pan Shi, John E Hopcroft, and David Bindel. 2016. Local spectral diffusion for robust community detection. In
Twelfth Workshop on Mining and Learning with Graphs.
[24] Kun He, Yiwei Sun, David Bindel, John E. Hopcroft, and Yixuan Li. 2015. Detecting overlapping communities from
local spectral subspaces. In ICDM. 769 -- 774.
[25] Lucas G. S. Jeub, Prakash Balachandran, Mason A. Porter, Peter J. Mucha, and Michael W. Mahoney. 2015. Think
locally, act locally: Detection of small, medium-sized, and large communities in large networks. Physical Review E 91, 1
(2015), 012821.
[26] Ravi Kannan, Santosh Vempala, and Adrian Vetta. 2000. On clusterings - good, bad and spectral. In FOCS. 367 -- 377.
[27] Kyle Kloster and David F. Gleich. 2014. Heat kernel based community detection. In KDD. ACM, 1386 -- 1395.
[28] Isabel M. Kloumann and Jon M. Kleinberg. 2014. Community membership identification from small seed sets. In KDD.
ACM, 1366 -- 1375.
[29] Andrea Lancichinetti and Santo Fortunato. 2009. Benchmarks for testing community detection algorithms on directed
and weighted graphs with overlapping communities. Physical Review E 80, 1 (2009), 016118.
[30] Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark graphs for testing community detection
[31] Andrea Lancichinetti, Filippo Radicchi, Jose J. Ramasco, and Santo Fortunato. 2011. Finding statistically significant
algorithms. Physical Review E 78, 4 (2008), 046110.
communities in networks. PLoS ONE 6, 4 (2011), e18961.
[32] Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney. 2008. Statistical properties of community
structure in large social and information networks. In WWW. 695 -- 704.
[33] Yixuan Li, Kun He, David Bindel, and John E. Hopcroft. 2015. Uncovering the small community structure in large
networks. In WWW. 658 -- 668.
[34] Yixuan Li, Kun He, Kyle Kloster, David Bindel, and John E. Hopcroft. 2018. Local Spectral Clustering for Overlapping
Community Detection. TKDD 12, 2 (2018), 17:1 -- 17:27.
[35] Michael W. Mahoney, Lorenzo Orecchia, and Nisheeth K. Vishnoi. 2012. A local spectral method for graphs: with
applications to improving graph partitions and exploring data graphs locally. The Journal of Machine Learning Research
13, 1 (2012), 2339 -- 2365.
[36] Mark EJ Newman. 2004. Fast algorithm for detecting community structure in networks. Physical review E 69, 6 (2004),
[37] M. E. J. Newman. 2006. Modularity and community structure in networks. Proceedings of the National Academy of
[38] M. E. J. Newman. 2013. Spectral methods for network community detection and graph partitioning. Physical Review E
066133.
Sciences 103, 23 (2006), 8577 -- 8582.
88, 4 (2013), 042822.
[39] Gergely Palla, Imre Derényi, Illés Farkas, and Tamás Vicsek. 2005. Uncovering the overlapping community structure
of complex networks in nature and society. Nature 435, 7043 (2005), 814 -- 818.
[40] Symeon Papadopoulos, Yiannis Kompatsiaris, Athena Vakali, and Ploutarchos Spyridonos. 2012. Community detection
in social media. Data Mining and Knowledge Discovery 24, 3 (2012), 515 -- 554.
[41] Jianbo Shi and Jitendra Malik. 2000. Normalized cuts and image segmentation. IEEE Trans. Pattern Analysis and
Machine Intelligence 22, 8 (2000), 888 -- 905.
, Vol. 1, No. 1, Article . Publication date: May 2019.
:30
K. He et al.
[42] Pan Shi, Kun He, David Bindel, and John E Hopcroft. 2017. Local lanczos spectral approximation for community
detection. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 651 -- 667.
[43] Sucheta Soundarajan and John E. Hopcroft. 2015. Use of Local Group Information to Identify Communities in Networks.
[44] Danial A. Spielman and Shanghua Teng. 2004. Nearly-linear time algorithms for graph partitioning, graph sparsification,
TKDD 9, 3 (2015), 21:1 -- 21:27.
and solving linear systems. In STOC. 81 -- 90.
[45] Twan van Laarhoven and Elena Marchiori. 2016. Local network community detection with continuous optimization of
conductance and weighted kernel K-means. The Journal of Machine Learning Research 17 (2016), 5148 -- 5175.
[46] Ulrike von Luxburg. 2007. A tutorial on spectral clustering. Statistics and Computing 17, 4 (2007), 395 -- 416.
[47] Ingmar Weber, Venkata R. Kiran Garimella, and Alaa Batayneh. 2013. Secular vs. Islamist polarization in Egypt on
[48] Joyce J. Whang, David F. Gleich, and Inderjit S. Dhillon. 2013. Overlapping Community Detection Using Seed Set
Twitter. In ASONAM. 290 -- 297.
Expansion. In CIKM. 2099 -- 2108.
[49] Joyce Jiyoung Whang, David F. Gleich, and Inderjit S. Dhillon. 2016. Overlapping Community Detection Using
Neighborhood-Inflated Seed Expansion. IEEE Trans. Knowl. Data Eng. 28, 5 (2016), 1272 -- 1284.
[50] Yubao Wu, Ruoming Jin, Jing Li, and Xiang Zhang. 2015. Robust local community detection: on free rider effect and its
elimination. In VLDB. 798 -- 809.
[51] Jierui Xie, Stephen Kelley, and Boleslaw K Szymanski. 2013. Overlapping community detection in networks: The
state-of-the-art and comparative study. ACM Computing Surveys (CSUR) 45, 4 (2013), 43.
[52] Jaewon Yang and Jure Leskovec. 2012. Defining and Evaluating Network Communities based on Ground-truth. In
ICDM. 745 -- 754.
[53] Jaewon Yang and Jure Leskovec. 2013. Overlapping community detection at scale: a nonnegative matrix factorization
approach. In Proceedings of the sixth ACM international conference on Web search and data mining. ACM, 587 -- 596.
[54] Shihua Zhang, Rui-Sheng Wang, and Xiang-Sun Zhang. 2007. Identification of overlapping community structure in
complex networks using fuzzy c-means clustering. Physica A: Statistical Mechanics and its Applications 374, 1 (2007),
483 -- 490.
[55] Yu Zhang and Dit-Yan Yeung. 2012. Overlapping community detection via bounded nonnegative matrix tri-factorization.
In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 606 -- 614.
, Vol. 1, No. 1, Article . Publication date: May 2019.
|
1903.06827 | 1 | 1903 | 2019-03-15T22:37:13 | Does Homophily Make Socialbots More Influential? Exploring Infiltration Strategies | [
"cs.SI",
"physics.soc-ph"
] | Socialbots are intelligent software controlling all the behavior of fake accounts in an online social network. They use artificial intelligence techniques to pass themselves off as human social media users. Socialbots exploit user trust to achieve their malicious goals, such as astroturfing, performing Sybil attacks, spamming, and harvesting private data. The first phase to countermeasure the malicious activities of the socialbots is studying their characteristics and revealing strategies they can employ to successfully infiltrate stealthily into target online social network. In this paper,we investigate the success of using different infiltration strategies in terms of infiltration performance and being stealthy. Every strategy is characterized by socialbots profile and behavioral characteristics. The findings from this study illustrate that assuming a specific taste for the tweets a socialbot retweets and/or likes make it more influential. Furthermore, the experimental results indicate that considering the presence of common characteristics and similarity increase the probability of being followed by other users. This is in complete agreement with homophily concept which is the tendency of individuals to associate and bond with similar others in social networks. | cs.SI | cs |
ORIGINAL ARTICLE
Journal Section
DoesHomophilyMakeSocialbotsMore
Influential?
ExploringInfiltrationStrategies
SamanehHosseiniMoghaddam1
MaghsoudAbbaspour1*
1Facultyofcomputerscienceand
engineering,ShahidBeheshtiUnivercityGC,
Evin,Tehran,Iran. 1983969411
*CorespondingAuthor,Email:
[email protected]
MandanaKhademi1
Socialbotsareintelligentsoftwarecontrollingallthebehav-
ior of fake accounts in an online social network. They use
artificial intelligencetechniques to pass themselves offas
humansocialmediausers. Socialbotsexploitusertrustto
achievetheirmaliciousgoals,suchasastroturfing,perform-
ing Sybil attacks, spamming, and harvesting private data.
Thefirstphasetocountermeasurethemaliciousactivities
of the socialbots is studying their characteristics and re-
vealingstrategiestheycanemploytosuccessfullyinfiltrate
stealthilyintotargetonlinesocialnetwork. Inthispaper,we
investigatethesuccessofusingdifferentinfiltrationstrate-
giesintermsofinfiltrationperformanceandbeingstealthy.
Everystrategyischaracterizedbysocialbotsprofileandbe-
havioralcharacteristics. Thefindingsfromthisstudyillus-
tratethatassumingaspecifictasteforthetweetsasocial-
botretweetsand/orlikesmakeitmoreinfluential. Further-
more,theexperimentalresultsindicatethatconsideringthe
presenceofcommoncharacteristicsandsimilarityincrease
theprobabilityofbeingfollowedbyotherusers. Thisisin
completeagreementwithhomophilyconceptwhichisthe
tendencyofindividualstoassociateandbondwithsimilar
othersinsocialnetworks.
1
2
KEYWORDS
Socialbot,Stealthy,Infiltrationstrategy,Socialinfluence,
Homophily,Socialsecurity
INTRODUCTION
1
Twitterisoneofthetopfivemostpopularsocialnetworks[1]. Itfacilitatesuserstoconnectwitheachotherirrespective
oftheirgeographicallocations,sharetheirthoughtexpressions,propagatenews,promoteacelebrityorbusinessbrand,
andsoon. Userscanfollowotherusersinordertoreceivetheirtweets. Itleadstoafollower-followee 1 relationship.
The popularity and the importance role in the world of business and policy, made Twitter an interesting target for
attackers. Twitterestimates23millionofitsactiveusersareactuallysocialbots[2].
Socialbotsareautomatedsoftwareswhicharecontrollingfakeaccountstoexploituserstrusttoachievetheirgoals.
They imitate actual users to pass themselves off as human accounts. Socialbots have verity applications with good
or malicious objectives. Some significant malicious applications are astroturfing [3], performing Sybil attacks [4],
spamming[5,6,7],andharvestingprivatedata[8]. Thefirstphasetodetectorcountermeasuremalicioussocialbots
is studying them and revealing strategies they can employ to allure actual users to be successful in terms of social
influenceandbeingstealthy. Studyingthepotentialpowerofcharacteristicsofinfiltrationstrategiesisalsousefulfor
developinggoodsocialbots.
Several researches have been conducted that performed the experiment of socialbot creation to demonstrate the
possibilityofsocialbotnetworkestablishment[9,10,11]. Nevertheless,alimitednumberofresearchesanalyzethe
characteristicsofsocialbotstorevealthemostinfiltrativecharacteristics[12,13]. Thesestudiesmainlyfocusedon
investigatingtheimpactofbasicprofileandbehavioralrelatedcharacteristicssuchasgender,age,following,andso
on. Accordingly,thereisstillconsiderableambiguityandunexploredarrangementofcharacteristics. Thispaperaims
to explore more advanced characteristics to find out the most effective infiltration strategies. To this goal, we use
factorialdesignexperiment[14]toevaluatetheinfiltrationperformanceandstealthyofdifferentsocialbotstrategies,
andexaminetheeffectivenessofindividualprofileandbehavioralrelatedcharacteristicsofthesocialbots. Consistently
usingtheterminologyofthefactorialdesignexperiment,allprofileandbehavioralrelatedcharacteristicsunderstudy
assumedtobeindependentvariableswhicharecalledfactorsandthevaluesofthecharacteristicsarecalledfactor
levels. Sincethefactorialdesignexperimentprovidesmoreinformationatasimilarorlowercost,itismoreefficient
thantraditionalone-factor-at-a-time(OFAT)experiments. Furthermore,thefactorialdesignexperimentprovidesa
facilityforstudyingtherelationshipbetweendifferentfactors. Ourexperimentsarerootedinthehypothesisthatthere
aresomerelationshipsbetweenthesuccessininfiltratingintoasocialnetworkandtheprofileandbehavioralrelated
characteristicsofasocialbot.
Sincethereisanexponentialrelationshipbetweenthenumberofcharacteristicsandthenumberofstrategiescomeout
fromthedifferenceofthearrangementofthesecharacteristics,performingablindstudyofallcharacteristicsisnot
feasible. Accordingly,employingsomeheuristicsinchoosingthesetofcharacteristicstobestudiedisadvantageous.
Thus,inordertocopewiththeexplodinggrowthinthenumberofstrategies,weemploytwoheuristicstodecideon
factors. Additionally, we divide all factors into two groups and do our study in two phases. In the first phase some
basicfactorsincludingtwobehavioralcharacteristicswhichdeterminethestatusofconsideringornotconsidering
theusers'interest,arestudied. Theinterestofasocilabotisdeterminedbythegeneralcategoryofwhatitretweets
and/orlikesbelongsto. Basedontheexperimentalresults,itcanbeconcludedthatconsideringaspecifictastefora
1Duringthispaper,inlinewiththeAPIsofTwitter,followeeisalsocalledfriend.
3
userisaneffectivestrategyforsocialinfiltration. Aprimaryandrawresultsofthefirstphasearereportedin[15]. A
muchmoredetailedanalysisisprovidedinthispaper. Inthesecondphase,thefocusisontheinspectionoftheimpactof
characteristicsregardedthehomophilyalongtopicofinterestwhichiscalledthetopicalhomophily [16]. Itisspeculated
thatamongallprofilesandbehavioralcharacteristicsstudied,theoneswhichareboundupwithtopicalhomophilyhave
amoretellingimpactoninfiltrationperformance.
Therestofthepaperisorganizedasfollows. Section2brieflysurveysrelatedworks. Section3isdedicatedtodescribing
the methodology used to create the socialbots, and the various metrics to quantify the success of them in terms of
infiltrationperformanceandbeingstealthy. Insection4and5,acomprehensiveanalysisoftheimpactofthevarious
characteristicoftwophasesofourstudyinthesocialbots'infiltrationperformanceispresented. Finally,inthesection6,
conlusionsanddirectionsoffutureworksareprovided.
2 RELATED WORKS
ManyresearchesarededicatedtocreateandinjectasocialbotintoanOSNs. Thisworkscanbecategorizedintotwo
main domains: (1) proving the vulnerability of social networks against socialbot infiltration and its implications, (2)
investigatingtheinfiltrationperformanceofdifferentsocialbotinfiltrationstrategies.
The majority of works are aimed at demonstrating the feasibility and implication of socialbots. Boshmaf et al [9, 8]
studied the use, impact, and implication of socialbots on Facebook. They created a socialbot net consisting of 102
socialbotonFacebookandindicatedthevulnerabilityofOSNstoalargescaleinfiltrationbysocialbots. Inaddition,
thefeasibilityofprivacybreachbyexploitingsocialbotsisproved. Elyasharetal[10]leveragedsocialbotstoinfiltrate
specificusersfromtargetedorganizationtobreachtechnicalinformation. Theyshowthatevensecurityawareusers
canbedupedbysocialbots. Zhangetal[11]constructedasocialbotnetworkconsistingof1000socialbotsonTwitter.
They validated the effectiveness and advantage of employing a socialbot network for spamming. Moreover, they
demonstratedthatsocialbotseasilycanmanipulateOSN'srepudiationsmetricssuchasKloutscoreandTwitalyzer.
Messiasetal[17]developedtwofakeaccountscontrolledbysocialbotsonTwittertoverifythepossibilityofgaining
considerableinfluentialscoresusingverysimplestrategies. Oneofthesocialbotsreachedaninfluencescorecloseto
somecelebrities. Someotherworkscreatedandinjectedsocialbotstoidentifysusceptibleaccounts 2 andstudytheir
distinguishedcharacteristicscomparedtoothers[18,19].
Someotherresearcherstookaphasefurtherandexploredifferentinfiltrationstrategiestorevealthemostsignificant
attributes. Freitasetal[12,20]performedveryfirstexperimentsinstudyingtheimpactofdifferentsocialbotstrategies
onthesuccessofsocialbotsintermsofinfiltrationperformance. Theycreated120socialbotaccountswithdifferent
characteristicsandbehaviors. Investigatedstrategieswereformedbyusingfourcharacteristics: (1)gender,(2)activity
levelindicatingthevolumeofpostingtweetsandfollowingotherusers,(3)tweetgeneratingstrategyincludingeither
retweetingoremployingautomatedsentencegenerators,and(4)thepolicyofchoosingtargetusers. Although31%of
socialbotsweremissedduringtheexperimenttimeperiod,theyshowedthatactivitylevelandthepolicyofchoosing
targetusersplayasignificantrole. Incontrast,genderandgenerationstrategydon'thavemuchinfluenceonthesuccess
ofasocialbot. Fazilandhiscoworker[13]created98Twittersocialbotsassociatedtosixdifferentcountriesandstudied
theinfluenceofsomeprofilecharacteristicsandactivitiesoninfiltrationperformanceofasocialbots. Theyfoundthat
socialbotsbelongingtoIndiaaremoresuccessfulindupingusers. Genderhasnosignificantimpactandfollowingisthe
mostinfiltrativebehavioramongtheactivitieswhichisstudied.
2Userswhicharealuredtofollowasocialbotarecalledsusceptible.
4
3 METHODOLOGY
Weaimtofindoutaneffectivedesignforsocialbotsbyexploringandevaluatingdifferentsocialbotinfiltrationstrategies.
Each infiltration strategy indicates a set of profile and behavioral related characteristics. The intuition behind our
methodologyisthatcreatingasocialbotwithdifferentcharacteristicsresultsindifferentqualityintermsofinfiltration
performanceandstealth.
Designingasocialbotinfiltrationstrategyinvolvesdecisiononapileofprofileandbehavioralattributes. Therefore,
studyingallplausiblestrategiesneedstoinvestigateallfeasiblearrangementsofallprofileandbehavioralcharacteristics
ofasocialbot. Thereisanexponentialrelationbetweenthenumberofinvestigatingcharacteristicsandthenumber
ofpossiblestrategiesmadeupofthem. Hence,studyingallattributesiscostlyandinfeasible. Thenumberofpossible
strategiesiscalculatedusingequation1,where Ai isthesetofdistinguishedvalidvaluesofI-thecharacteristicandnis
thenumberofinvestigatingcharacteristics.
Πn
i =1Ai
(1)
To manage the exponentially increasing number of feasible strategies, we focus on some unstudied characteristics
whicharemainlydesignedexploitingsocialtheories. Furthermore,wepartitionallcharacteristicsintotwogroupsand
investigatetheeffectofthecharacteristicsofeachgroupseparately. Inthefirstphase,basicprofileandbehavioral
characteristicsarestudied. Duringthesecondphase,somecharacteristicswhicharemainlydesignedontheshadeof
homophilytheory,areinvestigatedwhilethevaluesofthebasiccharacteristicsofthemostinfluentialstrategyofthe
firstphaseareemployed. Duringthefirstphase,fivecharacteristicswhichthreeofthemarebinaryandthetworest
havefourvalidvalues,arestudied. Accordingtoequation
refeq:1,thenumberofstrategieswouldbe128. Andinsecondphase,theimpactoffivebinaryandonequadraticfactors
areexplored. Thus,thenumberofstrategieswouldalsobe128. Therefore,totally256strategiesareconsidered. Ifall
elevenfactorsofbothtwophasesarestudiedinonephase,thenumberofstrategieswouldbe16384,whichis64times
greaterthan256. Infollowingsubsectionsomedetailsaboutcreatingsocialbotsandcommoncharacteristicsandalso
evaluatingstrategies,whichareidenticalinbothphasesaredescribed.
3.1 SocialbotCreation
Thesocialbotcreationconsistsoftwomainphases: (1)creatingafakeaccountand(2)developinganautomatedsoftware
which controls all activities of that account. All social accounts are created manually. This phase involves deciding
on some basic profile characteristics. In addition, developing a software controller includes deciding on behavioral
characteristics. Someoftheseprofileandbehavioralcharacteristicsarecommonbetweenallinvestigatedstrategies
andsomearedifferent. Weintroducecommoncharacteristicsinthissubsection.
Foreachstrategytwosocialbotsarecreatedwhicharesimilarincharacteristicswhichareunderstudiedanddifferent
ingender. Twitteruserprofileshavenoattributeindicatingthegenderoftheuser. Usersusuallyinferthegenderof
anotheruserbasedontheprofilepictureorthefirstnameattributeoftheprofile. Inourexperiment, thenamesof
socialbotsareselectedformalistofpopularPersiannames. Theprofilepicturesarechosenfrompopularphotoson
thehttp://hotornot.com/websiteoreye-catchingpicturesofGooglesearchresultaccordingtotheassignedgenderof
correspondingsocialbot.
Inourexperiment,allsocialbotshavethesametimezone,whichis+3:30GMT.Inaddition,thelanguageofallcreated
3.2 STRATEGYEVALUATION
5
profiles are set to English and also the language of all reposted tweets are English. As proved in [12] algorithmic
sentencescanbeeasilyidentified. Thus,wedon'texploitanyautomatedsentencegenerationmethodslikeMarkov
chaintosyntheticallygeneratetweets.
ToinjecteverynewbornsocialbotintoTwitter'snetworkofusersbyestablishingsomeprimaryconnections,wemade
everysocialbottweetaquoteandfollowtenuserswhicharesuggestedbyTwitterjustaftercreatingthefakeaccount.
ThisisaneffectivestrategytopreventTwitter'sTrustandSafetyteamfromsuspendingoursocialbots.
Allactivitiesareperformedfrom9AMtill12PMaccordingtoindicatedtimezoneandanysynchronizedbehaviors
areavoided. Furthermore,wemanageperiodicbehaviorasaclueforfakeaccountidentificationbyusingrandomtime
andrandomnumberinafixedrangeasthenumberoftimesthatanactivitycarryoutinaday. Activitiesarelimitedto
follow,retweet,andlike. Asitisconcludedin[12],themoreactivityasocialbotdo,themoreinfiltrationitachieved. The
socialbotswiththemosthighactivitylevel,theyintroduced,perform14actionsdailyonaverage. Ontheotherhand,it
isconceivablethatincreasingthevolumeofactivityleadstoabnormalbehaviorandsuspendingbyTwitterdefense
mechanism. So,wechoosethenumberofactivitiesthateverysocialbotperformsineverydayinarangethatcentered
by14.
Wecreatefakeaccountsmanuallyratherthanpurchasingthemfromblackmarketsorusingautomatedprofilecreation
tools,tobeabletosetprofileattributesaccordingtothecharacteristicsinlinewithstrategyassignedtothatsocialbot
andalsocommonattributesmentionedabove.
3.2 StrategyEvaluation
The success of each strategy is evaluated in terms of infiltration performance and being stealthy at the end of the
durationoftheexperiment. Wewillgivescoretothestrategiesbymetricswhicharemeasuringinfiltrationperformance
quantitatively. However,thestealthyofstrategiesisevaluated,asasecondarycriterion,todeterminetowhatextent
theyareundetectable.
Infiltrationperformanceevaluateshowmuchasocialbotcouldbeeffectivewhenemployedtosharesomething. As
reportedin[21],thenumberoffollowersrepresentstheinfiltrationscaleanduser'spopularity,butisnotrelatedtoother
importantnotionsofinfluencesuchasengagingtheaudience. Therefore,weuseKloutscoreaswell.
TherearetwowaystofollowauseronTwitter. Oneisfollowingauserdirectly,andtheotherisfollowingauserindirectly
byaddingshe/hetoalist. Whenauserisfolloweddirectly,itstweetsappearinthe"homefeed". But,ifauserisadded
intoalist,itstweetswillappearjustinthatlist. Whenwetalkaboutthenumberoffollowers,wemeanthetotalnumber
ofdirectandindirectfollowers. Ifjustthenumberofdirectfollowersisintended,wewillmentionitexplicitly. Asitwill
describelaterinfollowingsection,somesocialbotsarefollowedbysomeofourothersocialbots. Thiskindoffollowers
isnotcountedintoaccountwhenmeasuringthenumberoffollowersmetric.
Kloutscoreisapopularandstandardmetriccalculatedbyaprivatecompany,Klout.com,whichcollectsinformationof
anaccountinasocialnetworktoevaluatetheiroverallsocialinfluence[22]. Itisanumberbetween1and100. The
moreinfluentialasocialaccountis,thehigheritsKloutScorewillbe. TheexactalgorithmusedtocomputeKloutscore
isnotpubliclyknown,butwhatisadmittedisthatfollowingmeasureshelptoincreaseKloutscore: Followers,retweets,
mentions,listmemberships.
Aprimaryandsimplewaytoevaluatestealthyofastrategy,whichisusedbysomerelatedworks[12,13],iswhetherthe
socialbotaccountdevelopedbasedonthestrategyisdetectedandsuspendedbyTwitterdefensemechanismornot.
Wealsousethesamecriteriatobeabletocompareourexperimentalresultswiththeirs.
3.3 ETHICAL CONSIDERATIONS
6
3.3 Ethicalconsiderations
Intheprocedureofbothtwophasesofthisstudy,256socialbotaccountswerecreated. Thetotalnumberofinnerand
outerlinkswhichareestablished,isaboutthirtythousandthatisignorablecomparingtothesizeoftheTwittersocial
network. Sinceallofthetweetsrepostedbythesocialbotsareselectedfrompopulartweetswhicharesharedalarge
numberoftimes,webelievethatthenearlyfortythousandpopulartweetstotallysharedbythesocialbotsduring60
daysoftheexperiment,havenegligibleimpactontheecosystemofTwitterthatabout500milliontweetsposteddaily
onit[23]. However,allsocialbotaccountsweredeletedaftergatheringalldataneededtostudythem.
4 PHASE1: BASIC CHARACTERISTICS
Therearedifferentpotentiallyinfluentialcharacteristicswhendifferentinfiltrationstrategiesareexplored. Someof
themareempiricallystudiedinpreviousresearchesandweleveragedtheresultsonforminggeneralcharacteristicsof
oursocialbots. Inthefirstphasesomebasicprofileandbehavioralcharacteristicsareinspected. Profilecharacteristics
include"gender"and"profilepicture"whichhaveimpactontworemarkablymoreeye-catchingprofileattributes: name
and profile picture. Aside from two profile characteristics, three behavioral characteristics are leveraged to make
differentstrategies. Detaileddescriptionofthesecharacteristicsisprovidedinfollowingsubsection. Afterwards,the
resultsofourexperimentarepresentedinseparatesubsection.
4.1 SocialbotCreation
Thecharacteristicsourstudyisfocusedon,duringthefirstphase,areintroducedinthissubsection. Thedefinitionand
thedifferentvarietiesofeachcharacteristicarestated.
1) Gender: Although earlier researches proved that gender has not significant impact on the success of infiltration
strategies,weusethischaracteristicfollowingtwogoals: (1)toapplygenderonfirstnameandprofilepicturetoreacha
consistentprofileattributesand(2)tocircumventgenderbiasbygeneratingtwodifferentversionsofeverystrategy.
2)Profilepicture:Weexploittwocategoriesofattractiveprofilepictures. First,thepopularportraitphotosofhttp://hotornot.com/
areused. Second,somestunninggirlish/boyishphotosareselectedbygoogling.
3) First target set: Having some primary follower is essential for the success of subsequent follower acquisition [8].
Thus, some earlier researchers made collusion between socialbots and they follow each other at first. Establishing
relationbetweensocialbotsmakethemvulnerabletonetworkbasedfakeaccountdetectionmethods[24,25,26,27].
Tocopewiththisproblem,wedividetheactivitytimeperiodofeverysocialbotintotwoconsecutivephases. Duringthe
firstphase,apredefinedtargetuserswithspecificattributesarefollowedandinthesecondphaserandomlyselected
usersarefollowed. "Firsttargetset"characteristicindicatesthespecificattributesofusers,whicharefollowedinfirst
phase. Itcouldbeanyofthesecategories: (1)butterflyaccounts,(2)promoteraccounts,(3)followbackeraccounts,
and(4)othersocialbots. Thebutterflyaccountshaveanextraordinarylargenumberoffollowersandfollowings. In
addition,thenumberoftheirfollowingaccountsisgreaterthan5000[28]. Thepromoteraccountshavealargenumber
offollowingscomparedtothenumberoffollowersandalsohaverelativelyhighURLratio[28]. ThereareTwitter's
accountswhichareregisteredthemselvesintheknownwebsitesandpromisetofollowbackusersthatfollowthem. We
callthiskindofTwitteraccountsfollowbackeraccounts. Weleveragetwowebsitestoaccessthelistoffollowbackers:
(1)http://www.letsallfollowback.com/,and(2)http://twitterautofollowlist.com/.
4)Userinterest: Theintuitionbehinddesigning"userinterest"isaspecificinterestassignmenttothesocialbotstoliken
themmoretothemankind. Weconsiderthreedifferentmaintopicsasthetypesofinterestandonelevelfornospecific
4.2 EXPERIMENTALRESULTS
7
interests. So four different values for this characteristic are devised: (1) art, (2) sport, (3) politic, and (4) no specific
topic. Thesocialbotsexhibittheirinterestsbyselectingtweetstorepost. Forthispurpose,socialbotsbelongingtothe
firstthreecategoriesgetandrepostthemostpopulartweetsbymosthothashtagsrelatedtotheirtypeofinterest.
Thesocialbotsofthelastcategoryrepostmostpopulartweetsregardlessoftheirtopic. Tochoosethemostpopular
hashtags,weusehttp://hashtagify.me/webpage. Thispageallowstheiruserstosearchamongmorethan70million
Twitter hashtags and find the best ones for their needs based on different criteria such as popularity, relationships,
languages,influencesandothermetrics.
5)Likinginterestingtweets: Itisabinarycharacteristicwhichindicatesthatwhetherthesocialbotperformslikeactivity
ornot. Thesocialbotsliketweetsunderthetopicoftheirinterest.
Accordingtothenumberofvarietiesforeachcharacteristicandtheequation1,thetotalnumberofstrategiesachieved
by these characteristics is 128. We create all socialbots on Twitter. They are implemented in Python using Tweepy
package. TweepyisaPythonlibraryforaccessingTwitterAPIs. Allsocialbotsexecuteusingonemachinefor40days
that 10 days are dedicated to primary infiltration. We evaluate socialbots in terms of infiltration performance and
stealthyjustaftertheendofthistimeperiod. Resultsareprovidedinnextsubsection.
4.2 ExperimentalResults
Asitisstatedinsubsection3.2,thesuccessofsocialbotsisevaluatedusinginfiltrationperformanceandbeingstealth.
While note of the socialbots created in the first phase is suspended or blocked by Twitter during the 40 days of
experiments,weconcludethatthesocialbotsarestealthyenoughnottodetectbythesecuritymechanismsofTwitter.
Table1comparesthedurationofexperiments,thenumberofcreatedsocialbots,andthenumberofthemwhichwere
suspendedduringtheexperimentsfromthepreliminarystudiesandours. Althoughthedurationofourexperimentis
longerthanothers,nooneofthesocialbotsaredetectedbyTwitterdefensemechanism.
Inordertodecideonhowmucheverycharacteristicaffectsocialinfluenceofsocialbots,infiltrationperformanceof
differentvaluesofeveryconsideredattributesareinvestigatedintermsofthenumberoffollowersandtheKloutscore. To
indicatethedensityofthevariationsclearlyandtoprovidethepossibilityofeasyvisualcomparisonbox-plotdiagrams
areused[29].
Figure1presentsbox-plotsforthenumberoffollowersandKloutscoreofoursocialbotsofdifferentgender. Itshows
thatmaleandfemalesocialbotsachievealmostthesamenumberoffollowersinaverageandtherangesofKloutscore
areidentical. Femalesocialbotshavelittleadvantageovermalesocialbotsinthemaximumnumberoffollowersacquired
and the median value of Klout score. However, this little advantage is not noticeable as speculated in the previous
studies.
In figure 2, two categories of profile pictures, includingportrait andeye-catchinggirlish/boyishpicture, are compared.
TABLE 1 Comparisonofthestealthinesswithrelatedworks
Experiment
Durationofexperiment Numberofsocialbots
Freitasetal[20]
Fazilandhiscoworker[13]
Phase1ofourstudy
Phase2ofourstudy
30
30
40
40
120
98
128
128
Number of suspended
socialbots
38
0
0
0
8
4.2 EXPERIMENTALRESULTS
(a)numberoffollowers
FIGURE 1 Theimpactofgenderon(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
Althoughthemediannumberoffollowersofsocialbotswithgirlish/boyishprofilepictureislowerthansocialbotswith
portraitprofilepicture,girlish/boyishpictureoutdoportraitinKloutscorediagram. Sothegirlish/boyishpictureshave
slightlymoresocialinfluencethantheportraitpictures.
(b)Kloutscore
(a)numberoffollowers
FIGURE 2 Theimpactofprofilepictureon(a)thenumberoffollowersand(b)Kloutscore
TheinfiltrationperformanceoffirsttargetsetcharacteristicintermsofnumberoffollowersandKloutscoreisillustrated
in figure 3. It shows that the range of the number of followers is about the same in allfirsttargetset categories and
littleadvantageofotherbotsasfirsttargetsetinthemedian. However,Kloutscoreisamoretellingmeasureforsocial
influenceanditshowssomewhatsuperiorityofbutterfliesoverotherbotsregardingboththeaverageandthemedian
oftheKloutscoredistribution. Therefore,targetingbutterflyaccountstogainveryfirstsocialinfiltrationseemstobea
wisechoice.
Fromthefigure4wecanseeaclearcorrelationbetweentheuserinterestandbothoftheinfiltrationperformance
measures. Hence,beinginterestedintweetsrelatedtoartboostssocialinfluence. Itisnoteworthythatconsideringa
specifictopicasuserinterestagainstrandomtweetincreasetheprobabilityofsuccess. Likingtweetsunderthetopic
ofuserinterestputemphasisontheuser'staste. Asshowninfigure5,exhibitinguserinterestbylikingtweetshavea
positiveeffectoninfiltrationperformance. Furthermore,thevariabilityofboththenumberoffollowersandKloutscore
islessinsocialbotslikinginterestingtweetsandthusitmeansthatitismorereliableandthereismoreprobabilityfor
4.2 EXPERIMENTALRESULTS
9
(a)numberoffollowers
FIGURE 3 Theimpactoffirsttargetseton(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
socialbottopromoteitssocialinfluence.
(a)numberoffollowers
FIGURE 4 Theimpactofuserintereston(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
(a)numberoffollowers
FIGURE 5 Theimpactoflikinginterestingtweetson(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
10
4.2 EXPERIMENTALRESULTS
Asitispredictablebasedontheaboveanalysis,themoresuccessfulsocialbotofourexperimentistheonewhichismale,
hasgirlish/boyishpicture,followersbutterflyaccountsasfirsttargetset,isinterestedinart,andlikestweetsrelatedto
itsinterest. Theonlycharacteristicwhichthemostsuccessfulsocialbothasanditisnotthedominantone,isitsgender.
Asitisconsideredformer,genderdoesn'thaveanoticeableimpactontheinfiltrationperformance.
Inordertostudythecontributionofeachcharacteristicingainingsocialinfluence,weconductasensitivityanalysis.
Weemploysensitivityindexmeasuretoassesstheparametersensitivity. Sensitivityindexcalculatesthenormalized
differenceofoutputwhileoneinputparameterchangingfromitsminimumvaluetoitsmaximumvalue, inorderto
quantifytheinfluenceofthatinputparameterontheoutput[30]. SensitivityindexisformulatedinEquation2,where
Dmi n and Dmax representtheminimumandmaximumoutputvalues,respectively,whilevaryingtheinputparameter
fromitsminimumvaluetoitsmaximumvalue.
S I = Dmax − Dmi n
Dmax
(2)
Incasetheinputparametersarenominal,theminimumandmaximumvaluesofoutputareconsideredwhiletheinput
parameterchangesinnominalvalues. Figure6demonstratesthesensitivityindexofbasiccharacteristics. Theuser
interest and liking interesting tweets have the most impact on infiltration scale and Klout score, respectively. As
speculated,Userinterestandlikinginterestingtweetswhichboundupwithuser'staste,havemoreconsiderableimpacton
infiltrationperformancethanothercharacteristics.
FIGURE 6 Thesensitivityindexofeachbasicparametertakesvaluesbetween0and1. Thehigheristhesensitivity
indexthemoreinfluentistheparameterontheKloutscore.
Inordertostudytheinteractionamongthreemosteffectiveparameters,theaveragevalueofKloutscoreofsocialbots
withthespecifiedvaluesoftheseeffectiveparametersaredisplayedasaheatmapdiagraminfigure7. Asitcanbe
perceivedthattheeffectofoneofthoseparametersontheKloutscoreisnotconstantandtheeffectdiffersatdifferent
values of the others. For example, the differences between the average of the Klout score of socialbots which are
interestedinarttweetsandlikearttweetsandtheaverageoftheKloutscoreofsocialbotswhichareinterestedinsport
tweetsandlikesporttweetsvariesfordifferentfirsttargetset. Precisely,whenthefirsttargetsetissettobutterfly,the
effectofbeinginterestedinartonthevalueofKloutscoreincomparisontosport,isgreaterthanwhenthefirsttarget
setissettopromiserorpromoter. Inlikemanner,theeffectofthevalueofeverythreemosteffectiveparametersvaries,
dependingonthevalueofothers.
11
FIGURE 7 TheaveragevalueofKloutscorefordifferentvalueofthemostinfluentialparameters: Interest,liking,
andfirsttargetset.
5 PHASE2: ADVANCED CHARACTERISTICS
Homophilyisasocialtheorywhichexplainsfriendshipcreationprocess. Thetheoryexplainthattheindividualsina
socialnetworktendtobecomefriendswithsomeonewhoissimilartothem. Themoresimilarity,themorelikelihoodto
becomefriends. Manyresearcheshavestudiedhomophilyalongdemographicdimensionssuchasgender,age,location,
andlanguage[31,32,33]. Besidesdemographicsimilarity,sharedinterests,followees,andfollowersarealsoinfluential
factorsthatarehelpfulinfindingsimilarfriendsaswell[34]. Differentkindsofsimilarityarrangedifferentformsof
homophily. Thesimilarityininformation,tasteandattitudesistheoriginofhiddenvaluehomophily[31]. Inaddition,
triadicclosuretheorystatesthatiftwoindividualsinasocialnetworkhavemutualfriends,thentheprobabilitythat
theybecomefriendsinthefuturewillincrease. Ifhavingcommonfriendsisconsideredasadimensionofhomophily,
triadicclosureisaspecialcaseofhomophilytheorywhichiscalledstructuralhomophily[35].
Inspiringfromhomophilytheory,inthisphase,wedesignsomenewcharacteristicsandvalidatetheimpactofthem
ontheinfiltrationperformance. Noticethatcommonstrategiesbetweenallsocialbotsexplainedformer,including(1)
follow only English users and (2) retweet and like just English tweets, are aligned with the increasing demographic
homophily.
5.1 SocialbotCreation
Inthe secondphaseof ourempiricalstudy, allofthe socialbotsresemblethe characteristicsof themostinfiltrative
socialbotofthefirstphasewhichistheonewhichhasgirlish/boyishpicture,followbutterflyaccountsasfirsttarget
set,isinterestedinart,andlikestweetsrelatedtoitsinterest. Asitisstatedformer,genderdoesn'thaveanoticeable
impactontheinfiltrationperformance. However,toavoidgenderbias,foreverystrategyproducedbydifferentlevelsof
thefollowingfactors,twosocialbotswithdifferentgenderarecreated. Thefactorsourstudyisfocusedon,duringthe
secondphase,arepresentedasfollows:
1)Targetusers: Fourlevelsareconsideredfortheselectionoftargetuserstobefollowedbythesocialbots,regarding
12
5.2 EXPERIMENTALRESULTS
structuralhomophilyandtriadicclosure,includingthefollowersofitsfollowers,thefollowersofitsfriends,thefollowers
ofitsneighbors,andrandomlyselectedusers. Whereasthetermneighborreferstoanytypeoffollowerorfollowee
relationship.
2)Retweetbyhashtag: Itisabinarycharacteristicwhichdeterminesifthesocialbotincreasethehomophilybetweenthe
userwhichitfollowsanditself,ornot. Ifthevalueofthischaracteristicisyes,itmeansthatthesocialbotwillsearchfor
apopulartweetwhichhasatleastonecommonhashtagwiththelatesthashtagedtweetoffolloweduser,ifexists. A
tweetiscountedasapopulartweetifithasatleastonehashtagwhichisincludedinthe14mostpopularhashtagin
http://hashtagify.me/webpage.
3)Retweet: Inthesimilarmannerasretweetbyhashtag,itisabinaryfactorwhichifitissettoyes,whenthesocialbot
followanaccountitretweetoneofitsrecenttweetsshortlyafterwards. Ifthisfactorissettono,thesocialbotdonot
retweetthetweetsofitsfriends. Thischaracteristiccontrolsanaspectofhomophilyininterestandtaste.
4) Like: Likewise, as explained above about previous characteristic, this characteristic is also binary and indicates
whetherthesocialbotlikeatweetsharedbyanaccount,subsequenttofollowingit. Inthesameway,itfocusesonan
aspectofhiddenvaluehomophily.
5)Consideringrecentactivities: Inordertostudytheimpactofconsideringthepresenceofrecentactivityofuserswhich
arechosentobefollowed,insuccessofasocialbot,twodifferentpoliciesaretakenintoaccount: (1)followsolelyactive
users,(2)followrandomlyregardlessofitsactivitystate.
According to the equation 1, the total number of strategies achieved by the characteristics of phase 2 is 128. We
createallthesocialbotaccountsmanuallyonTwitter. ThesocialbotsareimplementedinPythonusingTweepypackage.
Allsocialbotsexecuteusingonemachinefor40daysthat10daysarededicatedtoprimaryinfiltration. Weevaluate
socialbots in terms of infiltration performance and stealthy just after this time period. Results are provided in next
subsection.
5.2 ExperimentalResults
Overthedurationofthesecondphaseofourexperiment,thesocialbotsreceivedintotal27537followsfrom24845
distinctuserswhichisabouttriplethetotalnumberoffollowersofthesocialbotsofthefirstphase. Themainconcen-
trationofthisphaseistheevaluationoftheimpactofemployinghomophilybasedcharacteristicsonthesuccessofa
socialbot. Table2displaystheaverageofKloutscoreandthefollowernumberforsocialbotsinfourfollowingcategories:
(1)socialbotswhichemploynohomophilybasedcharacteristic,(2)socialbotsexploithiddenvaluehomophilybased
characteristics,includingRetweetbyhashtag,Retweet,andLike,(3)socialbotswhichmakeuseofstructuralhomophily
basedcharacteristic,namelyTargetusers,and(4)socialbotswhichapplybothhiddenvalueandstructuralhomophily
basedcharacteristics. Itcanbeseenfromthesummarystatisticsprovidedintable2thatalthoughemployinganyof
hiddenvalueandstructuralhomophilyresultsinabetteroutcomethanusingnohomophilybasedstrategy,usingboth
ofthemsimultaneouslysignificantlyimprovethesocialinfluenceandthepopularityofsocialbotscorrespondingto
Kloutandthenumberoffollowers,respectively. Theseresultsprovidesupportforthehypothesisthathomophilybased
characteristicsmakesocialbotsmoreinfluential.
Asitisreportedintable1,noneofthesocialbotscreatedinphase2issuspended. Thus,thestealthinessofthestrategies
employedduringthisphaseisacceptable. Inordertoconsidertheimpactofeachindividualcharacteristicongaining
popularityandinfluenceintheTwitter,thenumberoffollowersandKloutscoreareinvestigatedrespectively. These
twocriteriaaremeasuredattheendofthedurationoftheexperimenttoquantifyhowsuccessfulasocialbotis.
Althoughgenderisnotoneofthecharacteristicsstudiedinthisphase,toreconfirmourresultsinphaseone,westartby
investigatingtheimpactofthegender. Figure8illustratesboxplotsthatsummarizethedistributionsforthenumber
5.2 EXPERIMENTALRESULTS
13
TABLE 2 Comparisonoftheinfiltrationperformanceofhomophilypolicies
Category
NoHomophily
HiddenValueHomophily
StructuralHomophily
Both
KloutScore
27
30
31
35
FollowerNo.
80
80
136
209
of followers and the Klout score of socialbots by gender. Although gender has no noticeable impact on the median
followernumber,theaverageofthenumberoffollowersforfemalesocialbotsisslightlymorethanmaleones. Klout
scoreindicatesakindofmoresuccessforfemales. However,ourResultsconfirmwithpreviousfindings[12,20,13]
statingthatgenderhasnosignificantimpactoninfiltrationperformance.
(b)Kloutscore
(a)numberoffollowers
FIGURE 8 Theimpactofgenderon(a)thenumberoffollowersand(b)Kloutscore
Asdescribedformer,targetusersisacharacteristicwhichindicatesthepolicyoffollowingotherusers. Fourdifferent
levelsaredefinedforthischaracteristic,includingthefollowerofitsfollowers,thefollowersofitsfriends,thefollowers
ofitsneighbors,andrandomlyselecteduser. Figure9aandbshowsthequartilesofthedistributionofthenumberof
followers and Klout score, respectively, for each target user. From the figure, it is evident that there is a significant
differenceinthepopularityofrandomlyfollowingusersorfollowingthefollowersofusersintheneighborhood. Thereis
asimilarpatterninthecaseofKloutscore. Overall,theseresultsrevealthatinfiltrationstrategiesemployingstructural
homophily based characteristics are better choices. The plot boxes in the figure 9 suggest that among structural
homophilybasedpoliciesstudiedfollowingthefollowersofthefollowersofthesocialbotresultsinmoderatelymore
successfulinfiltrationstrategyintermsofeitherthenumberoffollowersorKloutscore. Hence,itcouldconceivablybe
hypothesizedthattheusersaremoreconfidentintheirfriendsthantheirfollowers. Thus,theprobabilityoffollowing
backanewfollowerwhichisafriendoffriendismorethantheprobabilityoffollowingbackanewfollowerwhichisa
friendoffollowers.
Asstatedearlier,halfofoursocialbotsinphase2afterfollowingauser,selectahashtagofoneofitsrecentlyposted
tweets,ifexists,andsearchforapopulartweethavingthesamehashtag,whereastheotherhalfdonotrepostsucha
populartweetwithcommonhashtag. Thisbinaryfactorwhichiscalledretweetbyhashtaginspiredbythehiddenvalue
homophily. Figure10showsthemaindescriptivestatisticsofthedistributionofthenumberoffollowersandKlout
14
5.2 EXPERIMENTALRESULTS
(a)numberoffollowers
FIGURE 9 Theimpactoftargetuserson(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
score,respectively,fortwolevelsofthisbinaryfactorintheformofboxplot. Ascanbeseenfromthisfigure,repostinga
populartweetbycommonhashtagbringsslightlybetterresults. Twodiscretereasonsemergedfromthis. First,asitis
assumed,usinghomophilybasedcharacteristicsinthedesignoftheinfiltrationstrategyimprovestheprobabilityof
followerachievementandasaresult,boostssocialinfluence. Second,embeddingthischaracteristicleadstohigher
activitylevelwhichisconfirmedthatitresultsinbetterinfiltrationperformance[20].
(a)numberoffollowers
FIGURE 10 Theimpactofretweetbyhashtagon(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
Recallfromprevioussubsectionhalfofoursocialbotsrepostoneoftherecentlypostedtweetsofauserafterfollowing
it, while the other half does not do that. This characteristic denoted as retweet. Figure 11 compares the summary
statisticsofthenumberoffollowersandKloutscorefortwolevelsofthisbinarycharacteristicintheformofboxplot. It
showsthatthemedianfollowernumberandKloutscoreofthesocialbotswhichretweetafterfollowingarehigher. In
thesamewayasretweetbyhashtag,itisthereforeprobablethatthesuperiorityofretweetafterfollowingisbecauseof
eitherhomophilyenhancementoractivityincrease.
Anotherfactorsuggestedtostudythebeneficenceofhomophilyislikeafterfollowing. Respectingtothischaracteristic,
halfofoursocialbotslikeoneoftherecentlypostedtweetsofauserafterfollowingit,whiletheotherhalfdonnotlike.
Asitisillustratedinfigure12,althoughthereisnosignificantdifferenceinmedianpopularityacquiredbysocialbotsof
differentlevelsofthisfactor,sincetheupperwhiskerislongerincaseoflikeafterfollowing,theaverageofthefollower
5.2 EXPERIMENTALRESULTS
15
(a)numberoffollowers
FIGURE 11 Theimpactofretweeton(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
numberismorethantheother. Themedianandinter-quartilerangeofbothtwogroupsareroughlythesameforKlout
score. However,theaverageofexploitingthisstrategyisslightlymore,becauseofhavinglongerupperwhiskerand
shorterlowerwhiskerthantheother.
(a)numberoffollowers
FIGURE 12 Theimpactoflikeon(a)thenumberoffollowersand(b)Kloutscore
(b)Kloutscore
Thelastcharacteristicistheonedecidingwhetherconsiderthepresenceofrecentactivityofwhoisfollowedornot.
Theresultsaredemonstratedinfigure13. Surprisingly,themedianandtheaverageofKloutscoreissimilarforboth
oftwostateofthischaracteristic. Althoughthemedianandtheaverageofthenumberoffollowersshowabitbetter
resultsforconsideringrecentactivity,thedifferenceisnotsignificant.
Themoresuccessfulsocialbotofthesecondphaseistheonewhichisfemale,hertargetusersetconsistsofthefollowers
of her followers, retweet similar tweets by hashtag, retweet a randomly selected tweet of who followed, and like a
randomlyselectedtweetofwhofollowed. Asitisconsideredformer,genderdoesn'thaveanoticeableimpactonthe
infiltration performance. In order to study the contribution of other characteristics in gaining social influence, we
conductasensitivityanalysis. Figure14demonstratesthesensitivityindexofadvancedcharacteristics. Thepolicyof
selectingthetargetusershasthemostimpactoninfiltrationscaleandKloutscore. Sincethecharacteristicsstudiedin
thesecondphasemainlydesignedinspiringhomophilytheorywhichfocusedonthemechanismoftheformationof
relations,theyhavemoreimpactontheinfiltrationscalethanKloutscore.
16
(a)numberoffollowers
FIGURE 13 Theimpactofconsideringthepresenceofrecentactivityon(a)thenumberoffollowersand(b)Klout
score
(b)Kloutscore
FIGURE 14 Thesensitivityindexofeachadvancedparametertakesvaluesbetween0and1. Thehigheristhe
sensitivityindexthemoreinfluentistheparameterontheKloutscore.
6 CONCLUSION
Thisstudysetouttodeterminetheinfluenceofdifferentcharacteristicsonthesuccessoftheinfiltrationstrategyof
socialbots. Forthispurposetencharacteristicsarearrangedtobeinvestigatedduringtwophases. Thefirstphaseis
managedtoinvestigatesomebasicprofileandbehavioralcharacteristics. Ithasshownthatassigningaspecifictastetoa
socialbotmakeitmorepopularandalsofurtherinfluential. Fiveothercharacteristics,mainlyinspiredbythehomophily
principle,arestudiedduringphasetwo. Amongallprofilesandbehavioralcharacteristicsstudied,characteristicswhich
areboundupwithhomophilyprinciplehaveamoretellingimpactoninfiltrationperformance. Asthecharacteristics
studied in the second phase mainly designed inspiring homophily theory which focused on the mechanism of the
formationofrelations,theyhavemoreimpactontheinfiltrationscalethanKloutscore.
REFERENCES
17
Further experimental investigations are needed to find out more influential characteristics on infiltration strategy
design. Since there is an exponential relation between the number of exploring factors and the number of possible
strategiesemployingthesefactors,itisrecommendedtocandidateinfluentialcharacteristicstoexploreusingsocial
principles. Anotherpossibleareaoffutureresearchwouldbetoinvestigatethecorrelationbetweencharacteristics.
REFERENCES
[1] Kallas P, Top 15 Most Popular Social Networking Sites and Apps [August 2017] @DreamGrow; 2017.
08/12/2017). https://www.dreamgrow.com/top-15-most-popular-social-networking-sites/.
[2] SewardZM,TwitterAdmitsthatasManyas23MillionofitsActiveUsersareAutomated. Quartz;2014.
[3] WoolleySC. Automatingpower: Socialbotinterferenceinglobalpolitics. FirstMonday2016;21(4).
[4] WeiW,XuF,TanCC,LiQ. SybilDefender: Adefensemechanismforsybilattacksinlargesocialnetworks. IEEEtransac-
(Accessed on
tionsonparallelanddistributedsystems2013;24(12):2492 -- 2502.
[5] Fire M, Katz G, Elovici Y. Strangers intrusion detection-detecting spammers and fake profiles in social networks based
ontopologyanomalies. HumanJournal2012;1(1):26 -- 39.
[6] BenevenutoF,MagnoG,RodriguesT,AlmeidaV.Detectingspammersontwitter.In: Collaboration,electronicmessaging,
anti-abuseandspamconference(CEAS),vol.6;2010.p.12.
[7] LeeK,CaverleeJ,WebbS.Uncoveringsocialspammers:socialhoneypots+machinelearning.In:Proceedingsofthe33rd
internationalACMSIGIRconferenceonResearchanddevelopmentininformationretrievalACM;2010.p.435 -- 442.
[8] Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M. The socialbot network: when bots socialize for fame and money. In:
Proceedingsofthe27thannualcomputersecurityapplicationsconferenceACM;2011.p.93 -- 102.
[9] Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M. Design and analysis of a social botnet. Computer Networks
2013;57(2):556 -- 578.
[10] Elyashar A, Fire M, Kagan D, Elovici Y. Homing socialbots: intrusion on a specific organization's employee using Social-
bots. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and
MiningACM;2013.p.1358 -- 1365.
[11] ZhangJ,ZhangR,ZhangY,YanG. Ontheimpactofsocialbotnetsforspamdistributionanddigital-influencemanipula-
tion. In: CommunicationsandNetworkSecurity(CNS),2013IEEEConferenceonIEEE;2013.p.46 -- 54.
[12] FreitasC,BenevenutoF,GhoshS,VelosoA. Reverseengineeringsocialbotinfiltrationstrategiesintwitter. In: Proceed-
ings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 ACM;
2015.p.25 -- 32.
[13] FazilM,AbulaishM. WhyasocialbotiseffectiveinTwitter? Astatisticalinsight. In: 20179thInternationalConference
onCommunicationSystemsandNetworks(COMSNETS);2017.p.564 -- 569.
[14] Jain R. The art of computer systems performance analysis: techniques for experimental design, measurement, simula-
tion,andmodeling. JohnWiley&Sons;1990.
[15] Khademi M, Moghaddam SH, Abbaspour M. An empirical study of the effect of profile and behavioral characteristics
ontheinfiltrationrateofsocialbots. In: ElectricalEngineering(ICEE),2017IranianConferenceonIEEE;2017.p.2200 --
2205.
[16] Kang JH, Lerman K. Using lists to measure homophily on twitter. In: AAAI workshop on Intelligent techniques for web
personalizationandrecommendation;2012..
18
REFERENCES
[17] MessiasJ,SchmidtL,OliveiraR,BenevenutoF.Youfollowedmybot! TransformingrobotsintoinfluentialusersinTwitter.
FirstMonday2013;18(7).
[18] BoshmafY,LogothetisD,SiganosG,LeríaJ,LorenzoJ,RipeanuM,etal. Integro: LeveragingVictimPredictionforRobust
FakeAccountDetectioninOSNs. In: NDSS,vol.15;2015.p.8 -- 11.
[19] AielloLM,DeplanoM,SchifanellaR,RuffoG. PeopleareStrangewhenyou'reaStranger: ImpactandInfluenceofBots
onSocialNetworks. Links2012;697(483,151):1 -- 566.
[20] Freitas C, Benevenuto F, Veloso A, Ghosh S. An empirical study of socialbot infiltration strategies in the Twitter social
network. SocialNetworkAnalysisandMining2016;6(1):23.
[21] ChaM,HaddadiH,BenevenutoF,GummadiPK. Measuringuserinfluenceintwitter: Themillionfollowerfallacy. Icwsm
2010;10(10-17):30.
[22] RaoA,SpasojevicN,LiZ,DSouzaT. Kloutscore: Measuringinfluenceacrossmultiplesocialnetworks. In: BigData(Big
Data),2015IEEEInternationalConferenceonIEEE;2015.p.2282 -- 2289.
[23] AslamS,TwitterbytheNumbers(2018): Stats,Demographics&FunFacts;. (Accessedon08/11/2018). https://www.
omnicoreagency.com/twitter-statistics/.
[24] Yu H, Kaminsky M, Gibbons PB, Flaxman A. Sybilguard: defending against sybil attacks via social networks. In: ACM
SIGCOMMComputerCommunicationReview,vol.36ACM;2006.p.267 -- 278.
[25] Viswanath B, Post A, Gummadi KP, Mislove A. An analysis of social network-based sybil defenses. ACM SIGCOMM
ComputerCommunicationReview2010;40(4):363 -- 374.
[26] Cao Q, Sirivianos M, Yang X, Pregueiro T. Aiding the detection of fake accounts in large scale social online services. In:
Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation USENIX Association;
2012.p.15 -- 15.
[27] YuH,GibbonsPB,KaminskyM,XiaoF. Sybillimit: Anear-optimalsocialnetworkdefenseagainstsybilattacks. In: Secu-
rityandPrivacy,2008.SP2008.IEEESymposiumonIEEE;2008.p.3 -- 17.
[28] Yang C, Harkreader R, Zhang J, Shin S, Gu G. Analyzing spammers' social networks for fun and profit: a case study of
cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on World Wide Web ACM;
2012.p.71 -- 80.
[29] Walpole RE, Myers RH, Myers SL, Ye K. Probability and statistics for engineers and scientists, vol. 5. Macmillan New
York;1993.
[30] HambyD. Areviewoftechniquesforparametersensitivityanalysisofenvironmentalmodels. Environmentalmonitoring
andassessment1994;32(2):135 -- 154.
[31] McPherson M, Smith-Lovin L, Cook JM. Birds of a feather: Homophily in social networks. Annual review of sociology
2001;27(1):415 -- 444.
[32] Reagans R, Zuckerman E, McEvily B. How to make the team: Social networks vs. demography as criteria for designing
effectiveteams. Administrativesciencequarterly2004;49(1):101 -- 133.
[33] Yuan YC, Gay G. Homophily of network ties and bonding and bridging social capital in computer-mediated distributed
teams. JournalofComputer-MediatedCommunication2006;11(4):1062 -- 1084.
[34] Carullo G, Castiglione A, De Santis A, Palmieri F. A triadic closure and homophily-based recommendation system for
onlinesocialnetworks. WorldWideWeb2015;18(6):1579 -- 1601.
[35] RobinsG,PattisonP,WangP. Closure,connectivityanddegreedistributions: Exponentialrandomgraph(p*)modelsfor
directedsocialnetworks. SocialNetworks2009;31(2):105 -- 117.
|
1710.07606 | 1 | 1710 | 2017-10-20T16:59:49 | Complex Contagions: A Decade in Review | [
"cs.SI",
"cs.MA",
"physics.soc-ph"
] | Since the publication of 'Complex Contagions and the Weakness of Long Ties' in 2007, complex contagions have been studied across an enormous variety of social domains. In reviewing this decade of research, we discuss recent advancements in applied studies of complex contagions, particularly in the domains of health, innovation diffusion, social media, and politics. We also discuss how these empirical studies have spurred complementary advancements in the theoretical modeling of contagions, which concern the effects of network topology on diffusion, as well as the effects of individual-level attributes and thresholds. In synthesizing these developments, we suggest three main directions for future research. The first concerns the study of how multiple contagions interact within the same network and across networks, in what may be called an ecology of contagions. The second concerns the study of how the structure of thresholds and their behavioral consequences can vary by individual and social context. The third area concerns the roles of diversity and homophily in the dynamics of complex contagion, including both diversity of demographic profiles among local peers, and the broader notion of structural diversity within a network. Throughout this discussion, we make an effort to highlight the theoretical and empirical opportunities that lie ahead. | cs.SI | cs | Complex Contagions: A Decade in Review
Douglas Guilbeault, Joshua Becker and Damon Centola*
Annenberg School for Communication
Send correspondence to: [email protected]
Citation: Guilbeault, Douglas, Becker, Joshua, & Centola, Damon.
2018. Complex Contagions: A Decade in Review. In S. Lehmann & Y.
Ahn (Eds.), Spreading Dynamics in Social Systems. Springer Nature.
(Forthcoming).
2
Abstract
Since the publication of "Complex Contagions and the Weakness of
Long Ties" in 2007, complex contagions have been studied across an
enormous variety of social domains. In reviewing this decade of re-
search, we discuss recent advancements in applied studies of complex
contagions, particularly in the domains of health, innovation diffu-
sion, social media, and politics. We also discuss how these empirical
studies have spurred complementary advancements in the theoretical
modeling of contagions, which concern the effects of network topol-
ogy on diffusion, as well as the effects of individual-level attributes
and thresholds. In synthesizing these developments, we suggest three
main directions for future research. The first concerns the study of
how multiple contagions interact within the same network and across
networks, in what may be called an ecology of contagions. The second
concerns the study of how the structure of thresholds and their behav-
ioral consequences can vary by individual and social context. The
third area concerns the roles of diversity and homophily in the dynam-
ics of complex contagion, including both diversity of demographic
profiles among local peers, and the broader notion of structural diver-
sity within a network. Throughout this discussion, we make an effort
to highlight the theoretical and empirical opportunities that lie ahead.
Keywords: Complex Contagion, Computational Social Science, So-
cial Diffusion, Experimental Methods, Network Dynamics
3
1. Introduction
Most collective behaviors spread through social contact. From the
emergence of social norms, to the adoption of technological innova-
tions, to the growth of social movements, social networks are the path-
ways along which these "social contagions" propagate. Studies of dif-
fusion dynamics have demonstrated that the structure (or topology) of
a social network can have significant consequences for the patterns of
collective behavior that will emerge.
Over the last forty-five years, questions about how the struc-
ture of social networks affects the dynamics of diffusion have been of
increasing interest to social scientists. Granovetter's (1973) "Strength
of Weak Ties" study ushered in an era of unprecedented interest in
how network dynamics, and in particular diffusion on networks, affect
every aspect of social life, from the organization of social movements
to school segregation to immigration. Granovetter's study showed
that "weak ties" between casual acquaintances can be much more ef-
fective at promoting diffusion and social integration than "strong ties"
between close friends. This is because although casual friendships are
relationally weak, they are more likely to be formed between socially
distant actors with few network "neighbors" in common. These "long
ties" between otherwise distant nodes provide access to new infor-
mation and greatly increase the rate at which information propagates,
despite the relational weakness of the tie as a conduit.
In the last two decades, the explosion of network science
across disciplines such as physics, biology, and computer science has
produced many important advances for understanding how the struc-
ture of social networks affect the dynamics of diffusion. The full im-
pact of Granovetter's original insight was not realized until Watts and
Strogatz's (1998) "small world" model demonstrated that bridge ties
connecting otherwise distant nodes can dramatically increase the rate
of propagation across a network by creating "shortcuts" between re-
mote clusters. Introducing "long ties" into a network can give even
highly clustered networks the "degrees of separation" characteristic
of a small world. This model of network dynamics has had a tremen-
dous impact on fields as diverse as computer science, physics, epide-
miology, sociology, and political science.
Building on the idea of pathogenic contagions, this research
4
combines the diverse domains of ideas, information, behaviors and
diseases into the generic concept of a universal contagion. The attrac-
tive implication is that the mathematical tools developed by epidemi-
ologists for studying the spread of disease can be generically used to
study the dynamics of social, cultural and political change. In partic-
ular, the properties of social networks that have been shown to accel-
erate the spreading dynamics of disease diffusion–such as small world
topologies, weak ties, and scale-free degree distributions –can also be
used to make inferences about the role of networks in the domains of
social and political behavior. Regardless of whether a given contagion
is a prophylactic measure to prevent HIV infection or the HIV infec-
tion itself, Granovetter's groundbreaking claim was that "whatever is
to be diffused can reach a larger number of people, and traverse a
greater social distance, when passed through weak ties rather than
strong" (Granovetter 1973: 1366).
However, while this theory is useful for understanding the
rapid spread of HIV infections through networks of weak ties, it has
not shed light on the remarkable failure of these same networks to
spread prophylactic measures for preventing HIV (Coates et al. 2008).
The reason for this disturbing asymmetry between the spread of in-
fectious diseases and the diffusion of preventative measures is that
infectious diseases are typically simple contagions –i.e., contagions
for which a single activated source can be sufficient for transmission
–while preventive measures are typically complex contagions –i.e.,
behaviors, beliefs, or attitudes for which transmission requires contact
with multiple sources of activation. While repeated contact with the
same person can increase the likelihood of transmitting a simple con-
tagion, the transmission of complex contagions requires reinforce-
ment from several contacts. Any social contagion that is costly, dif-
ficult, or unfamiliar is likely to be a complex contagion, requiring
social reinforcement to spread.
The primary consequence of the distinction between simple
and complex contagions for diffusion through social networks is that
as "worlds" become very small, the speed of simple contagions in-
creases, while complex contagions become harder to spread. As Cen-
tola and Macy write,
For simple contagions, too much clustering means too few
5
long ties, which slows down cascades. For complex conta-
gions, too little clustering means too few wide bridges, which
not only slows down cascades but can prevent them entirely.
(2007: 723)
Centola and Macy (2007) identify several reasons why contagions
may be complex, including the need for social legitimation, the need
for credibility, or the complementarity of a behavior. For instance, a
contagion might be complex due to externalities, in which the value
of the contagion increases with the number of adopters. The value of
a communication technology such as a fax machine rests heavily on
the number of people who use it. When only one person has a fax
machine, it holds no value. A single contact with someone who has a
fax machine provides little reason for someone else to adopt it. Even
if the adopter provides repeated signals, a single person alone cannot
do much to increase the complementary value of the fax machine.
However, if a potential adopter comes into contact with several inde-
pendent sources who have all adopted fax machines, the complemen-
tary value of the technology increases. After exposure to a sufficient
number of reinforcing contacts, a person with no inherent interest in
fax machines can be convinced that it is a necessary investment.
A different kind of reason why a contagion might be complex
is due to uncertainty. For instance, physicians are often resistant to
adopting new medical technologies for fear of placing themselves at
risk of acting outside of accepted protocols. Early studies on adoption
patterns among physicians found that physicians were unlikely to
adopt a new medical technology, even though it had been formally
approved and was expected to be very effective, until they observed
several of their colleagues using it (Coleman et al., 1966). For similar
reasons, complexity in diffusion can also be a result of normative
pressures. This is often the case with the diffusion of managerial prac-
tices among elite firms. Because the choice of corporate governance
strategy can impact the reputation of a firm, the adoption of new prac-
tices is often dependent upon social reinforcement from competing
firms within the same industry. Corporate boards concerned about the
risk of social sanction are often unwilling to adopt new managerial
practices until they have already seen them adopted by several peer
institutions (Davis and Greve 1997).
6
In the last decade, the literature on complex contagions has
rapidly evolved both empirically and theoretically. In this review, we
discuss recent developments across four empirical domains: health,
innovation, social media, and politics. Each domain adds new com-
plexities to our understanding of how contagions emerge, spread, and
evolve, as well as how they undergird fundamental social processes.
We also discuss how these empirical studies have spurred comple-
mentary advancements in the theoretical modeling of contagions,
which concern the effects of network topology on diffusion, as well
as the effects of variation in threshold dynamics. Importantly, while
the empirical studies reviewed in this paper complement existing the-
oretical work, they also present many opportunities for new theoreti-
cal extensions. We suggest three main directions for future develop-
ment of research on complex contagions. The first concerns the study
of how multiple contagions interact within the same network and
across networks, in what may be called an ecology of complex conta-
gions. The second concerns the study of how the structure of thresh-
olds and their behavioral consequences can vary by individual and
social context. The third area concerns the recent discovery of diver-
sity as a causal variable in diffusion, where diversity can refer either
to the diversity of demographic profiles among local peers, or to the
broader structural diversity that local peers are situated within.
Throughout, we take effort to anticipate the theoretical and empirical
challenges that may lie ahead.
2. Empirical Advances
2.1. Applications to Health
For the past few decades, the study of public health has concerned not
only biological contagions, but also social contagions concerning
health behaviors: e.g. medication, vaccines, exercise, and the ideolo-
gies related to each (Christakis and Fowler 2012). It has been found
that simple contagions do not adequately capture the network dynam-
ics that govern the diffusion of health behaviors (Centola and Macy
2007; Centola et al. 2007; Centola 2010, 2011). Social health behav-
iors often require reinforcement from peers, and they are strongly in-
fluenced by cultural practices and group norms.
The Framingham Heart Study suggested that obesity spread
7
socially through a densely interconnected network of 12, 067 people,
assessed from 1971 to 2003 (Christakis and Fowler 2007). However,
this study posited that either biological or normative mechanisms
might play a role in the diffusion process, where each mechanism
would be expected to yield very different diffusion dynamics.
A clearer hypothesis came from a follow-up study examining
the spread of smoking behavior (Christakis and Fowler 2008). This
study found evidence that the likelihood a smoker will quit depends
on their exposure to multiple contacts, in part because smoking is of-
ten explicitly social and thus shaped by the dynamics of social norms.
The role of complexity in smoking behavior (and cessation) has been
supported by a more recent study using data from the National Lon-
gitudinal Study of Adolescent Health, which simulated the complex
contagion dynamics of smoking under conditions where smokers can
revert to smoking after quitting (Kuhlman et al. 2011). By examining
peer interactions over QuitNet – a social media platform for smokers
attempting to quit – it was found that smokers were more likely to
abstain if exposed to reinforcing contact from several abstinent users
(Myneni et al. 2015). Kuhlman et al. (2011b) discuss how the diffu-
sion of smoking behavior is filtered by both pro- and anti-smoking
norms. This insight into the complexity of the quitting process helps
to refine earlier models of smoking diffusion, in which threshold out-
comes are represented by the binary decision to adopt without consid-
eration of countervailing influences from non-adopters. Norms em-
power people to exert different kinds of influence – eg. for and against
behavior – which amplifies the role of complexity in situations where
non-adopters exhibit countervailing influences.
Exercise has similarly been found to exhibit the dynamics of
complexity when peers influence each other to adopt new exercise
behaviors. The characteristics of peers play an important role in influ-
ence dynamics, as both homophily and diversity have been shown to
amplify the impact of reinforcing signals on the likelihood of behavior
change. Centola (2011) demonstrated a direct causal relationship be-
tween homophily and the diffusion of complex contagions, indicating
that the effects of social reinforcement were much stronger when in-
dividuals shared a few key health characteristics in common. Further,
Centola and van de Rijt (2014) showed that social selection among
"health buddy" peers in a fitness program lead to connections among
8
peers who were homophilous on the same key health characteristics:
gender, age, and BMI. Aral and Nicolaides (2017) elaborate in show-
ing that social reinforcement from similar peers is strengthened when
those peers come from different social groups, highlighting the value
of structural diversity in the dynamics of complexity. Another recent
study of exercise behavior used an online intervention to demonstrate
that exposure to social influence from a reinforcing group of anony-
mous online "health buddies" could directly increase participants'
levels of offline exercise activity (Zhang et al. 2016).
An interesting twist in the relationship between complexity
and health came from a series of studies which showed how clustered
networks that facilitate the spread of social norms (e.g., anti-vaccina-
tion behavior) can thereby make populations susceptible to epidemic
outbreaks of simple contagions (e.g., such as the measles) (Salathe
and Bonhoeffer 2008; Campbell and Salathe 2013). These studies
model the diffusion of anti-vaccine attitudes as a complex contagion
that pulls people into echo chambers that amplify the likelihood of
disease outbreak in the overall population. This work points to a vital
direction for future research into how health behaviors and attitudes
toward health interact in a broader, multi-layered network of both
complex contagions and disease diffusion.
Moreover, there are even some surprising instances where bi-
ological pathogens may also be complex. Infectious diseases are com-
plex in situations where patients suffer simultaneous "co-infections"
from multiple pathogens. In these cases, each disease increases a pa-
tient's susceptibility to the other one, making it more likely that both
infections will take in hold in a patient. For instance, infection with
the influenza virus can increase the likelihood of coinfection with
other respiratory diseases, such as the Streptoccocus penumoniae bac-
terium (a leading cause of pneumonia). Each one creates susceptibil-
ity to the other, increasing the likelihood that joint exposure will lead
a patient to become infected with both.
While a single virus can efficiently use weak ties to spread
across a network, several viruses from different sources cannot be so
easily transmitted the same way. For these kinds of illnesses, clustered
social networks significantly increase the likelihood that individuals
who are exposed to complementary infections, such as pneumonia
and flu, or syphilis and HIV, will spread reinforcing co-infections.
9
Contrary to most epidemiological intuitions, in random networks in-
cidence rates of "complex synergistic co-infections" typically drop to
zero, while clustered social networks are surprisingly vulnerable to
epidemic outbreaks (Hébert-Dufresne and Althouse 2015).
2.2. Diffusion of Innovations
Economists, marketers, and organizational theorists have long been
interested in how technological innovations diffuse through a popula-
tion. Bass (1969) developed one of the first influential models of in-
novation diffusion, where technological adoption was understood as
a simple contagion. As the uptake of innovations came to be viewed
as inseparable from social networks, Schelling (1973) started to for-
mulate a threshold-based model of innovation adoption based on the
influence of multiple peers. It has since been found that complex con-
tagions characterize the diffusion of technologies in multiple areas of
social life.
A number of controlled experiments illustrate that innovations
diffuse through populations as complex contagions. Bandiera and
Rasul (2006) showed how farmers in Mozambique were more likely
to adopt a new kind of crop if they had a higher number of network
neighbours who had adopted. Oster and Thorton (2012) show that the
adoption of menstrual cups in women depends on influence from mul-
tiple peers, because of the transference of technology-relevant
knowledge. Based on these findings, Beaman et al. (2015) used com-
plex contagion models to design seeding strategies for the distribution
of pit planting in Malawi. Pit planting is a traditional West African
technology which is largely unknown in Malawi, and it has the poten-
tial to significantly improve maize yields in arid areas of rural Africa.
Beaman et al. compared the seeding strategies recommended by com-
plex contagion models to a benchmark treatment where village lead-
ers used local knowledge to select seeds. Seeding, in this experiment,
involved training specific people in each village on how to use pit
planting, given evidence that trained adopters of a technology are
most effective at distributing new technologies (Banerjee et al. 2013).
200 different villages were randomly treated with seeding strategies
from either complex contagion models or traditional approaches
based on local expertise. They found that seeding strategies informed
by complex contagion models increased adoption more than relying
10
on extension workers to choose seeds. Further, Beaman et al. observe
no diffusion of pit planting in 45% of the benchmark villages after 3
years. In villages where seeds were selected using the complex con-
tagion model, there was a 56% greater likelihood of uptake in that
village.
Complex contagions have also been shown to characterize the
diffusion of software innovations. Karsai et al. (2014) examined the
uptake of Skype – the world's largest Voice over internet protocol
service – from September 2003 to March 2011. They find that the
probability of adoption via social influence is proportional to the frac-
tion of adopting neighbours. Interestingly, they find that while adop-
tion behaves like a complex contagion process, termination of the ser-
vice occurs spontaneously, without any observable cascade effects.
These results suggest that there may be an asymmetry in the dynamics
of adoption (which are socially driven) versus the dynamics of termi-
nation (which may depend on non-social factors).
Ugander et al. (2012) also observe complex contagion dynam-
ics in the initial growth of Facebook, which now has over a billion
users worldwide. Facebook initially grew through peer recruitment
over email. The results showed a complex diffusion process, in which
people were more likely to adopt Facebook if they received requests
from multiple friends, especially if these friends belonged to separate
network components. This finding on the value of structural diversity
for amplifying reinforcing signals for adoption suggests interesting
new theoretical directions for research on the connections between
homophily, diversity, and complexity (see Sect. 4.3).
A parallel stream of research has focused on the role of mass-
media marketing in spreading the complex diffusion of innovations.
Toole et al. (2012) show that while mass media served to measurably
increase the adoption of Twitter, peer to peer social influence mecha-
nisms still account for the lion's share of the adoption patterns that
were observed, where local reinforcement played a major role in in-
dividuals' decisions to adopt Twitter. So much so, that the online mi-
croblogging platform exhibited strong spatial diffusion patterns in its
initial growth, as it spread through densely clustered networks of peer
reinforcement. Similar findings are echoed by Banerjee et al. (2013).
These studies suggest that the local peer influence dynamics of com-
plexity can initiate global cascades in the adoption of innovations. For
11
marketing to propel the diffusion of new technologies, mass-media
strategies need to account for how messages are dynamically filtered
by social networks (Berger 2013). Evidence suggests that advertising
campaigns initially diffuse like simple contagions with the first media
broadcast, but diffuse more like complex contagion once they begin
spread through social networks (Bakshy et al. 2012a). The interaction
between mass-media diffusion and social influence in the adoption of
technology (particularly complementary technologies) suggests that
the complexity of a diffusion process is determined in part by interac-
tions across several scales of a population.
The study of innovation diffusion is expanding in response to
a novel kind of complexity introduced by technologies themselves. A
new direction for future research concerns the role that social media
technologies play in shaping the evolution of other contagions, once
the social media technologies themselves are adopted. Due to their
explicitly complementary design, social media technologies, includ-
ing Facebook, Twitter, and Skype, all exhibited the dynamics of com-
plexity in their diffusion, spreading most effectively through networks
of peer reinforcement. Once these technologies diffuse, they allow in-
dividuals to grow larger networks that communicate at much faster
rates than were previously possible in word-of-mouth exchanges.
Thus, in addition to the spread of social media technologies, the do-
main of social media itself has become its own space for studying the
complex dynamics of the diffusion of collective behavior.
2.3. Social Media
Social media has significantly shaped and, in some cases, augmented
the diversity of complex contagions that can spread, the speed at
which they can spread, and the overall size of the populations they are
able to reach via global cascades (Borge-Holthoefer et al. 2013).
Kooti et al. (2012) show that one of the first methods for retweeting
was established as the successor of various competing complex con-
tagions, in an ecology of possible conventions. Barash (2011) and
Weng et al. (2013) find that most tweets spread via complex conta-
gions in retweet networks. This finding reappears with Harrigan et al.
(2012) who show that tweets are more likely to diffuse through re-
tweeting within clustered communities, where twitter users are able
12
to observe their friends retweeting the same message. Complex con-
tagions are observed across other platforms as well. Photo-tagging in
Flickr exhibits the hallmarks of diffusion via influence from multiple
peers (Barash 2011). A recent massive-scale randomized experiment
over Facebook showed that user-generated stories diffused like com-
plex contagions (Bakshy et al. 2012b). Meanwhile, social media web-
sites gather an unprecedented amount of data on communication
flows, permitting novel insights into how complex contagions emerge
and operate.
One of the most interesting findings of social media research
is that the content of a contagion matters for whether it behaves in a
complex manner. Wu et al. (2011) show that the modality of infor-
mation that structures a contagion influences its lifespan: viral videos
long outlive their textual counterparts. Romero et al. (2011) find that
there are distinct contagion dynamics for different kinds of hashtag.
Political hashtags are found to behave like complex contagions, where
exposure to multiple people using the hashtag is strongly correlated
with use. But hashtags based on idioms or memes, by contrast, behave
like simple contagions. Barash and Kelly (2012) and Fink et al. (2016)
replicate this finding by showing that political hashtags behave like
complex contagions, whereas news-based hashtags, broadcast by
mass media, spread like simple contagions.
Using the massively multiplayer virtual world of Second Life,
Bakshy et al. (2009) uncover complex contagions in the exchange of
user-created content. Specifically, they focus on the spread of con-
ventionalized avatar gestures constructed by players, which can only
spread through peer to peer sharing mechanisms. Bakshy et al. unveil
subtle interactions between user degree and diffusion: users who are
most effective at initiating cascades of gestures do not have the high-
est degree; rather, they collect rare gestures that other users are more
likely to adopt. This result points to uncharted territory in complex
contagions research, relating to how the quality or style of a contagion
influences its likelihood of spreading via social influence.
Undoubtedly, the source of complexity in these online dynam-
ics of spreading behavior lies partly in the sociological significance
that the content of an online contagion holds. For instance, Romero et
al. suggest that political hashtags, such as #TCOT (which stands for
"Top Conservatives on Twitter") and #HCR (which stands for
13
"Health Care Reform") were "riskier to use than conversational idi-
oms…since they involve publicly aligning yourself with a position
that might alienate you from others in your social circle." (2011: 3).
Thus, the authors found "that hashtags on politically controversial
topics are particularly persistent, with repeated exposures continuing
to have unusually large marginal effects on adoption" (3).
It is also likely that the level of complexity in diffusion de-
pends, in part, on the design of interfaces and the kinds of sociological
processes that platforms facilitate. Readymade communication but-
tons – such as the 'share' button on Facebook or the 'retweet' button
on Twitter – automatically enable the spread of information as a sim-
ple contagion. However, State and Adamic (2015) show how simple
contagions do not account for the spread of digital artifacts that re-
quire more effort to construct. Using a dataset of over 3 million users,
they show that the adoption of new conventions for profile pictures
are best described as complex contagions. They argue that the differ-
ence pertains to the amount of effort it takes to adopt the behavior:
certain informational contagions behave in a simple manner because
it takes no time to click and share after one exposure. But when a
contagion requires more effort, such as manually changing a profile
picture, users require evidence that several of their peers have ex-
pended the energy for the contagion, thereby justifying its weight in
terms of social capital.
Conversely, platform design can also prevent complex conta-
gions from emerging and spreading by constraining the ability for
people to perceive and share potential contagions (Bakshy et. al.
2012a, 2012b; Hodas and Lerman 2012; Gomez-Rodriguez et al.
2014). Doerr et al. (2012) find that, over the social news aggregator
Digg, users do not seem to preferentially share the content of their
peers. This result is likely to be specific to the Digg environment, be-
cause the culture of the platform is based on sharing news that your
friends do not already know. Studies of social media thus reveal how
environmental design alters the capacity for diffusion by shaping the
salience of peer behaviors and the culture of interaction altogether.
Going forward, social media environments are likely to serve
as a powerful tool for studying complex contagions experimentally.
Centola (2010, 2011, 2013a) developed a method for designing social
14
media platforms that embed participants into engineered social net-
works, which allow researchers to test the effects of network topology
and other variables on the dynamics of social diffusion. In a less con-
trolled study, Kramer et al. (2014) modified the newsfeeds of Face-
book users to examine emotional contagion. For some users, they re-
duced the amount of positive content, whereas for other users, they
reduced the amount of negative content. As a result, they were able to
systematically alter the emotional content of users' posts. While this
study could not eliminate endogeneity within user networks, the ran-
domization of messages allowed for suggestive experimental results
on the ways that social exposure to messages influence user behavior.1
Another related approach to experimentation on social media
comes from the advent of experimental methods that use algorithmi-
cally controlled social media accounts called bots to manipulate users'
experiences (Krafft et al. 2016). Mønsted et al. (2017) released a net-
work of bots into twitter and tested whether they could prompt the
uptake of specific hashtags. They show that bots can initiate the up-
take of new hashtags and that these hashtags spread as complex con-
tagions, whereby the probability of using the new hashtag drastically
increased if multiple bots and users were seen using it.
2.4. Politics
Political processes have been a longstanding topic of interest for
threshold-based contagion models. Granovetter's (1973, 1978) origi-
nal threshold model of collective action gave special attention to the
start-up problem for political protests and riots. He observed that in-
dividuals have different degrees of willingness (i.e. thresholds) to par-
ticipate in a riot, where their willingness is dependent on how many
of their neighbours they observe participating in the riot. Granovetter
1 Kramer et al.'s study also raised the important point about the ethics of experi-
mentation on social media. While previous social media studies using experimen-
tally designed social platforms (Salganik et al. 2006, Centola 2010, 2011, Centola
and Baronchelli 2015) enrolled subjects into their online platform with an explicit
process of informed consent, Kramer et al.'s study on Facebook used existing net-
works of peers without their explicit consent. It is an important topic of ongoing
discussion how to properly use existing peer networks, such as Facebook and
Twitter, to conduct experiments that manipulate user behavior.
15
observed that riots can emerge as a result of cascades, where a subset
of instigator individuals with low thresholds trigger the spread of ri-
oting. The first efforts to describe the emergence of social movements
with agent-based modeling maintained that population diversity was
essential for getting a movement off the ground. Without long ties
connecting communities, it was thought that social movements would
not be able to diffuse through a population and reach critical mass.
More recent models extend the study of diversity in political
processes by emphasizing the supporting role of homophily during
the growth phase of social movements. Centola (2013b) argues that
because social movements involve risky and costly forms of deviant
behavior, people require reinforcement from multiple peers to partic-
ipate, where homophily is useful for establishing a critical mass of
likeminded peers.
Again, this raises an interesting connection between diversity
and homophily. For organizing a critical mass, dense, homophilous
communities are necessary for getting social movements off the
ground because like-mindedness facilitates group solidarity, which
may be necessary to withstand the normative backlash that comes
from deviant behavior. On these grounds, Centola designed an agent-
based model to show that weak ties hinder the spread of social move-
ments by increasing exposure to counter-norm pressures, while also
reducing the group transitivity needed to reinforce group interests.
Homophily and clustering thus reinforce one another. However, once
homophilous networks gain enough local reinforcement, they can cre-
ate a critical mass that allows the movement to achieve sufficient sa-
lience in the whole population and to expand to diverse communities
through the aid of mass media.
In an empirical study of the effects of communication net-
works on mobilization, Hassanpour (2017) explored the spread of
armed conflict as a complex contagion in Damascus, Syria. On No-
vember 29th, 2012, Internet and cellular communications were shut
down all across Syria for over a day. The shutdown, according to Has-
sanpour, resulted in the loss of communication with long ties to indi-
viduals across the city. At the same time, the shutdown immediately
preceded an unprecedented increase in the diffusion of armed conflict
throughout the city. Using a geolocated dataset of daily conflict loca-
tions in Damascus, Hassanpour uncovers signs that the likelihood of
16
conflict in a region was influenced by whether there had been conflict
in multiple neighboring regions. Hassanpour suggests that this indi-
cates the spread of conflict as a complex contagion, which was al-
lowed to emerge when long ties were broken and interaction within
local clusters became the strongest determiners of armed conflict.
In other results, González-Bailón et al. (2011) shows that pro-
test recruitment in Spain, 2011, diffused over Twitter as a complex
contagion via peer influence. González-Bailón et al. (2011) use k-core
decomposition to show that the users who are in the core of the net-
work were most effective at initiating cascades of recruitment. In a
complementary study, Steinhert-Threlkeld (2017) offered evidence
that users in the periphery of social media networks can also trigger
global cascades. These studies suggest that social media can influence
the rise and spread of political complex contagions that inspire on-
the-ground political action.
Other recent empirical work has uncovered complex conta-
gions within a wide range of political processes, including campaign
donations (Traag 2016), grassroots mobilization (Parkinson 2013;
Parigi and Gong 2014), petition signing (Yasseri et al. 2014), social
control (Siegel 2009, 2011), institutional change (Dellaposta et al.
2017), and administrative management in both rural (Catlaw and
Stout 2016) and urban settings (Pan et al. 2013).
Barash (2011) developed a unique set of measures for charac-
terizing the lifespan of political contagions over social media. A com-
plex contagion begins by saturating a locally clustered community.
Once saturation is reached, the rate of propagation for the contagion
decelerates, as the number of potential adopters decreases. If the sat-
urated community has sufficiently wide bridges to other communities,
Barash (2011) argues that it is possible for a contagion to travel from
one community to the next. Diffusion between communities can cre-
ate a detectable temporal signature, because as a contagion enters a
new community, its rate of propagation rapidly increases with the
availability of new adopters. Barash explains how changes in the rate
of complex propagation can provide a measure for whether a conta-
gion is ramping up for a global cascade, hinting toward the possibility
of detecting global cascades, prior to their emergence.
Based on the work of Barash et al. (2012), Fink et al. (2016)
17
developed a number of measures for characterizing the spread of po-
litical hashtags as complex contagions. These measures include:
peakedness, commitment, concentration, and cohesion. Peakedness
concerns the duration of global activity associated with a contagion,
where a peak refers to a day-long period of usage when the average
mentions per day is more than two standard deviations away from the
average mentions in the preceding days. Peakedness is closely related
to burstiness, which has been shown to play an important role in
threshold-based cascade dynamics (Takaguchi et al. 2013). Commit-
ment refers to the number of people who sustain the life of a complex
contagion, even though they endure social costs by not conforming to
surrounding norms. Concentration simply refers to the proportion of
people using a hashtag during a given time period. And cohesion re-
fers to the network density over the subgraph of all users engaged in
a particular contagious phenomena. The authors make use of the idea
that complex contagions are incubated in locally dense communities
before they colonize other communities via sparse connections.
Using these measures, researchers have made a number of val-
uable observations. Fink et al. (2016) apply these measures to the
study of political hashtags in Nigeria. In their sample, they find polit-
ical hashtags consistently arise with a small proportion of instigators
(roughly 20%) who are densely connected, and that almost 60% of
late adopters for political hashtags had 2 or more previous adopter
friends. News hashtags, by contrast, are first propagated by largely
unconnected instigators who constitute between 50% and 90% of the
network, where less than 10% of adopters had 2 or more previous
adopter friends. Consistent with Romero et al. (2011), the authors sug-
gest that political hashtags require influence from multiple peers be-
cause they have higher social costs, especially in countries like Nige-
ria where surveillance by governments and extremists groups looms
over users. Compared to other hashtags, the researchers also find that
hashtags related to social movements have a higher density of ties
among early adopters, consistent with the argument that political
movements require a coalition of homophilous, densely connected us-
ers (Centola 2013b). Fink et. al further illustrate that it is possible to
map the virality of political hashtags using Barash's measures for the
temporal signatures of diffusion. They show how the #bring-
18
backourgirls hashtag went viral shortly after a period of decreased us-
age among early adopters, which indicated saturation in a local com-
munity prior to the spread of the contagion to other communities.
In a related paper, Barash and Kelly (2012) use the same
measures to model the spread of complex contagions over Russian
Twitter, a significantly different cultural setting. Yet again, these re-
searchers find that politically-salient hashtags diffuse like complex
contagions where news hashtags from mass media do not. Im-
portantly, this analysis shows how the heterogeneous distribution of
adoption thresholds is critical for understanding political contagions.
They find that engagement in political issues is non-uniform across
the population, and different communities have distinct patterns of
engagement and adoption, based on how the community relates to the
content captured by the hashtag. Users belonging to groups that op-
pose the political regime engage with controversial topics over a long
period, as a committed minority. Contrary to expectations, they find
that when hot button issues relevant to the opposition make it into the
mainstream, they are much more likely to sustain global saturation,
even amongst pro-government users. These results suggest that rein-
forcement dynamics can drive the spread of politically-salient content
over social media.
The diffusion of political contagions online interacts with both
the structure of the sub-communities that they reach and the group
identities that they activate. In March of 2013, 3 million Facebook
users changed their profile picture to an 'equals sign' to express sup-
port of same-sex marriage. Consistent with earlier work, State and
Adamic (2015) found that the equals sign profile picture spread as a
complex contagion. Their data suggests that mass media created only
about 58,000 spontaneous adopters, while roughly 106 million users
adopted based on peer exposures. They find that it took, on average,
exposures to 8 different peer adopters for a person to adopt. When
examining this threshold, the authors uncover intricate dependencies
between the identity of a user and their willingness to adopt. Users
were more likely to be exposed and thereby more likely to adopt if
they were female, liberal, non-heterosexual, and between the ages of
25-34. These findings suggest that thresholds for adopting contagions
are modulated by online identity signaling regarding political values
and beliefs. Similar, smaller scale studies of behavior on Facebook
19
find that a user's demographic characteristics do not determine their
influence in generating cascades, but instead most cascades rely on
multiple users to trigger spreading (Sun et al. 2009).
The study of political contagions – offline and online – reveals
a number of subtleties in how thresholds operate in sociological con-
texts. Political identity is a driving motivation for behavior change,
suggesting that homophily and clustering in social networks can be
essential for incubating the early growth of a political behavior over
social media. Furthermore, gender, race, and religion are also strong
predictors of whether someone will be exposed and receptive to a po-
litical contagion. A recent study by Traag (2016) shows that campaign
donations diffuse as complex contagions, but the findings here em-
phasize the value of diversity. The growth of support for a candidate
increases when people are exposed to donors from separate commu-
nities, particularly if those donors supported the opposite party. Di-
versity can thus complement homophily when it signals wider support
for a candidate, and thereby increases the likelihood that the candidate
will be more effective for achieving bi-partisan goals. The details are
subtle, however, since there are also situations where diverse support
for a candidate might signal mixed allegiances and comprise the can-
didate's party loyalty. The complementary roles of homophily and di-
versity in supporting complexity depend upon the content of the po-
litical messages that are used and the identities that they activate.
3. Theoretical Advances
Recent research into the formal model of complex contagions has ex-
plored two general directions. The first direction investigates how
complex contagions spread within large networks of varying topolo-
gies. To date, researchers have examined threshold-based contagion
models within power-law (Barash et al. 2012), locally tree-like
(Gleeson and Cahalane 2007), degree-correlated (Gleeson 2008;
Dodds and Payne 2009), directed (Gai and Kapadia 2010), weighted
(Hurd and Gleeson 2013), small-world (Centola et al. 2007), modular
(Galstyan and Cohen 2007), clustered (Ikeda et al. 2010; Hackett et
al. 2011), temporal (Karimi et al. 2013; Backlund et al. 2014), multi-
plex (Brummitt et al. 2012; Yağan et al. 2012, Lee et al. 2014), and
interdependent lattice networks (Shu et al. 2017). Researchers have
20
used different topologies to simulate how external factors like mass
media influence cascade dynamics (Bassett et al. 2012), and how to-
pologies influence percolation processes (Zhao et al. 2013). A pivotal
theoretical finding is that complex contagions require a critical mass
of infected nodes to initiate global cascades, and it has been shown
that critical mass dynamics depend in sensitive ways on network to-
pology and the distribution of node degree and adoption thresholds
(Barash 2011). There has also been efforts to provide analytic proofs
for the global dynamics of complex contagions (Barash 2011; O'Sul-
livan 2015). At the cutting-edge is research into how complex conta-
gions spread in coevolving, coupled, time-varying, and multi-layered
networks (Takaguchi et al. 2013; Pastor-Satorras et al. 2015).
The second major direction in theoretical complex contagion
research concerns mechanisms of diffusion at the node-level, con-
cerning individual attributes and thresholds. Wang et al. (2015a,
2015b) propose a contagion model which shows that the final adop-
tion size of the network is constrained by the memory capacities of
agents and the distribution of adoption thresholds. Perez-Reche et al.
(2011) simulate complex contagion dynamics with synergistic effects
among neighbors, and McCullen et al. (2013) structure the motivation
for an agent to adopt a behavior as a combination of personal prefer-
ence, the average of the states of one's neighbours, and the global av-
erage. Dodds et al. (2013) attempt to explicitly encode sociological
processes into their models by building agents with a preference for
imitation but an aversion for complete conformity. Melnik et al.
(2013) model multi-stage complex contagions, in which agents can
assume different levels of personal involvement in propagating the
contagion, at different times in their lifecycle. They find that multi-
stage contagions can create multiple parallel cascades that drive each
other, and that both high-stage and low-stage influencers can trigger
global cascades. Huang et al. (2016) build agents with a persuasive-
ness threshold which determines their ability to initiate adoption. This
new parameter can cause networks to become more vulnerable to
global cascades, especially heterogeneous networks. Further incorpo-
rating sociological considerations, Ruan et al. (2015) simulated how
conservativeness among nodes - i.e. the reluctance to adopt new
norms - interacts with cascades caused by spontaneous adopters.
The latest theoretical developments have informed research on
21
how to design network interventions and seeding strategies to stop the
spread of harmful complex contagions (Kuhlman et al. 2015). Such
interventions are based on the use of oppositional nodes that are per-
manently unwilling to adopt a behavior, regardless of peer influence.
Kuhlman et al. (2015) offers two heuristics for using seeding methods
to determine critical nodes for inhibiting the spread of complex con-
tagions. The first heuristic is to select the nodes with the highest de-
gree, and the second heuristic is to select nodes from the 20 core, de-
termined by k-core decomposition. They show how the second
heuristic is more effective for initiating and preventing global cas-
cades, because selecting from the 20 core increases the likelihood that
nodes are adjacent and thereby capable of reinforcing each other's in-
fluence. Centola (2009) shows that similar ideas can be used to eval-
uate the tolerance of networks against error and attack. Albert et al.
(2000) showed that scale-free networks are robust against network
failures, defined in terms of the inability to diffuse simple contagions.
When it comes to diffusing complex contagions, Centola shows that
scale-free networks are much less robust than exponential networks.
Thus, moving from simple to complex contagions changes the robust-
ness properties of scale-free networks. Building on this work, Blume
et al. (2011) investigate which topologies are more susceptible to what
they call cascading failures, which refers to the outbreak of negative
complex contagions that are harmful for social networks. Siegel
(2009, 2011) shows how these developments can inform models for
repressing social movements and performing crowd control on the be-
half of governments.
While early models of diffusion consider individual conta-
gions as independent and spreading in isolation, a number of studies
have begun to investigate evolutionary dynamics among multiple
complex contagions. Myers and Leskovec (2013) develop a statistical
model wherein competing contagions decrease one another's proba-
bility of spreading, while cooperating contagions help each other in
being adopted throughout the network. They evaluate their model
with 18,000 contagions simultaneously spreading through the Twit-
tersphere, and they find that interactions between contagions can
shape spreading probability by 71% on average. Jie et al. (2016) con-
struct a similar model to simulate competing rumor contagions in a
22
homogenous network. Empirical evidence is accumulating that mul-
tiple contagions frequently interact in real-world social systems. For
instance, the study of social contagions in the health domain has
shown competitive dynamics among positive and negative health
practices, e.g. smoking vs. jogging (Kuhlman et al. 2011a, 2011b).
Most interestingly, health research has uncovered ecological interac-
tions among contagions at different scales, such as the interaction be-
tween complex contagions (e.g. health-related attitudes and lifestyle
choices), and the spread of simple contagions (e.g. biological patho-
gens) (Campbell and Salathe 2013).
4. New Directions
Recent work on complex contagions points to three main directions
for future development. The first concerns the study of how multiple
contagions interact within the same network and across networks, in
what may be called an ecology of complex contagions. The second
concerns the study of how the structure of thresholds and their behav-
ioral consequences can vary by social context. The third area concerns
the interaction of diversity and homophily in the spread of complex
contagions, where diversity can refer to either the diversity of demo-
graphic profiles among one's local peers, or to the broader structural
diversity that local peers may be situated within.
4.1. Ecologies of Complex Contagions.
Past theoretical research has made significant progress in mapping the
behavior of complex contagions within a range of network topologies.
Newer work has begun to explore the complexities that arise when
multiple kinds of contagions interact in the same network (Su et al.
2016). Moreover, while the content of a contagion undoubtedly influ-
ences the spread and interaction of competing behaviors, it may have
an impact on network structure as well. An important area of future
research concerns how complex contagions shape network structure
and how network structure shapes complex contagions, as part of a
co-evolutionary process of network formation (Teng et al. 2012).
The process of modeling ecologies of contagions goes hand in
hand with a growing effort to model complex contagions in in several
23
new domains of collective behavior. Among the most recent applica-
tions is the examination of complex contagions in swarm behaviors.
One study showed that complex contagions provided the most robust
model of escape reflexes in schools of golden shriner fish, where
frightened individuals trigger cascades of escape responses on the ba-
sis of a fractional threshold among multiple peers (Rosenthal et al.
2015). Another direction for application concerns the role of complex
contagions in cognitive science. Simulation results suggest that com-
plex contagions may be able to account for the emergence and spread
of new categories, at the level of both perception and language, con-
sistent with the longstanding view that cultural artifacts depend on
principles of emergence and diffusion (Dimaggio 1997; Puglisi et al.
2008; Centola and Baronchelli 2015). Related extensions concern the
role of contagion in the structuring of collective memory (Coman et
al. 2016). Situating complex contagions at this level will extend ex-
isting perspectives on how processes of social diffusion are woven
into the foundations of culture and cognition.
4.2. Mapping Heterogeneous Thresholds in Context.
Extant models represent threshold heterogeneity in terms of distribu-
tions of values along a numerically defined scale, from 0 to 1 (Morris
2000). Applied studies of contagion dynamics show how thresholds
vary by individual differences and contextual dependencies relating
to the content of the contagion and its sociological significance. For
instance, there appear to be a different set of thresholds that govern
the adoption of a contagion (e.g. a technology) and the termination of
the contagion (Karsai et al. 2014). Similarly, the study of health con-
tagions suggests that people are susceptible to influence by those sup-
porting a positive health behavior and to those resisting it, where in-
dividuals may vary in their responses to processes of support and
resistance (Kuhlmann et al. 2011a; Myneni et al. 2015).
In the context of social media, readymade sharing buttons alter
the cost structure for certain contagions, allowing memes to be
adopted simply with a click. Interface design can also make certain
contagions more costly, thereby impacting the thresholds of individ-
uals and their willingness to adopt. Certain complex contagions, such
as political hashtags, appear to require exposure from 2-5 peers (Ba-
rash and Kelly 2012), whereas changes in profile pictures appear to
24
require exposure of up to 8 or more peers (State and Adamic 2015).
One conjecture is that thresholds are fractional, and therefore depend
sensitively on the number of connections that a person has. The more
connections there are, the higher the thresholds are likely to be.
Finally, identity appears to play a structural role in defining
thresholds. Identity has been used in two ways: group identity and
personal identity. A few recent studies have excluded group identity
and focused narrowly on personal identity, such as demographic char-
acteristics (Aral et al. 2009; Aral and Nicolaides 2017). However, the
role of demographic characteristics such as gender and race on adop-
tion thresholds is hard to understand independently of social context.
Depending on the social context and the identities that are activated,
people will react differently to a political contagion than to a health
contagion. By contrast, other work has suggested that demographic
traits play an important role in defining group identity, which in turn
interacts with people's thresholds for adoption (Centola 2011).
Political studies further show how identity-based responses to
contagions can take a variety of forms, where thresholds do not
simply represent the binary outcome of adoption – they also represent
whether an individual will join a committed minority, or whether they
will actively attempt to punish deviant behavior (Centola 2013b). Par-
kinson (2013) uses ethnographic methods to suggest that part of the
reason why identity influences contagion thresholds is because iden-
tities correspond to different functional roles in a social system, which
entail different kinds of behavioral responses that mediate diffusion.
These studies help to expose how group membership and normative
pressures give rise to individual variation in threshold dynamics. It is
likely that individuals differ in the kinds of thresholds they adopt to-
ward a potential contagion based on how they categorize the conta-
gion, relative to their political identity (State and Adamic 2015; Traag
2016). It may therefore be useful to consider different types of thresh-
olds that vary along sociological and psychological dimensions,
where key differences are marked by how contagions interface with
the identity-based responses of individuals and groups.
4.3. The Roles of Homophily and Diversity in Diffusion.
There are two forms of diversity in the literature on diffusion. Re-
25
searchers use the term to refer to cases where one's local neighbor-
hood in the network consists of people with different demographic
profiles and personality traits. We may call this identity-based diver-
sity. At other times, researchers use the term to refer to structural di-
versity where one's local neighborhood consists of people who belong
to separate components of the network, identified by removing the
ego node from the ego network. The first kind of diversity tends to
limit diffusion of complex contagions, while the second kind tends to
amplify it.
Looking at identity-based diversity, Centola (2011) compared
complex contagion dynamics on homophilous networks to the dy-
namics on non-homophilous networks, keeping network topology
constant. The results showed that homophily (i.e., reduced identity-
diversity) significantly improved the spread of complex contagions.
The reason for this is that greater similarity among contacts in a health
context made peers more relevant. Women were more likely to adopt
from women, and obese people were likely to adopt from obese peo-
ple. Reinforcing signals from irrelevant (i.e., diverse) peers were
largely ignored, while reinforcing signals from relevant (i.e., similar)
peers were influential in getting individuals to adopt a new health be-
havior. This result was most striking for the obese individuals. Expo-
sure among obese individuals was the same across conditions, yet
there was not a single obese adopter in any of the diverse networks,
while the number of obese adopters in homophilous networks was
equivalent to the total number of overall adopters in the diverse net-
works –resulting in a 200% increase in overall adoption as a result of
similarity among peers.
The effects of homophily can be complemented by structural
diversity. In studying the complexity of campaign donations, Traag
(2016) suggests that structural diversity can increase the credibility of
a complex contagion. If one belongs to an echo chamber, where one's
peers are highly similar and densely connected, then peer agreement
may undermine credibility, since their agreement may be the result of
induced homophily and pressures for conformity. By contrast, if one's
peers are from different components of the network, their opinions
may reasonably be viewed as independent and mutually confirming.
What unites these arguments is the supposition that people use the
identity composition of their local network neighbors to infer the
26
broader structural diversity of their network. However, structural di-
versity does not imply reduced homophily. Individuals may be similar
to their friends in different ways. They may be the same gender as
some, have the same professional role as others, and participate in the
same volunteer organizations as yet others. While identity diversity
can correlate with structural diversity, it does not always provide a
reliable way for inferring it. Receiving reinforcing encouragement
from individuals who belong to different parts of a person's social
network strengthens the independence of their signals, and may there-
fore be more likely to trigger adoption.
Similarly, Ugander et al. (2012) identify how the mechanism
of structural diversity can boost the influence of social reinforcement.
Their study of Facebook shows that people are more likely to adopt a
social media technology when they receive invites from people be-
longing to separate components of their ego network. Structural di-
versity does not, however, entail identity-based diversity. Ugander et
al.'s study leaves open the possibility that structural diversity alone –
without identity-based diversity – can modulate adoption thresholds.
This observation is especially interesting in light of State and
Adamic's (2015) finding that while the number of friends a user had
scaled linearly with their chances of adoption, adoption probabilities
plummeted as soon as a user possessed 400 friends or more. The au-
thors propose that having too many friends on social media can stifle
the spread of complex contagions by exposing users to a variety of
content so vast that they fail to receive repeated exposure by different
peers to any given phenomenon. Consistent with earlier results on po-
litical hashtags and social movement mobilization, these findings sug-
gest that more contentious complex contagions tend to benefit from
clustered, homophilous networks that can foster social change with-
out being overwhelmed by countervailing influences.
5. Conclusion
Complex contagions are found in every domain of social behavior,
online and off. Early theoretical developments in complex contagions
showed that topology and the distribution of adoption thresholds can
be decisive for determining whether global saturation is possible.
More recent theoretical modeling concerns the interaction of multiple
27
different contagions in the same network, where individuals are at-
tributed different motivations and behavioral responses to each con-
tagion. One of the critical challenges ahead involves mapping hetero-
geneous thresholds in context, where political identity, group
membership, and even the content of contagions can affect individual
thresholds and, by consequence, diffusion. Another valuable area for
future research concerns the ways in which individuals use infor-
mation about global network structure to inform their adoption pat-
terns, as is demonstrated by the effects of structural diversity on dif-
fusion. Investigations in this direction will benefit from studying how
individuals infer global structure from local interactions, and how
new social media environments are augmenting these inferences by
supplying information about one's broader ego network. As shown by
the literature accumulated over the last decade, examining complex
contagions in various applied domains has been enormously fruitful.
Each new domain has revealed new elements of diffusion dynamics
that require new theoretical explanations and elaborated modelling
techniques, revealing new areas of cumulative progress in understand-
ing the collective dynamics of social diffusion.
28
References
Albert, R., Jeong, H., & Barabási, A. (2000). Error and Attack Toler-
ance of Complex Networks. Nature, 406, 378-382.
Alvarez-Galvarez, J. (2015). Network Models of Minority Opinion
Spreading: Using Agent-Based Modeling to Study Possible
Scenarios of Social Contagion. Social Science Computer Re-
view, 34(5).
Aral, S., Muchnik, L. & Sundararajan, A. (2009). Distinguishing in-
fluence-based contagion from homophily-driven diffusion in
dynamic networks. PNAS, 106(51), 21544-21549.
Aral, S. & Nicolaides, C. (2017). Exercise contagion in a global social
network. Nat Commun 8, 14753.
Backlund, V. P., Saramaki, J., & Pan, R. K. (2014). Effects of tem-
poral correlations on cascades: threshold models on temporal
networks. Phys Rev E Stat Nonlin Soft Matter Phys, 89(6).
Bakshy, E., Karrer, B. & Adamic, L. (2009). Social Influence and the
Diffusion of User-Created Content. Proceedings of the 10th
ACM conference on Electronic commerce, 325-334.
Bakshy, E., Eckles, D., Yan, R., & Rosenn, I. (2012a). Social Influ-
ence in Social Advertising: Evidence from Field Experiments.
arXiv.
Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L. (2012b). The Role
of Social Networks in Information Diffusion. Proceedings of
ACM WWW 2012.
Bandiera, O. & Rasul, I. (2006). Social Networks and Technology
Adoption in Northern Mozambique. The Economic Journal,
116(514), 869–902.
Banerjee, A., Chandrasekhar, A. G. , Duflo, E., & Jackson, M. O.
(2013). The diffusion of microfinance. Science, 341(6144).
Barash, V. (2011). The dynamics of social contagion. PhD Disserta-
tion, Cornell University.
Barash, V. & Kelly, J. (2012). Salience vs Committment: Dynamics
of Political Hashtags in Russian Twitter. Berkman Center for
Internet and Society, Research Publication No. 2012-9.
Barash, V., Cameron, C. & Macy, M. (2012). Critical Phenomena in
Complex Contagions. Social Networks, 34, 451-461.
Bass, F. (1969). A new product growth for model consumer durables.
29
Management Science, 15(5), 215–227.
Bassett, D., Alderson, D., & Carlson, J. (2012). Collective Decision
Dynamics in the Presence of External Drivers. arXiv.
https://arxiv.org/abs/1206.1120
Beaman, L., Yishay, A., Magruder, J., & Mobarak, M. (2015). Can
Network Theory-based Targeting Increase Technology Adop-
tion? Working Paper.
Berger, J. (2013). Contagious: why things catch on. London, Simon
and Schuster.
Blume, L., Easley, D., Kleinberg, J., Kleinberg, R., & Tardos, E.
(2011). Which Networks are Least Susceptible to Cascading
Failures? IEEE 52nd Annual Symposium on Foundations of
Computer Science (FOCS).
Borge-Holthoefer, J., Baños, R. A., González-Bailón, S., and Moreno,
Y. (2013). Cascading Behaviour in Complex Soci-Technical
Networks. Journal of Complex Networks, 1, 3-24.
https://doi.org/10.1093/comnet/cnt006
Brummitt, C. D., Lee, K. M., & Goh, K. I. (2012). Multiplexity-facil-
itated cascades in networks. Phys Rev E Stat Nonlin Soft Mat-
ter Phys, 85(4 Pt 2).
Campbell, E. & Salathe, M. (2013). Complex social contagion makes
networks more vulnerable to disease outbreaks. Sci Rep,
3(1905).
Catlaw, T., and Stout, M. (2016). Governing Small-Town America
Today: The Promise and Dilemma of Dense Networks. The
American Association for Public Administration, 76(2), 225-
229.
Centola, D. (2009). Failure in complex networks. Journal of Mathe-
matical Sociology, 33, 64-68.
Centola, D. (2010). The spread of behavior in an online social net-
work experiment. Science, 329(5996), 1194-1197.
Centola, D. (2011). An experimental study of homophily in the adop-
tion of health behavior. Science, 334(6060), 1269-1272.
Centola, D. (2013a). Social media and the science of health behavior.
Circulation, 127(21), 2135-2144.
Centola, D. (2013b). Homophily, Networks, and Critical Mass: Solv-
ing the start-up problem in large group collective action. Ra-
tionality and Society, 25(1), 3-40.
30
Centola, D. & Baronchelli, A. (2015). The spontaneous emergence of
conventions: an experimental study of cultural evolution.
PNAS, 112(7), 1989-1994.
Centola, D. & Macy, M. (2007). Complex contagions and the weak-
ness of long ties. American Journal of Sociology, 113(3), 702-
734.
Centola, D, Eguiluz, V., & Macy, M. (2007). Cascade dynamics of
complex propagation. Physica A, 374, 449–456
Centola, D. & van de Rijt, A. (2014). Choosing your network: Social
Preferences in an Online Health Community. Social Science
and Medicine.
http://dx.doi.org/10.1016/j.socscimed.2014.05.019
Christakis, N. A. & Fowler, J. H. (2007). The spread of obesity in a
large social network over 32 years. N Engl J Med, 357(4), 370-
379.
Christakis, N. A. & Fowler, J. H. (2008). The collective dynamics of
smoking in a large social network. N Engl J Med, 358(21),
2249-2258.
Coleman, J. S., Katz, E., & Menzel, H. (1966). Medical innovation; a
diffusion study. Indianapolis, Bobbs-Merrill Co.
Coates, Thomas J., Richter, L., & Caceres, C. (2008). Behavioural
Strategies to Reduce HIV Transmission: How to Make Them
Work Better. The Lancet, 372(9639), 669–84.
Coman, A., Momennejad, I., Drach, R. D., & Geana, A. (2016). Mne-
monic convergence in social networks: The emergent proper-
ties of cognition at a collective level. PNAS, 113(29), 8171-
8176.
Davis, G. & Greve, H. (1997). Corporate Elites and Governance
Changes in the 1980s. The American Journal of Sociology,
103(1), 1-37.
DellaPosta, D., Nee, V., & Opper, S. (2017). Endogenous dynamics
of institutional change. Rationality and Society, 29(1), 5-48.
Dimaggio, P. (1997). Culture and Cognition. Annual Review of Soci-
ology, 23, 263-287.
Dodds, P. S. & Payne, J. L. (2009). Analysis of a threshold model of
social contagion on degree-correlated networks. Phys Rev E
Stat Nonlin Soft Matter Phys, 79(6 Pt 2), 066115.
31
Dodds, P. S., Harris, K. D., & Danforth, C. M. (2013). Limited imita-
tion contagion on random networks: chaos, universality, and
unpredictability. Phys Rev Lett, 110(15), 158701.
Doerr, C., Blenn, N., Tang, S., & Miegham, P. (2012). Are friends
overrated? A study for the social news aggregator Digg.com.
Computer Communications, 35(7), 796–809.
Fink, C., Schmidt, A., Barash, V., Cameron, C., & Macy, M. (2016).
Complex contagions and the diffusion of popular Twitter
hashtags in Nigeria. Social Networks 6(1).
Gai, P. & Kapadia, S. (2010). Contagion in financial networks. Pro-
ceedings of the Royal Society A, 466, 2401–2423
Galstyan, A. & Cohen, P. (2007). Cascading dynamics in modular
networks. Phys Rev E Stat Nonlin Soft Matter Phys, 75(3 Pt
2), 036109.
Gleeson, J. P. (2008). Cascades on correlated and modular random
networks. Phys Rev E Stat Nonlin Soft Matter Phys, 77(4 Pt
2), 046117.
Gleeson, J. P. & Cahalane, D. J. (2007). Seed size strongly affects
cascades on random networks. Phys Rev E Stat Nonlin Soft
Matter Phys, 75.
Gomez-Rodriguez, M., Gummadi, K. & Schölkopf, B. (2014). Quan-
tifying Information Overload in Social Media and its Impact
on Social Contagions. Proceedings of the Eighth International
Conference on Weblogs and Social Media, 170-179.
González-Bailón, S., Borge-Holthoefer, J., Rivero, A., & Moreno,
Y. (2011). The Dynamics of Protest Recruitment through an
Online Network. Scientific Reports, 1(197). https://www.na-
ture.com/articles/srep00197
Granovetter, M. (1973). The Strength of Weak Ties. American Jour-
nal of Sociology, 78, 1360–1380.
Granovetter, M. (1978). Threshold Models of Collective Behavior.
American Journal of Sociology, 83(1420–1443).
Hackett, A., Melnik, S. & Gleeson, J. P. (2011). Cascades on a class
of clustered random networks. Phys Rev E Stat Nonlin Soft
Matter Phys, 83(5 Pt 2), 056107.
Harrigan, N., Achananuparp, P., Lim, E. (2012). Influentials, novelty,
and social contagion: The viral power of average friends, close
communities, and old news. Social Networks, 34(4), 470-480.
32
Hassanpour, N. (2017). A Quasi-Experimental Study of Contagion
and Coordination in Urban Conflict: Evidence from the Syrian
Civil War in Damascus. Unpublished Manuscript.
Hébert-Dufresne, L. & Althouse, B. M. (2015). Complex Dynamics
of Synergistic Coinfections on Realistically Clustered Net-
works. Proceedings of the National Academy of Sciences,
112(33), 10551–56.
Hodas, N. O. & Lerman, K. (2012). How Visibility and Divided At-
tention Constrain Social Contagion. Privacy, Security, Risk
and Trust (PASSAT), 2012 International Conference on and
2012 International Conference on Social Computing (Social-
Com).
Huang, W., Zhang, I., Xu, X., & Fu, X. (2016). Contagion on com-
plex networks with persuasion. Scientific Reports 6 (23766).
doi:10.1038/srep23766
Hurd, T. R. & Gleeson, J. P. (2013). On Watts cascade model with
random link weights. J. Complex Networks, 1, 25–43
Ikeda, Y., Hasegawa, T. & Nemoto, K. (2010). Cascade dynamics on
clustered network. J. Phys.: Conference Series, 221.
Jie, R., Qiaoa, J., Xub, G., & Menga, Y. (2016). A study on the inter-
action between two rumors in homogeneous complex net-
works under symmetric conditions. Physica A: Statistical Me-
chanics and its Applications, 454, 129–142.
Karimi, K. & Holme, P. (2013). Threshold model of cascades in em-
pirical temporal networks. Physica A, 392, 3476–3483
Karsai, M., Iniguez, G., Kaski, K. & Kertesz, J. (2014). Complex con-
tagion process in spreading of online innovation. J R Soc In-
terface, 11(101), 20140694.
Kooti, F., Yang, H., Cha, M., Gummadi, P.K., and Mason, W.A.
(2012). The emergence of conventions in online social net-
works. ICWSM.
Krafft, P., Macy, M., & Pentland, A. (2016). Bots as Virtual Confed-
erates: Design and Ethics. The 20th ACM Conference on Com-
puter-Supported Cooperative Work and Social Computing
(CSCW).
Kramer, A., Guillory, J., & Hancock, J. (2014). Experimental Evi-
dence of Massive-scale Emotional Contagion through Social
Networks. PNAS, 111(24), 8788-8790.
33
Kuhlman, C., Kumar,A., & Tuli, G. (2011a). A bi-threshold model of
complex contagion and its application to the spread of smok-
ing behavior. AAAI Fall Symposium: Complex Adaptive Sys-
tems.
Kuhlman C.J., Kumar, V.S.A., Marathe M.V., Ravi S.S., &
Rosenkrantz D.J. (2011b) Effects of Opposition on the Diffu-
sion of Complex Contagions in Social Networks: An Empiri-
cal Study. In Salerno J., Yang S.J., Nau D., Chai SK. (Eds),
Social Computing, Behavioral-Cultural Modeling and Predic-
tion. SBP 2011. Lecture Notes in Computer Science, 6589.
Springer, Berlin, Heidelberg
Kuhlman C.J., Kumar, V.S.A., Marathe M.V., et al. (2015). Inhibiting
diffusion of complex contagions in social networks: theoreti-
cal and experimental results. Data Min Knowl Disc, 29, 423.
doi:10.1007/s10618-014-0351-4
Lee, K. M., Brummitt, C. D., & Goh, K. I. (2014). Threshold cascades
with response heterogeneity in multiplex networks. Phys Rev
E Stat Nonlin Soft Matter Phys, 90(6), 062816.
McCullen, N., Rucklidge, A., Bale, C., Foxon, T., & Gale, W. (2013).
Multiparameter models of innovation diffusion on complex
networks. J. Appl. Dyn. Syst., 12, 515–532.
Melnik, S., Ward, J. A., Gleeson, J. P., & Porter, M. A. (2013). Multi-
stage complex contagions. Chaos, 23.
Mønsted, B., Sapieżyński, P., Ferrara, E., & Lehmann, S. (2017). Ev-
idence of Complex Contagion of Information in Social Media:
An Experiment Using Twitter Bots. arXiv.
Morris, S. (2000). Contagion. Review of Economic Studies, 67, 57-78.
Myers, S. & Leskovec, J. (2013). Clash of the Contagions: Coopera-
tion and Competition in Information Diffusion. IEEE 12th In-
ternational Conference on Data Mining (ICDM).
Myneni, S., Fujimoto, K., Cobb, N., & Cohen, T. (2015). Content-
driven analysis of an online community for smoking cessa-
tion: integration of qualitative techniques, automated text
J Public
analysis,
Health,105(6),1206-1212.
networks. Am
and
affiliation
O'Sullivan, D., Keefe, G., Fennell, P., & Gleeson, J. (2015). Mathe-
matical modeling of complex contagion on clustered net-
works. Frontiers in Physics, 8(71).
34
Oster, E. & Thornton, R. (2012). Determinants of Technology Adop-
tion: Peer Effects in Menstrual Cup Take-up. The Journal of
European Economic Association, 10(6), 1263–1293.
Pan, W., Ghoshal, G., Krumme, C., Cebrian, M., & Pentland, A.
(2013). Urban characteristics attributable to density-driven tie
formation. Nat Commun, 4(1961).
Parigi, P. & Gong, R. (2014) From grassroots to digital ties: A case
study of a political consumerism movement. Journal of Con-
sumer Culture, 14(2).
Parkinson, S. (2013). Organizing Rebellion: Rethinking High-Risk
Mobilization and Social Networks in War. The American Po-
litical Science Review, 107(3), 418-432.
Pastor-Satorras, R., Castellano, C., Mieghem, P. V., & Vespignani,
A. (2015). Epidemic processes in complex networks. arXiv.
Perez-Reche, F. J., Ludlam, J. J., Taraskin, S. N., & Gilligan, C. A.
(2011). Synergy in spreading processes: from exploitative to
explorative foraging strategies. Phys Rev Lett, 106(21),
218701.
Puglisi, A., Baronchelli, A., & Loreto, V. (2008). Cultural route to the
emergence of linguistic categories. PNAS, 105(23), 7936-
7940.
Romero, D.M., Meeder, B., & Kleinberg, J. (2011). Differences in the
mechanics of information diffusion across topics: idioms, po-
litical hashtags, and complex contagion on twitter. In Pro-
ceedings of the 20th international conference on world wide
web. 695–704. ACM.
Rosenthal, S. B., Twomey, C. R., Hartnett, A. T., Wu, H. S., &
Couzin, I. D. (2015). Revealing the hidden networks of inter-
action in mobile animal groups allows prediction of complex
behavioral contagion. PNAS, 112(15), 4690-4695.
Ruan, Z., Iniguez, G., Karsai, M. & Kertesz, J. (2015). Kinetics of
Social Contagion. Phys Rev Lett, 115(21), 218702.
Salathe, M. & Bonhoeffer, S. (2008). The effect of opinion clustering
on disease outbreaks. J R Soc Interface, 5(29), 1505-1508.
Salganik, M. J., Dodds, P. S., & Watts, D. J. (2006). Experimental
study of inequality and unpredictability in an artificial cultural
market. Science, 311(5762), 854-856.
35
Schelling, T. (1973). Hockey Helmets, Concealed Weapons, and Day-
light Saving: A Study of Binary Choices with Externalities.
The Journal of Conflict Resolution, 17(3), 381-428.
Shu, P., Gao, L., Zhao, P., Wang, W., & Stanley, H. (2017). Social
Contagions on Interdependent Lattice Networks. Scientific
Reports, 7(44669).
Siegel, D. (2009). Social Networks and Collective Action. American
Journal of Political Science, 53(1), 122-138.
Siegel, D. (2011). When does Repression Work? Collective Action in
Social Networks. The Journal of Politics, 73(4), 993-1010.
State, B. & Adamic, L. (2015). The Diffusion of Support in an Online
Social Movement: Evidence from the Adoption of Equal-Sign
Profile Pictures. CSCW '15 Proceedings of the 18th ACM
Conference on Computer Supported Cooperative Work and
Social Computing, 1741-1750
Steinhert-Threlkeld, Z. (2017). Spontaneous Collective Action: Pe-
ripheral Mobilization During the Arab Spring. American Po-
litical Science Review, 111(2), 379-403.
Su, Y., Zhang, X., Liu, L. et al. (2016). Understanding information
interactions in diffusion: an evolutionary game-theoretic per-
spective. Frontiers
in Computer Science, 10, 518.
doi:10.1007/s11704-015-5008-y
Sun, E., Rosenn, I., Marlow, C., & Lento. T. (2009). Gesundheit!
Modeling Contagion through Facebook News Feed. Third In-
ternational AAAI Conference on Weblogs and Social Media.
Takaguchi, T., Masuda, N., & Holme, P. Bursty Communication Pat-
terns Facilitate Spreading in a Threshold-Based Epidemic Dy-
namics. PLoS One, 8(7).
Teng, C., Gong, L., Eecs, A., Brunetti, C., & Adamic, L. (2012). Co-
evolution of network structure and content. Proceedings of
WebSci '12 Proceedings of the 4th Annual ACM Web Science
Conference, 288-297
Toole, J., Meeyoung, C., & Gonzalez, M. (2012). Modeling the Adop-
tion of Innovations in the Presence of Geographic and Media
Influences. PLoS One, 7(1), 1-9.
Traag, V. (2016). Complex Contagion of Campaign Donations. PLoS
One, 11(4).
Ugander, J., Backstrom, L., Marlow, C., & Kleinberg, J. (2012).
36
Structural diversity in social contagion. PNAS, 109(16), 5962-
5966.
Wang, W., Shu, P., Zhu, Y. X., Tang, M., & Zhang, Y. C. (2015a).
Dynamics of social contagions with limited contact capacity.
Chaos, 25(10), 103102.
Wang, W., Tang, M., Zhang, H. F., & Lai, Y. C. (2015b). Dynamics
of social contagions with memory of nonredundant infor-
mation. Phys Rev E Stat Nonlin Soft Matter Phys, 92(1),
012820.
Watts, D. J., & Strogatz, S.H. (1998). Collective dynamics of 'small-
world' networks. Nature, 393(6684), 440-442.
Weng, L., Menczer, F., & Ahn, Y. Y. (2013). Virality prediction and
community structure in social networks. Scientific Reports, 3,
2522.
Wu, S., Tan, C., Kleinberg, J., & Macy, M. (2011). Does bad news
go away faster? Fifth international AAAI conference on web-
logs and social media, ICWSM. AAAI.
Yağan, O. & Gligor, V. (2012) Analysis of complex contagions in ran-
dom multiplex networks. Phys. Rev. E, 86, 036103.
Yasseri, T., Hale, S., & Margetts, H. (2014). Modeling the rise in In-
ternet-based petitions. arXiv. https://arxiv.org/abs/1308.0239
Zhang, J., Brackbill, D., Yang, S., Becker, J., Herbert, N., & Centola,
D. (2016). Support or competition? How online social net-
works increase physical activity: A randomized controlled
trial. Prev Med Rep, 4, 453-458.
Zhao, J. H., Zhou, H. J., & Liu, Y. Y. (2013). Inducing effect on the
percolation transition in complex networks. Nat Commun, 4,
2412.
|
1204.3682 | 1 | 1204 | 2012-04-17T01:33:13 | Leading the Collective: Social Capital and the Development of Leaders in Core-Periphery Organizations | [
"cs.SI",
"physics.soc-ph"
] | Wikipedia and open source software projects have been cited as canonical examples of collectively intelligent organizations. Both organizations rely on large crowds of contributors to create knowledge goods. The crowds that emerge in both cases are not flat, but form a core-periphery network in which a few leaders contribute a large portion of the production and coordination work. This paper explores the social network processes by which leaders emerge from crowd-based organizations. | cs.SI | cs | PROCEEDINGS, CI2012
LEADING THE COLLECTIVE: SOCIAL CAPITAL AND THE
DEVELOPMENT OF LEADERS IN CORE-PERIPHERY ORGANIZATIONS
Benjamin Collier
Tepper School of Business
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh PA, 15206
e-mail: [email protected]
ABSTRACT
Wikipedia and open source software projects have
been cited as canonical examples of collectively
intelligent organizations. Both organizations rely on
large crowds of contributors to create knowledge
goods. The crowds that emerge in both cases are not
flat, but form a core-periphery network in which a
few
leaders contribute a
large portion of
the
production and coordination work. This paper
explores the social network processes by which
leaders emerge from crowd-based organizations.
INTRODUCTION
Wikipedia has often been cited as one of the
canonical examples of a collectively
intelligent
organization. Much
like open source software
development, anyone may contribute to the project
and the end product is a valuable resource created by
a crowd of volunteers who are not paid directly by
the organization. While it is true that "Wikipedia has
been developed with almost no centralized control"
(Malone & Raubacher, 2010, p. 21) in terms of
formal hierarchical control mechanisms, a small core
group of contributors to Wikipedia contribute a
significant portion of the production and coordination
work while a majority of contributors remain as
peripheral participants (Kittur et al., 2007).
Collectively intelligent crowd-based organizations
such as open source software projects and Wikipedia
may be thought to be flat, egalitarian, and self-
organizing. However, research has examined a core
group of leaders that emerge through formal election
processes from the "crowd". Elected leaders in
crowd-based organizations often provide centralized
coordination of
long-term objectives, mediate
conflict within the organization, and develop formal
organizational policy (O’Mahony and Ferraro, 2007;
Dahlandar & O’Mahony, 2010).
Robert Kraut
Human-Computer Interaction Institute
Carnegie Mellon University
5000 Forbes Avenue
Pittsburgh, PA 15206
[email protected]
Without a
formal hierarchical path or clear
organizational roles, it is unclear how leaders emerge
from the crowd of participants in core-periphery
organizations. In Malone & Raubacher's (2010) work
on the collective intelligence genome, the "crowd"
gene and the "hierarchy or management" gene
provide a framework to understand who should be
performing organizational tasks. In the case of both
Wikipedia and open source software projects, the
hierarchy of leaders emerges from the crowd. In this
study we examine the social processes by which
leaders emerge from the crowd.
We begin by briefly defining and discussing core-
periphery organizations. We then move to develop
insight into the impact social network connections
have on developing leaders, and the role of weak,
Implications
simmelian
strong, and
for
ties.
understanding
the emergence of
leadership and
hierarchy from crowds in collectively intelligent
organizations are then discussed.
CORE-PERIPHERY ORGANIZATIONS
Drawing from Borgatti’s work on core-periphery
networks, we propose a modified definition of a core-
periphery organization as follows: a core-periphery
organization entails a dense, cohesive core and a
sparse, unconnected periphery (Borgatti, 2000). The
definition is intuitive and broad enough to encompass
a
volunteer
from
core-periphery
of
range
organizations, virtual organizations, and online
production communities. Core-periphery network
organizations commonly emerge from “crowd” based
contribution systems, in which there are (1) low
barriers to entry, (2) high variability in skill and time
commitments, and (3) lack of predefined roles.
SOCIAL CAPITAL AND LEADERSHIP
The study of leadership has focused on a few key
approaches: the behavioral approach, the power-
influence approach, the situational approach, and the
integrative approach (see Yukl 1989, 2002 for
review). Recently there has been a call in the
literature for a social capital approach to leadership
(Brass and Krackhardt, 1999). Other approaches
largely focus on what leaders do in isolation from
their context, or how leaders interact with their
individual followers. The social capital approach to
leadership examines social network ties and explores
the impact ties have on leadership development and
leadership effectiveness. In contrast to human capital
(traits, characteristics, behaviors, styles), social
capital refers to relationships with other people, and
the
access
to
information,
resources,
and
opportunities that come with those relationships
(Burt, 1992; Coleman, 1988).
DEVELOPING SOCIAL CAPITAL
In core-periphery organizations, as in volunteer
there are broadly
organizations,
levels of
two
membership:
leaders and non-leaders (Heidrich,
1990; Catano et al., 2001). Given that there are two
broad roles within core-periphery organizations, there
are two major transitions that must occur: transition
to the role of contributor and transition to the role of
leader. The socialization and training processes for
these two role transitions play a large part in how
newcomers adjust to the role of volunteer, and
veterans adjust to becoming a leader (Nicholson,
1984).
Early ties to periphery
In studies of both unions and volunteer organizations,
early experiences in core-periphery organizations are
shown to be especially important for socializing
newcomers
into
the norms and values of
the
organization
continued
encouraging
for
and
commitment to organizational activities (Fullagar et
al., 1992, 1994, 1995). Lave and Wenger’s seminal
work on legitimate peripheral participation (1991),
provides evidence that socialization and situated
learning
in
core-periphery
organizations
(communities of practice) primarily occurs not
between peripheral members (apprentices) and core
members (masters) but largely between peripheral
members. That is, a newcomer’s relationships to
others in the periphery provide a better experience to
learn production work and
the norms of
the
organization.
[Even] where the relationship of the apprentice to
master
is specific and explicit,
it
is not
this
relationship, but rather the apprentice’s relations to
other apprentices...that organize opportunities to
learn; an apprentice’s own master is too distant, an
object of too much respect to engage with in
awkward attempts at new activity.
-Lave and Wenger, 1991, p.92
In addition to motivational reasons for newcomers to
learn about the organization and entry level tasks
from other peers in the periphery, a significant body
of educational research suggests experts may not be
the most suitable teachers for novices. The “expert
blind spot” problem in education refers to the
problem that experts have in teaching and relating to
novices (Nathan and Petrosino, 2003; Koedinger &
Nathan, 1997; Koedinger et al., 2008).
As
individuals learn they move through the four stages:
(1) unconscious
incompetence,
(2)
conscious
incompetence, (3) conscious competence, and (4)
unconscious competence (Sprague and Stuart, 2003).
Initially a novice is unaware and incompetent at a
certain task or position. Then they slowly become
aware of their incompetence, and move to a stage of
competence in which they are aware of what they
know and how they learned it. In the last stage an
expert often becomes unaware of how they learned
the intricate details of the knowledge of their craft
despite their high level of competent (Ambrose et al.,
2010). As an example, the best teacher for a ninth
grade student in algebra may not be a research
scientist in advanced mathematics. As an expert, a
research scientist may not know a student’s
developmental background and the appropriate pace
for the student to learn. Often a better approach may
be to have peers who have recently gone through
algebra tutor the student since they still remember the
principles that gave them difficulty and have a novice
language appropriate for the student’s developmental
stage.
H1a: Ties developed early to the periphery will have
a greater influence than early leadership ties on
advancement to a leadership role
Late ties to leaders
As periphery members develop commitment and
have entered more advanced
stages
in
the
organization, they confront a role transition into a
leadership position (Heidrich, 1990). Current leaders
in any organization have a very limited amount of
time and resources available to make connections
with others and developing one-on-one relationships
within the organization (Cross and Thomas, 2011).
Leaders must be strategic about who they are
investing time in and mentoring. Core-periphery
organizations are bottom heavy in the sense that a
vast majority of the members are only moderately
involved
in contributing, so
leaders must be
particular and
time mentoring and
their
invest
coaching with those who have paid their dues to the
organization.
In previous research on core-periphery organizations,
studies have found that early on members focus on
production
level
tasks
and
later
develop
communication and organizational building activities
(O’Mahony and Ferraro, 2007; Dahlander and
O’Mahony, 2010).
In communities of practice, before a peripheral
member can become a legitimate tradesperson a
“master” must sponsor an “apprentice”. Similarly
sponsorship from current organizational leaders plays
a large role not only in mentoring and providing
support but also in legitimizing a candidate for
promotion to the rest of their colleagues (Brass and
Krackhardt, 1999; Ng et al., 2005). This sponsorship
and legitimizing process works most effectively
when the newcomer has paid their dues to the
organization and is ready to be considered for a
leadership position. Additionally, ties to leaders later
on in organizational tenure can signal promise and
provide mentoring and access to one's network
(Kilduff & Krackhardt, 1994; Brass & Krackhardt,
1999).
H1b: Ties developed to leaders later will have a
greater
influence
than
later periphery
ties on
advancement to a leadership role.
WEAK, STRONG, AND SIMMELIAN TIES
All social ties between people are not equal. Strong
ties are most often thought of as friendships or close
professional relationships, while weak ties are a more
loose
connection
such
as
an
acquaintance.
Simmelian ties go beyond strength and are defined as
a
triad (or more) of strong
ties
in a group
(Krackhardt, 1999; Krackhardt, 2002). For example,
if Irene has a strong tie to Jerry, and both Irene and
Jerry have a strong tie to Kyle, the tie would be
considered a simmelian tie.
Weak ties provide diverse access to information and
organizational awareness (Granovetter, 1973). The
cost of creating a weak tie is much lower than
creating a strong tie in terms of time and resources,
and thus people generally have many more weak ties
than strong ties. People are more likely to find out
information about job openings from weak ties, and
information flow
in weak
ties
is more novel,
divergent, and non-redundant than strong ties.
Strong ties have been found to induce commitment,
provide mentoring, and elicit trust (Kilduff and
Krackhardt, 1994). One’s attitudes, opinions, and
beliefs are more likely to be affected through strong
ties than through weak ties (Krackhardt, 1999). In
terms of transferring knowledge and organizational
culture between individuals, strong ties have been
shown to be more effective at transferring knowledge
that is difficult to codify and explain in a short period
of time (Hanson, 1999).
Simmel
importance of
the
(1950) emphasized
moving beyond dyadic ties to examine ties embedded
within triads. Research has confirmed Simmel’s
work and found that social ties embedded within
triads are more stable over time, stronger, more
durable, and exert more pressure
to conform
(Krackhardt, 1998).
Weak ties to periphery
Leaders
in
the
context
of
core-periphery
organizations coordinate and manage a large body of
peripheral contributors who have a high turnover and
may only occasionally show up
to contribute
(Crowston & Howison, 2006; Pearce 1980; Pearce
1993).
Learning to manage and interact with
peripheral members of the organization is a key
component of leadership in this context. Weak ties to
peripheral members of the organization as one
progresses towards a leadership positions both enable
potential leaders to learn to coordinate with and
manage other peripheral members and provides
potential leaders with access to a diverse pool of
organizational knowledge.
Short,
infrequent
interactions with peripheral members costs relatively
little time and provides access to novel information
(Granovetter, 1973; Burt, 1992).
Weak ties to leaders by contrast are not as likely to
give as wide of a view of the organization as weak
ties to the periphery.
Leaders are often well
connected with each other in the core and interactions
with leaders may not have as much to offer in terms
of
interactions with
to manage short
learning
members of the periphery.
H2a: Weak ties to the periphery will have a greater
influence on advancement to leadership than weak
ties to leaders.
Strong and simmelian ties to leaders
As leaders develop in core-periphery organizations
once they have adjusted to the organization and
developed a threshold level of commitment the next
role transition into a leadership position greatly
benefits from public sponsorship and mentoring from
current leaders (Lave and Wenger, 1991). The most
effective
ties
for mentoring,
coaching,
and
sponsorship are strong, stable, and embedded within
a community of current leaders (Krackhardt, 1992;
Krackhardt, 1999). The social and political skills for
leadership are not easily transferred and written
down, and research has shown this type of tacit
knowledge is best transferred through strong ties
ties and
Moreover, strong
(Hanson, 1999).
interaction with veteran leaders is the principal means
by which potential leaders absorb the subtleties of
organizational culture and climate of leadership
(Schein, 1979; Buchanan, 1974). Since simmelian
ties provide even stronger relationships than strong
ties, we hypothesize simmelian ties with current
leaders will be the most beneficial for developing
potential leaders in core-periphery organizations.
H2b: Strong ties to leaders will have a greater
influence on advancement to leadership than strong
ties to the periphery.
H2c: Simmelian ties to leaders will have a greater
influence on advancement
to
leadership
than
simmelian ties to the periphery.
RESEARCH CONTEXT
Wikipedia
source, online
large, open
a
is
encyclopedia written and edited by volunteers. As of
March 2011 over 90,000 regular editors have
contributed over 8 million articles to the English
version alone. Wikipedia has been in the top ten
most visited sites on the internet for over six years,
and a recent Pew Research study (2011) showed 53%
of internet users go to it for information. Wikipedia
is written and edited by volunteers and is not
supervised by a professional staff. Wikipedia is
structured as a model core-periphery organization in
two ways. First, research on the distribution of work
in Wikipedia has shown that a core of 2.5% of the
contributors to Wikipedia produce over half of the
edits to the content (Kittur et al, 2007). Second,
Wikipedia has an official “Administrator” role that
designates officially elected leaders while all other
editors are in a flat organizational position.
A small group of users titled “Administrators” hold a
special place in the organization as leaders with a
very public status and additional power in terms of
technical abilities to edit the front page of Wikipedia
and other sensitive content (Bryant et al, 2005; Burke
and Kraut, 2008; Collier et al., 2008). Administrators
are elected
the position after accepting a
to
nomination from someone within the Wikipedia
community, and undergo a seven-day vetting period
in which their record is reviewed, they are asked
interview-style questions, and voters publicly discuss
the merits of the candidate for promotion. After the
seven-day period, if the community has reached a
consensus, the candidate is promoted to be an
Administrator.
The process for becoming an
Administrator
for
is challenging
in Wikipedia
candidates, and only 56% of people nominated for
the leadership position are promoted.
METHODS
Data for
this study were collected for 2,442
candidates for Administrator positions in Wikipedia.
Each candidate was nominated and accepted the
nomination, but only 56% of candidates were
promoted to leadership. The data range from 2004 to
2010, and include a complete contribution history for
all candidates including all of the contributions they
has made to improving articles, all of the discussion
of articles they have contributed, policy development
and administrative behaviors, and history of direct
communications with other contributors.
Social ties were measured as ties via user talk (direct
communication) with other contributors within
Wikipedia
to either periphery members
(non-
Administrators) or leaders (Administrators). To get a
measure of the change in social ties over time,
candidates have their history broken up into three
periods: early, middle, and late. Periods correspond
to the number of months between the time they began
contributing and the date they were considered for
promotion. Within the analysis we control for both
the number of months they have been active as well
as the year they were considered for promotion.
Ties are only considered if they are reciprocal. For
communication to count as a tie, it must be a two-
way conversation on user talk pages. We consider
weak ties to be ties with less than six bidirectional
communications within
the given period which
corresponds to 84% of the sample ties. The results
and findings from this study are robust across using
cutoff points at both four ties and eight ties. Strong
ties by extension are any tie that has more than six
bidirectional communications within the same time
period. Ties are counted as a simmelian tie if the tie
between the candidate for leadership and the target of
the tie is a strong tie, and there is at least one other
person who has a strong tie to both the candidate for
leadership and the target of the tie.
The outcome in our model is whether the candidate
for
leadership was successfully promoted
to a
leadership position. Since the outcome is binary
(1=successful promotion, 0=unsuccessful promotion),
the data will be analyzed using a Probit model
(Wooldridge, 2002).
RESULTS
Our first hypothesis about the importance of early
ties to the periphery shows moderate support. Early
ties to leaders are not a significant predictor of
becoming a leader, while early ties to the periphery
develop a candidate for leadership. While the effect
size is somewhat small (B=0.05, p=.003), it is a
Table 1: Social Network Ties Predicting Promotion to Leadership
Figure 1: H1a - Early Network Ties
Figure 3: H1b - Late Network Ties
Figure 5: H2b - Strong Network Ties
Figure 2: Mid-Tenure Network Ties
Figure 4: H2a - Weak Network Ties
Figure 6: H2c - Simmelian Network Ties
significant effect and with a high variance in number
of weak ties it becomes quite noticeable in Figure 1.
During the late period, shortly before candidates are
considered for promotion, the target of the social ties
clearly makes a large difference (Figure 3). In the
late period, network ties to peripheral members is not
a significant predictor of becoming a leader while ties
to current leaders has a relatively large significant
effect (B=0.178, p<.001).
When examining weak, strong, and simmelian tie
differences between leaders and peripheral members,
we see a very clear difference. Weak ties to leaders
and to peripheral members are both significant
predictors of becoming a leader; however, we find
that weak ties to the periphery have a larger impact
on promotion (B=0.278, p<.001) than weak ties to
leaders (B=0.212, p<.001). Weak ties provide a
diversity of knowledge from peripheral members; in
addition, they clearly provide a benefit perhaps in
terms of being aware of the candidate or helping
them in small ways to develop as a leader (Figure 4).
Surprisingly we find that strong ties to either leaders
or peripheral members do not improve a candidate’s
probability of becoming a leader (Figure 5). We
hypothesized that mentoring and tacit knowledge
would be transferred through strong ties, but in this
context that does not seem to be the case. However,
we see a very large positive effect for simmelian ties
to leaders helping candidates become a leader (Figure
6). In this case despite prior research showing that
strong ties are key in mentoring and leadership
development, we find that strong ties may not always
be enough. Simmelian ties are indeed strong ties, but
they are strong ties embedded within a group of three
or more. One of the most important factors we find
is that simmelian ties to leaders (B=0.223, p=.018)
are not only more important than simmelian ties to
the periphery (B=0.054, p=.241), but are significantly
more important that strong ties to leaders.
DISCUSSION
Clearly
the
in
leaders do not simply “arrive”
collectively intelligent crowds, they are made and
developed over time. Commitment, socialization,
and mentoring processes that are key to developing
potential leaders happen in a social context. By
examining the social network of contributors over
time, we find clear differences in the impact of social
networks have on leadership. Early in a member’s
life we showed that ties to periphery members are
important and help develop a broader picture of the
organization and develop the skill sets necessary for a
leadership position.
Leaders
in core-periphery
organizations spend a significant amount of time
peripheral
interacting with
and
coordinating
members, and these experiences early on help
contributors develop into leaders. Similarly, we find
leaders and periphery
ties
that weak
to both
encourage
leadership development.
Leadership
development programs, such as the one at General
Electric, emphasize six-month rotations in various
areas of the business in an array of geographic
locations. This type of program is likely to expose
potential leaders to a wide variety of social contacts
for brief periods of time to developer their weak tie
network (H1b) early in their career (H1a). This
strategy seems to be effective in developing leaders
in core-periphery organizations as well.
To develop leaders in traditional organizations it may
seem intuitive to pair new entrants with current
leaders.
However, this study suggests that in
collectively intelligent crowds, new entrants to the
organization are best socialized by other entry level
or non-leadership members. When considering work
done on situated learning and legitimate peripheral
participation, this finding lines up with Lave and
Wenger’s (1991) observations in trade organizations.
Early on apprentices
largely
learn from other
apprentices. As organizational members spend more
time in the organization and develop the rudimentary
skills and begin to adapt to the culture, current
leaders can play a large role in helping them
transition into a more central leadership position.
However, our findings suggest that when considering
a mentoring or relational program to pair leaders with
non-leaders, one should consider using small groups
of strong ties to best develop leaders. Strong ties, in
our context and perhaps in the context of other core-
periphery organizations, did not play a role in
developing leaders; rather, simmelian ties to leaders
embedded in groups showed significant potential for
impacting the development of future leaders.
More broadly, while a significant portion of
leadership
development
research
focuses
on
developing leadership skills and selecting people
with certain personality traits (Day, 2001), more
attention should be given to the social capital of
emerging
social networks of
The
leaders.
organizational members over time ultimately play a
large role
in helping newcomers develop
into
organizational leaders. Social network connections
play a different role over time depending on the
tenure of the individual in the organizations (Brass
and Krackhardt, 1999). This study provides theory
and evidence to suggest that both individuals seeking
to be leaders and organizations seeking to develop
leaders from within may benefit from understanding
the underlying social networks in the organization.
ACKNOWLEDGEMENTS
We would like to thank Denise Rousseau, Anita
Woolley, and Brandy Aven for feedback and
assistance. This project was supported by NSF IIS-
0963451 and NSF OC10943148.
REFERENCES
Borgatti, S.
(2000). Models of core/periphery
structures. Social Networks, 21(4), 375-395.
Brass, D., & Krackhardt, D. (1999). The social
capital of twenty-first century leaders. In J. G.
Hunt & R. L. Phillips (Eds.), Out-of-the Box
Leadership Challenges for the 21st Century
Army (pp. 179-194).
Bryant, S. L., Forte, A., & Bruckman, A. (2005).
Becoming Wikipedian!: Transformation of
Participation
a Collaborative Online
in
Encyclopedia. GROUP. Sanibel Island, Florida.
Buchanan, B.
(1974). Building organizational
commitment: The socialization of managers in
work organizations. Administrative Science
Quarterly, 19, 533-546.
Burke, M., & Kraut, R. (2008). Mopping Up:
Modeling Wikipedia Promotion Decisions.
Computer Supported Cooperative Work. San
Diego, California: ACM.
Burt, R. (1992). Structural Holes: The Social Science
of Competition. Cambridge, MA: Harvard
University Press.
Catano, V. M., Pond, M., & Kelloway, E. K. (2001).
Exploring commitment and
leadership
in
volunteer
organizations.
Leadership &
Organization Development Journal, 22(6),
256-263.
Coleman, J. S. (1988). Social capital in the creation
of human capital. American
journal of
sociology, 94(S1), 95.
Collier, B., Burke, M., Kittur, N., & Kraut, R. (2008).
Retrospective versus Prospective Evidence for
Promotion: The Case of Wikipedia. Academy of
Management Annual Meeting. Anaheim, CA.
Cross, R., & Thomas, R. (2011). A smarter way to
network. Harvard Business Review, 89(7-8),
149-53, 167.
Crowston, K., & Howison, J. (2006). Core and
Periphery in Free/Libre and Open Source
Software Team Communications. Proceedings
of
the 39th Annual Hawaii International
Conference on System Sciences. Kaua'i, Hawai.
Dahlander, L., & O’Mahony, S. (2010). Progressing
to the Center: Coordinating Project Work.
Organization Science, (Arthur 1994), 1-19.
Day, D. V. (2001). Leadership Development: A
Review
in Context. Leadership Quarterly,
11(4), 581-613.
Fullagar, C., Clark, P., Gallagher, D., & Gordon, M.
E. (1994). A model of the antecedents of early
union commitment: the role of socialization
experiences
and
steward
characteristics.
Journal of Organizational Behavior, 15, 517-
533.
Fullagar, C., Gallagher, D., Gordon, M. E., & Clark,
P. F. (1995). Impact of early socialization on
union
commitment
and participation:
a
longitudinal
study.
Journal
of Applied
Psychology1, 80, 147-157.
Fullagar, C., McCoy, D., & Shull, C. (1992). The
socialization of union
loyalty. Journal of
Organizational Behavior1, 13, 13-26.
Granovetter, M. S. (1973). The strength of weak ties.
American Journal of Sociology, 78(6), 1360.
UChicago Press.
Hansen, M. (1999). The search-transfer problem: The
role of weak ties in sharing knowledge across
organizational subunits. Administrative Science
Quarterly, 44(1), 82-112.
Heidrich, K. W. (1990). Volunteers’ life-styles:
market segmentation based on volunteers' role
choices. Non-profit and Voluntary Sector
Quarterly, 19, 21-31.
Kilduff, M., & Krackhardt, D. (1994). Bringing the
individual back in: A structural analysis of the
internal
labor market
for
reputation
in
organizations. Academy
of Management
Journal, 37, 87-108.
Kittur, A., Chi, E., Pendleton, B. A., Suh, B., &
Mytkowicz, T. (2007). Power of the Few vs.
Wisdom of the Crowd: Wikipedia and the Rise
of the Bourgeoisie. Alt. CHI. San Jose.
Koedinger, K.R., & Nathan, M. J. (1997). Teachers’
notions of students' algebra problem-solving
difficulties. Annual Meeting of the James S.
McDonnel Foundation Program for Cognitive
Studies for Educational Practice.
Koedinger, K. R, Alibali, M. W., & Nathan, M. J.
(2008). Trade-offs between grounded and
abstract representations: evidence from algebra
problem solving. Cognitive Science, 32(2),
366-97.
Krackhardt, D.
(1999). The
ties
that
torture:
Simmelian
tie analysis
in organizations.
Research in the Sociology of Organizations,
(16), 183-210.
Krackhardt, D.
(2002). Structure, culture and
Simmelian ties in entrepreneurial firms. Social
Networks, 24(3), 279-290.
Krackhardt, D, & Hanson, J. R. (1993). Informal
networks:
the company behind
the chart.
Harvard Business Review, 71(4), 104-11.
Lave, J., & Wenger, E. (1991). Situated Learning:
Legitimate Peripheral Participation. New
York, NY: Cambridge University Press.
Malone, T. W., & Laubacher, R. (2010). The
Collective Intelligence Genome. MIT Sloan
Management Review, 51(3), 21-31.
Nathan, M.J., & Petrosino, A. (2003). Expert blind
spot among preservice
teachers. American
Educational Research Journal, 40(4), 905.
Sage Publications.
Ng, T. W. H., Eby, L. T., Sorenson, K. L., &
Feldman, D. (2005). Predictors of Objective
and Subjective Career Success: A Meta-
Analysis. Personnel Psychology, 58(2), 367-
408.
O’Mahony, S., & Ferraro, F. (2007). The Emergence
of Governance in an Open Source Community.
Academy of Management Journal, 50(5), 1079-
1106.
Pearce, J. L. (1980). Apathy or Self Interest? The
Volunteer’s Avoidance of Leadership Roles.
Journal of Voluntary Action Research, 9, 85-
94.
Pearce, J. L. (1993). Volunteers: The Organizational
Behavior of Unpaid Workers. New York, NY:
Routledge.
Schein, E. H., Schneier, I., & Baruer, C. H. (1971).
Occupational socialization in the professions:
The case of the role innovator. Journal of
Psychiatric Research, 8(521-530).
Simmel, G. (1950). Individual and society. In K. .
Wolff (Ed.), The Sociology of Georg Simmel.
New York: Free Press.
Sprague, J., & Stuart, D. (2003). The Speaker’s
Handbook
(6th
ed.).
Belmont,
Ca:
Wadsworth/Thompson Learning.
Yukl, G. (1989). Managerial Leadership: A Review
of Theory
and Research.
Journal
of
Management, 15(2), 251-289.
Yukl, Gary. (2002). Leadership in organizations.
Englewood Cliffs, NJ: Prentice-Hall.
|
1604.06260 | 1 | 1604 | 2016-04-21T11:23:00 | The Dynamics of Initiative in Communication Networks | [
"cs.SI",
"physics.soc-ph"
] | Human social interaction is often intermittent. Two acquainted persons can have extended periods without social interaction punctuated by periods of repeated interaction. In this case, the repeated interaction can be characterized by a seed initiative by either of the persons and a number of follow-up interactions. The tendency to initiate social interaction plays an important role in the formation of social networks and is in general not symmetric between persons. In this paper, we study the dynamics of initiative by analysing and modeling a detailed call and text message network sampled from a group of 700 individuals. We show that in an average relationship between two individuals, one part is almost twice as likely to initiate communication compared to the other part. The asymmetry has social consequences and ultimately might lead to the discontinuation of a relationship. We explain the observed asymmetry by a positive feedback mechanism where individuals already taking initiative are more likely to take initiative in the future. In general, people with many initiatives receive attention from a broader spectrum of friends than people with few initiatives. Lastly, we compare the likelihood of taking initiative with the basic personality traits of the five factor model. | cs.SI | cs |
The Dynamics of Initiative in Communication Networks
Anders Mollgaard, Joachim Mathiesen*
University of Copenhagen, Niels Bohr Institute , 2100 Copenhagen, Denmark
* [email protected]
Abstract
Human social interaction is often intermittent. Two acquainted persons can have
extended periods without social interaction punctuated by periods of repeated
interaction. In this case, the repeated interaction can be characterized by a seed
initiative by either of the persons and a number of follow-up interactions. The tendency
to initiate social interaction plays an important role in the formation of social networks
and is in general not symmetric between persons. In this paper, we study the dynamics
of initiative by analysing and modeling a detailed call and text message network sampled
from a group of 700 individuals. We show that in an average relationship between two
individuals, one part is almost twice as likely to initiate communication compared to the
other part. The asymmetry has social consequences and ultimately might lead to the
discontinuation of a relationship. We explain the observed asymmetry by a positive
feedback mechanism where individuals already taking initiative are more likely to take
initiative in the future. In general, people with many initiatives receive attention from a
broader spectrum of friends than people with few initiatives. Lastly, we compare the
likelihood of taking initiative with the basic personality traits of the five factor model.
Introduction
The digital recording of our social life including telecommunication and activity on the
internet allows us to answer previously unanswered questions about human behavior. It
is now possible to study the complex dynamics of social networks [1, 2] as well as their
formation and stability [3 -- 7]. Here, we are particularly interested in the dynamics of
initiative in social relations and how it might influence the formation of social networks.
A high degree of asymmetry in relations is observed in phone call networks [8] simply by
counting the number of calls going in each direction for all links over a period of time.
In particular, it has been found that for 25% of the links, 80% or more of the calls in a
relationship come from one part alone. Also, it has been shown that this asymmetry
cannot be explained by personal differences in call frequency. In general, it is possible to
take initiative through various modes of interaction, e.g. by face-to-face meetings, which
might result in a later call by phone or a text message. The fact that communication
happens in different ways might lead to spurious estimates of the asymmetry in
relations, when computed from a single mode of communication.
Here we consider communication in two channels, phone calls and text messages, in a
detailed data set sampled from 700 individuals. The data is collected from smartphones
distributed to students at the Technical University of Denmark and includes
information about communication both inside and outside the group of students. The
data is recorded over a period of 83 weeks and consists of 32412 links based on 972592
1/9
calls and 3949710 text messages. Smartphones have previously been used to infer 95%
of self-reported friendships based on communication and proximity [9]. In addition to
this, mobile phones have been used in several studies on human behavior [10, 11]
including communication dynamics [12], mobility [13], and personality [14, 15].
In the following, we introduce a parameter describing asymmetry in social relations.
From a statistical model that takes into account the sampling error on individual links,
we will compute the most probable distribution of the asymmetry parameter. We
further consider the dynamics of initiative by analysing the implications and causation
of asymmetry in relations.
Results
Definition of initiative. Not all phone calls and text messages represent an initiative,
since many of them are responses to previous communication. For example, a call may
not be picked up, but will anyway result in a later answer by the called part. Likewise,
most text messages will be part of an on-going communication. In order to distinguish
initiative from follow-up communication, we need to define a time scale that separates
the two. In Fig. 1, we show the distribution of times between communication events
over all relations in the data set. The time axis spans from one minute to one week and
the distribution follows a power law with an exponent of α = −1.26. The oscillations at
large time scales are due to the circadian rhythm and there is a local peak at precisely 3
hours, which is possibly due to the electronic response of an app installed on a number
of the smartphones in the study. The observed power law is in line with previous results
for inter-event times of human communication [16 -- 20] and other human activity [19, 21].
Unfortunately this also means that there is no natural time scale to separate initiative
from follow-up communication. Nonetheless, in this analysis, we have chosen to make a
cut between follow-up interaction and initiative at 24 hours. Most on-going telephone
communication has inter-event times below this scale (88 % of all inter-event times),
such that the expected rate of false positives for initiatives will be rather low. We
therefore define an initiative to be a communication event that is separated from a prior
communication on the same link by more than 24 hours. Communication separated by
a shorter time is considered to be follow-up.
Model. In the following, we compute the maximum-likelihood estimate of the
asymmetry distribution for relationships based on a statistical model. The relationship
between two persons, A and B, consists of a series of initiatives. For simplicity, we shall
assume that the probability for an initiative to be taken by person A, γA, is constant
over time. The corresponding probability for B is then γB = 1 − γA. We introduce
µ ≡ min (γA, γB) ≤ 0.5, as a measure of the asymmetry in a relationship. µ = 0.5
represents a fully symmetric relation with respect to initiatives, while µ = 0 represents a
fully asymmetric one. In the following, we will estimate the distribution of µ across
relationships in the full social network, which we shall denote F (µ). While we cannot
compute the true distribution, we shall compute the maximum-likelihood distribution,
FML (µ), based on the above assumptions.
Our data consists of a call and text message network of participants in the study and
external people that the participants have communicated with. The M observed links in
the network form a set, D = {Xii = 1, ..., M}, where i enumerates each link. The links
Xi ≡ (nA,i, nB,i) are characterized by the number of initiatives from person A (nA,i)
and B (nB,i), respectively, and we define NAB,i = nA,i + nB,i.
Invoking Bayes' theorem we get
2/9
Figure 1. Interevent distribution. Log-log plot of the distribution of waiting times
between communication events including both calls and text messages. Also shown is a
power law with an exponent of α = −1.26, which fits the distribution all the way from
one minute to one week. The power law nature of the distribution suggests that there is
no natural time scale to separate initiatives from follow-up communication. The local
peak at 3 hours is possibly the electronic response of an app and the oscillations at large
inter event times correspond to circadian cycles.
P (FD) =
P (DF ) P (F )
,
(cid:89)
P (D)
∝ P (DF ) ,
=
P (XiF ) .
i
For simplicity, we have here assumed a constant prior over F along with statistical
independence of the relationships. The normalization P (D) is ignored, since it is a
constant with respect to variation in F . The least initiative taking person could be
person A or person B, we must therefore integrate over both possibilities. Let us denote
the least initiative taking person by Y . The likelihood factor associated with a link
(nA,i, nB,i) given µ and Y may then be calculated using the binomial distribution
(cid:90)
(cid:88)
(cid:88)
Y ∈{A,B}
P (XiF ) =
=
P (XiY, µ) P (Y ) F (µ) dµ,
(cid:90) 1
2
(cid:18)Ni
(cid:19)
i (1 − µ)Ni−ni · 1
µn
2
· F (µ) dµ.
ni∈{nA,i,nB,i}
0
ni
Here we sum over Y (or equivalently n) giving each of the two possibilities a prior of a
1/2 and likewise integrate over µ giving each value a prior of F (µ). We shall now find
the distribution FML (µ) that maximizes the likelihood function P (DF ), or
equivalently, the log-likelihood log P (DF ).
We do this numerically using sequential least squares programming [22], which
handles both constraints and bounds. In our statistical model, we discretize the
initiative parameter µ → µj and thereby we also discretize the distribution F (µ) → Fj.
3/9
j Fj = 1 and the bounds 0 ≤ Fj ≤ 1 are introduced. We initialize Fj
according to the distribution of nA,i/Ni restricted to Ni > 20 and let the sequential
least squares estimation run until convergence. The analytic expression for the gradient
is calculated and used in the optimization, and for N > 100, we approximate the
binomial distribution by the normal distribution in order to handle the product between
(cid:1) and the very small µn
i (1 − µ)Ni−ni .
The constraint(cid:80)
the very large(cid:0)Ni
ni
In order to test the robustness and convergence of our estimates, we have created 100
synthetic data sets in the following way. We keep the number of links identical to the
original data set. Similarly, we keep the total number of initiatives, NAB,i, on each link,
Xi, the same, but we disregard the direction of the initiatives. For each link, we then
draw a µ from the distribution FML(µ), which is then used in a stochastic simulation of
the direction of the NAB,i initiatives. From the synthetics data set, we then make a
maximum likelihood estimate estimate, FML(µ) of the underlying distribution FML(µ).
In Fig. 2, we show the max likelihood distribution of µ obtained for the real data set
(full), along with the average distribution obtained for the synthetic data sets (dashed).
Also shown is the spread in the results of the synthetic data sets. Note that our
estimate of the underlying distribution is unbiased (the synthetic and real data overlap).
We observe that the distribution is bimodal with 23 percent of the links being fully
asymmetric, i.e. µ being very small. We suspect that many of these relations are of a
less social character, e.g. automatic text-message updates from service providers. For
this reason, we restrict our analysis to reciprocal relations only in the following sections,
i.e. relations with at least one initiative in both directions. For the full distribution, the
average µ is 0.282 ± 0.001, but if we exclude the potentially non-social links at µ = 0,
then we get an average of 0.359 ± 0.001. The errors correspond to those associated with
the error of the mean in the simulated data sets. We conclude that in an average
relation, one of the persons will be almost twice as likely as the other to initiate
communication.
Dynamics of relationships. In the above we considered relationships from a
static point of view and assumed that the probability parameter was constant in time.
Here we acknowledge that the history of a relationship may have an impact on future
communication. In particular, we study the effects of "initiative length". To explain
this term, we consider the following initiative history between person A and person B:
[. . . , B, A, A, A]. The current initiative length is 3, because person A has taken 3
consecutive initiatives, since the last initiative taken by person B. In other words, the
initiative length denotes the number of consecutive initiatives taken, since the last
change of "direction" in initiative.
As the initiative length grows, i.e. as either person A or person B keeps approaching
the other without a turn of initiative, we expect that the relationship becomes more
fragile and possibly comes to an end . Discontinued relationships are difficult to identify
in the data, since they might be resumed subsequent to the data recording. Instead, we
look for relationships that have been inactive for a very long time. In particular, we
consider the relationship between person A and person B to be discontinued, if the
following is true: person A has taken a total number of initiatives with other
individuals, not including B, which is 10 times larger, than the average number of
initiatives previously separating interaction between A and B.
In Fig. 3A we show the probability of a relationship ending as a function of the
initiative length. We find that the probability generally increases as the initiative length
grows towards 10. This is in line with previous research [12], which has shown that
reciprocity is important to link persistence. For initiative lengths greater than 12, the
probability drops back again; possibly because this involves only the most dedicated
relations, e.g. close relatives. In general, we find among all relations that the average
initiative length prior to the discontinuation of a relation is 3.2 (which in a jargon could
4/9
be named the "ghosting factor"). Note that, for better statistics, we have restricted the
analysis to relations with at least 15 initiatives.
In Fig. 3B, we show that the probability for the initiative in a relationship to change
from one part to the other as function of the initiative length. The plot is based on the
statistics of all relationships. When person A has taken a single initiative in a
relationship between A and B there is a 50% chance that the next initiative is taken by
B. However, as the number of consecutive initiatives taken by A increases, the
probability for B to take the next initiative drops exponentially. A least square
exponential fit yields the relation y = 0.51 · 0.92x, which says that the chance of the
initiative changing direction drops by 8% each time you make an initiative. In other
words, the direction of an initiative seems to have a self-amplifying effect, which
promotes the role of an initiator. This mechanism provides a possible explanation for
the persistent asymmetry observed in the data.
Figure 2. Asymmetry in relations. We show the max likelihood distribution of the
initiative parameter across relationships. Here µ = 0.5 corresponding to a fully
symmetric relationship, while µ = 0 is a fully asymmetric one. The full line corresponds
to the max likelihood distribution as it is derived from the data. We also test the
method for bias and uncertainty by applying it to synthetic data sets. The dashed line
correspond to the average estimate among the synthetic data sets, and the error bars
correspond to the spread in these estimates. We suspect that many of the highly
asymmetric relations at µ = 0 are of non-social character.
Dynamics of individuals. Here we turn to the initiative statistics of a person
rather than a relationship. We suspect that people, likely to take many initiatives, are
more likely to make friends, and, as the above results suggest, they are also more likely
to keep them. Again we start by deriving the population statistics of the initiative
parameter µp, only this time it characterizes a person instead of a link and it runs from
0 to 1. The parameter measures the probability that an initiative involving person i is
taken by i rather than one of her/his friends. Each person is characterized by the
number of in- and outgoing initiatives across all her/his relations. The analysis follows
the same steps as above, but without the sum over Y and with the integral over µp
running from 0 to 1. The obtained maximum-likelihood distribution for the µp
parameter is shown in Fig. 4A. The distribution is a little biased towards low initiative
with a mean of 0.469 ± 0.003, possibly because students are more likely to be called by
their parents than the other way around. The spread of the distribution is 0.082 ± 0.002,
but this estimate is probably slightly biased towards 0, due to the fully asymmetric
links being neglected. This is obvious from the spread of the reference distributions
(again computed from synthetic data), which is 4% lower than the spread of the
5/9
Figure 3. Initiative dynamics. In (A) we show the probability of a relationship
ending after a given initiative length. Here "initiative length" denotes the number of
consecutive one sided initiatives. Note that relationships are more likely to end after
several one-sided initiatives, although the probability drops back again for very large
(13+) initiative lengths. In (B) we show the probability of the initiative changing
direction as a function of the initiative length. We see that the probability drops
exponentially as the number of one sided initiatives in a row is increased. This suggests
that initiatives promotes the role of an initiator through a positive feedback.
distribution from which it was simulated. In general, the few percent with the very
lowest µ only take the initiative 25% of the time, whereas in the other end, we find
individuals which take initiative in 70% of the cases.
Next we look at the social consequences of µp; specifically we wish to quantify the
impact of a person's initiative on his abundance of friends. Since communication has
been recorded for varying lengths of periods, we cannot simply count the number of
contacts. Instead we count the average number of unique friends among all groups of 20
consecutive incoming initiatives. In principle, all 20 initiatives could be attributed to a
single person in which case we count just 1 unique friend among the 20 initiatives. The
other end of the scale corresponds to the 20 initiatives being attributed to 20 different
people, i.e. 20 unique friends. If one counts many unique individuals among person A's
incoming initiatives, it is an indication that many different people take an interest in
her/him. The µp parameter of a person is estimated from the number of outgoing
initiatives relative to the total number of initiatives. A scatter plot of the two quantities
is shown in Fig. 4B and we find a correlation between the two numbers of 0.35 ± 0.04.
The mean value of a binning along the horizontal axis is also shown in the plot. The
mean shows a clear trend: more personal initiative implies more interest from friends.
In particular, the number of unique friends among 20 incoming initiatives jumps from 8
to 12 as we move from low to high personal initiative. Note that, for better statistics,
this analysis has been restricted to individuals involved in at least 200 initiatives.
Finally we compare the likelihood of taking initiative with basic personality traits.
The participants in the study have filled questionnaires providing information about the
Big Five personality traits [23]. We have then performed a linear correlation between
the initiative parameter and the personality scores for each individual. We find the
following correlation coefficients for the traits with errors given as one standard
deviation, agreeableness (0.02 ± 0.12 ), conscientiousness (0.13 ± 0.10), extraversion
(0.26±0.06), neuroticism (0.11±0.07) and openness (0.07±0.08). The trait with the
highest correlation coefficient is perhaps not surprisingly extraversion. In general,
people with high extraversion scores are described to be outgoing and have a high
degree of sociability.
6/9
Figure 4. Initiative statistics of individuals. In (A) we show the
maximum-likelihood distribution of the personal initiative parameter µp, where µp is
the probability that an initiative involving person A is attributed to him rather than to
his friends. We note that µp varies a lot over the population; some people making only
25% of the initiatives themselves against 70% at the other end of the spectrum. This
has social consequences. In (B) we have estimated µp and plotted it against the "friend
abundance" for the full population. Friend abundance is estimated as the average
number of unique friends among all consecutive combinations of 20 incoming initiatives.
We find that people with large µp are rewarded by increased attention from their
network.
Discussion
The individual initiative for social interaction is an important factor in the formation
and stability of social networks. Here we have applied a statistical model to derive the
distribution of an initiative parameter in the social network of 700 individuals. In an
average relationship, we find that one part will take initiative only 36% of the time
whereas the other part will take initiative the remaining 64%, i.e. one part is in general
twice as likely to take initiative as the other. These numbers represent a considerable
asymmetry among the bulk of all relationships. We find that relationships are more
likely to end after large initiative lengths, although it drops back again around 13
consecutive initiatives by one part. Despite the possible implications for the stability of
a relationship, we observe no change in behavior to reduce the asymmetry. On the
contrary, we find that the initiative bias is self-amplifying; i.e. the probability of an
initiative changing side drops exponentially as a function of initiative length. The
self-amplification provides a possible mechanism behind the observed asymmetry by
promoting the role of an initiator over the history of a relationship.
We also derive the distribution of the initiative probability for individuals against all
of their friends. Our population is found to be a little biased towards low initiative,
with a mean value of 0.47 and a spread of 0.08. We show that persons with great
personal initiative are rewarded by a greater abundance of incoming initiatives. This
suggests that the gain of taking initiative, e.g. making more friends and keeping them, is
greater than the cost of being initiator. We also find that people taking many initiatives
score higher on extraversion in personality tests. People interact socially in many ways
and since our data is restricted to telephone communication, we neglect initiatives made
face-to-face and through online platforms. This might bias our results somewhat toward
asymmetric relations.
It would be interesting to explore further the effects of initiative in temporal
networks. Our results indicate that nodes have different probabilities of activating their
links. This has an effect on information spreading, since information will be quickly
7/9
shared by some nodes, while others partly work as dead ends. Finally, initiatives are
important in making new contacts and in keeping them, thereby being an important
factor in network formation.
Acknowledgements
The study received funding through the UCPH 2016 Excellence Programme for
Interdisciplinary Research.
Methods
This study was reviewed and approved by the appropriate Danish authority, the Danish
Data Protection Agency (Reference number: 2012-41-0664). The Data Protection
Agency guarantees that the project abides by Danish law and also considers potential
ethical implications. All subjects in the study gave written informed consent.
Supporting Information
S1 Text
Description of data. Short description of data used in the manuscript.
S2 Text
Data file. Data on initiatives of individuals included in the study.
References
1. Holme P, Saramaki J. Temporal networks. Physics reports. 2012;519(3):97 -- 125.
2. Karsai M, Kivela M, Pan RK, Kaski K, Kert´esz J, Barab´asi AL, et al. Small but
slow world: How network topology and burstiness slow down spreading. Physical
Review E. 2011;83(2):025102.
3. Albert R, Barab´asi AL. Statistical mechanics of complex networks. Reviews of
modern physics. 2002;74(1):47.
4. Newman ME. The structure and function of complex networks. SIAM review.
2003;45(2):167 -- 256.
5. Kossinets G, Watts DJ. Empirical analysis of an evolving social network. Science.
2006;311(5757):88 -- 90.
6. Oh W, Jeon S. Membership herding and network stability in the open source
community: The Ising perspective. Management science. 2007;53(7):1086 -- 1101.
7. Barab´asi AL, Albert R. Emergence of scaling in random networks. science.
1999;286(5439):509 -- 512.
8. Kovanen L, Saramaki J, Kaski K. Reciprocity of mobile phone calls. Dynamics of
Socio-Economic Systems. 2011;2(2):138 -- 151.
8/9
9. Eagle N, Pentland AS, Lazer D. Inferring friendship network structure by using
mobile phone data. Proceedings of the National Academy of Sciences.
2009;106(36):15274 -- 15278.
10. Lane ND, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell AT. A survey of
mobile phone sensing. Communications Magazine, IEEE. 2010;48(9):140 -- 150.
11. Stopczynski A, Sekara V, Sapiezynski P, Cuttone A, Madsen MM, Larsen JE,
et al. Measuring large-scale social networks with high resolution. PloS one.
2014;9(4):e95978.
12. Hidalgo CA, Rodriguez-Sickert C. The dynamics of a mobile phone network.
Physica A: Statistical Mechanics and its Applications. 2008;387(12):3017 -- 3024.
13. Song C, Qu Z, Blumm N, Barab´asi AL. Limits of predictability in human
mobility. Science. 2010;327(5968):1018 -- 1021.
14. de Montjoye YA, Quoidbach J, Robic F, Pentland AS. Predicting personality
using novel mobile phone-based metrics. In: Social computing,
behavioral-cultural modeling and prediction. Springer; 2013. p. 48 -- 55.
15. Mollgaard A, Zettler I, Dammeyer J, Jensen MH, Lehmann S, Mathiesen J.
Extended Similarity Metric for Weighted Heterogeneous Networks. submitted.
2016;.
16. Barabasi AL. The origin of bursts and heavy tails in human dynamics. Nature.
2005;435(7039):207 -- 211.
17. Malmgren RD, Stouffer DB, Motter AE, Amaral LA. A Poissonian explanation
for heavy tails in e-mail communication. Proceedings of the National Academy of
Sciences. 2008;105(47):18153 -- 18158.
18. Vazquez A. Impact of memory on human dynamics. Physica A: Statistical
Mechanics and its Applications. 2007;373:747 -- 752.
19. Stouffer DB, Malmgren RD, Amaral LA. Log-normal statistics in e-mail
communication patterns. arXiv preprint physics/0605027. 2006;.
20. Nakamura T, Kiyono K, Yoshiuchi K, Nakahara R, Struzik ZR, Yamamoto Y.
Universal scaling law in human behavioral organization. Physical review letters.
2007;99(13):138103.
21. Johansen A, Sornette D. Download relaxation dynamics on the WWW following
newspaper publication of URL. Physica A: Statistical Mechanics and its
Applications. 2000;276(1):338 -- 345.
22. Kraft D, et al. A software package for sequential quadratic programming.
DFVLR Obersfaffeuhofen, Germany; 1988.
23. Digman J. Personality structure: Emergence of the five-factor model. Annual
review of psychology. 1990;Available from: http://www.annualreviews.org/
doi/pdf/10.1146/annurev.ps.41.020190.002221.
9/9
|
1811.12162 | 1 | 1811 | 2018-10-31T13:32:22 | Effective Resistance-based Germination of Seed Sets for Community Detection | [
"cs.SI",
"cs.LG",
"stat.ML"
] | Community detection is, at its core, an attempt to attach an interpretable function to an otherwise indecipherable form. The importance of labeling communities has obvious implications for identifying clusters in social networks, but it has a number of equally relevant applications in product recommendations, biological systems, and many forms of classification. The local variety of community detection starts with a small set of labeled seed nodes, and aims to estimate the community containing these nodes. One of the most ubiquitous methods - due to its simplicity and efficiency - is personalized PageRank. The most obvious bottleneck for deploying this form of PageRank successfully is the quality of the seeds. We introduce a "germination" stage for these seeds, where an effective resistance-based approach is used to increase the quality and number of seeds from which a community is detected. By breaking seed set expansion into a two-step process, we aim to utilize two distinct random walk-based approaches in the regimes in which they excel. In synthetic and real network data, a simple, greedy algorithm which minimizes the effective resistance diameter combined with PageRank achieves clear improvements in precision and recall over a standalone PageRank procedure. | cs.SI | cs |
Effective Resistance-based Germination of Seed Sets for Community
Detection
Jonathan Eskreis-Winkler
University of Chicago
Risi Kondor
University of Chicago
Abstract
Community detection is, at its core, an at-
tempt to attach an interpretable function to
an otherwise indecipherable form. The im-
portance of labeling communities has obvi-
ous implications for identifying clusters in so-
cial networks, but it has a number of equally
relevant applications in product recommen-
dations, biological systems, and many forms
of classification. The local variety of com-
munity detection starts with a small set of
labeled "seed nodes," and aims to estimate
the community containing these nodes. One
of the most ubiquitous methods - based on
its simplicity and efficiency - is personalized
PageRank. The most obvious bottleneck for
deploying this form of PageRank successfully
is the quality of the seeds. We introduce a
"germination" stage for these seeds, where an
effective resistance-based approach is used to
increase the quality and number of seeds from
which a community is detected. By breaking
seed set expansion into a two-step process,
we aim to utilize two distinct random walk-
based approaches in the regimes in which
they excel.
In synthetic and real network
data, a simple, greedy algorithm which min-
imizes the effective resistance diameter com-
bined with PageRank achieves clear improve-
ments in precision and recall over a stan-
dalone PageRank procedure.
1 INTRODUCTION
Nascent abilities to collect progressively more massive
amounts of data continually motivate new approaches
Review pending
to large-scale data analysis. Recognizing that many
data collection pursuits involve unstructured data, and
that the data collected is of a scale so large that it
is infeasible for a human being to label training data
with their associated classes, the fields of unsupervised
learning and semi-supervised learning gain new im-
portance (Zhou et al., 2017; Banerjee et al., 2017).
We focus on a contemporary challenge in the class of
community detection (CD) problems. The aim of CD
is to leverage the known features of a complex sys-
tem - namely its nodes and edges - to estimate unob-
served functions, such as class labelings, on the net-
work. The foundation of network analysis in general
and CD in particular is that the nodes and edges of a
graph convey valuable information, information that
can be deployed for practical applications. In the last
decade, the CD problem has motivated solutions in
a constantly growing set of fields ripe for application
(Gargi et al., 2011; Shai et al., 2017; Garcia et al.,
2018).
A proliferation of work in CD has given rise to the
formulation of several distinct problems involving the
detection of communities that have different starting
assumptions and objectives. Namely, given a graph
G = (V, E), one type of community detection aims
to develop a full partition of the nodes V into non-
overlapping groups (Andersen et al., 2006; Fortunato,
2010). Another type acknowledges that networks will
not always admit partitions into disjoint subgraphs
and so its objective is to detect possibly overlapping
communities, maximizing graph coverage (Palla et al.,
2005; Xie et al., 2013). A less ambitious type is the
detection of a single community. This problem be-
gins with a predefined set of seeds which are known
to be members of the sought-after community (Mehler
and Skiena, 2009; Yang and Leskovec, 2015; Hollocou
et al., 2018; van Laarhoven, 2018).
The term "seed set expansion" can refer to two scenar-
ios. The first scenario is an unsupervised problem that
demands a graph partition and might be addressed
with a two-step algorithm: it would first identify ap-
propriate seeds and then use them to extrapolate to-
Effective Resistance-based Germination of Seed Sets for Community Detection
wards a partition of the graph into possibly overlap-
ping communities (Whang et al., 2013; Moradi et al.,
2014). The second scenario is the detection of a com-
munity around a predefined seed set and is equivalent
to the "less ambitious" problem described above. In
both scenarios a seed set is being expanded, but while
the former is an unsupervised problem, the latter is
semi-supervised. Our approach is addressing this last
form of CD.
In addition to the many forms of CD, the number of
scoring functions by which these methods are evalu-
ated has also grown rapidly. Central to any approach
to CD is the specification of a scoring function to assess
the degree to which community structure is present.
The most popular and effective scoring functions are
based either on maximizing triadic closures, i.e. the
local clustering coefficient, or on minimizing conduc-
tance (Yang and Leskovec, 2015).
Our work focuses on improving the state of the art
in CD for seed set expansion around a single node,
or a small set of nodes. A dominant force in this
problem setting is a CD-oriented version of PageRank
deemed "personalized PageRank" (PPR). Whereas the
original PageRank algorithm is a ranking of nodes'
importance (using PageRank contributions) in a gen-
eral graph, PPR focuses on ranking nodes with scores
based on their proximity to a pre-defined seed set
(Bahmani et al., 2010; Whang et al., 2013; Kloumann
et al., 2017). Our contribution builds upon existing
applications of PageRank by introducing an effective
resistance-based germination stage before the propa-
gation of PPR weights begins. Specifically, we propose
a two-step approach using PPR on a vector which dis-
tributes weight over a new, revised seed set. This set
includes the original seed nodes, but it also adds a se-
lection of nodes that are chosen to minimize the effec-
tive resistance (ER) diameter of the revised seed set.
The stopping rule for identifying the respective points
at which the germination stage and PPR are stopped
is based on community scoring functions.
The remainder of the paper is organized as follows: in
Section 2 we review the role that random walks play
in the theoretical underpinnings of PageRank and ER.
The manner in which these two measures of node sim-
ilarity differ is illustrated and the rationale for valu-
ing ER in CD is presented. In Section 3, we present
the germination stage algorithm along with its time
complexity. We also make explicit the connection be-
tween our algorithm and minimizing the ER diame-
ter. In Section 4, we provide synthetic and empirical
data experiments to show the efficacy of our two-step
approach in practice. We conclude in Section 5 by
outlining the new ideas that this work motivates and
anticipating developments in the near future for CD.
2 BACKGROUND
2.1 Conventions of Notation
For simplicity, this paper considers undirected, un-
weighted graphs G = (V, E). The number of nodes
is V = n and the number of edges is E = m.
If
for an edge e ∈ E, it is the case that e = (u, v) for
u, v ∈ V , then u, v, may be denoted as e+ and e− for
efficiency. When indices of a vector v are denoted, the
first through kth indices are v[1 : k] or the kth index is
v[k].
2.2 Problem Statement
Given a seed set S ⊂ V and assuming some ground
truth community C ⊂ V exists such that S ⊂ C, we
are interested in estimating a community C ⊂ V , such
that S ⊂ C and C minimizes a loss function measur-
ing community structure. S may be a set of a single
vertex in V or a collection of vertices. Whereas some
CD scenarios, such as the "overlapping communities"
problem, aim to achieve a high proportion of coverage
on the entire network, the aim of this seed set expan-
sion problem is to find a single high quality community
subject only to the constraint that it cover the seeds.
In this sense we are addressing a one-class classifica-
tion problem.
There are two components to addressing this prob-
lem. The first is to define the objective function to be
minimized which quantifies the quality of community
structure. The second component is to achieve this
minimum, or to approximately achieve it. Take for
instance the scoring function fc : S ⊂ V → R which
measures the conductance of a subgraph. The global
objective function based on conductance is:
C∗ = argminC⊂V fc(C)
This problem is NP hard, and so we must find some
other recourse towards identifying a viable solution.
Thus begins the second component of CD, devising a
procedure for actually finding a subgraph with strong
community structure.
2.3 Random Walks and Community
Detection
Random walks on graphs are a fundamental key to un-
derstanding the relatedness between vertices. In a net-
work analysis setting, it is frequently assumed that be-
sides the edge set there are no known vertex-associated
features. So, we are left to assume that any nodes' in-
terrelatedness is determined by whether they are edge-
connected, if their shortest path distance is small, or
if it is "easy" to travel from one node to another. This
Jonathan Eskreis-Winkler, Risi Kondor
underlies the popularity of random walk-based kernels
in graph-based learning problems.
It is natural to consider the wealth of information that
random walks can provide for any problem in CD. In
the absence of a single, agreed-upon definition for com-
munity structure, the basic idea of "more relatedness
inwards than outwards" aligns well with the fact that
a random walk after k steps is more likely to be at
any individual node in its community than it is to be
at any node in any other community. There are sev-
eral manners in which the role of random walks may
be formalized. One popular example is based on the
PageRank vector. It produces an estimate of the sta-
tionary distribution of a random walk which starts at
a set of chosen nodes.
If there is truth to the idea
that there is significantly more interrelatedness inside
a community than at its boundary, then this PageR-
ank vector should assign nodes inside the community
higher scores than those which are outside of it. A dif-
ferent formulation is the commute time Cvivj between
two nodes. The random walk interpretation of this
quantity is the expected amount of time for a random
walk beginning at vi to arrive at vj and then return to
vi. If at any stage of a random walk it is more likely
for the walk to stay inside a community than move to
a different one, then commute times within a commu-
nity will typically be shorter than those which must
cross the community boundary.
2.4 Personalized PageRank
The PageRank algorithm was originally introduced as
a means of providing rankings for the pages of the
World Wide Web (Page et al., 1999).
In the two
decades since its introduction, it has evolved as a tech-
nique for a wide set of problems in a number of ap-
plied fields. The specific development we focus on
here is personalized PageRank (PPR), a variant of the
PageRank algorithm where the initial mass is fixed at
a single node or subset of the nodes Vo ⊂ V (with zero
mass elsewhere) (Fogaras et al., 2005; Kloumann et al.,
2017). This translates to an initial zero vector x ∈ Rn,
except that ∀k ∈ Vo, xk = 1Vo . The PPR vector is
then calculated based on this initial state; the degree
to which two nodes vi, vj (cid:54)∈ Vo are more or less similar
to the seed set Vo is governed by means of their re-
spective indices in the PageRank vector xvi , xvj . This
method is equivalent to finding the steady state of a
random walk with restarts whose mass is initially dis-
tributed evenly at the set of nodes which comprise the
seed set. Node v's score thus quantifies how likely it
is that a random walk which starts at the seed set will
end at node v.
This procedure translates into a CD scheme when the
indices of the PageRank contributions are listed in
a vector xPageRank (after having listed the indices of
the vertices in Vo) in the order of their score rank-
ing (Andersen and Lang, 2006). The next step in
relating this vector to a community is minimizing
a scoring function f : W ⊂ V → R which mea-
sures the strength of community structure. The cho-
sen community is then xPageRank[1 : ko] where ko =
argmin1≤k≤nf (xPageRank[1 : ko]).
2.5 Effective Resistance
By interpreting a general graph as an electric network,
one can study graph properties by considering how
electricity flows throughout the network. All edges
in the graph are considered resistors (in the case of
an unweighted graph, they have equal resistance) and
the relationship between the resistance of an edge re,
the electric current over the edge fe, and the electric
potential difference between the nodes connected by
said edge ve+ − ve− are governed by Ohm's Law:
fe =
ve+ − ve−
re
That is, for a unit of current to flow across an edge, the
potential difference at the edge's endpoints must be
equal to the resistance. Summarized in matrix form,
where p ∈ Rn is a vector of potential differences across
edges and B ∈ {−1, 0, 1}m×n is an incidence matrix
of G, the flow over every edge is f = Bp. A second
property of an electric network is the flow conservation
property. If a unit of electric current is sent from node
a to b, then at any vertex v (cid:54)= a, b in the graph, the sum
of the flow of all edges connected to v is 0. Summarized
in matrix form, where δi is the Dirac delta function,
BT f = δa − δb. Noting that BBT = LG, the graph
Laplacian of G, and using Ohm's Law with the flow
conservation property, we find that
†
BT Bp = LGp = δa − δb ⇐⇒ p = L
G(δa − δb)
This last formula provides a means of deducing the
potential differences across all nodes for a given electric
flow across the network. For a single unit of current to
flow across an edge, the resistance of the edge must be
matched by the potential difference of its endpoints.
When the flow of δa − δb is realized on the edge set of
G, both the potential difference between a and b and
the associated effective resistance (ER) between a and
b will be p[a] − p[b]; the ER of edge e is
†
G(δa − δb)
ab = (δa − δb)T L
reff
Said in a different way, seeing a graph's edge set as
a collection of resistors, if the resistors were replaced
by a single resistor that acted indistinguishably from
Effective Resistance-based Germination of Seed Sets for Community Detection
the collection subject to any flow vector - in terms of
the amount of current and potential difference between
edge endpoints - the amount of resistance of said single
resistor is reff
ab . Although the ER does not only summa-
rize the relationship between nodes that are connected
by an edge, for the purposes of this investigation, it is
only the ERs between nodes connected by an edge that
will be used directly.
Another useful property of ER in an unweighted graph
is that the ER between any two nodes that are edge
connected is exactly equal to the probability of those
two nodes being edge connected in a random sample
from the uniform spanning tree distribution of G. Un-
fortunately, to reproduce the elegant demonstration of
why this is the case would require prohibitively many
lines of formulae. This fact in particular provides some
useful intuition as to why the ER would be a helpful
tool in CD. Suppose a graph has two distinct sub-
graphs which are complete, but do not connect to each
other except through a single edge. The ER of the edge
which connects the two clusters will be very high (it
will in fact be equal to one) because it is not possi-
ble for a spanning tree of the graph to exist without
including this edge. The ER of an edge between two
nodes in the same cluster will be comparatively small,
because there are a number of spanning trees of the
graph that do not make use of this edge. The ER of
edges is thus a reasonable means of detecting a graph
cluster's boundary because the edges which traverse
that boundary have higher ERs. One last popular per-
spective of ER is that the expected number of steps of
a random walk beginning at vi, reaching vj, and then
ending at vi (commute distance Cvivj ) is proportional
to the ER (with constant 2m).
2.6 Limitations of Effective Resistance
dvi
+ 1
dvj
While these facets of ER provide a solid grounding
for using it as a tool to understand nodes' interrelat-
edness, the behavior of ER described above does not
necessary scale to large graphs. Specifically, it has
been shown for classes of random geometric graphs -
specifically kNN-graphs, -graphs, and Gaussian sim-
ilarity graphs - that as the size of the graph n → ∞,
Cvivj ≈ 1
, the sum of the inverse of their de-
grees (Luxburg et al., 2010). Luxburg et al. (2010)
describe in their paper "Getting Lost in Space" that
as the graph size grows, the number of paths between
any two nodes increases and a random walk will tend
to "forget" where it began, ultimately depending only
on the degrees of the points at which it starts and
ends. This limitation has in fact motivated a num-
ber of modified resistance-based graph distances that
circumvent the scalability issue (Luxburg et al., 2010;
Nguyen and Mamitsuka, 2016). ER's inability to scale
+ 1
dvj
to large datasets carries two significant caveats involv-
ing graph types and which scenarios the convergence
to 1
is weakest. Regarding the first point, the
dvi
convergence results are proven only for graphs with a
minimal degree that grows with the graph size. This is
not an unreasonable assumption in kNN- or -graphs
generated from data, but it is not an assumption that
matches the properties of empirical networks. Sec-
ondly, the limitations of ER as a graph distance met-
ric are only shown to be problematic for summarizing
global structure, such as for nodes that are not close
in the shortest path distance. CD is primarily con-
cerned with local properties of real-world graphs with
strong power law distributions. Furthermore, the ERs
that will be used in this study will concern only the
ER between nodes that are edge connected, i.e. very
local.
3 A TWO-STEP COMMUNITY
DETECTION ALGORITHM FOR
SEED SET EXPANSION
While many algorithms will address an unsupervised
CD problem by first establishing seeds and then prop-
agating from those seeds, in the semi-supervised con-
text, the seeds are provided a priori, and propagation
from those seeds is what the community detector must
accomplish. The algorithm we present here takes an
alternative route. We introduce what we term a ger-
mination stage. Just as the germination of a seed is
its first step departing from seed form towards becom-
ing a full-fledged plant, the germination of seed sets
in CD converts the seed set into a more larger, more
reliable set of nodes, from which a community may be
cultivated. In this stage, the information contained in
the initial seed set is culled and expanded - not to the
expected community estimate, but to a richer seed set
for the second stage of propagation. Our approach can
be compared in spirit to optimization methods which
provide a minimization algorithm with a "warm start."
After this first stage we take the traditional route of
propagation using personalized PageRank. Our moti-
vation for splitting the CD procedure into these stages
is based on the observation that the better the quality
of the seeds used for propagation, the better the out-
put. Basing the first stage of seed germination on ER
is a deliberate choice based on the theoretical proper-
ties of ER. Additionally, empirical evidence suggests
that a greedy method using a resistance-based metric
will initially choose community candidates at a lower
false positive rate than those that would be chosen
based on the PPR score vector.
Jonathan Eskreis-Winkler, Risi Kondor
3.1 Finding the Set with Small Effective
Resistance Diameter
While the basic procedure of germinating a seed set
and then propagating its information is quite gen-
eral, we outline one specific implementation of this
approach using the tools of ER and PageRank. The
first step is to calculate pairwise ERs for every ele-
ment of E. This can be done in two ways. The first is
the inversion of the graph Laplacian. ER for any pair
of nodes u, v ∈ V can be computed from the inverse
Laplacian as
uv = L†
reff
uu + L†
vv − 2L†
uv
The second approach is to sample uniform spanning
trees from the graph at hand. The ER of an edge
can be estimated as the proportion of the finite sam-
ple of spanning trees wherein said edge occurs. De-
pending on the situation, one of these two approaches
might be preferable. For sparse, diagonally domi-
nant matrices, fast solvers exist which can find reff
uv in
O(cid:0)nlog(n)log(−1)(cid:1) where n is the number of nonzero
entries and is an accuracy level (Schaub et al., 2017).
Spanning trees may be sampled (without any restric-
tion on the type of graph) in O(n 5
3 m13) (Durfee et al.,
2017). The practitioner should thus decide which ap-
proach to use based upon the degree of sparsity, the re-
quired accuracy, and the ease of implementation. Fur-
thermore, we are intrigued by the possibility of sam-
pling spanning trees in a more efficient manner that
guarantees an approximate estimate of the ER with
high probability. The outcome of these procedures will
lead to an estimate of the ER for every edge that ap-
pears in the graph (in the case of spanning trees) or
for every pairwise relationship between nodes (in the
case of graph Laplacian inversion). For the purposes of
our algorithm, though, it is sufficient, even in the sec-
ond approach, to store and use only the ERs between
nodes that are connected by an edge in G.
A greedy algorithm is then implemented to progres-
sively grow the seed set with the objective of minimiz-
ing the ER diameter at every stage. The specifics are
found in Algorithm 1, where R denotes a sparse ma-
trix containing ERs between nodes that are connected
by an edge, seeds are the initial seeds provided, and
f is a community structure scoring function, namely
conductance.
Two points in the algorithm must be clarified: the
stopping condition, and the complexity of line 6. Re-
garding the stopping function, we employ a proce-
dure introduced by Yang et al. (2015) who conduct
a "sweep" of the PageRank vector and calculate the
successive conductances of larger and larger subgraphs
around the seed nodes; they consider the points where
local minima occur to be community candidates. Since
Algorithm 1 Greedy Minimizer of ER Diameter
1: procedure GreedyMinimizer(R, seeds, f )
(cid:46)
Produce a useful ordering of the elements of V
w.r.t. seed nodes
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
cur comm ← seeds
unused ← V − seeds
s = {}
while len(unused) > 0 ∧ checkStop(s) do
i = argmink∈unused (min(R[k, cur comm]))
v = unused[i]
cur comm = cur comm ∪ {v}
s = s ∪ f (cur comm)
unused = unused \ {v}
return cur comm
our objective in this stage of the algorithm is to pre-
serve the purity of the germinated seed set as well as
possible, we avoid false positives by always taking the
first local minimum as a stopping point in the algo-
rithm. Another convention of Yang et al. (2015) was
to disregard any local minima for which the scoring
function does not subsequently increase 20% before
arriving at another local minimum. Since our proce-
dure for identifying a local minimum must control the
false positive rate in the germination stage, we use a
stricter criteria of 5%. In any case, this means that the
cur comm returned by Algorithm 1 must be trimmed
back to the point at which the local minimum actually
occurred and cannot be used as is. Though it has not
been observed to occur in practice, if it were the case
that no local minimum meets this criteria, then the
entire set of nodes would be returned.
Next, regarding the time complexity for an algorithm
involving a search for the argument of the minimum of
a set of values each of which is the minimum of another
list, we show in Theorem 1 that the time complexity
is O(1). We assume at the onset that the graph at
hand has a maximum node degree of d, which grows
at a slower rate than graph size. Similarly, we as-
sume that the maximum community size nc is not a
graph property that grows at the same rate as graph
size. These are basic features of the Lancichinetti-
Fortunato-Radicchi (LFR) graph model (Lancichinetti
and Fortunato, 2009).
Theorem 1. The time complexity of Algorithm 1 is
O(1).
Proof. In general, finding the minimum of a list of
length n is of complexity O(n).
In the worst case
scenario of line 6 (when the graph is complete) the
number of required operations would be:
n−len(seeds)(cid:88)
n−len(seeds)(cid:88)
a(n − a) =
an − a2
a=1
a=1
i=1 id = d nc(nc+1)
2
c) = O(1).
a=1 a −(cid:80)n
munity, this term may be approximated as(cid:80)n
a2 = n(cid:80)n
Since len(seeds) is a small fraction of the entire com-
a=1 an−
a=1 a2. In this formulation, both
sums are on the order of n3. In practice, we observe a
local minimum to occur very early, after only consider-
ing ≈ nc
10 (though the actual proportion would depend
on the parameter which describes the power law dis-
tribution of the vertices' degrees). But even if we are
to consider the algorithm to run for nc steps, the total
. So, under
our assumptions that we are in a sparse graph setting,
where community sizes do not grow at the same rate
as the number of nodes in the graph, the complexity
of Algorithm 1 is O(n2
operations remain: (cid:80)nc
3.2 Theoretical Properties of the
Germinated Seed Set
The objective of finding a subgraph which contains
the seeds and also has the smallest ER diameter is the
problem we wish to solve. There is even some recent
work in graph clustering which attempts to find these
subgraphs efficiently. One recent paper introduced a
polynomial time algorithm to partition a graph into
sets of nodes which have a bounded ER diameter (Alev
et al., 2017). This approach suggests an important
inroad into graph clustering based on ER, but is not
directly applicable to identifying a single community.
It is also worth considering that the solution to the
relaxed minimization problem is extremely fast and
does not add much computational overhead to the use
of PPR. That is, even with the computation of ERs,
the germination of a seed set, and subsequent PPR, the
overall complexity is still sub-quadratic. Furthermore,
by demonstrating the efficacy of even an incredibly
greedy algorithm for minimizing ER diameter, we aim
to motivate more advanced methods for finding low
ER diameter subgraphs which could be coupled with
a subsequent stage of PPR.
That being said, we demonstrate that a bound ex-
ists at every step of the while loop of our algorithm.
Specifically, the increase of ER diameter at each step
is bounded above by the minimum of the ERs between
all vertices already included and the newest addition.
Theorem 2. At each stage of the while loop in Algo-
rithm 1, the increase of the ER diameter of cur comm
is bounded above by the minimum of the ERs between
the newest node and the nodes in the current state of
cur comm.
Proof. It must be noted first that reffRes : V × V → R
is a distance metric and that (V, reffRes) is a metric
space.
Suppose that at step i the newest can-
didate for community membership to cur comm
is w ∈ V .
This could be the case only if
Effective Resistance-based Germination of Seed Sets for Community Detection
∀u ∈ V, min(cid:0){reffRes(u, v) v ∈ cur comm}(cid:1) =
min(cid:0){reffRes(w, v) w ∈ unused, v ∈ cur comm}(cid:1).
min(cid:0){reffRes(u, v) v ∈ cur comm}(cid:1).
diameffRes(cur comm∪{w}) ≤ diameffRes(cur comm)+
4 EXPERIMENTS
4.1 Data Description and Approach
Three different forms of network data are consid-
ered below.
The first type is a network sam-
pled from a hierarchically-structured stochastic block
model (HSBM). The matrix of probabilities along with
a sample realization are depicted for ease of visualiza-
tion in Figure 1. This is not a network structure com-
monly found empirically, but we use this model as a
demonstration for the way an ER method works and
how we expect it to work in a general network.
Figure 1: A hierarchical SBM and its realization
Next we present synthetic network data generated
from the LFR graph model, a more realistic network
model than the HSBM (Lancichinetti and Fortunato,
2009). This graph model assumes all the graph's ver-
tices' degrees are distributed according to an exponen-
tial distribution. Depending on the parameter of this
distribution, graphs may vary from a sparse "hub and
spokes" structure to a single cluster with a nearly uni-
form degree distribution. Using this data we show that
the ER component of our method behaves differently
depending on what proportion of the community is a
high degree node. We also demonstrate that as long as
the size of the community grows at a slower rate than
the graph as a whole, the performance of our method
does not degrade as a function of graph size. This is
a specific concern of ours considering the limitations
of using ER as a global similarity metric in large net-
works, as described in Section 2.6.
Lastly, we consider several
large data benchmarks
for CD. We selected some of the most commonly
Jonathan Eskreis-Winkler, Risi Kondor
used networks with labeled ground-truth communities.
Though these labelings are not perfect, these bench-
marks elicit the closest match to real-world applica-
tions available. The specific datasets we consider are
the blogs hyperlink network, Amazon co-purchasing
network, the DBLP computer science co-authorship
network, the Youtube social network, the Orkut social
network, and web-linkages between Wikipedia pages
(Leskovec and Krevl, 2014).
While many CD methods are validated by juxtapos-
ing an estimated partition with the ground-truth com-
munity partition, in the one-community example con-
sidered in this paper, the objective is to maximize a
combination of precision and recall for the single esti-
mated community. We quantify our method next to
traditional PPR using F1 scores. While the compar-
ison of a community estimate to the ground truth is
ultimately based on the F1 score or other scores cal-
culated from precision and recall, we also provide a
complete precision-recall curve for the entire sequence
of the cur comm vector in order to profile whether a
higher precision method is simply more conservative,
or if it is uniformly outperforming a competitor. After
all, the objective of our study is not specifically to pro-
duce an out-of-the-box cutting edge CD scheme, but
to demonstrate how much the seed germination stage
contributes before PPR begins. For this reason, our
benchmark in these experiments is a vanilla PPR al-
gorithm whose only parameter is α, which determines
how much weight is redistributed at the initial seed
nodes in each iteration.
To conduct each experiment we select a community
from to the ground truth labeling, and select a fixed
number of seeds from that community. Then, we pro-
vide the network's edge set and its chosen seeds to
the CD algorithm. When results are averaged, this re-
flects our having run the experiment independently on
several randomly sampled synthetic networks, or our
having queried a community estimate around different
seeds or a different community label in each iteration.
4.2 Hierarchical Stochastic Block Models
The basic intuition that a network node will have lower
resistance towards a high degree node than a low de-
gree node is put to the test by this graph model. We
show that in the extreme scenario where node de-
grees are distributed uniformly and there is sufficient
within-community interconnectedness, ER will iden-
tify all community nodes reliably before making false
positives. In contrast to this, we attribute ER's inabil-
ity to be a standalone CD method in general to the
relatively high ER between the hub of a community
and its spokes relative to the resistance between the
hub of one community and the hub of another. In this
general case, only a few paths exist for a low degree
node to the core of its community (corresponding to a
high resistance path), though there may be more paths
from one high degree node to another, even if they are
found in distinct communities. In the HSBM setting,
all the nodes' degrees are distributed uniformly in a
small interval, avoiding this limitation. The ability of
ER to perform and scale well in this setting (compet-
itively with PPR), and not even be greatly improved
on by a germination stage, is evident in Figure 2.
Figure 2: F1 scores for networks based on the HSBM
model as a function of graph size
4.3 Synthetic Network Data
The next network type used is the LFR model
of benchmark graphs (Lancichinetti and Fortunato,
2009). In this model, the heterogeneity of the distri-
bution of node degrees and community sizes are con-
trolled by a power law distribution, along with a pa-
rameter governing how high a proportion of a node's
edges are inward-facing versus outward-facing. In this
more realistic setting, with parameters to tune gov-
erning what proportion of a network is "popular" in
its community, the contribution of ER to PPR can be
assessed.
We show in this more realistic setting that pairing an
ER-based germination stage with PPR outperforms
PPR alone. In the top portion of Figure 3 we show
that this result is not dependent on the size of the
graph and in the bottom portion we show that this
result is not dependent on the parameter of the power
law distribution of the model. Though it is appar-
ent that graphs with fewer degrees overall pose more
challenging CD tasks, the relative performance of our
method is consistently superior.
Effective Resistance-based Germination of Seed Sets for Community Detection
For purposes of illustration, we take one instance of
the CD task in the Amazon dataset and show the
ROC curves for each CD method based on ground
truth co-purchasing data. Each ROC curve depicts
the precision-recall tradeoff for a progressively larger
community estimate. A scoring function would deter-
mine which community estimate is selected. In Figure
4 we see the primary trend in basing a PPR proce-
dure on top of a germination stage. Specifically, we
observe that the high precision of using ER alone is
short lived. After attaining ≈ 25% recall, the ER at-
tains a local minimum, at which point the germination
stage stops. This triggers PPR to be initiated on the
"germinated" seed set, leading to consistently better
precision and recall, without regard for the point at
which the stopping function is activated.
Figure 3: F1 scores for networks based on the LFR
model as a function of graph size (top) and power law
parameter (bottom)
4.4 Empirical Network Data
Lastly, we implement our CD approach on publicly
available,
large-scale, naturally occurring networks
wherein seed set expansion is particularly relevant. To
assess the general performance of these methods, we
consider the mean F1 score over 10 experiments of
sampling seeds from a fixed ground truth community.
A summary of the (approximate) network sizes, and
average F1 scores are presented in Table 1. "Germ." in
the table denotes using a germination stage pre-PPR.
It is worth noting that the results are averaged over ex-
periments of varying difficulty, which is addressed in
the supplementary material. When the difference in
F1 score across all experiments is considered between
PPR and germination, PPR was improved upon 85%
of the time.
Table 1: Mean of F1 scores on empirical networks
NAME
Blogs
Amazon
DBLP
Youtube
Orkut
Wikipedia
n
103
105
105
106
106
106
PPR (sd) Germination (sd)
0.95 (0.015)
0.69 (0.07)
0.58 (0.12)
0.42 (0.04)
0.49 (0.21)
0.57 (0.25)
0.96 (0.003)
0.74 (0.02)
0.67 (0.13)
0.49 (0.05)
0.60 (0.23)
0.68 (0.21)
Figure 4: ROC curve for a single run of CD
5 CONCLUSIONS
We have shown that a simple modification to PPR
can lead to a significant boost in accuracy for CD.
While our algorithm's specific contribution to single
community seed set expansion is promising, we are
even more motivated by degree to which a two-step
procedure is beneficial in a single community seed set
expansion problem.
In the future, we plan to demonstrate further the
power of this two-step approach. Possible directions
include considering a larger class of community scoring
functions, algorithms for locally minimizing ER diam-
eter, and thoroughly investigating the accuracy-time
tradeoffs of these decisions.
Jonathan Eskreis-Winkler, Risi Kondor
References
Alev, V. L., Anari, N., Lau, L. C., and Gharan, S. O.
(2017). Graph Clustering using Effective Resis-
tance. arXiv:1711.06530 [cs]. arXiv: 1711.06530.
Andersen, R., Chung, F., and Lang, K. (2006). Lo-
cal Graph Partitioning using PageRank Vectors.
In 2006 47th Annual IEEE Symposium on Foun-
dations of Computer Science (FOCS'06), pages
475 -- 486, Berkeley, CA, USA. IEEE.
Andersen, R. and Lang, K. J. (2006). Communities
from seed sets. In Proceedings of the 15th inter-
national conference on World Wide Web, pages
223 -- 232. ACM.
Bahmani, B., Chowdhury, A., and Goel, A. (2010).
Fast Incremental and Personalized PageRank.
Proc. VLDB Endow., 4(3):173 -- 184.
Banerjee, P., Culp, M. V., Ryan, K. J., and Michai-
lidis, G. (2017). Graph-Based Semi-Supervised
Learning With Big Data.
Handbook of Re-
search on Applied Cybernetics and Systems Sci-
ence, pages 154 -- 185.
Durfee, D., Kyng, R., Peebles, J., Rao, A. B., and
Sachdeva, S. (2017). Sampling random spanning
trees faster than matrix multiplication.
In Pro-
ceedings of the 49th Annual ACM SIGACT Sym-
posium on Theory of Computing - STOC 2017,
pages 730 -- 742, Montreal, Canada. ACM Press.
Fogaras, D., Rcz, B., Csalogny, K., and Sarls,
T. (2005). Towards Scaling Fully Personalized
PageRank: Algorithms, Lower Bounds, and Ex-
periments. Internet Mathematics, 2(3):333 -- 358.
Fortunato, S.
(2010).
Community detection in
graphs. Physics Reports, 486(3-5):75 -- 174. arXiv:
0906.0612.
Garcia, J. O., Ashourvan, A., Muldoon, S., Vet-
tel, J. M., and Bassett, D. S. (2018). Appli-
cations of Community Detection Techniques to
Brain Graphs: Algorithmic Considerations and
Implications for Neural Function. Proceedings of
the IEEE, 106(5):846 -- 867.
Hollocou, A., Bonald, T., and Lelarge, M. (2018). Mul-
tiple Local Community Detection. SIGMETRICS
Perform. Eval. Rev., 45(3):76 -- 83.
Kloumann, I., Ugander, J., and Kleinberg, J. (2017).
Block Models and Personalized PageRank. Pro-
ceedings of the National Academy of Sciences,
114(1):33 -- 38. arXiv: 1607.03483.
Lancichinetti, A. and Fortunato, S. (2009). Bench-
marks for testing community detection algorithms
on directed and weighted graphs with overlapping
communities. Physical Review E, 80(1):016118.
Leskovec, J. and Krevl, A. (2014). SNAP Datasets:
Stanford large network dataset collection. http:
//snap.stanford.edu/data.
Luxburg, U. V., Radl, A., and Hein, M. (2010). Get-
ting lost in space: Large sample analysis of the
resistance distance. In Lafferty, J. D., Williams,
C. K. I., Shawe-Taylor, J., Zemel, R. S., and Cu-
lotta, A., editors, Advances in Neural Information
Processing Systems 23, pages 2622 -- 2630. Curran
Associates, Inc.
Mehler, A. and Skiena, S. (2009). Expanding Net-
work Communities from Representative Exam-
ples. ACM Trans. Knowl. Discov. Data, 3(2):7:1 --
7:27.
Moradi, F., Olovsson, T., and Tsigas, P. (2014). A lo-
cal seed selection algorithm for overlapping com-
munity detection. In 2014 IEEE/ACM Interna-
tional Conference on Advances in Social Networks
Analysis and Mining (ASONAM 2014), pages 1 --
8.
Nguyen, C. H. and Mamitsuka, H. (2016). New resis-
tance distances with global information on large
graphs.
In Artificial Intelligence and Statistics,
pages 639 -- 647.
Page, L., Brin, S., Motwani, R., and Winograd, T.
(1999). The PageRank Citation Ranking: Bring-
ing Order to the Web.
Palla, G., Dernyi, I., Farkas, I., and Vicsek, T. (2005).
Uncovering the overlapping community structure
of complex networks in nature and society. Na-
ture, 435(7043):814 -- 818.
Gargi, U., Lu, W., S. Mirrokni, V., and Yoon, S.
(2011). Large-Scale Community Detection on
YouTube for Topic Discovery and Exploration.
In Proceedings of 5th International AAAI Con-
ference on Weblogs and Social Media.
Schaub, M. T., Trefois, M., van Dooren, P., and Del-
venne, J.-C. (2017). Sparse Matrix Factorizations
for Fast Linear Solvers with Application to Lapla-
cian Systems. SIAM Journal on Matrix Analysis
and Applications, 38(2):505 -- 529.
Effective Resistance-based Germination of Seed Sets for Community Detection
Shai, S., Stanley, N., Granell, C., Taylor, D., and
Mucha, P. J. (2017). Case studies in network com-
munity detection.
van Laarhoven, T. (2018). Generative models for local
network community detection. Physical Review
E, 97(4). arXiv: 1804.04469.
Whang, J. J., Gleich, D. F., and Dhillon,
I. S.
(2013). Overlapping Community Detection Using
Seed Set Expansion. In Proceedings of the 22Nd
ACM International Conference on Information &
Knowledge Management, CIKM '13, pages 2099 --
2108, New York, NY, USA. ACM.
Xie, J., Kelley, S., and Szymanski, B. K. (2013). Over-
lapping Community Detection in Networks: The
State-of-the-art and Comparative Study. ACM
Comput. Surv., 45(4):43:1 -- 43:35.
Yang, J. and Leskovec, J. (2015). Defining and evaluat-
ing network communities based on ground-truth.
Knowledge and Information Systems, 42(1):181 --
213.
Zhou, L., Pan, S., Wang, J., and Vasilakos, A. V.
(2017). Machine learning on big data: Opportu-
nities and challenges. Neurocomputing, 237:350 --
361.
|
1911.11970 | 1 | 1911 | 2019-11-27T06:02:05 | Graph Representation for Face Analysis in Image Collections | [
"cs.SI",
"cs.CV"
] | Given an image collection of a social event with a huge number of pictures, it is very useful to have tools that can be used to analyze how the individuals --that are present in the collection-- interact with each other. In this paper, we propose an optimal graph representation that is based on the `connectivity' of them. The connectivity of a pair of subjects gives a score that represents how `connected' they are. It is estimated based on co-occurrence, closeness, facial expressions, and the orientation of the head when they are looking to each other. In our proposed graph, the nodes represent the subjects of the collection, and the edges correspond to their connectivities. The location of the nodes is estimated according to their connectivity (the closer the nodes, the more connected are the subjects). Finally, we developed a graphical user interface in which we can click onto the nodes (or the edges) to display the corresponding images of the collection in which the subject of the nodes (or the connected subjects) are present. We present relevant results by analyzing a wedding celebration, a sitcom video, a volleyball game and images extracted from Twitter given a hashtag. We believe that this tool can be very helpful to detect the existing social relations in an image collection. | cs.SI | cs | Graph Representation for Face Analysis in
Image Collections
Domingo Mery and Florencia Valdes
Abstract -- Given an image collection of a social event with a huge number of pictures, it is very useful to have tools that can be
used to analyze how the individuals -- that are present in the collection -- interact with each other. In this paper, we propose an
optimal graph representation that is based on the 'connectivity' of them. The connectivity of a pair of subjects gives a score that
represents how 'connected' they are. It is estimated based on co-occurrence, closeness, facial expressions, and the orientation
of the head when they are looking to each other. In our proposed graph, the nodes represent the subjects of the collection, and
the edges correspond to their connectivities. The location of the nodes is estimated according to their connectivity (the closer
the nodes, the more connected are the subjects). Finally, we developed a graphical user interface in which we can click onto the
nodes (or the edges) to display the corresponding images of the collection in which the subject of the nodes (or the connected
subjects) are present. We present relevant results by analyzing a wedding celebration, a sitcom video, a volleyball game and
images extracted from Twitter given a hashtag. We believe that this tool can be very helpful to detect the existing social relations
in an image collection.
Index Terms -- Face recognition, gender recognition, expression recognition, facial analysis, graph representation, image
collection, deep learning.
!
9
1
0
2
v
o
N
7
2
]
I
S
.
s
c
[
1
v
0
7
9
1
1
.
1
1
9
1
:
v
i
X
r
a
1 INTRODUCTION
In the last decades, it has been a common practice to
have collections of a huge number of images [1]. For
example, a social event -- like a wedding celebration --
can have thousands of pictures. Moreover, we can
download thousands of images from social networks
given a hashtag. In practice, it is not so simple to
browse all
images, and it can be very helpful to
analyze the faces and build a graph representation
with information extracted from all faces that are
present in the images as illustrated in Fig. 1, where
the nodes represent the subjects and the edges are the
connections between them.
In recent years, we have witnessed tremendous
improvements in face recognition by using complex
deep neural network architectures trained with mil-
lions of face images (see for example advances in
face recognition [2] [3] [4] and in face detection [5]
[6]). In addition, there are very impressive advances
in applications [7], face clustering [8] [9], and in the
recognition of age [10], gender [11], facial expressions
[12], eye gaze [13], head pose [14] and facial land-
marks [15].
In this field, many works deal with applications that
can be developed using the face analysis tools. Here
some examples: In [16], social networks are built by
detecting and tracking faces in news videos, the idea
is to establish how much and with whom a politician
• D.Mery and F.Valdes are with the Department of Computer Science,
Pontificia Universidad Cat´olica, Santiago of Chile.
URL: http://domingomery.ing.uc.cl
appears on TV news. In [17], a facial behavior analysis
is presented. The method can extract expressions and
action units (facial movements such as 'inner portion
of the brows is raised' or 'lips are relaxed and closed'),
that could be used to build interactive applications.
In [18], 'social relations' (defined as the association
like warm, friendliness and dominance, between two
or more persons) are detected in face images in the
wild. In [19], face-based group-level emotion recog-
nition is proposed to study the behavior of people
participating in social events. Similar advances have
been made in video analysis using the information of
the location and actions of people in videos. See for
example [20], where a 'context aware' configuration
model is proposed for detecting groups of persons
and their interactions (e.g., handshake, hug, etc.) in
TV material.
It is evident that the state of the art in this field is
far from perfect, and any contribution that can help
to detect and measure the interaction of individuals
in an image collection will play a relevant role when
analyzing social relations.
Our contributions are threefold. Given an image
collection and a set of subjects that are present in
the collection: i) We define a 'connectivity' measure-
ment between every pair of subjects of the set that
gives a score that represent how connected they are.
The connectivity is based on co-occurrence, closeness,
facial expressions, and the orientation of the head
when they are looking to each other. ii) We estimate
an optimal graph in which the nodes represent the
subjects of the set, and the length of the edges that
connect the nodes depends on the connectivity of the
2
looking to, for this end we use the projection of the roll
vector obtained in [14], and v) the face descriptor of d
elements (xk), in this case we use descriptor with uni-
norm. In our experiments, we use ArcFace [3], that
computes an embedding of d = 512 elements with
outstanding results. The descriptors of m detected
faces are stored in matrix X of m × 512 elements. In
addition, we have a list of ne enrolled subjects that
we want to analyze. It can be defined manually or
using a face clustering algorithm. The descriptors of
the enrolled faces have uni-norm and they are stored
in a matrix Xe of ne×512 elements. It is very simple to
detect if the enrolled subjects are present in the image
collection: we compute the m × ne-element matrix
e > θ, where θ is a threshold that we set
Y = XXT
to 0.4. If Y (k, i) = 1, that means that subject Si was
detected in image zk.
2.2 Analysis: Connectivity Matrices
The following matrices have ne × ne elements. The in-
dices of the elements of the matrices are (i, j). Element
(i, j) gives a 'connectivity measure' between subjects
Si and Sj. The matrices are symmetric, that means
for matrix X, Xij = Xji. In addition, Xii = 0. In
all connectivity matrices of our approach, a high/low
value of Xij means that the connectivity between Si
and Sj is high/low.
1. Co-occurrence Matrix (C): Element Cij is defined
as the number of images in the collection in which
subjects Si and Sj are present. This matrix is easily
computed by defining a 'presence matrix' P of ne × n
elements in which element Pit is 1/0 if subject Si is
present/absent in image It.
2. Closeness Matrix (D): Element Dij is defined as the
sum of the 'closeness factors' of subjects Si and Sj
in those images of the collection in which Si and Sj
are present. The factor is computed as follows: For
subjects Si and Sj, we measure the size in pixels
of the bounding box of the faces as ai =
wihi
the average (ai + aj)/2, and
the distance d in pixels between the centers of the
bounding boxes in the image. The 'closeness factor'
is computed for those images that have similar face
and aj = (cid:112)wjhj,
√
Fig. 1. Block diagram of our proposed method.
subjects (the closer the nodes, the more connected
are the subjects). iii) We developed a graphical user
interface in which by clicking onto the nodes (or the
edges), the user can display the corresponding images
of the collection in which the subject of the nodes (or
the connected subjects) are present.
2 PROPOSED METHOD
In this section, we present our method that can be
used for a facial graph representation in an image col-
lection. The method follows Fig. 1. Before we perform
the analysis, it is necessary to do some preliminary
computations. After that, we define some matrices
that can be used to measure the 'connectivity' between
the subjects that are present in the collection, and fi-
nally we estimate and define the graph representation.
2.1 Preliminary Computations: Feature Extrac-
tion
The idea of our approach is to analyze a set I of n
images {It}, for t = 1··· n. We detect all faces of I
using Multi-task Cascaded Convolutional Networks
(MTCNN) [5] that has been demonstrated to be very
robust in unconstrained environments. All detected
faces are stored as set F of m face images {Fk}, for
k = 1··· m. In addition, we store in vector z of m
elements the image index of the detected face image,
i.e., zk = t, if face image Fk was detected in image It.
Furthermore, the m bounding boxes of the detected
faces are stored in matrix B of m × 4 elements with
coordinates bk = (x1, y1, x2, y2)k for face image k.
After face detection is performed, for each face image
k, we compute the width and height (wk, hk) of the
bounding box. Afterwards, we compute: i) the age
(ak), the gender (gk) using the library py-agender [21]
that offers very good results. ii) The facial expressions
(ek) are defined as a vector of seven probabilities
[12] for: angry, disgust, scared, happy, sad, surprised,
and neutral. iii) The 68 facial landmarks (lk) give the
coordinates (x, y) of the eyebrows (left and right),
eyes (left and right), nose, mouth and jawline. For
this end, we use the library Dlib [22], iv) the pose
vector (vk) defines the direction where the face is
sizes (min(ai/aj, aj/ai) < 0.7) and for the faces that
are close enough (d/a < nf ). In our experiments, we
set nf to 4. With the first criterium, we can avoid
faces that are close in the image but because of the
perspective they are far away in 3D space. With the
second criterium, we consider only those pairs of
images that are close enough. In our case, the faces
must be closer than 4a (4 'faces'). Thus, the 'closeness
factor' is defined as (nf − d/a)/nf . In this case, the
factor is close to one, if the faces are very close; it is
for example 0.25, if the distance of the faces is 3a, and
it is zero if the distance is greater than 4a.
3. Connection Matrix (Z): Element Zij is defined as the
sum of the 'connection factors' of subjects Si and Sj in
those images of the collection in which Si and Sj are
present. The factor is computed as follows: For subject
Si and Sj, we compute the intersection of vectors vi
and vj defined as the projected roll vectors (computed
from the head pose) that start at the point that is in
the middle of both eyes (computed as the center of the
landmarks corresponding to the eyes of the face). If
the intersection of the vectors are in front of the faces,
we compute both distances from intersection point to
the middle of both eyes, and select the minimum (d). If
d is very small, it means that one subject is seeing close
to the other one. The 'connection factor' is defined
(like the 'closeness factor') as (nf − d/a)/nf for d/a <
nf .
4. Empathy Matrix (E): Element Eij is defined as the
sum of the 'empathy factors' of subjects Si and Sj in
those images of the collection in which Si and Sj are
present. The factor is computed as follows: For subject
Si and Sj, we measure the first six elements of the
expression vector (we avoid the neutral expression) as
vectors e(cid:48)
j. The idea of the 'empathy factor' is to
be close to one (or zero), if the expressions of subjects
Si and Sj are similar (or different). For this end, we
use the cosine similarity, that means, we normalize
j and define the
the vectors as e(cid:48)
'empathy factor' as the dot product of them.
5. Happiness Matrix (H): Element Hij is defined as the
sum of the 'happiness factors' of subjects Si and Sj
in those images of the collection in which Si and Sj
are present. The factor is computed as follows: For
subjects Si and Sj, we extract the fourth element of the
expression vector (that corresponds to the happiness)
hi = ei(4) and hj = ej(4), and define the 'happiness
factor' as the average (hi + hj)/2.
i and e(cid:48)
i and e(cid:48)
i/e(cid:48)
j/e(cid:48)
Finally, the total connectivity matrix T is defined as
the average: T = (C + D + Z + E + H)/5. We tested
different weighted sums with similar results.
2.3 Graph Construction
In order to build a graph that represent the connectiv-
ity of the subjects to be analyzed, we define a graph
of ne nodes (one for each subject) and locate them
in a 2D space in position (xi, yi) for i = 1··· ne.
3
The key idea of the graph, is that the closer are the
nodes i and j, the higher the connectivity between
them. That means, the distance of both nodes ∆ij =
(xi, yi) − (xj, yj) should be a value that represents
the 'no-connectivity' between subjects Si and Sj. In
our approach, we use the 'connectivity' defined in
previous section (see matrix T). We tested several
definitions for 'no-connectivity' and the best one -- in
terms of the visualization of the graph -- was given by
Wij = 1/(cid:112)Qij + 1, where Qij = 99 × Tij/ max (T),
that means the 'no-connectivity' Wij for subjects Si
and Sj gives values between 0.1 (when the connectiv-
ity is maximal) and 1.0 (when there is no connectiv-
ity). In addition, we set W (i, i) = 0. The idea of our
method is to find the coordinates of the nodes (xi, yi),
so that the distance of the nodes ∆ij, should be similar
to the 'no-connectivity' Wij. This is an optimization
problem that can be represented by minimizing the
F → min. We
Frobenius norm: error = ∆ − W2
solve this problem using the simplex search method
[23] with a starting point given by the solution of
a graph drawing by force-directed placement [24],
in which the length of each edge in the graph is
proportional to its weight Wij. In our experiments, we
report the Mean Absolute Error (MAE), as a metric of
the performance of the graph, defined as the mean
difference ∆ij − Wij in all pairs of nodes. Obviously,
MAE cannot be zero in many cases where (e.g., A is
friend of B and C, but B and C are enemies).
2.4 Graph Representation
For the node representation: a node is typically rep-
resented as a point or a circle. Alternatives in this
case can be the size of the circle, color of the circle
and color of the boundary of the circle. In our case
for node i, we put the face of subject Si in a circle
(the radius is related to the number of images in
which Si is present), and the color of the boundary
is related to the predominant facial expression of Si.
We use the colors based on [25]: scare (dark gray),
angry (red), disgusted (green), sad (blue), surprised
(white), happy (yellow), neutral (gray). For the edge
representation: an edge is typically represented as a
line, or (bi)directional arrow. Alternatives in this case
can be the color and the width of the line. In our
case for edge (i, j), we decided to use lines (and not
arrows) to make the graph simpler. In addition, our
connectivity matrix is symmetric and it has no sense
to use arrows1. The color of the lines, in our case, is
set to the most common expression between subjects
Si and Sj, and the width of the line corresponds to the
number of images in which both subjects are present.
If Si and Sj do not have pictures together (Cij = 0),
there will be no edge between them.
1. Nevertheless, the definition of connection given by matrix Z
can be changed, if we consider the case when subject Si is looking
to subject Sj but not vice-versa. In this case, directional arrows can
be used.
4
Fig. 2. Graph Representations. A) Wedding -- A1: proposed graph representation. A2: Nodes of proposed graph
with edges given manually (blue lines: couples, green arrows: parents to sons and daughters, orange lines:
siblings, magenta lines: friends. B) Friends (ellipse is plotted manually), C) Volleyball: two teams (red and white
stars drawn manually). D) Trump - The Squad. In addition, some examples of the GUI (see text).
Since the information of the co-occurrence matrix
and presence matrix is stored, we propose to display
the graph in a Graphical User Interface (GUI) in which
the user can interact with the nodes and edges. By
clicking onto a node, the user can obtain information
related to the subject of the node: e.g., gender, age
and facial expressions. In addition, the images of the
collection in which the subject is present can be dis-
played according to the facial expression (the images
can be sorted using the expression 'happiness' for
example). On the other hand, by clicking onto an edge
(that connect two nodes, in our case two subjects),
the user can display the corresponding images of the
connected subjects (images of the collection in which
both subjects are present).
3 EXPERIMENTAL RESULTS
In this section, we report the results obtained in four
experiments that we used to validate the proposed ap-
proach. The implementation was done in Python 3.6.4
(for face detection and feature extraction) and Matlab
R2019b (for connectivity matrices, graph construction
and representation and Graphical User Interface).
3.1 Private Wedding
We took a private family album of a wedding celebra-
tion in which we participated. That means, we know
exactly the subjects that are present and the relations
that they have. In order to protect the privacy of the
participants, we public only the attributes and de-
scriptors of the faces, and for the graph representation
we use synthetic faces generated by a GAN model
[26]. This dataset has 639 images and 2280 faces. The
obtained graph is illustrated in Fig. 2-A1. In Fig. 2-A2,
we provide an additional graph with the same nodes,
in which the edges are drawn manually according to
the existing relation between the participants (couples,
parents, sons, daughters, siblings and friends).
→ Discussion: (MAE = 0.1944) In the graph, we ob-
serve that main participants are the bride and the
groom. In the GUI, we show the histogram of the
expressions of the bride (she was happy in 78% of the
pictures). The main facial expression of the wedding is
'happiness' (yellow), however, there are some people
that is angry (the parents of the bride). It is very
impressive, how close are the nodes in the graph for
many of the strongest relationships of the participants.
3.2 Friends
We downloaded videos of the sitcom 'Friends' with
a compilation of the six main characters (Rachel,
Phoebe, Monica, Joey Chandler and Ross) and guest
stars (like Julia Roberts, Brad Pitt, Robin Williams,
etc.)2. This dataset has 16429 images and 27647 faces.
For the enrollment, we select the six main characters
and 18 guest stars. The obtained graph is illustrated
in Fig. 2-B.
→ Discussion: (MAE = 0.2313) From the graph, we ob-
serve that the main participants coincide with the six
main characters of Friends. The main facial expression
in the graph for this comedy is 'happiness' (yellow).
There is for example a connection with Brad Bitt (he
was present in 363 images, and from them, Ross was
present in 67 as well). In the GUI, we can display the
images with co-occurrences.
3.3 Volleyball Game
On July 2nd, 2019, we downloaded from Flickr the
album "VBVBA RVC 2 2010" of pictures taken by
Bruce A Stockwell 3. In these pictures, we observe
pictures of different volleyball games played on April
2010 by teenage players. This dataset has 1131 images
and 4550 faces. The obtained graph is illustrated in
Fig. 2-C. In this set, there are two teams of players
(see red and white stars included manually in the
graph). For the enrollment, we select the players of
both teams.
3.4 Discussion:
(MAE = 0.0679). 16% and 6% of the detected faces
belong to the red and white teams respectively. We
observe in the graph, that both teams are clustered,
and the main participants (size of the faces) are from
the red team. The facial expressions are 'scared' (gray)
and 'happiness' (yellow). This is very typical in a
game that stress and happiness co-exist. The GUI
shows images of some of the main participants. In
addition, we show the images of player 14 sorted
according to her 'happiness'.
2. See both videos on https://youtu.be/7GbOUIFa87g and https:
//youtu.be/8mP5xOg7ijs.
the
3. See
album https://www.flickr.com/photos/bas68/
albums/72157624234584197. The pictures are licensed under a
Creative Commons "Attribution-NonCommercial-NoDerivs 2.0
Generic"
5
3.5 Donald Trump -- The Squad
On July 19th, 2019, we downloaded images from Twit-
ter given the hashtags #Trump and #DonaldTrump.
In those days, there was a problem between Trump
and four Democratic congresswomen (known as The
Squad). This dataset has 494 images (126 were au-
tomatically removed because they were duplicated),
and 677 faces. The obtained graph is illustrated in Fig.
2-D. For the enrollment we select Trump and some rel-
atives, some politicians and the four congresswomen.
→ Discussion: (MAE = 0.1251). In the graph, we ob-
serve that main participant is Trump, he has a 'happy'
relation to his wife and daughter, and a 'sad' and
'angry' relation to Putin and Merkel respectively. An
independent cluster is given by The Squad with only
one connection to Trump (given by a photo montage).
For this connection we use dark gray to show that
there is no common facial expression.
4 CONCLUSIONS
In this paper, we presented a graphical tool that can be
used to detect and analyze social relations in an image
collection. We proposed an optimal graph representa-
tion that is based on the 'connectivity' of the subjects.
We based our measurement on co-occurrence, close-
ness, facial expressions, the orientation of the head.
The nodes represent the subjects of the collection,
and the edges are their connectivities. In our solution,
the closer the nodes, the more connected are the
subjects. We propose a representation for the nodes
and edges (colors are related to facial expressions and
size are related to presence). The graph can be used
in a graphical user interface (GUI) in which we can
display the original images that shows the connection
of the people. Finally, we present relevant results by
analyzing a wedding celebration, a sitcom video, a
volleyball game and images extracted from twitter
given a hashtag. We believe that this tool can be
very helpful to detect the existing social relations in
an image collection. For future work, we would like
to expand to three or more people by analyzing the
connectivity matrix.
ACKNOWLEDGMENTS
The authors want to thanks to Grant Fondecyt -- Chile
# 1191131.
REFERENCES
[1] D. Mery, "Face analysis: State of the art and ethical chal-
lenges," in Proceedings of the Pacific Rim Symposium on Image
and Video Technology (PSIVT 2019): Workshop Vision-Tech, 2019.
[2] O. M. Parkhi, A. Vedaldi, and A. Zisserman, "Deep face
recognition," in British Machine Vision Conference (BMVC2015),
vol. 1, 2015, p. 6.
J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "Arcface: Additive
angular margin loss for deep face recognition," in Proceedings
of the IEEE Conference on Computer Vision and Pattern Recogni-
tion, 2019, pp. 4690 -- 4699.
[3]
6
[24] T. M. Fruchterman and E. M. Reingold, "Graph drawing
by force-directed placement," Software: Practice and experience,
vol. 21, no. 11, pp. 1129 -- 1164, 1991.
[25] T. M. Sutton and J. Altarriba, "Color associations to emotion
and emotion-laden words: A collection of norms for stimulus
construction and selection," Behavior research methods, vol. 48,
no. 2, pp. 686 -- 728, 2016.
[26] T. Karras, S. Laine, and T. Aila, "A style-based generator archi-
tecture for generative adversarial networks," in Proceedings of
the IEEE Conference on Computer Vision and Pattern Recognition,
2019, pp. 4401 -- 4410.
[4] P. Li, L. Prieto, D. Mery, and P. J. Flynn, "On low-resolution
face recognition in the wild: Comparisons and new tech-
niques," IEEE Transactions on Information Forensics and Security,
vol. 14, no. 8, pp. 2000 -- 2012, 2019.
[5] K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint face detec-
tion and alignment using multitask cascaded convolutional
networks," IEEE Signal Processing Letters, vol. 23, no. 10, pp.
1499 -- 1503, 2016.
[6] X. Sun, P. Wu, and S. C. Hoi, "Face detection using deep
learning: An improved faster rcnn approach," Neurocomputing,
vol. 299, pp. 42 -- 50, 2018.
[7] D. Mery, I. Mackenney, and E. Villalobos, "Student attendance
system in crowded classrooms using a smartphone camera," in
2019 IEEE Winter Conference on Applications of Computer Vision
(WACV).
IEEE, 2019, pp. 857 -- 866.
[8] C. Otto, D. Wang, and A. K. Jain, "Clustering millions of faces
by identity," IEEE transactions on pattern analysis and machine
intelligence, vol. 40, no. 2, pp. 289 -- 303, 2017.
[9] Y. Shi, C. Otto, and A. K. Jain, "Face clustering: representation
and pairwise constraints," IEEE Transactions on Information
Forensics and Security, vol. 13, no. 7, pp. 1626 -- 1640, 2018.
[10] R. Rothe, R. Timofte, and L. Van Gool, "Deep expectation
of real and apparent age from a single image without facial
landmarks," International Journal of Computer Vision, vol. 126,
no. 2-4, pp. 144 -- 157, 2018.
[11] F. H. d. B. Zavan, O. R. Bellon, L. Silva, and G. G. Medioni,
"Benchmarking parts based face processing in-the-wild for
gender recognition and head pose estimation," Pattern Recog-
nition Letters, vol. 123, pp. 104 -- 110, 2019.
[12] O. Arriaga, M. Valdenegro-Toro, and P. Ploger, "Real-time
convolutional neural networks for emotion and gender classi-
fication," arXiv preprint arXiv:1710.07557, 2017.
[13] O. Lorenz and U. Thomas, "Real time eye gaze tracking system
using cnn-based facial features for human attention measure-
ment," in Proceedings of the 14th International Joint Conference
on Computer Vision, Imaging and Computer Graphics Theory and
Applications - Volume 5: VISAPP,, INSTICC. SciTePress, 2019,
pp. 598 -- 606.
[14] N. Ruiz, E. Chong, and J. M. Rehg, "Fine-grained head pose
estimation without keypoints," in The IEEE Conference on
Computer Vision and Pattern Recognition (CVPR) Workshops, June
2018.
[15] M. Zhu, D. Shi, M. Zheng, and M. Sadiq, "Robust facial
landmark detection via occlusion-adaptive deep networks,"
in Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, 2019, pp. 3486 -- 3496.
[16] B. Renoust, T. Kobayashi, T. D. Ngo, D.-D. Le, and S. Satoh,
"When face-tracking meets social networks: a story of politics
in news videos," Applied network science, vol. 1, no. 1, p. 4,
2016.
[17] T. Baltrusaitis, A. Zadeh, Y. C. Lim, and L.-P. Morency, "Open-
face 2.0: Facial behavior analysis toolkit," in 2018 13th IEEE
International Conference on Automatic Face & Gesture Recognition
(FG 2018).
IEEE, 2018, pp. 59 -- 66.
[18] Z. Zhang, P. Luo, C.-C. Loy, and X. Tang, "Learning social
relation traits from face images," in Proceedings of the IEEE
International Conference on Computer Vision, 2015, pp. 3631 --
3639.
[19] X. Huang, A. Dhall, R. Goecke, M. Pietikainen, and G. Zhao,
"Multimodal framework for analyzing the affect of a group of
people," IEEE Transactions on Multimedia, vol. 20, no. 10, pp.
2706 -- 2721, 2018.
[20] M. Hoai and A. Zisserman, "Talking heads: Detecting humans
and recognizing their interactions," in Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, 2014, pp.
875 -- 882.
implementation
a
gender
(https://pypi.org/project/py-agender/)," 2019.
"Py-Agender: Keras
and
network
of
estimation
for
age
[21] Y. Uchida,
cnn
[22] D. E. King, "Dlib-ml: A machine learning toolkit," Journal of
Machine Learning Research, vol. 10, no. Jul, pp. 1755 -- 1758, 2009.
[23] J. C. Lagarias, J. A. Reeds, M. H. Wright, and P. E. Wright,
"Convergence properties of the nelder -- mead simplex method
in low dimensions," SIAM Journal on optimization, vol. 9, no. 1,
pp. 112 -- 147, 1998.
|
1704.05393 | 1 | 1704 | 2017-04-18T15:20:25 | Mining Worse and Better Opinions. Unsupervised and Agnostic Aggregation of Online Reviews | [
"cs.SI",
"cs.CL",
"cs.IR"
] | In this paper, we propose a novel approach for aggregating online reviews, according to the opinions they express. Our methodology is unsupervised - due to the fact that it does not rely on pre-labeled reviews - and it is agnostic - since it does not make any assumption about the domain or the language of the review content. We measure the adherence of a review content to the domain terminology extracted from a review set. First, we demonstrate the informativeness of the adherence metric with respect to the score associated with a review. Then, we exploit the metric values to group reviews, according to the opinions they express. Our experimental campaign has been carried out on two large datasets collected from Booking and Amazon, respectively. | cs.SI | cs |
Mining Worse and Better Opinions
Unsupervised and Agnostic Aggregation
of Online Reviews(cid:63)
Michela Fazzolari1, Marinella Petrocchi1,
Alessandro Tommasi2, and Cesare Zavattari2
1 Institute of Informatics and Telematics (IIT-CNR), Pisa, Italy
2 LUCENSE SCaRL, Lucca, Italy
{m.fazzolari,m.petrocchi}@iit.cnr.it,
{alessandro.tommasi,cesare.zavattari}@lucense.it
Abstract. In this paper, we propose a novel approach for aggregating
online reviews, according to the opinions they express. Our methodology
is unsupervised - due to the fact that it does not rely on pre-labeled
reviews - and it is agnostic - since it does not make any assumption
about the domain or the language of the review content. We measure the
adherence of a review content to the domain terminology extracted from
a review set. First, we demonstrate the informativeness of the adherence
metric with respect to the score associated with a review. Then, we
exploit the metric values to group reviews, according to the opinions
they express. Our experimental campaign has been carried out on two
large datasets collected from Booking and Amazon, respectively.
Keywords: Social Web mining, Online reviews aggregation, Adherence
metric, Domain terminology, Contrastive approach
1
Introduction
Online reviews represent an important resource for people to choose among mul-
tiple products and services. They also induce a powerful effect on customers'
behaviour and, therefore, they undertake an influential role on the performance
of business companies. Since the information available on reviews sites is often
overwhelming, both consumers and companies benefit from effective techniques
to automatically analysing the good disposition of the reviewers towards the tar-
get product. To this aim, opinion mining [11,19] deals with the computational
treatment of polarity, sentiment, and subjectivity in texts. However, opinion
mining is usually context-sensitive [24], meaning that the accuracy of the senti-
ment classification can be influenced by the domain of the products to which it
is applied [22]. Furthermore, sentiment analysis may rely on annotated textual
(cid:63) Extended version of "Mining Worse and Better Opinions. Unsupervised and Agnostic
Aggregation of Online Reviews", to appear in Proc. of 17th International Web
Engineering Conference (ICWE 2017).
corpora, to appropriately train the sentiment classifier, see, e.g., [8]. Also, most
of the existing techniques are specialised for the English language: a cross-lingual
adaptation is required in order to apply them to a different target language, [10].
In this paper, we propose an original approach to aggregate reviews with sim-
ilar opinions. The approach is unsupervised, since it does not rely on labelled
reviews and training phases. Moreover, it is agnostic, needing no previous knowl-
edge on either the reviews domain or language. Grouping reviews is obtained by
relying on a novel introduced metric, called adherence, which measures how much
a review text inherits from a reference terminology, automatically extracted from
an unannotated reviews corpus. Leveraging an extensive experimental campaign
over two large reviews datasets, in different languages, from Booking and Amazon
we first demonstrate that the value of the adherence metric is informative, since
it is correlated with the review score. Then, we exploit adherence to aggregate
reviews according to the reviews positiveness. A further analysis on such groups
highlights the most characteristic terms therein. This leads to the additional
result of learning the best and worst features of a product.
In Section 2, we define the adherence metric. Section 3 presents the datasets.
Section 4 describes the experiments and their results. In Section 5, we report on
related work in the area. Section 6 concludes the paper.
2 Review Adherence to Typical Terminology
We aim at proving that positive reviews - in contrast with negative ones - are
generally more adherent to the emergent terminology of the whole review col-
lection. This will provide us a form of alternative polarity detection: indeed, we
might estimate the relative polarity of a review by measuring how adherent it is
to the domain terminology. Because a meaningful comparison against terminol-
ogy requires a sizeable chunk of text, the proposed approach best applies to a
set of reviews. Here, we describe how the domain terminology is extracted and
we define a measure of adherence of a piece of text against such terminology.
2.1 Extracting the Terminology
Every domain is characterized by key concepts, expressed by a domain termi-
nology: a set of terms that are either specific to the domain (e.g., part of its
jargon, such as the term "bluetooth" in the mobile domain) or that feature a
specific meaning in the domain, uncommon outside of it (e.g., "monotonous"
in the math domain). Identifying this terminology is important for two main
reasons: i) avoiding that irrelevant terms (such as "the", "in", "of" ...) have
a weight in the computation of adherence; ii) knowing which key concepts are
more relevant in a set of texts provides significant insight over their content.
The terminology is extracted in a domain and language agnostic way, with the
benefit of not relying on domain and linguistic resources.
Contrastive approaches [2] to terminology extraction only rely on sets of raw
texts in the desired language: i) a set belonging to the domain of interest and ii) a
few others on generic topics (e.g., a collection of books, newspaper articles, tweets
-- easily obtainable, nowadays, from the Web). The contrastive approach work
by comparing the characteristic frequency of the terms in the domain documents
and in generic ones. The rationale is that generic, non-content words like "the",
as well as non specific words, will be almost equally frequent in all the available
sets, whereas words with a relevance to the domain will feature there much more
prominently than they do in generic texts.
There are many sophisticated ways to deal with multi-words, but any statistics-
based approach needs to consider that, for n-grams3 to be dealt with appropri-
ately, the data needed scales up by orders of magnitude. For our purposes, we
stick to the simpler form of single-term (or 1-gram) terminology extraction.
Let D be a set of documents belonging to the domain of interest D, and let
G1 . . .GM be M sets of other documents (the domain of each Gi is not necessarily
known, but it is assumed not to be limited to D). All terms occurring in docu-
ments of D (TD) as candidate members of TD, the terminology extracted from
D. For each term t, we define the term frequency (tf) of a term t in a generic set
of documents S as:
{d ∈ St occurs in d}
tfS (t) =
S
(1)
(probability that, picking a document d at random from S, it contains t). The
tf alone is not adequate to represent the meaningfulness of a term in a set of
documents, since the most frequent words are non-content words4. Because of
this, inverse document frequency (idf) [23] is often used to compare the frequency
of a term in a document with respect to its frequency in the whole collection.
In our setting, we can however simplify things, and just compare frequencies of
a term inside and outside of the domain. We do this by computing the term
specificity (ts) of a term t over domain set D against all Gi's, which we define as:
tsD
G (t) =
tfD(t)
min
i=1..M
tfGi(t)
(2)
tsD
G (t) is effective at identifying very common words and words that are not
specific to the domain (whose ts will be close to 1), as well as words particularly
frequent in the domain, with a ts considerably higher than 1. Extremely rare
words may cause issues: if D and Gi's are too small to effectively represent a
term, such term will be discarded by default. We chose an empirical threshold
θfreq = 0.005, skipping all terms for which tfD(t) < θfreq. This value is justified
by the necessity to have enough documents per term, and 0.5% is a reasonable
figure given the size of our datasets. We compute ts for all t ∈ TD. We define:
(3)
TD = {ttsD
G (t) ≥ θcutoff}
To set the value of θcutoff, we might i) choose the number of words to keep
(e.g., set the threshold so as to pick the highest relevant portion of TD) or ii) use
3 Constructions of n words: "president of the USA" is a 4-gram.
4 The ten most frequent words of the English language, as per Wikipedia (https://
en.wikipedia.org/wiki/Most_common_words_in_English), are "the", "be", "to",
"of", "and", "a", "in", "that", "have", and "I".
an empirical value (higher than 1), indicating how much more frequent we ask
a term to be, being a reliably part of the terminology. For our experiments, we
have used this simpler alternative, empirically setting θcutoff = 16. Higher values
include fewer terms in the terminology, improving precision vs. recall, whereas
lower values include more terms, negatively affecting precision. This value was
the one used in the experiments conducted in [7].
2.2 Adherence Definition
The adherence (adh) of a document d to a terminology T is defined as:
adhT(d) =
{tt occurs in d} ∩ {t ∈ T}
{tt occurs in d}
(4)
It represents the fraction of terms in document d that belongs to terminology
T. This value will typically be much smaller than 1, since a document is likely
to contain plenty of non-content words, not part of the domain terminology.
The specific value of adherence is however of little interest to us: we show how
more adherent reviews tend to be more positive than those with lower values of
adherence, only using the value for comparison, and not on an absolute scale.
3 Datasets
The first dataset consists of a collection of reviews from the Booking website, dur-
ing the period between June 2016 and August 2016. The second dataset includes
reviews taken from the Amazon website and it is a subset of the dataset avail-
able at http://jmcauley.ucsd.edu/data/amazon, previously used in [14,15].
We also used a contrastive dataset to extract the domain terminology.
Booking Dataset. For the Booking dataset, we had 1,135,493 reviews, related
to 1,056 hotels in 6 cities. We only considered hotels with more than 1,000
reviews, in any language. For each review, we focused on:
-- score: a real value given by the reviewer to the hotel, in the interval [2.5,10];
-- posContent: a text describing the hotel pros;
-- negContent: a text describing the hotel cons;
-- hotelName: the name of the hotel which the review refers to.
As review text, we took the concatenation of posContent and negContent.
Amazon Dataset. Reviews in the Amazon dataset are already divided accord-
ing to the individual product categories. We chose two macro-categories, namely
Cell Phones & Accessories and Health & Personal Care and we further selected
reviews according to 6 product categories. For each review, we focused on:
-- score: an integer assigned by the reviewer to the product (range [0,5]);
-- reviewText: the textual content of the review;
-- asin: the Amazon Standard Identification Number, that is a unique code of
10 letters and/or numbers that identifies a product.
Table 1 shows statistics extracted from the Booking and the Amazon dataset.
Table 1. Outline of the datasets used in this study.
(a) Booking
(b) Amazon
City
#Hotels #Rev.
Product Category #Prod. #Rev.
London
LosAngeles
NewYork
Paris
Rome
Sydney
358
57
167
211
146
86
521852
51911
208917
111103
92321
129676
Bluetooth Headsets
Bluetooth Speakers
Screen Protectors
Unlocked Cell Phones
Magnifiers
Oral Irrigators
937
93
2227
1367
210
50
124694
14941
223007
118889
12872
10768
Contrastive Terminology Dataset. In addition to the domain documents,
originating from the above datasets, we used various datasets, collected for other
purposes and projects, as generic examples of texts in the desired language, in
order to extract the terminology as in Section 2.1. Table 2 resumes the data used
to construct the contrastive dataset.
4 Experiments and Results
Each dataset D is organized in categories Ci. Each category contains items that
we represent by the set of their reviews Ij. When performing experiments over D,
we extract the terminology of each category Ci (TCi). We then compute adhTCi
(r)
for each r ∈ Ij ∈ Ci (r is the single review).
For the Amazon dataset, Ci are the product categories, whereas Ij's are the
products (represented by their sets of reviews). For the Booking dataset, Ci are
the hotel categories, whereas Ij's are the hotels (represented by their sets of
reviews). We carried on experiments with and without review balancing. The
latter has been considered to avoid bias: reviews with the highest scores are
over-represented in the dataset, therefore the computation of the terminology
can be biased towards positive terms. Thus, for each Ci and for each score, we
randomly selected the same number of reviews.
4.1 Adherence Informativeness
A first analysis investigates if there exists a relation between the adherence
metric - introduced in Section 2 - and the score assigned to each review.
Table 2. Outline of the contrastive dataset.
English
Italian
French
220k online newspaper articles 1.28M forum posts 198k tweets
15.98M tweets
7.37M tweets
Amazon Dataset. For each product category, we extract the reference ter-
minology, by considering all the reviews belonging to that category against the
contrastive dataset, for the appropriate language. Then, we compute the adher-
ence value for each review. To show the results in a meaningful way, we grouped
reviews in 5 bins, according to their score, and compute the average of the ad-
herence values on each bin. The results are reported in Figure 1.
The graph shows a line for each product category. Overall, it highlights that
reviews with higher scores have higher adherence, implying a better correspon-
dence with the reference terminology in comparison to reviews with lower scores.
This result could be biased by the fact that reviews with higher scores are more
represented in the dataset than the others.
Therefore, we balanced the reviews in bins: we set B as the number of reviews
of the less populated bin and we randomly selected the same number of reviews
from the other bins. Then, we recomputed the average adherence values and we
obtained the results shown in Figure 2, which confirm the trend of the previous
graph.
Even if the Bluetooth Speakers and Oral Irrigators categories feature a slight
decreasing trend in the adherence value, when passing from reviews with score
4 to reviews with score 5, the general trend shows that the adherence metric is
informative of the review score.
Fig. 1. Score vs adherence - Amazon
dataset - unbalanced.
Fig. 2. Score vs adherence - Amazon
dataset - balanced.
Booking Dataset. In the second experiment, we group the hotel reviews
accordingly to the city they refer to. For each city, we extract the reference
terminology and we compute the adherence value for each review. To make
the results comparable with the ones obtained for Amazon we re-arrange the
Booking scoring system to generate a score evaluation over 5 bins. To this aim,
we apply the score distribution suggested by Booking itself, since Booking scores
are inflated to the top of the possible range of scores [16]. Therefore, we consider
the following bin distribution:
-- very poor: reviews with a score ≤ 3;
-- poor: score ∈ (3, 5];
-- okay: score ∈ (5, 7];
-- good: score ∈ (7, 9];
-- excellent: score > 9.
The results of the average adherence values on each bin are reported in
Figure 3. A line is drawn for each city, by connecting the points in correspondence
to the adherence values. The graph suggests that the average adherence is higher
for reviews with higher scores. Thus, the higher the score of the hotel reviews,
the more adherent the review to the reference terminology.
To avoid the bias caused by the over-representation of the positive reviews
in the dataset, we compute the average adherence values by using a balanced
number of reviews for each bin. The results, reported in Figure 4, confirm the
trend of the previous graph, even if the slope is smaller.
Fig. 3. Score vs adherence - Booking - un-
balanced.
Fig. 4. Score vs adherence - Booking - bal-
anced.
Working on balanced bins, the typical terminology of the reviews corpus has
been recalculated, with respect to what computed for the original, unbalanced
dataset. Thus, even considering the less populated bin, the average adherence
value for the balanced dataset is not the same as the one in the unbalanced
dataset for the same bin (this holds both for Booking and Amazon datasets).
The under-sampling applied to the majority classes to balance the reviews
number leads to a deterioration of the results (both for Amazon and Booking -
Figures 2 and 4.
4.2 Good Opinions, Higher Adherence
Interestingly, in the Booking dataset, the text of each review is conveniently
divided into positive and negative content. Thus, we perform an additional ex-
periment, by only considering positive and negative chunks of reviews. For each
city, we group positive and negative contents of reviews and we compute the
adherence value for each positive and negative chunk, with respect to the ref-
erence terminology. Finally, we average the adherence values according to the
score bins. The results are reported in Figure 5, for the unbalanced dataset. In
the graph, we report two lines for each city: the solid (dashed) lines are obtained
by considering the positive (negative) contents of reviews. The same colour for
solid and dashed line corresponds to the same city. We also perform the same
calculation by considering a balanced dataset (Figure 6).
Fig. 5. Score vs adherence - Booking un-
balanced dataset - considering positive
and negative contents separately.
Fig. 6. Score vs adherence - Booking bal-
anced dataset - considering positive and
negative contents separately.
Both the graphs highlight that there is a clear division between the solid
and dashed lines. In particular, the average adherence obtained considering pos-
itive contents is, for most of the bins, above the average adherence computed
considering negative contents. This separation is more evident when the review
score increases (it does not hold for very poor scores). Overall, positive aspects
of a hotel are described with a less varied language with respect to its negative
aspects. Probably, this phenomenon occurs because unsatisfied reviewers tend
to explain what happened in details.
In addition to the average value, we also computed the standard deviation
within each bin, that resulted to be quite high, as reported in Table 3, Table
4, Table 5 and Table 6. This suggests that, even correlated with the score, the
adherence is not a good measure when considering a single review, but its infor-
mativeness should be rather exploited by considering an ensemble of reviews, as
detailed in Section 4.4.
4.3 Extension to Different Languages
The experiments described so far were realised by considering a subset of reviews
in English, taken from the original Booking dataset, which features other lan-
guages too. To further evaluate the informativness of the adherence metric, we
selected two additional review subsets, in Italian and in French. For each subset,
Table 3. Average adherence and the average standard deviation for six Amazon cat-
egories - unbalanced dataset.
Bluetooth Bluetooth Magnifiers
Headsets
Speakers
Oral
Unlocked
Irrigators Protectors CellPhones
Screen
Bin Avg Std Avg Std Avg
Std Avg Std Avg
Std Avg
1
2
3
4
5
0.17
0.18
0.19
0.21
0.21
0.07
0.07
0.07
0.08
0.09
0.16
0.19
0.20
0.24
0.26
0.08
0.07
0.08
0.09
0.11
0.15
0.15
0.16
0.17
0.18
0.08
0.07
0.08
0.08
0.09
0.17 0.07
0.18 0.07
0.19 0.07
0.21 0.08
0.22 0.08
0.16
0.16
0.16
0.18
0.20
0.07
0.07
0.07
0.08
0.09
0.15
0.15
0.16
0.18
0.19
Std
0.06
0.06
0.07
0.08
0.10
Table 4. Average adherence and the average standard deviation for six Amazon cat-
egories - balanced dataset.
Bluetooth Bluetooth Magnifiers
Headsets
Speakers
Oral
Unlocked
Irrigators Protectors CellPhones
Screen
Bin Avg Std Avg Std Avg
Std Avg Std Avg
Std Avg
1
2
3
4
5
0.17
0.19
0.19
0.21
0.21
0.07
0.07
0.07
0.08
0.09
0.18
0.2
0.21
0.23
0.23
0.08
0.07
0.08
0.08
0.09
0.16
0.16
0.16
0.17
0.18
0.08
0.08
0.08
0.08
0.09
0.18 0.07
0.19 0.06
0.2 0.07
0.22 0.08
0.21 0.08
0.17
0.17
0.16
0.18
0.19
0.07
0.07
0.07
0.08
0.09
0.15
0.16
0.16
0.18
0.18
Std
0.06
0.06
0.07
0.08
0.09
Table 5. Average adherence and the average standard deviation for six Booking cities
- unbalanced dataset.
London LosAngeles NewYork
Paris
Rome
Sydney
Bin Avg Std Avg
Std Avg Std Avg Std Avg Std Avg Std
1
2
3
4
5
0.18 0.15
0.23 0.16
0.27 0.17
0.29 0.19
0.30 0.19
0.17
0.21
0.24
0.27
0.27
0.13
0.15
0.16
0.17
0.18
0.17 0.15
0.23 0.16
0.26 0.17
0.28 0.18
0.28 0.18
0.18 0.14
0.24 0.17
0.28 0.18
0.32 0.19
0.32 0.19
0.18 0.14
0.22 0.15
0.26 0.17
0.30 0.18
0.32 0.18
0.20 0.16
0.21 0.15
0.22 0.15
0.26 0.18
0.29 0.19
Table 6. Average adherence and the average standard deviation for six Booking cities
- balanced dataset.
London LosAngeles NewYork
Paris
Rome
Sydney
Bin Avg Std Avg
Std Avg Std Avg Std Avg Std Avg Std
1
2
3
4
5
0.24 0.18
0.25 0.16
0.27 0.17
0.30 0.19
0.30 0.20
0.22
0.23
0.25
0.27
0.28
0.15
0.16
0.16
0.17
0.19
0.25 0.22
0.25 0.17
0.27 0.17
0.29 0.19
0.29 0.19
0.24 0.18
0.26 0.18
0.29 0.18
0.32 0.20
0.31 0.18
0.24 0.17
0.26 0.17
0.29 0.16
0.31 0.18
0.32 0.19
0.27 0.23
0.25 0.16
0.23 0.14
0.28 0.18
0.30 0.21
we drawn two graphs, the first considering all the reviews content, the second
the separation between positive and negative contents. For these experiments,
we considered imbalanced bins, due to the limited number of reviews available
in each language. The results are reported in Figure 7.
(a) All content, Italian
(b) Positive/negative content, Italian
(c) All content, French
(d) Positive/negative content, French
Fig. 7. Score vs adherence - Booking unbalanced dataset - reviews in Italian and French.
Essentially, in both cases, it is confirmed that the higher the score, the higher
the adherence when considering the overall text (Figure 7-a and Figure 7-c).
Similarily, the graphs in Figure 7-b and Figure 7-d show a clear division between
positive and negative adherence values, when the score increases.
4.4 Language and Domain-Agnostic Reviews Aggregation
In this section, we present an application of the outcome found in previous ones.
Given a set of texts, we propose to aggregate texts with positive polarity and
texts with negative polarity, without a priori knowing the text language and do-
main, and without using any technique of Natural Language Processing (NLP),
while exploiting only the adherence metric. We apply the following methodology:
1. For each review r ∈ Ij ∈ Ci we compute the adherence adhTCi
2. Reviews r ∈ Ij are sorted in ascending order w.r.t. their adherence value.
3. Ordered reviews are split in bins with the same cardinality. We defined Kbins
bins, each holding {r ∈ Ij}/Kbins reviews in ascending order of adherence.
4. For each bin Bi, we compute the average of the adherence value of the reviews
(r), as well as, for the purposes of valida-
it contains: Avgadh,i = 1
R
tion, the average score provided by those reviews, Avgscore,i = 1
R
(cid:80) score(r).
(cid:80) adhTCi
(r).
5. Finally, we aim at proving that, when the average adherence value of each
bin increases, the average score value also increases. Thus, we compute the
percentage of Ij ∈ Ci for which we observe:
Avgscore,Kbins
≥ Avgscore,1
Avgscore,i ≥ Avgscore,i−1
(5)
(6)
is the average score for the last bin, Avgscore,1 is the
where Avgscore,Kbins
average score for the first bin, and i = 1, . . . , Kbins.
Table 7 reports the results for the Amazon dataset. For each category Ci, we
apply the methodology three times, modifying the minimum number of reviews
(minRev ) for each item Ij, in order to discard items with few reviews. We set
Kbins=3 and we report the number of items (#I) and the total number of reviews
(#Rev) considered, plus the percentage of Ij ∈ Ci for which (5) is true (%).
Table 7. Amazon dataset - parameters: equation (5), bins = 3.
Category Ci
minRev=20
minRev=50
minRev=100
BluetoothHeadsets
BluetoothSpeakers
ScreenProtectors
UnlockedCellPhones 1116
143
Magnifiers
OralIrrigators
48
82
#Ij #Rev
817 108693
13155
1741 174320
97049
8763
10301
423
54
(%) #Ij #Rev
96393
86
12278
96
781 144597
83
78836
542
89
5714
46
72
32
9832
85
223
27
(%) #Ij #Rev
82723
93
10423
100
370 116337
90
58788
257
94
3694
18
87
91
21
8987
(%)
97
100
96
97
100
90
This result shows that, considering 3 bins, the percentage of items for which
the average score of the last bin is higher than the average score of the first bin is
above 80% for each category (except for Magnifiers in case the minimum number
of reviews is 20). Nevertheless, the percentage grows in almost all cases, when
the minimum number of reviews increases. It exceeds 90% for every category,
when the minimum number of reviews is, at least, 100.
Therefore, in the majority of cases, it is true that, when the average adher-
ence of reviews belonging to the last bin is higher than the average adherence
of reviews included in the first bin, the same relation exists between their cor-
respondent average scores. This finding is mostly supported when we consider
only items with many reviews (at least 100).
For the Booking dataset, we straight consider only hotels with at least 100
reviews. We perform three experiments according to the languages of reviews
(English, Italian, and French). For each experiment, Kbins=3 and we report the
number of items (#I), the total number of reviews (#Rev) considered and the
percentage of Ij ∈ Ci for which (5) is true (%). The results are in Table 8. The
percentage of items for which the average score of the last bin is higher than the
average score of the first bin is above 90% in all the cases.
Table 8. Booking dataset considering different languages - parameters: equation (5),
bins = 3. Not enough Italian reviews were available for Los Angeles and Sydney.
Category Ci
London
LosAngeles
NewYork
Paris
Rome
Sydney
56
English
#Ij #Rev
356 467863
46700
163 182438
93164
211
144
68543
74 126744
Italian
(%) #Ij #Rev
76 11952
97
93
-
6518
95
806
96
64 11040
97
100
-
-
27
6
-
French
(%) #Ij #Rev
123 20507
96
-
993
60 10753
93
72 12623
100
4197
28
94
-
4
553
7
(%)
94
100
90
90
93
100
Thus, given a set of reviews on, e.g., hotels, or restaurants, in any language,
we can identify a group of reviews that, on average, express better opinions than
another group of reviews. Noticeably, this analysis works even if the associated
score is not available, i.e., it can be applied to general comments about items.
We consider now if also relation (6) is verified for each bin i = 1, . . . , Kbins,
i.e., if the function between the ordered sets of average adherence values Avgadh,i
and average score values Avgscore,i is a monotonic function. By plotting the
average score vs the average adherence, for some items, we found out a general
upward trend. Nevertheless, there were many spikes that prevent the function
from being monotonic. Then, we tried to smooth down the curves by applying
a moving average with window = 2 and we then computed the percentage of
Ij ∈ Ci for which (6) was verified. For the Amazon dataset, we performed three
experiments, modifying the minimum number of reviews required (minRev ) for
each item, in order to discard items with few reviews. Results are in Table 9.
Such results are worse with respect to the ones in Table 7. Nevertheless,
in all cases (but Oral Irrigators), the percentage values increase when minRev
increase (for Magnifiers, it remains the same with minRev = 50, 100). When
minRev = 100, the percentage of Ij ∈ Ci for which (6) is true is above 72%.
For the Booking dataset, due to the high number of available reviews, we also
varied the number of bins from 3 to 5. We only considered reviews in English
Table 9. Amazon dataset - parameters: equation (6), bins = 3.
Category Ci
BluetoothHeadsets
BluetoothSpeakers
UnlockedCellPhones
Magnifiers
OralIrrigators
ScreenProtectors
minRev=20 (%) minRev=50 (%) minRev=100 (%)
69
88
69
58
77
58
76
93
72
72
81
66
82
96
77
72
76
73
and computed the percentage of items for which the equation (6) is true. Table
10 shows a clear degradation of performances when the number of bin increases.
Table 10. Booking dataset - parameters: equation (6).
Category Ci bins=3 (%) bins=4 (%) bins=5 (%)
London
LosAngeles
New York
Paris
Rome
Sydney
83
75
66
65
82
92
95
88
88
87
94
95
67
61
47
40
67
85
So far, the results indicate a relation between the increasing adherence values
and the increasing score values. However, we cannot prove a strong correlation
between adherence and score, either considering a single review or groups of
reviews. Therefore, we followed a different approach, by computing, for each
item Ij ∈ Ci, the difference between the average values of the first and last bin,
both for the adherence and the score:
∆adh(j) = Avgadh,Kbins
∆score(j) = Avgscore,Kbins
− Avgadh,1
− Avgscore,1
If we average such differences for all the items Ij ∈ Ci, both for adherence and
score, we obtain an average value for each category Ci:
AvgDadh =
AvgDscore =
1
J
1
J
J(cid:88)
J(cid:88)
j=1
j=1
∆adh(j)
∆score(j)
(7)
(8)
where J is the total number of items j ∈ Ij.
(a) Bluetooth headsets
(b) Bluetooth speakers
(c) London (en)
(d) New York (en)
Fig. 8. Average differences for Amazon and Booking example categories.
Figure 8 shows the values of (7) and (8) for items belonging to some of the
Amazon and Booking categories. In each graph, the x-axis reports the number of
bins considered, wheres the y-axis represents the average differences values. We
depicted the average differences for the adherence with a solid red line, while
the average differences for the score with a dashed blue line. The graphs clearly
show that, when the number of bin increases, the first and last bin include
reviews which describe the product in a considerably different way, in term of
positiveness. Thus, given a category, it is possible to discriminate among groups
of reviews, related to that category, in such a way that each group expresses an
opinion different from the others, ordered from the most negative to the most
positive ones (or vice-versa).
4.5 Representative Terms in First and Last Bins
Here, we extract the most recurrent terms in the positive and negative groups
of reviews. Given an item (either a hotel or a product), we consider the terms
included in the positive set and in the negative set (last and first bins, with
Kbins = 10) that can be also found in the extracted terminology.
For each term, we compute the term frequency -- inverse document frequency
(tf-idf) value (in this case, tf is the term frequency inside the bin, that is the
number of reviews that include such term), we sort the terms accordingly and
we select the first 20 ones for the positive and negative set. We then remove the
terms common to both sets, in order to identify the most discriminating ones.
Table 11 shows the terms extracted for two Amazon products.
Table 11. The most relevant positive and negative terms for two Amazon products.
Product
Negative
Positive
Terms
Score Terms
B005XA0DNQ refund,
packag-
ing,
casing, discon-
nected, gift, battery,
packaged,
addition,
plugging,
hooked,
99, hook,
shipping,
speaker,
purpose,
sounds, kitchen
B0083RXA86
impressive,
stereo,
charger,
mostly,
product,
button,
charging,
switch,
louder, useless, price,
usb
2.9
2.4
sound,
compact,
great,
retractable,
portable, very, price,
unbelievable,
satis-
easy,
fied, product,
recommend,
small,
perfect,
little, handy,
size
very,
charge,
use-
blue,
ful,
coating,
satisfied, quite, bat-
tery, enough, music,
attachment,
excel-
lent, highly, quality,
pleased
Score
4.3
4.6
Table 12. The most relevant positive and negative terms for the Amazon categories.
Product
Negative terms
Positive terms
BluetoothHeadsets
charge, item, amazon, hear,
purchased, device, problem,
bought
clear,
fit,
recommend,
highly, music, easy, excel-
lent, comfortable, quality
BluetoothSpeakers
ScreenProtectors
speakers,
volume,
gift,
reviews,
charge,
item,
amazon, music, purchased,
charging, bought
purchase,
cover, bought,
item, iphone, pack, instruc-
tions
UnlockedCellPhones buy, phone, phones, seller,
everything, amazon,
problem,
item,
cell,
iphone,
bought
AppetiteControl
tried,
these, hungry,
try,
pills, reviews, products, oz,
bottle, waste, eat, bought
little, portable, excellent,
recom-
bluetooth,
mend,
sounds,
highly, quality, size
small,
easy,
perfect,
clear,
highly, fits, apply, perfectly
samsung,
perfect, excellent, fast, card,
easy, recommend, android,
quality, sim
cambogia,
garcinia,
loss,
pounds,
ommend,
definitely,
exercise
lost,
rec-
highly,
extract,
diet,
lose,
After having extracted the terms for every item, we calculate their frequency
within a whole category. Again, we remove the terms common to both sets (pos-
itive and negative), to highlight the most representative positive and negative
terms for the category. Table 12 shows the terms extracted for the five Amazon
categories with more reviews. Table 13 shows the terms extracted for some Book-
ing categories, for English, Italian and French. However, for Italian and French,
few examples are shown, due to the low number of reviews for such datasets.
5 Related Work
Terminology extraction. Automatic terminology extraction is one of the pillars
of many terminology engineering processes, such as text mining, information
retrieval, ontology learning, and semantic web technologies. The aim is to au-
tomatically identify relevant concepts (or terms) from a given domain-specific
corpus. Within a collection of candidate domain-relevant terms, actual terms
are separated from non-terms by using statistical and machine learning methods
[20]. Here, we rely on contrastive approaches, where the identification of relevant
candidates is performed through inter-domain contrastive analysis [21,6,1].
Opinion Mining. Opinion mining techniques aim at automatically identifying
polarities and sentiments in texts[11], by, e.g., extracting subjective expressions
Table 13. The most relevant positive and negative terms for Booking categories.
City
Negative terms
Positive terms
London (en)
booked, bar, floor, wifi, stayed,
stay, shower, receptionist, recep-
tion, booking, hotels
New York (en) booked, square, checked, floor,
door,
reception,
desk, reservation, booking, ho-
tels
stayed,
stay,
helpful, cleanliness, convenient,
quiet, comfortable, beds, facil-
ities, clean, excellent, friendly,
size
bathroom,
perfect,
helpful,
cleanliness, comfortable, beds,
clean, excellent, small, noisy,
friendly, size
Rome (it)
Paris (fr)
albergo, prenotazione, servizi,
stanze, hotel,
sog-
giorno, reception, doccia, book-
ing
struttura,
cortesia,
gentile,
disponibile,
confortevole,
termini, ottima,
gentilezza, abbondante, pulita,
cordiale
gare,
chambres,
accueil,
emplacement,
anglais,
hotel,
clients, avons, sol, londres, wifi,
lit, chambre, r´eservation, hotel,
r´eception, pay´e, bruit, booking
confortable,
salle, g´eographique, d´ejeuner,
petite,
proche,
petit, qualit´e, quartier,
tr`es,
m´etro, calme, propret´e, literie,
situation,
agr´eable,
proximit´e, bain
propre,
representing personal opinions and speculations[25] or detecting so called con-
textual polarity of a word, i.e., the polarity acquired by the word contextually
to the sentence in which it appears, see, e.g., [26,27,17]. Often, opinion min-
ing rely on lexicon-based approaches, involving the extraction of term polarities
from sentiment lexicons and the aggregation of such scores to predict the overall
sentiment of a piece of text, see, e.g., [5,8,4,3].
Clustering Opinions. Unsupervised learning does not require labelled data for
the training process. Among them, clustering algorithms can be profitably used
to find the natural clusters in the data, by calculating the distances or similari-
ties from the centres of the clusters. Few efforts have been devoted to the study
of polarity detection in online reviews with clustering techniques. In [9], the
authors present the clustering-based sentiment analysis approach, by applying
three different techniques, namely TF-IDF weighting, voting mechanism and en-
hancement by hybrid with scoring method. In [13,12], the authors describe and
experimental study of some common clustering techniques used for sentiment
analysis of online reviews and investigate how any step of the clustering pro-
cess (pre-processing, term weighting, clustering algorithm) can affect clustering
results. The work in [18] studies the relationship between online movie reviews
and the box office incomes. The detection of sentiments is carried out by using
tf and idf values as features and Fuzzy Clustering as algorithm.
Here, we proposed an alternative approach to polarity detection, relying on
automatic terminology extraction, in a domain and language agnostic fashion,
and not relying on linguistic resources.
6 Final Remarks
We presented a novel approach for aggregating reviews, based on their polarity.
The methodology did not require pre-labeled reviews and the knowledge of the
reviews' domain and language. We introduced the adherence metric and we
demonstrated its correlation with the review score. Lastly, we relied on adherence
to successfully aggregate reviews, according to the opinions they express.
Acknowledgments.
Research partly supported by MSCA-ITN-2015-ETN grant agreement #675320
(European Network of Excellence in Cybersecurity) and by Fondazione Cassa di
Risparmio di Lucca, financing the project Reviewland.
References
1. Basili, R., et al.: A contrastive approach to term extraction. In: Terminologie et
intelligence artificielle. Rencontres. pp. 119 -- 128 (2001)
2. Bonin, F., et al.: A contrastive approach to multi-word extraction from domain-
specific corpora. In: Language Resources and Evaluation. ELRA (2010)
3. Bravo-Marquez, F., et al.: Building a twitter opinion lexicon from automatically-
annotated tweets. Knowledge-Based Systems 108, 65 -- 78 (2016)
4. Cambria, E., Hussain, A.: Sentic Computing: A Common-Sense-Based Framework
for Concept-Level Sentiment Analysis. Springer (2015)
5. Cambria, E., et al.: SenticNet 3: a common and common-sense knowledge base
for cognition-driven sentiment analysis. In: 28th AAAI Artificial Intelligence. pp.
1515 -- 1521 (2014)
6. Chung, T.M., Nation, P.: Identifying technical vocabulary. System 32(2), 251 -- 263
(2004)
7. Del Vigna, F., Petrocchi, M., Tommasi, A., Zavattari, C., Tesconi, M.: Semi-
supervised knowledge extraction for detection of drugs and their effects. In: Social
Informatics I (2016)
8. Esuli, A., Sebastiani, F.: SENTIWORDNET: A publicly available lexical resource
for opinion mining. In: Language Resources and Evaluation. pp. 417 -- 422 (2006)
9. Li, G., Liu, F.: Application of a clustering method on sentiment analysis. J. Inf.
Sci. 38(2), 127 -- 139 (2012)
10. Ling Lo, S., et al.: A multilingual semi-supervised approach in deriving Singlish sen-
tic patterns for polarity detection. Knowledge-Based Systems 105, 236 -- 247 (2016)
11. Liu, B.: Sentiment Analysis and Opinion Mining. Morgan & Claypool (2012)
12. Ma, B., Yuan, H., Wu, Y.: Exploring performance of clustering methods on docu-
ment sentiment analysis. Information Science (2015)
13. Ma, B., et al.: A comparison study of clustering models for online review sentiment
analysis. In: Web-Age Information Management. pp. 332 -- 337. Springer (2013)
14. McAuley, J., Pandey, R., Leskovec, J.: Inferring networks of substitutable and
complementary products. In: 21th KDD. pp. 785 -- 794. ACM (2015)
15. McAuley, J., et al.: Image-based recommendations on styles and substitutes. In:
38th Research and Development in Information Retrieval. pp. 43 -- 52. ACM (2015)
16. Mellinas, J.P., Mar´ıa-Dolores, S.M.M., Garc´ıa, J.J.B.: Booking.com: The unex-
pected scoring system. Tourism Management 49, 72 -- 74 (2015)
17. Muhammad, A., Wiratunga, N., Lothian, R.: Contextual sentiment analysis for
social media genres. Knowledge-Based Systems 108, 92 -- 101 (2016)
18. Nagamma, P., et al.: An improved sentiment analysis of online movie reviews based
on clustering for box-office prediction. In: Computing, Communication and Au-
tomation. pp. 933 -- 937 (2015)
19. Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr.
2(1-2), 1 -- 135 (2008)
20. Pazienza, M.T., et al.: Terminology extraction: An analysis of linguistic and sta-
tistical approaches. In: Knowledge Mining, pp. 255 -- 279. Springer (2005)
21. Penas, A., Verdejo, F., Gonzalo, J.: Corpus-based terminology extraction applied
to information access. In: Corpus Linguistics. vol. 13, pp. 458 -- 465 (2001)
22. Ren, Y., Zhang, Y., Zhang, M., Ji, D.: Context-sensitive Twitter sentiment classi-
fication using neural network. In: Artificial Intelligence. pp. 215 -- 221. AAAI (2016)
23. Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval.
Inf. Process. Management 24(5), 513 -- 523 (1988)
24. Turney, P.D.: Thumbs up or thumbs down?: Semantic orientation applied to un-
supervised classification of reviews. In: Computational Linguistics Meeting. pp.
417 -- 424. ACL (2002)
25. Wilson, T., et al.: OpinionFinder: A system for subjectivity analysis.
In:
HLT/EMNLP on Interactive Demonstrations. pp. 34 -- 35. ACL (2005)
26. Wilson, T., et al.: Recognizing contextual polarity in phrase-level sentiment anal-
ysis. In: HLT/EMNLP. pp. 347 -- 354. ACL (2005)
27. Wilson, T., et al.: Recognizing contextual polarity: An exploration of features for
phrase-level sentiment analysis. Comput. Linguist. 35(3), 399 -- 433 (2009)
|
1512.01043 | 1 | 1512 | 2015-12-03T11:29:36 | Approaches for Sentiment Analysis on Twitter: A State-of-Art study | [
"cs.SI",
"cs.CL",
"cs.IR"
] | Microbloging is an extremely prevalent broadcast medium amidst the Internet fraternity these days. People share their opinions and sentiments about variety of subjects like products, news, institutions, etc., every day on microbloging websites. Sentiment analysis plays a key role in prediction systems, opinion mining systems, etc. Twitter, one of the microbloging platforms allows a limit of 140 characters to its users. This restriction stimulates users to be very concise about their opinion and twitter an ocean of sentiments to analyze. Twitter also provides developer friendly streaming API for data retrieval purpose allowing the analyst to search real time tweets from various users. In this paper, we discuss the state-of-art of the works which are focused on Twitter, the online social network platform, for sentiment analysis. We survey various lexical, machine learning and hybrid approaches for sentiment analysis on Twitter. | cs.SI | cs | Approaches for Sentiment Analysis on Twitter:
A State-of-Art study
Harsh Thakkar and Dhiren Patel
Department of Computer Engineering, National Institute of Technology, Surat-395007, India
{harsh9t,dhiren29p}@gmail.com
Abstract. Microbloging is an extremely prevalent broadcast medium amidst the
Internet fraternity these days. People share their opinions and sentiments about
variety of subjects like products, news, institutions, etc., every day on mi-
crobloging websites. Sentiment analysis plays a key role in prediction systems,
opinion mining systems, etc. Twitter, one of the microbloging platforms allows
a limit of 140 characters to its users. This restriction stimulates users to be very
concise about their opinion and twitter an ocean of sentiments to analyze. Twit-
ter also provides developer friendly streaming API for data retrieval purpose al-
lowing the analyst to search real time tweets from various users. In this paper,
we discuss the state-of-art of the works which are focused on Twitter, the online
social network platform, for sentiment analysis. We survey various lexical, ma-
chine learning and hybrid approaches for sentiment analysis on Twitter.
Keywords. Microbloging, Sentiment Analysis, Online Social Network, Opin-
ion Mining.
1
Introduction
Sentiment analysis is a challenge of the Natural Language Processing (NLP), text
analytics and computational linguistics. In a general sense, sentiment analysis deter-
mines the opinion regarding the object/subject in discussion. Its initial use was made
to analyze sentiment based on long texts such as letters, emails and so on. It is also
deployed in the field of pre- as well as post-crime analysis of criminal activities. With
the explosion of internet applications such as microbloging websites, forums and
social networks, this field of study gained its limelight of late. People discuss, com-
ment and criticize various topics, and write reviews, recommendations, etc. using
these applications. User generated data carries a lot of valuable information on prod-
ucts, people, events, and so on. The cut throat competition of the modern world has
led to advanced mechanisms of customer feedback and satisfaction-to-innovation
cycle. The large user generated content requires the use of automated techniques for
mining and analyzing since crowd sourced mining and analysis are difficult. Work in
this area originated early from its applications in blogs [1] and product/movie [2]
reviews. Today, traditional news outlets have an online version of their news.
Applying this field with the microbloging fraternity is a challenging job. This chal-
lenge became our motivation. Substantial research has been carried out in both ma-
chine learning and the lexical approaches to sentimental analysis for social networks.
We summarize the work done so far will aim to improve the existing approaches Rest
of the paper is organized as follows: Section 2 discusses background of sentiment
analysis, section 3 summarizes the results obtained from the survey of approaches to
sentiment analysis, and finally in section 4 we conclude our paper with conclusion
and references at the end.
2
Background
Sentiment analysis has been practiced on a variety of topics. For instance, sentiment
analysis studies for movie reviews [4], product reviews [5], and news and blogs ([3],
[6]). In this section, Twitter specific sentiment analysis approaches are reported. The
research on sentiment analysis so far has mainly focused on two things: identifying
whether a given textual entity is subjective or objective, and identifying polarity of
subjective texts [3]. Most sentiment analysis studies use machine learning approaches.
In sentiment analysis domain, the texts belong to either of positive or negative
classes. There may also be multi-valued or binary classes like positive, negative and
neutral (or irrelevant). The core complexity of classification of texts in sentiment
analysis with respect to that of other topic-based cataloging is due to the non-usability
of keywords [2], despite the fact that the number of classes in sentiment analysis is
less than that in the later approach by [4].
Opinion mining (sentiment extraction) is employed on Twitter posts by means of
following techniques
Lexical analysis
Machine learning based analysis
Hybrid/Combined analysis
2.1 Lexical analysis
This technique is governed by the use of a dictionary consisting pre-tagged lexicons.
The input text is converted to tokens by the Tokenizer. Every new token encountered
is then matched for the lexicon in the dictionary. If there is a positive match, the score
is added to the total pool of score for the input text. For instance if “dramatic” is a
positive match in the dictionary then the total score of the text is incremented. Other-
wise the score is decremented or the word is tagged as negative. Though this tech-
nique appears to be amateur in nature, its variants have proved to be worthy ([11],
[8]). Fig. 1 shows the working of a lexical technique.
Yes
No
Fig. 1. Working of a lexical technique.
The classification of a text depends on the total score it achieves. Considerable
amount of work has been devoted for measuring which best lexical information
works. An accuracy of about 80% on single phrases can be achieved by the use of
hand tagged lexicons comprised of only adjectives, which are crucial for deciding the
subjectivity of an evaluative text as demonstrated by [9]. The author of [7] extended
this work making use of same methodology and tested a database of movie reviews,
reported an accuracy of mere 62%. Other than the hand tagged lexicon approach, [2]
came up with a variant by utilizing internet search engine for marking the polarity of
words included in work of [7]. They used two AltaVista search engine queries: target
word + „good‟ and other target word + „bad‟. The score was evaluated by the search
that yielded the max number of hits, which reported to improve the earlier accuracy
from 62% to 65%. In Subsequent research ([8], [10]) the scoring of words was ac-
complished by using the WordNet database. They compared the target word with two
pivot words („good‟ and „bad‟) and found the Minimum Path Distance (MPD) be-
tween the words in the WordNet pyramid. The MPD is the converted to an incremen-
tal score, which is stored in the word dictionary. This variant was reported to yield
accuracy [10] of 64%. The author of [11] proposes another method which presents an
alternative to ([8], [10]), taking motivation from [9], by evaluating the semantic gap
between the words simply subtracting the set of positive ones from the negative ones
yielding 82% accuracy. Lexical analysis has a limitation: its performance (in terms of
time complexity and accuracy) degrades drastically with the exponential growth of
the size of dictionary (number of words).
2.2 Machine learning based analysis
Machine learning is one of the most prominent techniques gaining interest of re-
searchers due to its adaptability and accuracy. In sentiment analysis, mostly the su-
pervised learning variants of this technique are employed. It comprises of three stag-
es: Data collection, Pre-processing, Training data, Classification and plotting results.
In the training data, a collection of tagged corpora is provided. The Classifier is pre-
sented a series of feature vectors from the previous data. A model is created based on
the training data set which is employed over the new/unseen text for classification
purpose. In machine learning technique, the key to accuracy of a classifier is the se-
lection of appropriate features. Generally, unigrams (single word phrases), bi-grams
(two consecutive phrases), tri-grams (three consecutive phrases) are selected as fea-
ture vectors. There are a variety of proposed features namely number of positive
words, number of negative words, length of the document, Support Vector Machines
(SVM) ([14], [15]), and Naïve Bayes (NB) algorithm [16]. Accuracy is reported to
vary from 63% to 80% depending upon the combination of various features selected.
Fig. 2 shows the typical number of steps involved in a machine learning technique.
Working of this technique can be explained as follows:
First Step:
Data Collecting – in this stage data to be analyzed is crawled from
various sources like Blogs, Social networks (Twitter, MySpace, etc.) depending upon
the area of application.
Second Step:
Pre-processing – In this stage, the acquired data is cleaned and
made ready for feeding it into the classifier. Cleaning includes extraction of keywords
and symbols. For instance – Emoticons are the smiley used in textual form to repre-
sent emotions e.g. “:-)”, “:)”, “=)”, “:D”, “:-(“, “:(“, “=(“, “;(“, etc.. Correcting the all
uppercase and all lowercase to a common case, removing the non-English (or prof-
fered language texts), removing un-necessary white spaces and tabs, etc.
Third Step:
Training Data – A hand-tagged collection of data is prepared by
most commonly used crowd-sourcing method. This data is the fuel for the classifier; it
will be fed to the algorithm for learning purpose.
Fourth Step: Classification – This is the heart of the whole technique. Depending
upon the requirement of the application SVM or Naïve bayes is deployed for analysis.
The classifier (after completing the training) is ready to be deployed to the real time
tweets/text for sentiment extraction purpose.
Fifth Step:
Results – Results are plotted based on the type of representation
selected i.e. charts, graphs, etc. Performance tuning is done prior to the release of the
algorithm.
Fig. 2. Steps involved in the machine learning approach.
The machine learning technique faces challenges in: designing a classifier, availa-
bility of training data, correct interpretation of an unforeseen phrase. It overcomes the
limitation of lexical approach of performance degradation and it works well even
when the dictionary size grows exponentially.
2.3 Hybrid analysis
The advances in sentiment analysis lured researchers to explore the possibility of a
hybrid approach which could collectively exhibit the accuracy of a machine learning
approach and the speed of lexical approach. In [17] authors use two-word lexicons
and an unlabeled data, dividing these two-word lexicons in two discrete classes nega-
tive and positive. Pseudo documents encompassing all the words from the set of cho-
sen lexicons are created. Then computed the cosine similarity amongst the pseudo
documents and the unlabeled documents. Depending upon the measure of similarity,
the documents were either assigned a positive or a negative sentiment. This training
dataset was then fed to a naïve bayes classifier for training purpose.
Another approach presented by [18], derived a “unified framework” using back-
ground lexical information as word class associations. Authors renewed information
for particular areas using the available datasets or training examples and proposed a
classifier called as Polling Multinomial Classifier (PMC) (also known as the multi-
nomial naïve bayes). Manually labeled data was incorporated for training purpose.
They claimed that making use of lexical knowledge improved performance. Another
variant of this approach was presented by [19]. But so far only [18] have been able to
claim good results.
3
Summary
In a survey conducted by [20], comparison of all approaches has showed that best
results have been observed from machine learning approaches, and least by lexical
approaches. However, without any proper training of a classifier in machine learning
approach results may deteriorate drastically. Work is being carried on hybrid ap-
proaches; hence so far only limited information is available to our knowledge.
The techniques were tested by [20] on a movie review & recommendation and
news review area based on user tweets. Their results seem to be promising for further
research. For the training purpose of the classifiers, they used: Cornel movie review
dataset [2], General inquirer adjective lists [12], yahoo web search API [13], Porter
stemmer [22], WordNet Java API [23], Stanford log linear POS tagger with Penn
Treebank tag set [23], WEKA M.L. java API (only for Machine Learning purpose)
[24], SVM-light ML implementation (M.L. classifier) [25]. The results are summa-
rized in Table 1.
Table 1. Summary of accuracy in % of various techniques of sentiment analysis derived from
tests carried out by [20] and our other survey (* - approx).
Including features
Baseline (as is)
Baseline, stemming
Baseline , WordNet
Baseline , Yahoo web search
Baseline, all above
Approach
Lexical [20]
Lexical [20]
Lexical ([8],[10])
Lexical [20]
Lexical [20]
Machine Learning ([14],[15]) SVM , Unigrams
Machine Learning ([14],[15]) SVM , Unigrams , Aggregate
Machine Learning [16]
Machine Learning [16]
Naïve Bayes , Unigrams
Naïve bayes , Unigrams ,
Aggregate
Accuracy
50
50.2
60.4
57.7
55.7
*~77
65 - 68
75 - 77
~77-78
On the other hand hybrid approaches are showing the following general sentiment
analysis results:
Table 2. Summary of accuracy in % of various hybrid approaches derived from tests carried
out by [20] and our other survey.
Approach
Hybrid [17]
Hybrid [19]
Hybrid [18]
Features
Class-two Naïve bayes , unlabeled data
SVM + Naïve bayes , emoticons
Class-two Naïve bayes , twitter datasets
Accuracy
~64
70
~84
4
Conclusion
Open social networks are best examples of sociological trust. The exchange of mes-
sages, followers and friends and varying sentiments of users provide a crude platform
to study behavioral trust in sentiment analysis domain. Machine learning approaches
have been so far good in delivering accurate results. Depending upon the application,
the success of any approach will vary. Lexical approach is a ready-to-go and doesn‟t
require any prior information or training. While on the other hand machine learning
requires a well-designed classifier, huge amount of training data sets and performance
tuning prior to deployment. Hybrid approach has so far displayed positive sentiment
as far as performance is concerned. Though they have been deployed using unigrams
and diagrams, their performance is worse on trigrams. This definitely leaves research-
ers to explore the terrain.
References
1. Bautin, M., Vijayrenu , L., and Skenia, International sentiment analysis for news and
blogs. In Second Int. Conf. on Weblogs and Social Media ICWSM (2008)
2. Turney, P. D.: Thumbs up or thumbs down?. Semantic orientation applied to unsupervised
classification of reviews. In Proceedings of the 40th annual meeting of the Association for
Computational Linguistics (2002) 417–424
3. B. Pang and L. Lee,: Opinion mining and sentiment analysis. Foundations and Trends in
Information Retrieval, vol. 2, no. 1-2 (2008) 1-135
4. B. Pang and L. Lee: Using very simple statistics for review search: An exploration. In Pro-
ceedings of the International Conference on Computational Linguistics (COLING), (2008)
5. K. Dave, S. Lawrence, and D. M. Pennock,: Mining the peanut gallery: Opinion extraction
and semantic classification of product reviews (2003) 519-528
6. N. Godbole, M. Srinivasaiah, and S. Skiena,: Large-scale sentiment analysis for news and
blogs (2007)
7. Kennedy, A., Inkpen, D.,: Sentiment Classification of Movie and Product Reviews Using
Contextual Valence Shifters, Computational Intelligence (2006) 110–125
8. Kamps J., Marx, M., Mokken, R.J.,: Using WordNet to Measure Semantic Orientation of
Adjectives. LREC vol. IV (2004) 1115–1118
9. Hatzivassiloglou, V., Wiebe, J.: Effects of Adjective Orientation and Gradability on Sen-
tence Subjectivity. Proceedings of the 18th International Conference on Computational
Linguistics, New Brunswick, NJ (2000)
10. Andreevskaia, A., Bergler, S., Urseanu, M.: All Blogs Are Not Made Equal: Exploring
Genre Differences in Sentiment Tagging of Blogs. In: International Conference on Web-
logs and Social Media (ICWSM-2007), Boulder, CO (2007)
11. Turney, P.D., Littman, and M.L.: Measuring Praise and Criticism: Inference of Se-mantic
Orientation from Association. ACM Transactions on Information Systems (2003) 315–346
12. Stone, P.J., Dunphy, D.C., and Smith, M.S.: The General Inquirer: A Computer Approach
to Content Analysis. MIT Press, Cambridge, (1966)
13. Yahoo! Search Web Services, Online http:// developer. yahoo.com/search/ (2007)
14. Akshay, J.: A Framework for Modeling Influence, Opinions and Structure in Social Media.
In: Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, Van-
couver, BC, July (2007) 1933–1934
15. Durant, K., and Smith M.: Mining Sentiment Classification from Political Web Logs. Pro-
ceedings of Workshop on Web Mining and Web Usage Analysis of the 12th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining. Philadel-
phia (2006)
16. S. Prasad: Micro-blogging sentiment analysis using Bayesian classification methods
(2010)
17. A. Pak and P. Paroubek: Twitter based system: Using twitter for disambiguating sentiment
ambiguous adjectives. Proceeding SemEval '10 Proceedings of the 5th International Work-
shop on Semantic Evaluation (2010) 436-439
18. B. Liu, X. Li, W.S. Lee, and P.S. Yu.: Text classification by labeling words. Proceedings
of the National Conference on Artificial Intelligence, Menlo Park, CA; Cambridge, MA;
London.. MIT Press (2004) 425-430
19. P. Melville, W. Gryc, and R.D. Lawrence. Sentiment analysis of blogs by combining lexi-
cal knowledge with text classification. In Proceedings of the 15th ACM SIGKDD interna-
tional conference on Knowledge discovery and data mining (2009) 1275-1284
20. R. Prabowo and M. Thelwall. Sentiment analysis: A combined approach. Journal of In-
formatics (2009) 143-157
21. M. Annett and G. Kondrak: A comparison of sentiment analysis techniques: Polarizing
movie blogs (2008) 25-35
22. No Title, Online http://tartarus.org/ ~martin/PorterStemmer/ java.txt, October (2007)
23. Fellbaum, C.: WordNet: An Electronic Lexical Database. Language, Speech, and Commu-
nication Series. MIT Press, Cambridge (1998)
24. Toutanova, K., Manning, C.D.: Enriching the Knowledge Sources Used in a Maxi-mum
Entropy Part-of-Speech Tagger. In Proceedings of EMNLP/VLC, Hong Kong, China
(2000) 63–71
25. Witten, H., Frank, and E.: Data Mining: Practical Machine Learning Tools and Tech-
niques, 2nd edition. Morgan Kaufmann, San Francisco (2005)
|
1510.03059 | 2 | 1510 | 2015-11-09T17:08:36 | Influence of network topology on cooperative problem-solving systems | [
"cs.SI",
"nlin.AO",
"physics.soc-ph"
] | The idea of a collective intelligence behind the complex natural structures built by organisms suggests that the organization of social networks is selected so as to optimize problem-solving competence at the group-level. Here we study the influence of the social network topology on the performance of a group of agents whose task is to locate the global maxima of NK fitness landscapes. Agents cooperate by broadcasting messages informing on their fitness and use this information to imitate the fittest agent in their influence networks. In the case those messages convey accurate information on the proximity of the solution (i.e., for smooth fitness landscapes) we find that high connectivity as well as centralization boost the group performance. For rugged landscapes, however, these characteristics are beneficial for small groups only. For large groups, it is advantageous to slow down the information transmission through the network to avoid local maximum traps. Long-range links and modularity have marginal effects on the performance of the group, except for a very narrow region of the model parameters. | cs.SI | cs | Influence of network topology on cooperative problem-solving systems
Jos´e F. Fontanari
Instituto de F´ısica de Sao Carlos, Universidade de Sao Paulo,
Caixa Postal 369, 13560-970 Sao Carlos, Sao Paulo, Brazil
Instituto de Ciencias Matem´aticas e de Computa¸cao, Universidade de Sao Paulo,
Caixa Postal 668, 13560-970 Sao Carlos, Sao Paulo, Brazil
Francisco A. Rodrigues
The idea of a collective intelligence behind the complex natural structures built by organisms
suggests that the organization of social networks is selected so as to optimize problem-solving com-
petence at the group-level. Here we study the influence of the social network topology on the per-
formance of a group of agents whose task is to locate the global maxima of NK fitness landscapes.
Agents cooperate by broadcasting messages informing on their fitness and use this information to
imitate the fittest agent in their influence networks. In the case those messages convey accurate
information on the proximity of the solution (i.e., for smooth fitness landscapes) we find that high
connectivity as well as centralization boost the group performance. For rugged landscapes, however,
these characteristics are beneficial for small groups only. For large groups, it is advantageous to slow
down the information transmission through the network to avoid local maximum traps. Long-range
links and modularity have marginal effects on the performance of the group, except for a very narrow
region of the model parameters.
I.
INTRODUCTION
The benefits of cooperative work have long been ex-
plored by nature as revealed by the collective structures
built by termites and slime molds. These structures may
be thought of as the organisms' solutions to the problems
that endanger their existence [1, 2]. Within this (admit-
tedly controversial) perspective, competence in problem
solving should be viewed as a selection pressure on the
size and organization of groups of gregarious animals, in
addition to the more traditional pressures such as de-
fense against predation and foraging success [3]. In fact,
given the ubiquity of network optimization in biology [4],
one would expect that the size and the topology of so-
cial networks are also selected for optimization of species
adaptation and surveillance [5, 6]. Social networks are
considered optimal if they improve communication and
decision making at the group level, while keeping a min-
imum number of (costly) connections between the indi-
viduals [6].
The information in social networks flows between indi-
viduals via social contacts and, in the problem-solving
context, the relevant process is imitative learning or,
more generally, social learning [7], as expressed in this
quote by Bloom "Imitative learning acts like a synapse,
allowing information to leap the gap from one creature
to another" [1]. In fact, social learning has inspired the
planning of a variety of optimization heuristics, such as
the particle swarm optimization algorithm [8] and the
adaptive culture heuristic [9, 10]. Although there has
been some progress on the understanding of the fac-
tors that make cooperative group work effective [11 --
14], a workable minimal model to study group problem-
solving via imitative learning was proposed only very re-
cently [15, 16]. Our goal here is to investigate how the
social network properties are related to efficiency at the
group level within that minimal model framework. By
efficiency we mean that the time to solve a problem must
scale superlinearly with the number of individuals or re-
sources employed in the task.
The agent-based model we consider consists of a group
of L agents that can perform individual trial-and-test
searches to explore a fitness landscape and, most impor-
tantly, can imitate a model agent -- the best perform-
ing agent in their influence network at the trial -- with
a certain probability p. Thus the model exhibits the
two critical ingredients of a collective brain:
imitative
learning and a dynamic hierarchy among the agents [1].
It is the exchange of messages between agents inform-
ing each other on their partial success (i.e., their fitness
at the current trial) towards the completion of the task
that characterizes the model as a distributed cooperative
problem-solving system [11].
The task of the agents is to find the global maxima of
smooth and rugged fitness landscapes created by the NK
model and the performance or efficiency of the group is
measured by the number of trials required to find those
maxima. We assume that the links between agents are
costless. Differently from a previous study that consid-
ered only fully connected networks (i.e., each agent in-
fluences and is influenced by all the other agents in the
group) [16], here we focus on the structure of the social
network that connects the agents within the group. In
particular, we consider the effect of varying the connec-
tivity (or coordination number) of one-dimensional lat-
tices as well as of varying the structure of the network
while keeping the average connectivity of the network
fixed.
We find that in both smooth and rugged landscapes
the best group organization comprises an optimal num-
ber L∗ of fully connected agents. For smooth landscapes,
decrease of the connectivity and hence of the speed of
5
1
0
2
v
o
N
9
]
I
S
.
s
c
[
2
v
9
5
0
3
0
.
0
1
5
1
:
v
i
X
r
a
information transmission is always detrimental to the
performance of the group, regardless of the group size
L. For rugged landscapes, however, this decrease can be
greatly beneficial if L > L∗, but it is slightly detrimental
if L < L∗. In the case the number of agents and links
are kept fixed, we find that centralization (i.e., the exis-
tence of agents with a large number of connections) is,
in general, advantageous for small size groups. In addi-
tion, centralization in large groups leads to catastrophic
performances in rugged landscapes. We find that the
introduction of long-range connections has no effect on
the performance of the group, except when the parame-
ters are set close to the region where the imitative search
fails to find the global maximum. In that case those links
greatly harm the group performance. It is interesting to
notice that this behavior is different from other dynam-
ical processes taking place in networks. For instance,
synchronization is strongly influenced by the decrease of
the average shortest distances in the network [17].
The rest of the paper is organized as follows. In Sec-
tion II we present a brief description of the NK model
of rugged fitness landscapes. In Section III we describe
in some detail the imitative learning search strategy and
introduce a convenient measure of the performance of
the search for the global maximum on NK landscapes.
In Section IV we study the performance of the imita-
tive search in the case the imitation network is modeled
by a regular one-dimensional lattice with coordination
number M and in Section V in the case it is modeled
by more complex network topologies, namely, scale-free,
small-world and community networks. Finally, Section
VI is reserved to our concluding remarks.
II. NK MODEL OF RUGGED FITNESS
LANDSCAPES
The NK model was introduced by Kauffman [18] to
model the adaptive evolution process as walks on rugged
fitness landscapes. The main advantage of the NK model
of rugged fitness landscapes is the possibility of tuning
the ruggedness of the landscape by changing the two in-
teger parameters of the model, namely, N and K. The
NK landscape is defined in the space of binary strings of
length N . This parameter determines the size of the so-
lution space, 2N . The other parameter K = 0, . . . , N − 1
influences the number of local maxima on the landscape.
In particular, for K = 0 the corresponding (smooth)
landscape has one single maximum. For K = N − 1, the
(uncorrelated) landscape has on the average 2N / (N + 1)
maxima with respect to single bit flips [19].
The solution space of the NK landscape consists of the
2N distinct binary strings of length N , which we denote
by x = (x1, x2, . . . , xN ) with xi = 0, 1. To each string x
we associate a fitness value Φ (x) which is an average of
the contributions from each component i in the string,
2
FIG. 1. Example of the computation of the fitness for the
string x = (0, 1, 1, 0) with N = 4 and K = 2. There are
four components, as indicated in the figure. For instance,
if φ(0, 1, 1) = 0.3, φ(1, 1, 0) = 0, 2, φ(1, 0, 0) = 0.5 and
φ(0, 0, 1) = 0.1, then Φ (x) = (1/4)(φ0 +φ1 +φ2 +φ3) = 0.275.
This procedure is performed for each of the 2N possible strings
that define the landscape.
i.e.,
N(cid:88)
i=1
1
N
Φ (x) =
φi (x) ,
(1)
where φi is the contribution of component i to the fitness
of string x. It is assumed that φi depends on the state xi
as well as on the states of the K right neighbors of i, i.e.,
φi = φi (xi, xi+1, . . . , xi+K) with the arithmetic in the
subscripts done modulo N . We notice that K measures
the degree of interaction (epistasis) among the compo-
nents of the strings.
It is assumed, in addition, that
the functions φi are N distinct real-valued functions on
{0, 1}K+1. As usual, we assign to each φi a uniformly dis-
tributed random number in the unit interval [18]. Hence
Φ ∈ (0, 1) has a unique global maximum. Figure 1 illus-
trates the calculation of Φ (x).
For K = 0 there are no local maxima and the sole max-
imum of Φ is easily located by picking for each component
i the state xi = 0 if φi (0) > φi (1) or the state xi = 1,
otherwise. However, for K > 0 finding the global max-
imum of the NK model is a NP-complete problem [20],
which means that the time required to solve the problem
using any currently known deterministic algorithm in-
creases exponentially fast with the length N of the strings
[21]. The increase of the parameter K from 0 to N−1 de-
creases the correlation between the fitness of neighboring
configurations (i.e., configurations that differ at a single
component) in the solution space. For K = N − 1, those
fitness values are uncorrelated so the NK model reduces
to the Random Energy model [22, 23]. The simplest way
to see this is to consider two neighboring configurations,
say xa = (0, 0, . . . , 0) and xb = (1, 0, . . . , 0), and to cal-
culate explicitly the correlation between their fitnesses,
which yields corr(cid:0)Φ (xq) , Φ(cid:0)xb(cid:1)(cid:1) = 1 − (K + 1) /N , as
expected.
Since the functions φi are random, the ruggedness mea-
sures (e.g., the number of local maxima) of a particular
realization of a NK landscape are not fixed by the pa-
rameters N and K. In fact, those measures can vary con-
siderably between landscapes characterized by the same
values of N and K > 0 [18], which implies that the per-
0110011001100101(0,1,1)(1,1,0)(1,0,0)(0,0,1)formance of any search heuristic based on the local corre-
lations of the fitness landscape depends on the particular
realization of the landscape. Hence in order to highlight
the role of the parameters that are relevant to imitative
learning -- the group size L, the network topology and
average connectivity M , and the imitation probability p
-- here we compare the performance of groups character-
ized by different sets of those parameters for the same
realization of the NK fitness landscape.
In particular,
we consider two types of landscape: a smooth landscape
with N = 12 and K = 0 and a rugged landscape with
N = 12 and K = 4. The effects of averaging over differ-
ent landscape realizations is addressed briefly in Section
V.
III. THE MODEL
We consider a group composed of L agents. Each agent
operates in an initial binary string drawn at random with
equal probability for the bits 0 and 1. Henceforth we use
here the terms agent and string interchangeably. At any
trial t, a target agent can choose between two distinct
processes to operate on the strings. The first process,
which happens with probability 1 − p, is the elementary
move in the solution space that consists of picking a bit
i = 1, . . . , N at random with equal probability and then
flipping it. Through the repeated application of this op-
eration, the agent can produce all the 2N binary strings
starting from any arbitrary string. The second process,
which happens with probability p, is the imitation of a
model string. We choose the model string as the high-
est fitness string at trial t among the (fixed) subgroup of
agents that can influence the target agent. The string to
be updated (target string) is compared with the model
string and the different bits are singled out. Then the
agent selects at random one of the distinct bits and flips
it so that this bit is now the same in both the target
and the model strings. Hence, as a result of the imita-
tion process the target string becomes more similar to
the model string. Figure 2 illustrates the steps involved
in the model.
The parameter p ∈ [0, 1] is the imitation probability.
The case p = 0 corresponds to the baseline situation in
which the L agents explore the solution space indepen-
dently. The imitation procedure described above is moti-
vated by the mechanism used to simulate the influence of
an external media [24, 25] in the celebrated agent-based
model proposed by Axelrod to study the process of cul-
ture dissemination [26, 27]. We notice that in the case
the target string is identical to the model string, and this
situation is not uncommon since the imitation process re-
duces the diversity of the group, the agent executes the
elementary move with probability one.
The collective search ends when one of the agents finds
the global maximum and we denote by t∗ the number of
trials made by the agent that found the solution. Since
the agents operate in parallel and the search halts simul-
3
FIG. 2. Illustration of the update rules of the model. At any
step, a target agent is selected and its binary string is changed
either by flipping one randomly chosen bit or by copying a bit
from the highest fitness (model) string. The former process
occurs with probability 1 − p, whereas the latter with proba-
bility p. Notice that when the imitation operation is selected,
the updated string becomes closer to the model string.
taneously for all agents, t∗ stands also for the number of
trials made by any one of the L agents. In other words,
the trial number t is incremented by one unit when the
L agents have executed one of the two operations on its
associated string. We notice that except for the case
p = 0, the update of the L agents is not strictly a par-
allel process since the model strings may change several
times within a given trial. Nonetheless, since in a single
trial all agents are updated, the total number of agent
updates at trial t is given by the product Lt.
Here we measure the efficiency of the search by the to-
tal number of agent updates necessary to find the global
maximum (i.e., Lt∗), which is essentially the computa-
tional cost of the search. Since the typical number of tri-
als to success t∗ scales with the size of the solution space
2N , it is convenient to present the results in terms of
the rescaled computational cost, defined as C ≡ Lt∗/2N .
In fact, in the case of the independent search it can be
shown that the mean rescaled computational cost is given
by [16]
(cid:104)
1 − (λN )L(cid:105) ,
L
(cid:104)C(cid:105) =
2N
(2)
where λN is the second largest eigenvalue of a tridi-
agonal stochastic matrix T whose elements are Tij =
(1 − j/N ) δi,j+1 + j/N δi,j−1 for j = 1, . . . , N − 1, Ti0 =
δi,1, and TiN = δi,N , where δi,j is the Kronecker delta.
The notation (cid:104). . .(cid:105) stands for the average over indepen-
dent searches on the same landscape. The results of
the simulations exhibited in the next sections were ob-
L(cid:105) =
tained by averaging over 105 searches. Notice that (cid:104)t∗
1/
is the expected number of trials for a
group of L independent agents to find the global max-
imum. In particular, for N = 12 we have λ12 ≈ 0.99978
1(cid:105) ≈ 4545. Since (λ12)L ≈ e−L(1−λ12) we have
and (cid:104)t∗
1(cid:105) and (cid:104)C(cid:105) ≈ L/212
1(cid:105)/212 ≈ 1.110 for L (cid:28) (cid:104)t∗
(cid:104)C(cid:105) ≈ (cid:104)t∗
for L (cid:29) (cid:104)t∗
1(cid:105).
(cid:104)
1 − (λN )L(cid:105)
0 0 0 0 1Target agent0 1 0 0 1Flipping1-pp0 0 0 1 11 1 0 1 01 0 0 1 11 0 0 0 10 0 1 1 11 1 1 1 1...0 0 1 1 1highest fitnessfitness0.40.30.10.80.5copySubgroup of neighbours4
FIG. 3.
(Color online) Mean rescaled computational cost
(cid:104)C(cid:105) for the imitation probability p = 0.5 as function of
the number of sites L of a regular one-dimensional lattice
(ring) with coordination number M = 2((cid:3)), M = 10((cid:79)),
and M = 50((cid:35)). The results for the fully connected lattice
M = L − 1((cid:32)) as well as for the independent search (+) are
(cid:104)C(cid:105) = 0.76(cid:0)L/212(cid:1)1/2 in the range L ∈ (cid:2)102, 103(cid:3). The pa-
also shown. The solid curve is Eq. (2), the dashed line is the
linear function (cid:104)C(cid:105) = L/212 and the dotted line is the fitting
rameters of the NK landscape are N = 12 and K = 0. The
landscape exhibits a single maximum.
FIG. 4. (Color online) Mean rescaled computational cost (cid:104)C(cid:105)
for the imitation probability p = 0.5 as function of the num-
ber of sites L of a regular one-dimensional lattice (ring) with
coordination number M = 2((cid:3)), M = 4(×), M = 8((cid:79)),
M = 20((cid:52)) and M = 50((cid:35)). The results for the fully con-
nected lattice M = L − 1((cid:32)) as well as for the independent
search (+) are shown also. The solid curve is Eq. (2) and
the dashed line is the linear function (cid:104)C(cid:105) = L/212. The pa-
rameters of the NK landscape are N = 12 and K = 4. The
landscape exhibits 52 local maxima and a single global max-
imum.
IV. REGULAR LATTICES
Here we consider the case that the agents are fixed
at the L sites of a one-dimensional lattice with periodic
boundary conditions (i.e., a ring) and can interact with
their M/2 left neighbors as well as with their M/2 right
neighbors. Hence M ≤ L− 1 is the coordination number
of the lattice. This configuration is important because
one can vary the connectivity M of the lattice without
the risk of producing disconnected clusters.
Figure 3 shows the performance of a group of L agents
at the task of finding the global optimum of a smooth
landscape (K = 0) in the case the copying and the
elementary move operations are equally probable, i.e.,
p = 0.5. We find that, regardless of the number of agents
L, the best performance is achieved by the fully con-
nected lattice M = L − 1 and the performance degrades
smoothly as the connectivity decreases. This can be ex-
plained by the absence of local maxima in the landscape
for K = 0. Since all sequences display faithful infor-
mation about the location of the global maximum, the
higher the information flow between them, the better the
performance of the group. In addition, we find that re-
gardless of the connectivity the computational cost de-
creases as the imitation probability increases. We re-
call that for p ≈ 1 only the model string, which is
represented by several copies when L is large, is likely
to perform the elementary move; all other strings imi-
tate the model. This reduces greatly the effective group
size since the strings are concentrated in the vicinity of
the model string, which cannot accommodate more than
L = N = 12 strings without duplication of work. This
is the reason we observe the degradation of the perfor-
mance when the group size increases beyond the optimal
value L ≈ N . Notice that for K = 0 the imitative learn-
ing search always performs better than the independent
search.
group sizes in the range L ∈ (cid:2)102, 103(cid:3), Fig. 3 reveals
At this stage it is prudent to point out that a constant
computational cost implies that the time t∗ necessary
to find the global maximum decreases linearly with the
number of agents. On the other hand, a computational
cost that grows linearly with the group size means that
adding more agents to the group does not affect t∗. For
a sublinear decrease of t∗, since (cid:104)C(cid:105) increases with L1/2
and, therefore, t∗ decreases with L−1/2. According to
our criterion for efficiency, as a collaborative strategy the
imitative search is efficient only in the range L < 10
where we find the superlinear scaling t∗ ∝ L−2.
Figure 4 shows the performance for a rugged land-
scape (K = 4) having 52 local maxima and a single
global maximum. Because of the presence of local max-
ima that may trap the sequences in their neighborhoods,
the computational cost exhibits a much more complex
dependence on the model parameters than in the pre-
vious case of a single-maximum landscape. This figure
reveals many instructive facts about the imitative search
strategy. In particular, this strategy may be disastrous,
in the sense that it performs much worse than the inde-
pendent search, for large groups with high connectivity
0.05 0.1 0.5 1 3100101102103104<C>L 0.3 1 10 30100101102103104<C>L5
FIG. 5.
(Color online) Mean rescaled computational cost
(cid:104)C(cid:105) for the imitation probability p = 0.5 as function of the
coordination number number M ≤ L − 1 for regular one-
dimensional lattices (rings) with L = 10((cid:52)), L = 100((cid:35))
and L = 1000((cid:79)). The lines are guides to the eyes. The
parameters of the NK landscape are N = 12 and K = 4.
The landscape exhibits 52 local maxima and a single global
maximum.
(i.e., L ∈ [20, 2000] and M > 15 for the data of Fig.
4).
In this case, the decrease of the connectivity and
consequently of the rate of information flow through the
network greatly improves the performance of the imita-
tive search. Most interestingly, however, is the finding
that for small groups (say, L < 10) the fully connected
system is the optimal one, as shown in Fig. 5. The same
conclusion holds true in the case the number of agents is
greater than the size of the solution space (L > 212) since
it is very likely that some string will be close to the global
maximum and it is thus advantageous to disseminate this
information quickly through the group. For groups of in-
termediate size (say, L = 100) the detrimental effects of
increasing the connectivity of the lattice are startling as
illustrated in Fig. 5.
The main conclusion of this analysis is that the opti-
mal setting for the imitative search is a small group of
size L∗, which depends on the imitation probability p
as well as on details of the landscape, where the agents
are fully connected. In particular, L∗ decreases with in-
creasing p as illustrated in Fig. 6: for p > 0.98 we find
L∗ = 2 whereas for p → 0 we find L∗ ≈ 2N . Although
the decrease of the connectivity between agents can boost
significantly the performance of the group in the regime
L∗ < L (cid:28) 2N , the leading factor for optimality is the
group size, with the lattice connectivity playing a coad-
juvant role (see Fig. 5).
V. COMPLEX NETWORKS
The previous section focused on the influence of vary-
ing the connectivity of the regular network on the
FIG. 6. (Color online) Mean rescaled computational cost (cid:104)C(cid:105)
for the fully connected lattice as function of the number of
sites L for the imitation probability p = 0.2((cid:4)), p = 0.3((cid:78)),
p = 0.5((cid:32)) and p = 0.7((cid:72)). The parameters of the NK land-
scape are N = 12 and K = 4. The landscape exhibits 52 local
maxima and a single global maximum.
problem-solving performance of the group. Here we con-
sider networks with the same average connectivity but
very different organizations, as reflected by the degree
distribution -- the degree ki of a node i is given by
its number of connections.
In particular, we consider
scale-free networks generated by the Barab´asi-Albert al-
gorithm [29], a star topology and a regular chain with
nearest-neighbors links. In the three topologies there are
L nodes and L − 1 links. In addition, to examine the in-
fluence of long-range interactions we consider small-world
networks [30] as well as a network exhibiting community
structure [31].
A. Scale-free networks
A scale-free network is a network whose degree distri-
bution follows a power law when the number of nodes
L is very large. For our purposes, the interesting fea-
ture of this topology, besides being a good approxima-
tion to social and biological networks [28], is that it in-
troduces a distinction between agents, since the nodes of
the network can exhibit very different degrees. Here we
use the Barab´asi-Albert algorithm for generating random
scale-free networks which exhibit the degree distribution
P (k) ∼ k−3 in the asymptotic limit L → ∞ [29]. This
algorithm is based on a preferential attachment mecha-
nism and network growth. Thus, at each time step, a
new node i with m0 connections is added to the network.
The probability that a node j, which is present in the
network, will receive a connection from i is proportional
l kl. In
the case we start with a single node and m0 = 1, the
resulting network will exhibit L − 1 connections at the
Lth step. In addition, if m0 = 1 then the network will
to kj (the degree of j), i.e., P (i → j) = kj/(cid:80)
1 10100101102<C>M 0.4 0.6 0.8 1 1.2110100<C>L6
FIG. 7. (Color online) Mean rescaled computational cost (cid:104)C(cid:105)
for the imitation probability p = 0.5 as function of the num-
ber of sites L for a chain with coordination number M = 2
((cid:35)), scale-free networks generated according to the Barab´asi-
Albert algorithm with initial degree m0 = 1 ((cid:52)), and a
star topology ((cid:79)). In each run we used a different random
scale-free network. The parameters of the NK landscape are
N = 12 and K = 0.
show a tree-like structure [28].
Notice that the size of the neighbors group of each node
(i.e., the influence network) varies in scale-free networks,
contrariwise to the regular networks considered in the last
section. The results of the imitative search in a smooth
landscape (K = 0) and in a rugged landscape (K = 4)
are summarized in Figs. 7 and 8, respectively, in the case
the L agents are located at the nodes of a scale-free net-
work. For the sake of comparison, we consider also a star
topology where L − 1 agents are connected to a central
agent (a super-spreader), and a regular one-dimensional
lattice with free boundary conditions and coordination
number M = 2. In the three network topologies consid-
ered in these figures, the number of agents is L and the
number of links is L− 1. In addition, for L = 3 the three
topologies produce identical graphs.
Since in the absence of local maxima (K = 0) the
model string always displays faithful information about
the location of the global maximum, the faster this in-
formation spreads among the agents, the better the per-
formance of the group. Figure 7 indicates that for L not
too large, the star topology maximizes the information
flow among agents and so it yields the best performance
among the three topologies. The chain topology min-
imizes the information flow and so it yields the worst
performance, whereas the scale-free topology exhibits a
performance level that is intermediate to those two ex-
tremes. However, the star topology has obvious draw-
backs that become apparent for large L only (L > 200
for the data of Fig. 7): in the case the fittest agent is not
the central agent, the useful, new information it carries is
not available for imitation to the other agents, who can
imitate the central agent only. Actually, that piece of
FIG. 8. (Color online) Same as Fig. 7 but for a rugged NK
landscape with parameters N = 12 and K = 4.
information can even be lost if the fittest agent is chosen
as the target agent before it is imitated by the central
one.
In the presence of local maxima (K = 4), we find a
similar pattern, as shown in Fig. 8, but the failure of
the star topology already for L > 30 is probably due to
the spreading of inaccurate information about the global
optimum by the central agent. In fact, once the central
agent reaches a local maxima it quickly attracts the rest
of the group towards it.
We may interpret the central agent of the star topol-
ogy as a type of blackboard, which the other agents must
access to get hints about the location of the global max-
imum [32]. In fact, when the central agent is selected as
the target and the imitation operation is chosen, it copies
the best performing agent of the previous trial and this
information become available to the other agents, which
can then access the blackboard with probability p. Given
the severe bottleneck to the information flow in the star
topology, it comes to a surprise that it works so well for
small groups.
For topologies where the degree of the nodes (or
agents) is not constant, we can estimate the probability
Ph that the agent with the highest degree is the one that
finds the global maximum. Since in the case all agents
have the same probability of finding the global maximum
(e.g., for the regular lattices discussed in Section IV) this
probability is 1/L, it is convenient to consider the ratio
rh = Ph/ (1/L) = LPh ≥ 1 which gives a measure of
the influence of the degree of an agent on its chances of
hitting that maximum. In Fig. 9 we show rh as function
of the group size for the star and the scale-free topolo-
gies. In the limit of very large L, chances are that the
global maximum already shows up in the setting of the
initial population, so we have rh → 1 in this limit. The
influence of the degree on the ratio rh depends on the
ruggedness of the landscape: it is significant for smooth
landscapes but marginal for rugged landscapes. It is in-
0.2 0.4 0.6 0.8 1100101102103<C>L 0.7 0.8 0.9 1100101102103<C>L7
B. Community structure and small-world networks
To explore the effects of the structure of the population
on the performance of the imitative search, we consider
a network with L = 200 agents divided in 4 clusters of
50 agents each as illustrated in Fig. 10. The probability
that two nodes of the same cluster are connected is 0.3,
whereas nodes in different clusters are connected accord-
ing to a probability of 0.001. The total number of links
is 1519 so the average connectivity of the network is ap-
proximately 15.2. We consider, in addition, small-world
networks which allow the interpolation between struc-
tureless (random) graphs and regular lattices [30].
In particular, the small-world networks we consider
here are generated using the Watts and Strogatz algo-
rithm. Explicitly, we begin with a one-dimensional lat-
tice of L nodes, each node connected to M neighbors
(M/2 on each side), and periodic boundary conditions.
Then for every node i = 1, . . . , L we rewire the links be-
tween i and j = i + 1 (the sums are done modulo L) with
probability β. Rewiring of a link is done by replacing
the original neighbor of node i by a random node chosen
uniformly among all possible nodes that avoid self-loops
and link duplication. This procedure is then repeated for
the links between i and j = i + 2, i and j = i + 3, and
so on until the links between i and j = i + M/2. The
case β = 1 corresponds to random graphs with average
connectivity M and the case β = 0 to a regular ring with
number of coordination M .
Figures 11 and 12 show the mean computational cost
for small-world networks with rewiring probability β =
0, 0.2 and 1, and for the network with community struc-
ture shown in Fig. 10. We find that (cid:104)C(cid:105) is completely
insensitive to variations on the structure of the network
for smooth landscapes (see Fig. 11). This conclusion ap-
plies to rugged landscapes as well, except for p close to
the boundary of the region where the imitative search
fails to find the global maximum (see Fig. 12). In this
case the sensitivity is extreme. For instance, for p = 0.58
searches using random networks (β = 1) fail to find the
global maximum, whereas searches using regular (β = 0)
or community networks succeed. In fact, for large values
of the imitation probability, the risk of the search be-
ing stuck in local maxima is very high and so long-range
links which speed up the flow of information through the
network may become notably detrimental to the imita-
tive search performance. However, in the absence of local
maxima (Fig. 11) the best performance is attained by im-
itating the model string and allowing only their clones to
explore the landscape through the elementary move.
To check whether the specific realization of the NK
rugged fitness landscape we used in our study has un-
duly influenced our conclusions, we have considered four
random realizations of the landscape with N = 12 and
K = 4 in addition to that realization. We note that for
smooth landscapes (K = 0) all realizations are equiva-
lent. The comparison between the mean computational
costs for those five realizations is shown in Fig. 13. The
FIG. 9. (Color online) Ratio rh between the probability Ph
that the agent with the highest degree in the network finds
the global maximum and the baseline probability 1/L for the
case the L agents are equiprobable to find that maximum.
The symbols ((cid:52)) are the results for scale-free networks gen-
erated according to the Barab´asi-Albert algorithm, whereas
the symbols ((cid:79)) are for the star topology. In each run we used
a different random scale-free network. The imitation proba-
bility is p = 0.5 and the parameters of the NK landscape are
N = 12, K = 0 (open symbols) and K = 4 (filled symbols).
FIG. 10. (Color online) Network with a community structure
consisting of L = 200 nodes divided in 4 groups of 50 nodes
each. The average connectivity of the network is approxi-
mately 15.2.
teresting that for the star topology the regime where rh
decreases with increasing L roughly coincides with the
regime where the star topology performs less well than
the other topologies considered in Figs. 7 and 8.
1 3 5 7 902004006008001000rhL8
FIG. 13.
(Color online) Mean rescaled computational cost
(cid:104)C(cid:105) as function of the probability of imitation p for the net-
work with community structure illustrated in Fig. 10 and five
realizations (different symbols) of the NK fitness landscape
with N = 12 and K = 4.
VI. DISCUSSION
The tenet of our approach to study cooperative
problem-solving systems is that group size and organi-
zation are selected so as to maximize group-level per-
formance as measured by the number of trials necessary
to find the global maxima of fitness landscapes. Differ-
ently from the definition of network optimality in biol-
ogy, where there is a direct selection pressure to reduce
the number of connections between entities because of
their building and maintenance costs [33], here we as-
sume that the connections between agents are costless.
As a result, we find that the optimal group organization
is obtained by a relatively small group of fully connected
agents. The optimal group size L∗ is a decreasing func-
tion of the imitation probability p (see Fig. 6) and is
roughly proportional to the logarithm of the size of the
solution space [16]. In our model, the problem-solving ef-
ficiency decreases with the group size for L > L∗ because
of the duplication of work resulting from the decrease
of the diversity of the group members due to imitation.
More traditional selection pressures that contribute to
limit the size of groups are resource competition, parasite
transmission and the managing of the social relationships
[34, 35].
The manner the information on the location of the
global maximum spreads among the agents, which is de-
termined by the network structure, as well as the accu-
racy of that information can greatly affect the problem-
solving performance of the group. For instance, we find
that for smooth landscapes the decrease of the agents'
connectivity is always harmful to the performance, re-
gardless of the group size L. For rugged landscapes,
however, this decrease can be highly beneficial for large
groups (i.e., L > L∗). In fact, because the model agent
may broadcast misleading information in this case, it is
FIG. 11.
(Color online) Mean rescaled computational cost
(cid:104)C(cid:105) as function of the imitation probability p for the net-
work with community structure illustrated in Fig. 10 ((cid:35)),
and for small-world networks with average connectivity 14
and rewiring probability β = 1 ((cid:52)), β = 0.2 (×), and β = 0
((cid:79)). The number of nodes is L = 200 for the three networks
and the parameters of the smooth NK landscape are N = 12
and K = 0.
FIG. 12. (Color online) Same as Fig. 11 but for the rugged
NK landscape of parameters N = 12 and K = 4.
results are qualitatively the same. The quantitative dif-
ferences are due to variations in the number of local max-
ima as well as in their distances to the global maximum
for the different landscape realizations. It is reassuring
to note that the initial decrease of the mean cost with
the imitation probability p, which indicates that (moder-
ate) imitation is a sensible cooperation strategy, as well
as the existence of a threshold imitation value beyond
which the group fails to find the global maximum, are ro-
bust properties of the imitative learning search on rugged
landscapes.
0.2 0.4 0.6 0.8 1 1.200.20.40.60.81<C>p 0.6 0.8 1 1.200.10.20.30.40.50.60.7<C>p 0.4 0.6 0.8 1 1.200.10.20.30.40.50.60.70.8<C>padvantageous to slow down the information transmission
so as to allow the agents more time to explore the solution
space away from the neighborhoods of the local maxima.
The same conclusion holds in the case of centralization:
the presence of super-spreaders, which enhance the diffu-
sion of information, is beneficial provided the information
is accurate. Decentralized networks are less susceptible
to the diffusion of inaccurate information. It is interest-
ing that for small groups (i.e., L < L∗) both centraliza-
tion and full connectivity are beneficial, regardless of the
accuracy of the information. In addition, the presence of
long-range links has no effect on the performance of the
group, except for a very narrow region of the model pa-
rameters. Notice that the evolution of other dynamical
processes, such as synchronization or cascade failures, are
strongly affected by the network structure [36]. There-
fore, the weak influence of long-range links on the perfor-
mance of the imitative learning search is not an expected
result.
An interesting question that we can address within our
minimal model framework is whether the fixed topology
of a social network can enhance the fitness of some group
members [37]. In this case the accuracy of the transmit-
ted information seems to be the crucial ingredient.
In
fact, for smooth landscapes we find that highly-connected
agents are very likely to be the ones that find the global
maximum, but for rugged landscapes the fitness advan-
tage of the central agents is marginal only (see Fig. 9).
Another interesting issue, which we plan to address in a
future work, is the study of adaptive networks, in which
9
the network topology itself changes during the search
[38, 39]. The difficulty here is to find a suitable procedure
to update the topology, since simply adding more con-
nection to the model (fittest) agent can be catastrophic
if that agent is near a local maximum.
Finally, we note that our study departs from the vast
literature on the game theoretical approach to the evo-
lution of cooperation [40] where it is usually taken for
granted that mutual cooperation is beneficial to the play-
ers. Here we consider a problem solving scenario and
a specific cooperation mechanism (imitation) aiming at
determining in which conditions cooperation is benefi-
cial. The findings that in some cases cooperation results
in maladaptive behavior [41, 42] and that for very large
groups efficiency is achieved by minimizing communica-
tion [43] support our conjecture that the efficacy of imi-
tative learning could influence the size and organization
of the groups of social animals.
ACKNOWLEDGMENTS
The research of JFF was partially supported by
grant 2013/17131-0, Sao Paulo Research Foundation
(FAPESP) and by grant 303979/2013-5, Conselho Na-
cional de Desenvolvimento Cient´ıfico e Tecnol´ogico
(CNPq). FAR acknowledges CNPq (grant 305940/2010-
4) and FAPESP (grant 2013/26416-9) for financial sup-
port.
[1] Bloom H (2001) Global Brain: The Evolution of Mass
Mind from the Big Bang to the 21st Century. Wiley, New
York
[2] Queller DC, Strassmann JE (2009) Beyond society: the
evolution of organismality. Phil. Trans. R. Soc. B 364:
3143 -- 3155
[9] Kennedy J (1998) Thinking is social: Experiments with
the adaptive culture model. J. Conflict Res. 42: 56 -- 76
[10] Fontanari JF (2010) Social interaction as a heuristic for
combinatorial optimization problems. Phys. Rev. E 82:
056118
[11] Huberman BA (1990) The performance of cooperative
[3] Wilson E (1975) Sociobiology. Harvard University Press,
processes. Physica D 42: 38 -- 47
Cambridge, MA
[4] Barab´asi A-L, Oltvai ZN (2004) Network biology: un-
derstanding the cells functional organization. Nat. Rev.
Genet. 5: 101 -- 113
[5] Derex M, Beugin M-P, Godelle B, Raymond M (2013)
Experimental evidence for the influence of group size on
cultural complexity. Nature 503: 389 -- 391
[6] Pasquaretta C, Lev´e M, Claidi`ere N, van de Waal E,
Whiten A, MacIntosh AJJ, Pel´e M, Bergstrom ML,
Borgeaud C, Brosnan SF, Crofoot MC, Fedigan LM,
Fichtel C, Hopper LM, Mareno MC, Petit O, Schnoell
AV, di Sorrentino EP, Thierry B, Tiddi B, Sueur C (2014)
Social networks in primates: smart and tolerant species
have more efficient networks. Sci. Rep. 4: 7600
[12] Clearwater SH, Huberman BA, Hogg T (1991) Cooper-
ative Solution of Constraint Satisfaction Problems. Sci-
ence 254: 1181 -- 1183
[13] Hong L, Page SE (2004) Groups of diverse problem
solvers can outperform groups of high-ability problem
solvers. Proc. Natl. Acad. Sci. USA 101:16385 -- 16389
[14] Rendell L, Boyd R, Cownden D, Enquist M, Eriksson
K, Feldman MW, Fogarty L, Ghirlanda S, Lillicrap T,
Laland KN (2010) Why Copy Others?
Insights from
the Social Learning Strategies Tournament. Science 328:
208 -- 213
[15] Fontanari JF (2014) Imitative Learning as a Connector
of Collective Brains. PLoS ONE 9: e110517
[16] Fontanari JF (2015) Exploring NK Fitness Landscapes
[7] Heyes CM (1994) Social learning in animals: Categories
Using Imitative Learning. Eur. Phys. J. B 88: 251
and mechanisms. Biol. Rev. 69: 207 -- 231.
[17] Barahona M, Pecora LM (2002) Synchronization in
[8] Bonabeau E, Dorigo M, Theraulaz G (1999) Swarm In-
telligence: From Natural to Artificial Systems. Oxford
University Press, Oxford, UK
Small-World Systems. Phys. Rev. Lett. 89: 054101
[18] Kauffman S, Levin S (1987) Towards a general theory of
adaptive walks on rugged landscapes. J. Theor. Biol. 128:
11 -- 45
10
[19] Kaul H, Jacobson SH (2006) New global optima re-
sults for the Kauffman NK model: handling dependency.
Math. Program. 108: 475 -- 494
[20] Solow D, Burnetas A, Tsai M, Greenspan NS (2000)
On the Expected Performance of Systems with Complex
Interactions Among Components. Complex Systems 12:
423 -- 456
[21] Garey MR, Johnson DS (1979) Computers and In-
tractability: A Guide to the Theory of NP-Completeness.
Freeman, San Francisco, CA
[22] Derrida B (1981) Random-energy Model: An Exactly
Solvable Model of Disordered Systems. Phys. Rev. B 24:
2613 -- 2626
[23] Saakian DB, Fontanari JF (2009) Evolutionary dynam-
ics on rugged fitness landscapes: Exact dynamics and
information theoretical aspects. Phys. Rev. E 80: 041903
[24] Shibanai Y, Yasuno S, Ishiguro I (2001) Effects of Global
Information Feedback on Diversity. J. Conflict Res. 45:
80 -- 96
[31] Girvan M, Newman MEJ (2002) Community structure
in social and biological networks. Proc. Natl. Acad. Sci.
USA 99: 7821 -- 7826
[32] Englemore R, Morgan T (1988) Blackboard Systems.
Addison- Wesley, New York
[33] Clune J, Mouret J-B, Lipson H (2013) The evolution-
ary origins of modularity. Proc. R. Soc. B Biol. Sci. 280:
20122863
[34] Kurvers, RHJM, Krause J, Croft DP, Wilson ADM, Wolf
M (2014) The evolutionary and ecological consequences
of animal social networks: emerging issues. Trends Ecol.
Evol. 29: 326 -- 335
[35] Dunbar RIM (1992) Neocortex size as a constraint on
group size in primates. J. Human Evol. 22: 469 -- 493
[36] Barrat A, Barthelemy M, Vespignani A (2008) Dynami-
cal processes on complex networks. Cambridge University
Press, Cambridge, UK
[37] Waters JS, Fewell JH (2012) Information Processing in
Social Insect Networks. PLoS ONE 7: e40337
[25] Peres LR, Fontanari JF (2011) The media effect in Ax-
[38] Gross T, Blasius B (2008) Adaptive coevolutionary net-
elrod's model explained. Europhys. Lett. 96: 38004
works: a review. J. R. Soc. Interface 5: 259 -- 271
[26] Axelrod R (1997) The Dissemination of Culture: A
Model with Local Convergence and Global Polarization.
J. Conflict Res. 41: 203 -- 226
[27] Barbosa LA, Fontanari JF (2009) Culture-area relation
in Axelrod's model for culture dissemination. Theor.
Biosci. 128: 205 -- 210
[28] Albert R, Barab´asi A-L (2002) Statistical mechanics of
complex networks. Rev. Mod. Phys. 74: 47 -- 97
[29] Barab´asi A-L, Albert R (1999) Emergence of scaling in
random networks. Science 286: 509 -- 512
[30] Watts DJ, Strogatz SH (1998) Collective dynamics of
'small-world' networks. Nature 393: 440 -- 442
[39] Perra N, Gon¸calves B, Pastor-Satorras R, Vespignani
A (2012) Activity driven modeling of time varying net-
works. Sci. Rep. 2: 469
[40] Axelrod R (1984) The Evolution of Cooperation. Basic
Books, New York
[41] Laland KN, Williams K (1998) Social transmission of
maladaptive information in the guppy. Behav. Ecol. 9:
493 -- 499
[42] Laland KN, Atton N, Webster MM (2011) From fish to
fashion: experimental and theoretical insights into the
evolution of culture. Phil. Trans. R. Soc. B 366: 958 -- 968
[43] Moffett MW (2011) Adventures among Ants: A Global
Safari with a Cast of Trillions. University of California
Press, Oakland
|
1802.01159 | 1 | 1802 | 2018-02-04T17:13:33 | Mining Twitter Conversations around E-commerce Promotional Events | [
"cs.SI"
] | With Social Media platforms establishing themselves as the de facto destinations for their customers views and opinions, brands around the World are investing heavily on invigorating their customer connects by utilizing such platforms to their fullest. In this paper, we develop a novel technique for mining conversations in Twitter by weaving together all conversations around an event into one unified graph (Conversation Graph, henceforth). The structure of the Conversation Graph emerges as a variant of the BOWTIE structure (dubbed ASKEWBOWTIE henceforth) as a result of the complex communication patterns amongst these players. Finally, we investigate the structural properties of the ASKEWBOWTIE structure to understand the configuration of the components and their temporal evolution. | cs.SI | cs |
CSCW '16 COMPANION, FEBRUARY 27 -- MARCH 2, 2016, SAN FRANCISCO, CA, USA
Mining Twitter Conversations around
E-commerce Promotional Events
Binny Mathew
Dept. of CSE
IIT Kharagpur, India
[email protected]
Niloy Ganguly
Dept. of CSE
IIT Kharagpur, India
[email protected]
Unnikrishnan T A
Dept. of CSE
IIT Kharagpur, India
[email protected]
Samik Datta
Flipkart Ltd.
Bangalore, India
[email protected]
Tanmoy Chakraborty
Dept. of CSE
IIT Kharagpur, India
[email protected]
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for third-party components of this work must be honored.
For all other uses, contact the Owner/Author.
Copyright is held by the owner/author(s).
CSCW '16 Companion, February 27 - March 02, 2016, San Francisco, CA, USA
ACM 978-1-4503-3950-6/16/02.
http://dx.doi.org/10.1145/2818052.2869130
345
Abstract
With Social Media platforms establishing themselves as the
de facto destinations for their customers' views and
opinions, brands around the World are investing heavily on
invigorating their customer connects by utilizing such
platforms to their fullest. In this paper, we develop a novel
technique for mining conversations in Twitter by weaving
together all conversations around an event into one unified
graph (Conversation Graph, henceforth). The structure of
the Conversation Graph emerges as a variant of the
BOWTIE structure (dubbed ASKEWBOWTIE henceforth) as a
result of the complex communication patterns amongst
these players. Finally, we investigate the structural
properties of the ASKEWBOWTIE structure to understand
the configuration of the components and their temporal
evolution.
Author Keywords
Twitter conversations; ASKEWBOWTIE; E-commerce.
ACM Classification Keywords
E.1 [Data Structures]: Graphs and Networks
Introduction
The open nature of Twitter and its wealth of publicly
available communications have attracted the attention of the
research community. However, majority of the existing
SESSION: POSTERS
Event
#tweets
#users
BBD
BASD2
BASD3
135, 593
51, 323
160, 322
40, 891
10, 926
19, 155
# tweets
with @
96, 263
43, 360
139, 896
Table 1: Description of the
data-sets.
Data-set Precision% Recall%
89.50% 89.82%
BBD
90.54% 91.56%
BASD2
92.36% 92.54%
BASD3
Table 2: Accuracy of sentiment
tagger for three datasets.
Graph
BBD
BASD2
BASD3
LSCC
U
T
36K 118K 83%
8K
56K 88%
14K 210K 90%
T (LSCC)
95.21%
96.54%
95.49%
Table 3: Statistics of the
Conversation Graphs. The columns
LSCC and T (LSCC) denote the
percentage concentration of the
total SCC mass and flow associated
with LSCC respectively.
Component
IN
LSCC
OUT
TENDRILS
DISC
BASD2
BBD
BASD3
63% 55.3% 57.1%
12% 23.1% 21.1%
1.5% 3.5%
1.2%
21% 13.8% 14.3%
6.2%
2.8% 6.7%
Table 4: Concentration of masses
in different components of the
ASKEWBOWTIE.
literature [3] focus on studying these conversations in
isolation. These works highlight the importance of studying
the overall structure that emerges in Social Media due to an
Event. Chierichetti et al. [2] studied short-lived events, like a
goal scored in SUPERBOWL, where users share their views
and opinions to the World. In contrast, in this paper we
collect and study all the conversations that took place
around three large-scale e-commerce promotional events
conducted by India's largest e-commerce portal, Flipkart.
Through a detailed study of the users' profile, activity etc.,
we find several classes of users existing in the
conversational ecosystem. We weave together all these
conversations into a Conversation Graph, and find that the
graph demonstrates a stable BOWTIE-like structure -
hitherto observed in World Wide Web [1] - mainly
comprising of three connected components - IN, LSCC1,
OUT (Figure 1). The IN component enjoys the largest
concentration of users, and hence, we term this variant the
ASKEWBOWTIE. Finally, we conduct a thorough analysis to
understand the structural properties of the ASKEWBOWTIE.
Data-sets
We focus on three large-scale promotional events,
conducted by FLIPKART, that attracted enormous public and
mainstream media attention: BigBillionDay (BBD),
BigAppShoppingDays (BASD2 and BASD3). The statistics of
the crawled data-sets are presented in Table 1. We further
gathered from Twitter other publicly available information on
the authors of those tweets, e.g., account creation time,
total number of tweets till date, list of followers and
followings, the time-stamp of their latest tweets etc. As an
estimate of their influence, we also obtained their
Klout-scores2 through the publicly available APIs.
1Largest Strongly Connected Component
2https://klout.com/home
Users and Opinions
Given that 11% of the tweets across our data-sets were
written in vernacular3, we chose not to use off-the-shelf
Sentiment Analysis tools. Instead, building upon the
features proposed in [5], we train a binary classifier
(Support Vector Machine). Three annotators annotated
1000 tweets for each data-set with positive and negative
sentiments (average inter-annotator agreement 89%). On
average, we obtain precision and recall of 90%, as can be
seen from Table 2 with 10-fold cross-validation.
Based on this Sentiment Analysis, we further classify the
Twitter handles into 4 categories: (i) HAPPY: Happy
customers having a positive opinion on average, (ii)
UNHAPPY: Unhappy customers who had negative opinion
on average, (iii) ADVERSARIAL: Adversarial accounts
spreading negative sentiments, purposefully, (iv) PROMOTER:
Friendly accounts spreading positive sentiments, perhaps
as a result of incentives. We resort to a collection of
heuristics to arrive at a rule-based classifier for this purpose.
The Conversation Graph
Twitter provides two peer-to-peer communication primitives
- reply and mention - that encourage conversations
amongst the users. We also consider re-tweets, in our
definition of conversation.
Let T and U denote the universe of such tweets and users,
respectively, in our crawls. For each tweet, t ∈ T , let
a(t) ∈ U and R(t) ⊂ U denote the author and recipients of
the tweet t, respectively. Then we create a Conversation
Graph, G(U,T ). For each tweet t ∈ T , a directed edge is
added from u to v, whenever u = a(t) and v ∈ R(t).
Multiple edges between vertex-pairs are converted to
weighted edges. Furthermore, let ta denote the
3https://github.com/irshadbhat/litcm
346
CSCW '16 COMPANION, FEBRUARY 27 -- MARCH 2, 2016, SAN FRANCISCO, CA, USA
Figure 1: A Schematic diagram of
a ASKEWBOWTIE.
Data-sets Measures
BBD
BASD2
BASD3
WF
LD
PP
CW
WF
LD
PP
CW
WF
LD
PP
CW
T (IN → LSCC)
27930.01
0.47
0.34
0.01
9152.05
0.46
0.10
0.006
24264.46
0.46
0.20
0.02
T (LSCC → OUT)
423.31
0.48
0.41
0.004
408.71
0.47
0.15
0
3463.02
0.49
0.70
0.002
Table 5: Formality of tweets in
T (IN → LSCC) and
T (LSCC → OUT). Features [4]: (i)
Word Frequency (WF ) measuring
rarity of words, (ii) Lexical Density
(LD) capturing the stylistic
difference between corpora in
terms of the proportion of verbs,
nouns, adjectives and adverbs, (iii)
Personal Pronouns (PP)
measuring the usage of Third
Person Pronouns, and, (iv) Curse
Words (CW ) measuring frequency
of abusing words. Higher values of
LD and PP hints at more formal
communication; whereas WF and
CW has opposite effects.
creation-time of the tweet. The sub-graph induced by tweets
created during (d, d + ∆), G(T(d,d+∆)) allows us to view a
time-slice of the conversation graph. For subsets of users,
U ⊂ U, we let G(U ) denote the sub-graph induced by
vertices in U. Similarly, for a pair of such subsets, (Ui, Uj),
we let T (Ui → Uj) = {t a(t) ∈ Ui, R(t)∩ Uj 6= ∅, t ∈ T }
denote the flow across the cut (Ui, Uj). We summarize all
the conversation graphs in Table 3.
The ASKEWBOWTIE. To begin with, we decompose the
graph into its Strongly Connected Components (SCC). All
pairs of vertices within each SCC enjoy bi-directional
connectivity. We observe that the largest such SCC (dubbed
LSCC) is a giant, accounting for 81.5% of SCC mass
throughout our data-sets. We further decompose G(U,T )
into components according to their reachability to and from
LSCC. For example, all vertices in LSCC are reachable from
all vertices in IN, but not vice-versa. Similarly, all vertices in
OUT are reachable from all vertices in LSCC in a strictly
uni-directional manner. Note that vertices in
TENDRILS enjoy no directed reachability to and from LSCC.
Vertices in DISC are disconnected from rest of the graph. A
schematic of the structure is presented in Figure 1. The
relative sizes of these components across our data-sets are
captured in Table 4. Given the skew of concentration
towards the IN component, we call the structure
ASKEWBOWTIE in what follows.
Next, we study the users that fall into each of these
components.
Components
To understand the components better, we now set out to
investigate the users that fall into different components of
ASKEWBOWTIE.
User Type. First, we study the distributions of different
347
handle-types across components. We observe that, across
our data-sets, majority of the PROMOTER handles fall into
LSCC, whereas, majority of the ADVERSARIAL handles are
concentrated within IN. Given the heavy concentration of
users in IN, we observe a large concentration of handles of
all types, apart from PROMOTER.
User Influence. To study the influence of the users, we use
Klout scores as an estimate. The median influence score
for BBD in LSCC and OUT is 66% and 71% higher than that
of the other components, respectively. This conforms to our
intuition than LSCC and OUT house more influential users
than rest of the graph.
Figure 2: Alluvial diagram depicting the migration of users across
components of the ASKEWBOWTIE over four consecutive days
during BBD. Each colored block represents a different component.
Block size indicates the size of the component, and the shaded
waves joining the blocks represent migrations. The width of the
wave is proportional to the fraction of users that had migrated.
Temporal Dynamics. Here, we study the stability of the
ASKEWBOWTIE by constructing time-slices of the
conversation graph, G(T(d,d+1)), in cumulative fashion at
different days during the promotional event. We see in
SESSION: POSTERS
Figure 3: Cumulative Distribution
Function of the sentiment-scores
for two flows - T (IN → LSCC) and
T (LSCC → OUT) in the
ASKEWBOWTIE (in x-axis, 0 and 1
indicate extreme negative and
extreme positive sentiments
respectively.
Figure 2 that the observed skewness of the
ASKEWBOWTIE structure remains invariant across the days.
TENDRILS tend to be the most unstable among the
components, with 35% of the users inside it eventually
moving to the rest of the components, majority towards IN.
We notice that 51.8% of the users who freshly join the
conversations each day add to IN, followed by 37.2% added
to TENDRILS each day. In contrast, LSCC sees only 4.04%
of the arrivals each day, hinting at the relative stability of the
core of the conversation. From the perspective of the
organizers of these promotional events, the migration of
users to LSCC and OUT indicates increasing engagement
levels.
Flows
Now we turn our attention from the components to the flow
across the components of the ASKEWBOWTIE. In particular,
we seek flow features that discriminate the T (IN → LSCC)
flow from the T (LSCC → OUT).
Opinion. In Figure 3, we plot the cumulative distribution
function of the sentiment-scores of tweets
t ∈ T (IN → LSCC) and t ∈ T (LSCC → OUT). We observe
that the T (IN → LSCC) flow is more negative in general,
barring BASD2 where the overall sentiment was positive,
and BBD where the overall sentiment was predominantly
negative. This conforms to our hypothesis that the
UNHAPPY users that abound in IN are responsible for the
more negative opinions in T (IN → LSCC).
Formality. We turn to study the language of the tweets - in
particular, their degree of adherence to the linguistic
standards. Using the technique proposed in [4], we answer
the question: Is T (LSCC → OUT) more formal than
T (IN → LSCC)? Table 5 summarizes our observations and
demonstrates that communications in T (LSCC → OUT) are
more formal than the communications in T (IN → LSCC),
348
again confirming our hypothesis. This perhaps indicates
that LSCC serves as a refiner of the tweets flowing from
IN to OUT and provides more meaningful information to the
users in OUT.
Conclusions and Future Work
In this paper, we weaved together all the conversations
around large-scale e-commerce promotional events in
Twitter into a conversation graph, and found that the graph
demonstrates a stable ASKEWBOWTIE structure. We
believe that the insights regarding structure and temporal
dynamics of the Conversation Graph obtained through this
study would help design better Social Relationship
Management tools, which is our penultimate goal.
References
[1] Andrei Broder, Ravi Kumar, Farzin Maghoul,
Prabhakar Raghavan, Sridhar Rajagopalan, Raymie
Stata, Andrew Tomkins, and Janet Wiener. 2000.
Graph Structure in the Web. Comput. Netw. 33, 6
(2000), 309 -- 320.
[2] Flavio Chierichetti, Jon Kleinberg, Ravi Kumar,
Mohammad Mahdian, and Sandeep Pandey. 2014.
Event detection via communication pattern analysis. In
AAAI. 51 -- 60.
[3] Peter Cogan, Matthew Andrews, Milan Bradonjic,
W Sean Kennedy, Alessandra Sala, and Gabriel Tucci.
2012. Reconstruction and analysis of twitter
conversation graphs. In HotSocial. ACM, 25 -- 31.
[4] Yuheng Hu, Kartik Talamadupula, and Subbarao
Kambhampati. 2013. Dude, srsly?: The Surprisingly
Formal Nature of Twitter's Language. In ICWSM.
Cambridge, USA, 244 -- 253.
[5] Saif M Mohammad, Svetlana Kiritchenko, and Xiaodan
Zhu. 2013. NRC-Canada: Building the state-of-the-art
in sentiment analysis of tweets. In SEM. 321 -- 327.
|
1308.3831 | 3 | 1308 | 2013-11-20T02:31:23 | Strict majority bootstrap percolation in the r-wheel | [
"cs.SI",
"math.PR"
] | In this paper we study the strict majority bootstrap percolation process on graphs. Vertices may be active or passive. Initially, active vertices are chosen independently with probability p. Each passive vertex becomes active if at least half of its neighbors are active (and thereafter never changes its state). If at the end of the process all vertices become active then we say that the initial set of active vertices percolates on the graph. We address the problem of finding graphs for which percolation is likely to occur for small values of p. Specifically, we study a graph that we call r-wheel: a ring of n vertices augmented with a universal vertex where each vertex in the ring is connected to its r closest neighbors to the left and to its r closest neighbors to the right. We prove that the critical probability is 1/4. In other words, if p>1/4 then for large values of r percolation occurs with probability arbitrarily close to 1 as n goes to infinity. On the other hand, if p<1/4 then the probability of percolation is bounded away from 1. | cs.SI | cs |
Strict majority bootstrap percolation in the r-wheel∗
M. Kiwia, P. Moisset de Espan´esa, I. Rapaporta,∗, S. Ricab, G. Theyssierc
aDIM, CMM (UMI 2807 CNRS), Universidad de Chile
bFacultad de Ingenier´ıa y Ciencias, Universidad Adolfo Ib´anez
cLAMA, Universit´e de Savoie, CNRS, France
Abstract
In the strict Majority Bootstrap Percolation process each passive vertex v be-
comes active if at least ⌈ deg(v)+1
⌉ of its neighbors are active (and thereafter
2
never changes its state). We address the problem of finding graphs for which a
small proportion of initial active vertices are likely to eventually make all ver-
tices active. We study the problem on a ring of n vertices augmented with a
"central" vertex u. Each vertex in the ring, besides being connected to u, is
connected to its r closest neighbors to the left and to the right. We prove that
if vertices are initially active with probability p > 1/4 then, for large values of
r, percolation occurs with probability arbitrarily close to 1 as n → ∞. Also, if
p < 1/4, then the probability of percolation is bounded away from 1.
Keywords: bootstrap percolation, interconnection networks.
1. Introduction
Consider the following deterministic process on a graph G = (V, E). Initially,
every vertex in V can be either active or passive. A passive vertex v becomes
active iff at least k of its neighbors are already active; once active, a vertex never
changes its state. This process is known as k-neighbor bootstrap percolation [4].
If at the end of the process all vertices are active, then we say that the initial
set of active vertices percolates. We wish to determine the minimum ratio of
initial active vertices needed to achieve percolation with high probability. More
precisely, suppose that the elements of the initial set of active vertices A ⊆ V
∗Corresponding author ([email protected]).
∗Supported by CONICYT via Basal (M.K.,P.M.,I.R), N´ucleo Milenio ICM/FI P10-024F
(M.K.,I.R.), Fondecyt 1130061 (I.R.), Fondecyt 1130709 (S.R.), ANR-09-BLAN-0164 (G.T.).
Preprint submitted to Elsevier
October 18, 2018
are chosen independently with probability p. The problem is finding the least p
for which percolation of A is likely to occur.
Since its introduction by Chalupa et al [4], the bootstrap percolation process
has mainly been studied in the d-dimensional grid [n]d = {1, . . . , n}d [1]. The
precise definition of critical probability that has been used is the following:
pc([n]d, k) = inf{p ∈ [0, 1] : Pp(cid:0)A percolates [n]d(cid:1) ≥ 1/2}.
In [1] it is proved that, for every d ≥ k ≥ 2, pc([n]d, k) =(cid:16) λ(d,k)+o(1)
log(k−1) n (cid:17)d−k+1
,
where λ(d, k) < ∞ are equal to the values of specific definite integrals for every
d ≥ k ≥ 2.
In the (simple) Majority Bootstrap Percolation (simple MBP)
process (introduced in [2]) each passive vertex v becomes active iff at least
⌈ deg(v)
⌉ of its neighbors are active, where deg(v) denotes the degree of vertex
2
v in G. Note that for [n]d, the critical probability for simple MBP percolation
corresponds to pc([n]d, d), which goes to 0 as n → ∞.
Here we introduce the strict Majority Bootstrap Percolation (strict MBP)
process: each passive vertex v becomes active iff at least ⌈ deg(v)+1
2
⌉ of its neigh-
bors are active. Note that if deg(v) is odd, then strict and simple MBP coincide.
For [n]d the critical probability in strict MBP pc([n]d, d+1) goes to 1. This holds
because, in this case, any unit hypercube starting with its 2d corners passive
will stay passive forever.
A natural problem is finding graphs for which the critical probability in the
strict MBP is small. Results by Balogh and Pittel [3] imply that the critical
probability of the strict MBP for random 7-regular graphs is 0.269. In [6], two
families of graphs for which the critical probability is also small (but higher
than 0.269) are explored. The idea behind these constructions is the following.
Consider a regular graph of even degree G. Let G ∗ u denote the graph G
augmented with a single universal vertex u. The strict MBP dynamics on G ∗ u
has two phases. In the first phase, assuming that vertex u is not initially active,
the dynamics restricted to G corresponds to the strict MBP. If more than half
of the vertices of G become active, then the universal vertex u also becomes
active, and the second phase begins. In this new phase, the dynamics restricted
to G follows the simple MBP (and full activation becomes much more likely to
occur).
2
The two augmented graphs studied in [6] were the wheel WHn = u ∗ Rn
and the toroidal grid plus a universal vertex TWHn = u ∗ R2
n (where Rn is the
n is the toroidal grid on n2 vertices). For a family of
ring on n vertices and R2
graphs G = (Gn)n, the following parameter was defined (as before, A denotes
the initial set of active vertices):
p+
c (G) = infnp ∈ [0, 1] : lim inf
n→∞
Pp (A percolates Gn in strict MBP) = 1o .
Consider the families WH = (WHn)n and T WH = (TWHn)n.
It was
proved in [6] that p+
c (WH) = 0.4030.... For the toroidal case it was shown that
0.35 ≤ p+
c (T WH) ≤ 0.372. Computing the critical probability for the wheel is
trivial. Nevertheless, if we increase the radius of the vertices, then the situation
becomes much more complicated. More precisely, let Rn(r) be the ring where
every vertex is connected to its r closest vertices to the left and to its r closest
vertices to the right. Here we study the strict MBP process in a generalization
of the wheel that we call r-wheel WHn(r) = u ∗ Rn(r). Our main result is the
following:
Theorem 1. The limit of p+
c (WH(r)), as r → ∞, exists and equals 1/4.
2. Preliminary results
We start by showing that we can reduce our problem to the issue of whether
a single fixed (non-universal) vertex eventually becomes active.
Lemma 2. Let 0 < p < 1 be the probability for a vertex to be initially active.
Let r be a positive integer. Denote by pW (n, r, p) the percolation probability of
the r-wheel and denote by pR(n, r, p) the probability that the strict majority on
Rn(r) ends up with (strictly) more active than passive vertices. Then,
lim inf
n→∞
pR(n, r, p) ≤ lim inf
n→∞
pW (n, r, p),
lim sup
n→∞
pW (n, r, p) ≤ p + (1 − p) · lim sup
n→∞
pR(n, r, p).
Proof. Note that for ǫ > 0 we can choose n large enough so that the probability
that at least one block of r consecutive vertices are initially active is larger than
1 − ǫ, in which case percolation occurs iff the universal vertex becomes active
during the evolution. We deduce the first inequality by taking ǫ arbitrarily small.
3
Note now that the universal vertex is active when the dynamics stabilizes only
if it was either already active initially (probability p) or if it was initially passive
and the dynamics on the ring Rn(r) produces more than n/2 active vertices.
The vertices of the ring Rn will be denoted as 0, 1, . . . , n − 1, starting at
some arbitrary vertex (arithmetic over vertex indices will always be modulo n).
The positive integer r will be called the radius.
Lemma 2 shows that we can study the ring Rn(r) and its dynamics to derive
results about the r-wheel. Now, fix some arbitrary vertex and consider the 0-1
random variable Xi(n, r) giving the state of vertex i after stabilization of the
dynamics (Xi(n, r) = 0 if the state is passive, and Xi(n, r) = 1 if it is active).
Next, we show how to bound pR(n, r, p) in terms of Ep (X0(n, r)).
Lemma 3. Let 0 < p < 1, n ∈ N+, and r a fixed radius. Then,
2Ep (X0(n, r)) − 1 ≤ pR(n, r, p) ≤ 2Ep (X0(n, r)) .
Proof. By definition pR(n, r, p) = Pp (Pi Xi(n, r) > n/2). By Markov's inequal-
ity we then have Pp (Pi Xi(n, r) > n/2) ≤ 2
Ep (Pi Xi(n, r)) . Using linearity
of expectation and the fact that all Xi(n, r) are equally distributed (symmetry
n
of the ring), we deduce pR(n, r, p) ≤ 2Ep (X0(n, r)). The lower bound is ob-
tained in the same way considering again Markov's inequality but for the (again
positive) random variable n −Pi Xi(n, r). More precisely:
pR(n, r, p) = 1 − Pp n −Xi
Xi(n, r) > n/2! ≥ 1 −
2
n
Ep n −Xi
Xi(n, r)!
3. Lower bound on p
+
c (WH(r))
We will assume n > 2r + 1 and that the initial state of the universal vertex u
is passive. Let 0 < p < 1/2 and q = 1 − p. The starting configuration σ =
(σ0, . . . , σn−1), where vertex j is initially active (respectively passive) if and
only if σj = 1 (respectively σj = 0), occurs with probability pPj σj qn−Pj σj .
We write X0 instead of X0(n, r). Conditioning on σ0,
Pp (X0 = 1) ≤ p + Pp (X0 = 1σ0 = 0) .
(1)
4
We say there is a wall located ℓ > 0 vertices to the left of vertex 0 if σ−ℓ = 1,
σ−ℓ−1 = σ−ℓ−2 = . . . = σ−ℓ−(r+1) = 0. Similarly, we say there is a wall located
at ℓ > 0 vertices to the right of vertex 0 if σℓ = 1, σℓ+1 = σℓ+2 = . . . =
σℓ+(r+1) = 0. Let L (respectively R) be the smallest positive ℓ such that there
is a wall located ℓ vertices to the left (respectively right) of vertex 0 (if a wall
does not occur, let L = R = n). For 0 < ∆ < n to be fixed later, and since L
and R are identically distributed, we have that:
Pp (X0 = 1σ0 = 0)
≤ 2 · Pp (X0 = 1, R ≥ ∆σ0 = 0) + Pp (X0 = 1 ∧ L, R < ∆σ0 = 0)
(2)
Summarizing, to bound Ep (X0) = Pp (X0 = 1) we can bound the two terms
in the right hand side of (2). The proof of next lemma is straightforward.
Lemma 4. For 0 < p < 1 and positive integers a, r,
Ep (Rσ0 = σ1 = . . . = σa−1 = 0, σa = 1) ≤ q−r(aqr + 1/(pq)).
Proof. Consider a Markov chain with states labeled 0, 1, . . . , r + 1 where for all
s ≤ r, the probability of going from state s to 0 (respectively s to s + 1) is p
(respectively q), and once state r + 1 is reached, the Markov chain stays there
forever. For s ∈ {0, . . . , r+1}, let Ns be the number of steps it takes the Markov
chain to reach state r + 1 when it starts at state s. Note that
E (Rσ0 = σ1 = . . . = σa−1 = 0, σa = 1) ≤ a + E (N0) .
Moreover, E (Nr+1) = 0, and E (Ns) = 1 + q · E (Ns+1) + p · E (N0) for all
0 < s ≤ r. Thus, for all 0 ≤ s ≤ r + 1,
E (N0) =
1
qj + E (Ns) =
s
Xj=1
1
qj ≤
1
pqr+1 .
r+1
Xj=1
Putting everything together yields the result.
Corollary 5. For 0 < p < 1 and positive integers r, ∆,
Pp (X0 = 1, R ≥ ∆σ0 = 0) ≤ 1
∆ · q−r(rqr + 1/(pq)).
Proof. If vertex 0 eventually becomes active, it must be the case that initially
it did not belong to a block of r + 1 consecutive passive vertices. Thus, if
X0 = 1 and σ0 = 0, then there must exist a positive integer a such that a ≤ r,
5
σ1 = σ2 = . . . = σa−1 = 0, and σa = 1. For brevity, we will denote this
particular array of outcomes for the σ's as Ca. By Markov's inequality,
Pp (X0 = 1, R ≥ ∆σ0 = 0) ≤
Pp (R ≥ ∆Ca) Pp (Ca) ≤
1
∆
max
a=1,...,r
Ep (RCa) .
r
Xa=1
The desired conclusion follows from Lemma 4.
Lemma 6. For 0 < p < 1/2 and positive integers r, ∆,
Pp (X0 = 1 ∧ L, R < ∆σ0 = 0) ≤ 2∆ (4pq)r .
Proof. Suppose the closest wall to the left (respectively right) of vertex 0 is at
vertex −a (respectively b). Furthermore, suppose vertex 0 is passive. Note that
for vertex 0 to eventually become active, it must be the case that some passive
vertex i for −a < i < b must necessarily become active the first time the strict
majority dynamics is applied. Hence, if Si denotes the number of j's, j 6= i and
i − r ≤ j ≤ i + r, for which vertex j initially takes the value 1, then
Pp (X0 = 1 ∧ L, R < ∆σ0 = 0) ≤ Pp (∃i, −∆ < i < ∆s.t.Si ≥ r + 1)
≤ 2∆ max
i:−∆<i<∆
Pp (Si ≥ r + 1) .
However, a Chernoff bound tells us that, for t = 1/2 − p ≤ (r + 1)/(2r) − p,
Pp (Si ≥ r + 1) ≤ Pp (Si ≥ (p + t) · 2r) ≤ (cid:18) p
p + t(cid:19)p+t(cid:18) q
q − t(cid:19)q−t!2r
≤ (4pq)r
Putting everything together yields the conclusion.
Theorem 7. For all 0 < p < 1/4 there exists a large enough integer r0 = r0(p)
such that if r ≥ r0 and n > 2r + 1, then Ep (X0(n, r)) < 1/4.
Proof. Let r′
0 = r′
0(p) be such that r ≥ r′
C = 8r/(pq). By Corollary 5, Pp (X0 = 1, R ≥ Cq−rσ0 = 0) ≤ 2
0 implies that rqr ≤ 1/pq, and let
Cpq = 1
4r .
By (1), and fixing ∆ = Cq−r in (2), and Lemma 6, we obtain that:
Pp (X0 = 1) ≤ p + 1
2r + 2Cq−r(4pq)r = p + 1
2r + 2C(4p)r.
Hence, for p < 1/4 there exists a large enough positive integer r0 = r0(p) ≥ r′
so that if r ≥ r0, then p + 1
2r + 2C(4p)r < p + 1
r < 1/4.
0(p)
Theorem 7, Lemma 3, and Lemma 2 yield the following:
Corollary 8. lim inf r→∞ p+
c (WH(r)) ≥ 1/4.
6
4. Upper bound on p
+
c (WH(r))
Consider a simplified process with three states on the one-dimensional integer
lattice Z: (i) w, a wall, (ii) s, a spreading state, and (iii) e, an empty lattice
point. Let sites in state w and s remain so forever, and in consecutive rounds let
sites in state e with at least one neighbor in state s update to state s. Let pw,
ps and pe be positive initial probabilities of states w, s and e respectively, where
pw + ps + pe = 1. Each lattice point is initially assigned a state, independent of
the other lattice point states.
Lemma 9. The probability that lattice point 0 is eventually in state s is greater
than 1/(1 + pw/ps).
Proof. Define sL (respectively sR) to be state of the closest lattice point on the
left (respectively right) of 0 whose state is not e. Since pe = 1−pw −ps < 1, both
sL and sR are well-defined with probability 1. Let E be the event that lattice
point 0 is eventually in state s, and denote by P its probability of occurring.
Note that for E to occur, either the lattice point 0 is initially in state s, or it is
initially in state e and at least one of the lattice points sL or sR is initially in
state s. Hence, recalling that pe = 1 − pw − ps < 1,
P = ps + pe Xi≥0,j≥0
≥ ps(cid:18)1 +
1
1 + pw/ps
.
pi+j
e
(p2
s + 2pwps) = ps +
ps(ps + 2pw)pe
(1 − pe)2
1 − pw − ps
pw + ps (cid:19) =
We now consider again the strict MBP process in the ring Rn(r) and reduce
it to the aforementioned three-state model as follows: Fix some length ℓ and
partition the vertices of Rn(r) into length ℓ blocks (i.e., sets of ℓ consecutive
vertices, where n = tℓ). Let Wℓ,r be the set of all possible blocks of length
ℓ that contain r + 1 consecutive passive vertices. Also, let Sℓ,r be the set of
all blocks of length ℓ that do not contain r + 1 consecutive passive vertices
and that, for any state configuration for vertices not contained in the block, all
the vertices belonging to the block eventually become active when applying the
strict majority dynamics. Any block in Wℓ,r is a wall in Rn(r) and any block
in Sℓ,r is a spreading state. Any other block is an empty state. Let µ(Wℓ,r)
7
(respectively µ(Sℓ,r)) be the probabilityr that an arbitrary block belongs to Wℓ,r
(respectively Sℓ,r). The following lemma is not difficult to prove:
Lemma 10. For 0 < p < 1 and positive integers r, ℓ,
(i) lim inf n→∞ Ep (X0(n, r)) ≥ 1/(cid:0)1 + µ(Wℓ,r)/µ(Sℓ,r)(cid:1).
(ii) If ℓ ≥ r + 1, then µ(Wℓ,r) ≤ ℓqr+1.
We will now find a lower bound for µ(Sℓ,r). The goal is to prove that µ(Wℓ,r )
µ(Sℓ,r )
goes to 0 when r → ∞. For that purpose we denote, for any 0-1 word v, by
v0 (respectively v1) the number of occurrences of symbol 0 (respectively 1)
in v, and denote the i-th character of v by vi. We set ℓ = 2r + 1 and consider
the set Tr of binary words v of length ℓ satisfying the following properties: (1)
v1 = r + 1,v0 = r; (2) v0 = v2r = 1, vr = 0 and (3) the word w = w1 · · · wr−1
of length r − 1 over alphabet {0, 1}2 defined by wi = (vi, vi+r) is a generalized
Dyck word [5] associated to the weight function ω(a, b) = +1 if (a, b) = (0, 0),
ω(a, b) = −1 if (a, b) = (1, 1) and ω(a, b) = 0 otherwise. I.e., ω satisfies the
i=1 ω(wi) ≥ 0 for all 1 ≤ j ≤ r − 1, and (ii)
following two conditions: (i) Pj
Pr−1
i=1 ω(wi) = 0.
Lemma 11. If r is a positive integer and ℓ = 2r + 1, then Tr ≤ Sℓ,r.
Proof. Consider some v ∈ Tr and denote by w the word of length r − 1 over the
alphabet {0, 1}2 as defined above. We first consider successively each vertex i
of Rn(r), for i = r to i = 2r − 1, and apply the strict majority dynamics to
it. Initially, the state of vertex i is vi. During this first sequence of updates,
we denote by ni the number of 1s in the neighborhood of vertex i at the time
this vertex is considered (i.e., we take into account updates of vertices j < i
which possibly occurred before in the sequence). Since v ∈ Tr, we have that
v1 = r + 1, so at the beginning of the process i = r and nr = r + 1. We claim
that for all i with r ≤ i < 2r − 1, when we consider vertex i + 1 in the process
we have ni+1 − ni = ω(wi+1−r) and the state of vertex i is 1. This claim is
deduced by induction from the fact that i − r is the only vertex of index less
than i + 1 in the symmetric difference of the neighborhoods of vertices i and
i + 1, hence ni+1 − ni = δ+ − δ− where δ+ = 1 if vertex i was updated from 0 to
1 in the previous step and 0 otherwise, and δ− = 1 if vi−r = 1 and 0 otherwise.
Using the induction hypothesis for all j ≤ i, by the Dyck property of w, we
8
have ni = nr +Pi−r
j=1 ω(wj) ≥ nr = r + 1. Hence, if vertex i was 0 before being
considered (vi = 0), it updates to 1 when considered. In any case vertex i is
1 once considered in the process. Moreover, we have δ+ = 1 iff vi = 0 and we
deduce that δ+ − δ− = ω(wi+1−r), thus establishing the claim.
Now, from the claim, we deduce that all vertices from i = r to i = 2r are
active when the sequence of updates ends. Then, we consider a new sequence
of updates from vertex i = r − 1 to vertex i = 1 (successively). Trivially, when
vertex i is considered, its neighborhood contains at least r + 1 active vertices
(because the neighborhood of vertex i contains the active vertices 0 and vertices
i + 1, . . . , i + r). Hence, all vertices will be active at the end of this second
sequence of updates. This completes the proof of the lemma.
Theorem 12. If 1 > p > 1/4, then there is an r0 = r0(p) such that for all
r ≥ r0 we have: limn→∞ Ep (X0(n, r)) = 1.
Proof. First, we claim that there is some positive rational function φ(·) such
that Tr ≥ φ(r) · 4r for all r. To prove this, choose r = 4k + 1 (this is without
loss of generality since r 7→ Tr is increasing). It is straightforward to associate
injectively a word v ∈ Tr to any word w of length r − 1 = 4k over alphabet
{0, 1}2 which is a generalized Dyck word associated to the weight function ω
as defined before. To obtain a lower bound on the number of such generalized
Dyck words, we consider the subset Uk of words w of length 4k over the al-
phabet {0, 1}2 and such that (cid:12)(cid:12)(cid:8)i : ω(wi) = +1(cid:9)(cid:12)(cid:12) =(cid:12)(cid:12)(cid:8)i : ω(wi) = −1(cid:9)(cid:12)(cid:12) = k and
(cid:12)(cid:12)(cid:8)i : ω(wi) = 0(cid:9)(cid:12)(cid:12) = 2k. The set Uk can be generated, up to a straightforward
interleaved by binary words of size 2k. Therefore, Tr ≥ D2k ·(cid:0)4k
2k(cid:1)22k. Using
rational functions φ1 and φ2 we have D2k ∼ φ1(k) · 4k and(cid:0)4k
2k(cid:1) ∼ φ2(k) · 42k. It
follows that there is some positive rational function φ such that Tr ≥ φ(r) · 4r.
encoding, by considering classical Dyck words of length 2k (weights +1/−1)
classical results about Catalan numbers and Stirling's formula, for some positive
This establishes the claim.
By Lemma 11, for some positive rational function φ it holds that µ(Sℓ,r) ≥
φ(r) · qrpr+14r. By Lemma 10 (ii), µ(Wℓ,r )
µ(Sℓ,r)
is asymptotically less than Φ(r) ·
(4p)−r, where Φ(·) is another positive rational function.
If p > 1/4 then
µ(Wℓ,r)/µ(Sℓ,r) goes to 0 when r → ∞. The theorem follows from Lemma 10
(i).
9
It follows that lim supr→∞ p+
c (WH(r)) ≤ 1/4 and, invoking Corollary 8, we
conclude that limr→∞ p+
c (WH(r)) = 1/4.
References
[1] J. Balogh, B. Bollob´as, H. Duminil-Copin and R. Morris. The
sharp
threshold
for
bootstrap
percolation
in
all
dimensions.
Trans. Amer. Math. Soc. 364:2667-2701 (2012).
[2] J. Balogh, B. Bollob´as and R. Morris. Majority bootstrap percolation on the
hypercube. Combin. Probab. Comput. 18:17-51 (2009).
[3] J. Balogh and B. Pittel. Bootstrap percolation on the random regular graph.
Random Structures & Algorithms 30(1-2):257-286 (2007).
[4] J. Chalupa, P. L. Leath and G. R. Reich. Bootstrap percolation on a Bethe
lattice. J. Phys. C: Solid State Phys. 12:L31-L35 (1979).
[5] P. Duchon. On the enumeration and generation of generalized Dyck words.
Discrete Math. 225(1-3):121-135 (2000).
[6] I. Rapaport, K. Suchan, I. Todinca and J. Verstraete. On dissemination
thresholds in regular and irregular graph classes. Algorithmica 59:16-34
(2011).
10
|
1612.03639 | 1 | 1612 | 2016-12-12T12:10:28 | Connection Discovery using Shared Images by Gaussian Relational Topic Model | [
"cs.SI",
"cs.IR"
] | Social graphs, representing online friendships among users, are one of the fundamental types of data for many applications, such as recommendation, virality prediction and marketing in social media. However, this data may be unavailable due to the privacy concerns of users, or kept private by social network operators, which makes such applications difficult. Inferring user interests and discovering user connections through their shared multimedia content has attracted more and more attention in recent years. This paper proposes a Gaussian relational topic model for connection discovery using user shared images in social media. The proposed model not only models user interests as latent variables through their shared images, but also considers the connections between users as a result of their shared images. It explicitly relates user shared images to user connections in a hierarchical, systematic and supervisory way and provides an end-to-end solution for the problem. This paper also derives efficient variational inference and learning algorithms for the posterior of the latent variables and model parameters. It is demonstrated through experiments with over 200k images from Flickr that the proposed method significantly outperforms the methods in previous works. | cs.SI | cs | Connection Discovery using Shared Images by Gaussian Relational Topic Model
Xiaopeng Li∗, Ming Cheung†, James She‡
∗†‡HKUST-NIE Social Media Lab, Hong Kong University of Science & Technology, Hong Kong
∗[email protected], †[email protected], ‡[email protected]
6
1
0
2
c
e
D
2
1
]
I
S
.
s
c
[
1
v
9
3
6
3
0
.
2
1
6
1
:
v
i
X
r
a
Abstract -- Social graphs, representing online friendships
among users, are one of the fundamental types of data for
many applications, such as recommendation, virality prediction
and marketing in social media. However, this data may be
unavailable due to the privacy concerns of users, or kept private
by social network operators, which makes such applications
difficult. Inferring users' interests and discovering users' con-
nections through their shared multimedia content has attracted
more and more attention in recent years. This paper proposes a
Gaussian relational topic model for connection discovery using
user shared images in social media. The proposed model not
only models users' interests as latent variables through their
shared images, but also considers the connections between users
as a result of their shared images. It explicitly relates user
shared images to user connections in a hierarchical, systematic
and supervisory way and provides an end-to-end solution
for the problem. This paper also derives efficient variational
inference and learning algorithms for the posterior of the
latent variables and model parameters. It is demonstrated
through experiments with over 200k images from Flickr that
the proposed method significantly outperforms the methods in
previous works.
Keywords-Bayesian, topic model, variational inference, user
shared images, connection, discovery, recommendation, social
network analysis.
I. INTRODUCTION
Social graphs (SGs),
representing online friendships
among users, are fundamental data for many applications,
such as recommendation, virality prediction and marketing
in social media. However, this data may be unavailable due
to the privacy concerns of users, or kept private by social net-
work operators, and these applications become challenging
with an incomplete set of data. Providing a potential solution
to this problem, user connections are also reflected in the
abundant social content, especially images, shared on social
networks. Inferring users' interests and discovering users'
connections through their shared multimedia content has
attracted more and more attention in recent years. A common
but unreliable approach is using user annotated tags (or
user tagging) associated with each shared image to discover
user connections when the SG is not accessible. However,
user annotated tags may be unavailable or images may be
incorrectly labeled, as shown in Fig. 1. Instead of indirectly
taking the image content information through tags, a more
direct method is to consider the image's visual content.
Users with connections of follower/followee relationships
Figure 1: Examples of user shared images, image tags, user
interest reflected and user connections.
are found to have relatively higher visual content similarities
among their shared images. An simplistic example of user
generated images on Flickr is shown in Fig. 1: Both users A
and B share images of cars and user C shares an image of a
flower. The follower/followee relationship between users A
and B can possibly be detected from the higher similarity
of visual features in their shared images. When more shared
images from each of users A, B and C are accessible for
evaluation, the actual follower/followee relationships should
become reliably and accurately detectable, though such a
task is becoming challenging with the number of shared
images and user connections in social networks growing
larger every day.
The effectiveness of connection discovery using user
shared images is mainly determined by two elements: effec-
tive extraction of information from images and an effective
method to connect the image content to user connections. On
the one hand, with the recent development of convolutional
neural network (CNN), the analysis and understanding of
image content has become much more effective [1] through
hierarchical representation, closing the semantic gap be-
tween pixels and content. It is therefore possible to extract
rich image content information through CNN. On the other
hand, how to effectively discover user connections using
the image content remains a challenge. Summarizing the
#Race #Car#Sar#Awesome#Car #AwesomeUser SharedImages:Users:ABCTags:User Connections:ABCUser Interests:CarFlowerCarFlowerCarFlowermethods or frameworks proposed in previous works such
as [2], [3], [4] and [5], the process is generally divided into
two stages: first, construction of user profile by counting the
occurrences of image labels or summing the image feature
vectors, and second, prediction of connections between users
based on the constructed user profile. The limitation of these
methods is two-fold. First, aggregating all items in a simple
way for each user might not be solid enough to capture
users' interests. An analogy can be found in text analytics,
where the bag-of-words model is compared with topic mod-
els, especially latent Dirichlet allocation (LDA)[6]. Second,
user profiling through images is completely separated from
connection discovery. Separating the two potentially results
in untight relatedness of image content and social links,
meaning that the observation of partial social links lends
no help toward connection discovery using image content.
In this paper, a Gaussian relational topic model (GRTM) is
proposed for connection discovery using user shared images
in order to overcome the abovementioned limitations. GRTM
is an end-to-end hierarchical model specifically designed to
not only model users' interests through image content but
also to supervise the modeling in such a way that the content
of shared images is statistically connected to the links
between users, inspired by hierarchical relational model in
text document domain [7]. GRTM effectively extracts rich
image content information through CNN and models each
semantic topic as a Gaussian topic. GRTM also models each
user's interests as a latent factor and assumes that the action
of the user sharing an image is probabilistically motivated by
his or her interests. Furthermore, the links between users are
modeled based on the images each user shares. Combining
these in a coherent probabilistic generative process,
the
proposed GRTM provides a systematic way to close the
gap between the actions of users sharing images and users
connecting to each other. The main contributions of this
paper are the following:
• proposes an end-to-end Gaussian relational topic model
for connection discovery using user shared images,
closely relating user shared image content
to user
connections.
• derives efficient variational inference for the proposed
model to approximate the posterior of latent variables
and learn model parameters.
• evaluates the performance of the proposed model with
real data and proves the significantly better performance
of the proposed method.
The rest of the paper is organized as follows. Section II
discusses previous works. Section III introduces the GRTM
for connection discovery using shared images. Section IV
describes in detail the inference of latent variables and model
parameters, as well as the prediction method. Section V
presents experimental results and discussion, and Section
VII concludes the paper.
II. RELATED WORKS
One content-based approach to discover connections
through images is to generate a label for an image based on
its visual elements [8][9]. However, determining the relation-
ship between the visual elements and the label is not a trivial
task because the same object can be visually different among
images, and denoting each image by a single label loses a
lot of information. [2] and [10] propose to first generate
labels for user shared images by clustering and describe
users' characteristics by counting the occurrences of image
clusters appearing in their collections. The prediction is then
made through analyzing the similarities among the users'
histograms. Both methods assume each image contains one
and only one topic, neglecting potentially rich information.
On the other hand, [3] and [4] represent users' interests
by summing the feature vectors of their images, achieving
a similar effect to the other methods. However, all these
methods do not actually connect shared images to the links
between users, or only connect shared images to links, and
not the other way around.
Relational topic model was first proposed in [7] for docu-
ment networks in the text analytics domain. It is an extension
of the latent Dirichlet model (LDA) [6] and supervised
LDA [11]. This family of approaches model each document
as topic proportions, and each word in the document is
drawn from a set of topics, which are distributions over
a fixed vocabulary. Furthermore, the relational topic model
models the links between documents as a binary random
variable that is conditioned on their contents. More recent
papers, [12] and [13], share a similar methodology with
this paper, also proposing a hierarchical
to
process user images and infer users' interest as latent factors
from Bayesian inference. However, [12] starts with low-
level pixels and describes image regions with visual words,
while [13] models the visual descriptor as drawn from a
vocabulary, just like in the text domain. Also, [12] considers
no social information and hence, as with other works, does
not relate image content to user relationships for connection
discovery, and [13] considers the social influence of existing
links to the users rather than predicting new ones. Our
work extracts rich information of image content through
CNN and models users' interests and users' connections
simutaneously. As an end-to-end model, ours closely relates
users' connections to user shared images, with the goal being
connection discovery.
topic model
III. THE PROPOSED MODEL FOR CONNECTION
DISCOVERY USING SHARED IMAGES
This section introduces the problem of connection dis-
covery using shared images and the proposed Gaussian
relational topic model. Given a social network, there are
N users, {u1, u2, . . . , uN}. Each of the users, u, shares a
collection of images, Iu = {xu,1, xu,2, . . . , xu,Nu}, where
Nu is the number of images the user u shares and xu,n is the
Figure 3: CNN feature extraction for images and Gaussian
topic
ii) Draw the image xu,nzu,n,{µ, Σ}1:K ∼
N (µzu,n , Σzu,n ).
2) For each pair of users u, v:
a) Draw binary link indicator between users
yzu, zv ∼ ψ(·zu, zv).
Fig. 2 illustrates the graphical model for the generative
process. Assuming there are a total of K topics, generating
an image is done by first picking the topic it belongs to. The
apparent choice of distribution for picking the topic assign-
ment zu,n from K possible values is multinomial distribu-
tion, parameterized by the k-dimensional user preference θu.
The conjugate prior for multinomial distribution is Dirichlet
distribution. Therefore, the user preference θu is assumed to
be drawn from Dirichlet distribution, parameterized by α.
Under each topic, an image is assumed to be drawn from
a multivariate Gaussian distribution, parameterized by mean
µ and covariance Σ:
k=1
p(xu,nzu,n,{µ, Σ}1:K) =
N (xu,nµk, Σk)1(zu,n=k).
(1)
where 1(·) is an indicator function. Therefore, given the pa-
rameters α and topic distribution {µ, Σ}1:K, the generative
probability of a user shared image is given by
p(xu,n,zu,n, θuα,{µ, Σ}1:K)
= p(θuα)p(zu,nθu)p(xu,nzu,n,{µ, Σ}1:K).
(2)
Given two users and the topic assignments of all their
images, the link between the two users is determined by
the link probability function ψ. Specifically, the exponential
function is adopted due to the linear form of the log
likelihood [7]:
K(cid:89)
(cid:80)
ψ(y = 1zu, zv) = exp(ηT ( ¯zu ◦ ¯zv) + ν),
(3)
where ¯zu = 1
notation ◦ denotes the element-wise product.
Nu
n zu,n, η and ν are parameters, and the
The overall joint likelihood of the observation, i.e., the
user shared images and links between users, and the latent
variables, i.e., the user preference and topic assignment, is
Figure 2: The proposed Gaussian Relational Topic Model
(GRTM) (shaded nodes are observed.)
nth image shared by the user u. The connections between
users are not available due to privacy concerns or proprietary
information protection. However, the connections can still
be discovered through the images shared by the users. The
objective is to predict the possible connections between users
based on the user shared images.
The proposed GRTM model, is based on Gaussian mixture
model and relational topic model, as shown in Fig. 2. It is a
generative probabilistic model in which a user is described
by a topic distribution that is reflected through his or her
collection of shared images. It models that the action of a
user sharing an image follows a generative process: a user's
preferences or the topic proportion in his or her collections
is generated through a Dirichlet-distributed vector, and he
shares an image by first drawing a topic assignment from
his or her preferences then drawing an image from the
corresponding topic distribution. Unlike LDA and relational
topic model, where text documents are the context and words
are generated from a vocabulary, this paper extracts rich
information from images through a pre-trained CNN and
Gaussian topic is adopted in order to consider and preserve
the rich information of the images, as shown in Fig. 3. The
links between users are then modeled as binary variables
and are determined by the users' preferences. In this way,
the user shared images and the links between users are
statistically connected.
Formally, the generative process of the proposed GRTM
is as follows:
1) For each user u:
a) Draw topic proportions θuα ∼ Dir(α).
b) For each image xu,n:
i) Draw topic assignment zu,nθu ∼ M ult(θu).
zu,nθuxu,nNuzv,nθvxv,nNvKyu,v!,#$%,Σ%'xu,nxv,nyu,vuseruser shared image…RdGaussian TopicConvolutional Neural Network(cid:89)
determined by
(cid:89)
p(U, y, θ, zα,{µ, Σ}1:K) =
p(θuα)
p(zu,nθu)p(xu,nzu,n,{µ, Σ}1:K)
(cid:89)
u
n
(u,v)
p(yzu, zv).
(4)
IV. INFERENCE, ESTIMATION AND PREDICTION
In this section, the Bayesian variational inference for the
proposed GRTM is presented.
A. Inference
The posterior distribution of the latent variables and
parameters given the observations and topic parameters is
inferred by:
p(θ, z, η, νU, y, α,{µ, Σ}1:K)
(cid:82)(cid:80)
=
p(U, y, θ, zα,{µ, Σ}1:K)
p(U, y, θ, zα,{µ, Σ}1:K)dθ
zu,n
(5)
.
The exact posterior, however, is intractable since the denom-
enator involves a complex summation and integral. Instead,
like previous works, variational inference with free parame-
ters is used to approximate the exact posterior. Specifically,
the mean field approximation with the form
(cid:89)
(cid:89)
q(θ, zγ, φ) =
qu(θuγu)
qz(zu,nφu,n)
(6)
u
n
is used to approximate the posterior p of θ and z. And the
goal is to minimize the Kullback-Leibler (KL) divergence
between the approximation and the exact posterior. Equiva-
lently, we try to maximize the variational free energy, which
is the evidence lower bound of the log marginal probability
of the observations:
L =
Eq[log p(xu,nzu,n,{µ, Σ}1:K)]
u
n
(cid:88)
(cid:88)
(cid:88)
(cid:88)
−(cid:88)
Eq[log qθ(θuγu)] −(cid:88)
(cid:88)
Eq[log p(zu,nθu)] +
Eq[log p(yu,vzu,v, η, ν)].
+
+
n
u
u
u
(cid:88)
(cid:88)
u
n
Eq[log p(θuα)]
Eq[log qz(zu,nφu,n)]
(u,v)
B. Estimation
(7)
Having the evidence lower bound of the log likelihood, the
maximization of the lower bound can be achieved through
coordinate ascent, where each variable is iteratively updated
assuming all others are fixed, until convergence. By taking
the derivative of the evidence lower bound in Eq. 7, subject
to the sum-to-one constraint, the update of the free parameter
φ is
φu,n,k ∝ exp(log N (xu,nµk, Σk) + Ψ(γi) − Ψ(
K(cid:88)
γj)
(cid:88)
+
vyu,v=1
j=1
η ◦ ¯φv
Nu
),
(cid:80)
(8)
n φv,n. And the normalization
where ¯φv = Eq[¯zv] = 1
Nv
term is the sum over all K.
γ is
Nu(cid:88)
With a similar method, the update of the free parameter
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
u
γu,k = αk +
(9)
Isolating the terms involving {µ, Σ}1:K in the lower
bound and taking the derivative, the update of the topic
parameters {µ, Σ}1:K is
φu,n,k.
n=1
(cid:80)
u
Σk =
n φu,n,kxu,n
(cid:80)
µk =
n φu,n,k(xu,n − µk)(xu,n − µk)T
n φu,n,k
u
,
(10)
.
(11)
u
n φu,n,k
It would be inappropriate to regard all links except ob-
served positive links as negative training examples since
there might be positive but unobserved links between users,
which is expected to predict. Therefore, following [7], we
use a regularization penalty parameterized by ρ for the
negative observations. And the updates of the link function
are conducted analytically by
ν ← log(M − 1T ¯Π) − log(ρ(1 − 1
K
ρ
) + M − 1T ¯Π), (12)
K 2 1 − 1ν),
η ← log( ¯Π) − log( ¯Π +
(13)
where M =(cid:80)
and ¯πu,v = 1
Nu
C. Prediction
1(yu,v = 1), ¯Π =(cid:80)
(cid:80)
n φu,n ◦ 1
(cid:80)
n φv,n.
u,v
Nv
u,v ¯πu,v 1(yu,v = 1)
With all the variational parameters estimated, the link
between two users given their shared collection of images
can be predicted. The variational Bayesian prediction is
given by:
p(yu,vxu, xv) = Eq[p(yu,v¯zu, ¯zv)].
it still
involves complicated summations over
However,
all possible z for all the images considered. Instead, we
perform plug-in approximation and substitute all z with its
variational expectation. Hence, the predictive probability is
approximated with
(14)
p(yu,vxu, xv) = exp(ηT ¯πu,v + ν),
(15)
where ¯πu,v = 1
Nu
n φu,n ◦ 1
Nv
n φv,n.
(cid:80)
(cid:80)
V. EXPERIMENTAL RESULTS
In this section, experiments are conducted to investigate
the effectiveness of the proposed GRTM for connection
discovery using user shared images.
A. Dataset and Experimental Setup
A set of 201,006 images uploaded by 542 users are
scraped from Flickr, an online social network for image
sharing, with millions of images uploaded. The 542 users
are selected randomly from images under the same tag query
page to provide diversity. The average number of shared
images for each user is 370, covering diverse content, and
there are 902 connections among the 542 users. The images
are processed by GoogLeNet [14], pretrained using the
ILSVRC 2014 dataset, for image representation, so that rich
semantic information can be extracted. The links between
users are divided into two parts: 60% of the links are used
for training and 40% of the links are used for testing. Using
the user shared images and training links, the latent variables
and model parameters of the GRTM are estimated through
an iterative process, as described in the previous section.
Using Eq. 15, the testing process is then undertaken to
predict the probability of the links existing between users
, excluding the observed training links, and the results are
then compared with the groundtruth of the testing links. The
Dirichlet hyperparameter α is set to 2.0, and the number
of topics is set to be 100 in our experiment. Though the
number of topics has some influence to some extent, the
overall performance does not vary much.
As a comparison with previous works on similar applica-
tions, the Mean method from [4] where users' profiles are
constructed through their shared images by taking the mean
features of all the images, and the BoFT method [2] where
users' profiles are obtained by counting the occurrences of
cluster labels in users' collections obtained through image
clustering, are implemented. The prediction of user connec-
tions is thus conducted through computing the similarity
between users. And instead of using the scale invariant
feature transform (SIFT) for image feature extraction, CNN
(GoogLeNet) features are used.
B. Results
The prediction performance of the Mean method, BoFT
method and proposed GRTM is shown in Fig. 4, where
both the receiver operating characteristic (ROC) curve and
precision-recall curve are plotted. The ROC curve is the
function of true positive rate (TPR) and false positive rate
(FPR) and is used to measure how well the model can
distinguish whether two users are friends or not. As it is
shown, the ROC curve of the GRTM clearly dominates
the other two methods. For example, for the point in the
ROC curve with TPR of 0.8, given a pair of users with a
true friendship, GRTM has 80% probability of predicting it
correctly, while given a pair of users without a friendship,
Figure 4: ROC curve for Mean method [4], BoFT method
[2] and proposed GRTM.
Figure 5: Precision-Recall curve for Mean method [4], BoFT
method [2] and proposed GRTM.
it has 20% probability of predicting it incorrectly. For the
same TPR, however, the BoFT method has 35% probability
of incorrect prediction for users without a friendship, and
Mean method has 45%. Overall, the area under curve (AUC)
for ROC curve of the proposed GRTM is 0.89, while that
of the BoFT method is 0.84 and that of Mean method is
0.78. As an alternative measure, the precision-recall curve,
as shown in Fig. 5, is the function of the precision rate and
recall rate. It measures what fraction of the recommended
candidates are the user's true friends and what fraction of
true friends are recommended. As with the ROC curve, the
precision-recall curve of the proposed GRTM also dominates
the others. For example, for the same recall rate of 10%,
the precision rate of the GRTM is 18%, while that of the
BoFT method is 11% and that of the Mean method is 5.9%.
Overall, the precision-recall AUC of the proposed GRTM is
0.05, while that of the BoFT method is 0.039 and that of
the Mean method is 0.021.
In order to illustrate how the proposed GRTM interprets
the user shared images, some example images are shown
00.20.40.60.8100.20.40.60.81False Positive RateTrue Positive RateROC Curve MeanBoFTGRTM00.20.40.60.8100.20.40.60.81RecallPrecisionPrecision-Recall Curve MeanBoFTGRTMREFERENCES
[1] Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature,
vol. 521, no. 7553, pp. 436 -- 444, 2015.
[2] M. Cheung, J. She, and Z. Jie, "Connection discovery using
big data of user-shared images in social media," Multimedia,
IEEE Transactions on, vol. 17, no. 9, pp. 1417 -- 1428, 2015.
[3] L. Yang, C.-K. Hsieh, and D. Estrin, "Beyond classification:
Latent user interests profiling from visual contents analy-
sis," in International Conference on Data Mining Workshop.
IEEE, 2015, pp. 1410 -- 1416.
[4] J. Zhuang, T. Mei, S. C. Hoi, X.-S. Hua, and S. Li, "Modeling
social strength in social media community via kernel-based
learning," in Proceedings of the 19th International Conference
on Multimedia. ACM, 2011, pp. 113 -- 122.
[5] X. Geng, H. Zhang, Z. Song, Y. Yang, H. Luan, and T.-S.
Chua, "One of a kind: User profiling by social curation,"
in Proceedings of
the ACM International Conference on
Multimedia. ACM, 2014, pp. 567 -- 576.
[6] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent Dirichlet
allocation," Journal of Machine Learning Research, vol. 3,
pp. 993 -- 1022, 2003.
[7] J. Chang and D. M. Blei, "Relational
topic models for
document networks." in AIStats, vol. 9, 2009, pp. 81 -- 88.
[8] E. Moxley, J. Kleban, J. Xu, and B. Manjunath, "Not all
tags are created equal: Learning flickr tag semantics for
global annotation," in Multimedia and Expo, International
Conference on.
IEEE, 2009, pp. 1452 -- 1455.
[9] X. Zhang, X. Zhao, Z. Li, J. Xia, R. Jain, and W. Chao,
"Social image tagging using graph-based reinforcement on
multi-type interrelated objects," Signal Processing, vol. 93,
no. 8, pp. 2178 -- 2189, 2013.
[10] M. Cheung, J. She, and X. Li, "Non-user generated annotation
on user shared images for connection discovery," in Cyber,
Physical and Social Computing, the 8th IEEE Conference on.
IEEE, 2015.
[11] J. D. Mcauliffe and D. M. Blei, "Supervised topic models,"
in Advances in Neural Information Processing Systems, 2008,
pp. 121 -- 128.
[12] P. Xie, Y. Pei, Y. Xie, and E. P. Xing, "Mining user interests
from personal photos." in AAAI. Citeseer, 2015, pp. 1896 --
1902.
[13] J. Sang and C. Xu, "Right buddy makes the difference: An
early exploration of social relation analysis in multimedia
applications," in Proceedings of the 20th ACM International
Conference on Multimedia. ACM, 2012, pp. 19 -- 28.
[14] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov,
D. Erhan, V. Vanhoucke, and A. Rabinovich, "Going deeper
with convolutions," in Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition, 2015, pp. 1 -- 9.
Figure 6: Left: examples of Gaussian topics; Right: examples
of friendship prediction by Mean method, BoFT method and
the proposed GRTM.
in Fig. 6. Since each Gaussian topic is defined by µk and
Σk and each image has a probability under the Gaussian
topic, images that achieve the highest probabilities under
that topic are selected as representatives. As shown in Fig.
6, the semantic meaning of the Gaussian topics, such as
cars, flowers, buildings, race cars and surfing, can be readily
distinguished. The Gaussian topics cover a variety of objects,
scenes, sports, etc. Those images that contain more than
one topic could also be revealed through the probabilities
under different Gaussian topics. It is also noted that ordinary
cars and race cars are separated as different topics, which
is also beneficial to reflect users' preferences for subse-
quent connection discovery. Fig. 6 shows examples of the
friendship prediction results obtained by the three methods.
The example user, A, shares a lot of car images. For
recommendation purposes, all three methods are directed to
recommend 10 friends. As shown in the figure, out of the 10
recommendations, the proposed GRTM successfully predicts
5 of them, whereas the BoFT only successfully predicts 2
and the Mean method successfully predicts 1. Furthmore,
the successful predictions of the other two methods are in
fact a subset of those of the proposed GRTM.
VI. CONCLUSION
This paper proposes a Gaussian relational topic model
(GRTM) for connection discovery using user shared images
in social media. The GRTM not only models users' interests
as latent variables through user shared image content but also
models the connections between users as a result of their
shared images. It explicitly relates user shared images to
the connections between users in a hierarchical, systematic
and supervisory way and provides an end-to-end model for
connection discovery using shared images. It is demonstrated
by experiment that the proposed model significantly outper-
forms the methods in previous works where the modeling
of users' interests and connection discovery are separated.
ACKNOWLEDGMENT
This work is supported by the HKUST-NIE Social Media
Lab., HKUST.
Topic 1Topic 2Topic 3Topic 4Topic 5User AFriend 1Friend 2Friend 3Friend 4Friend 5GRTMBoFTMeanSuccessfully Predicted by:Friends list:(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1) |
1511.09050 | 2 | 1511 | 2016-11-27T12:08:29 | Rank me thou shalln't Compare me | [
"cs.SI"
] | Centrality measures have been defined to quantify the importance of a node in complex networks. The relative importance of a node can be measured using its centrality rank based on the centrality value. In the present work, we predict the degree centrality rank of a node without having the entire network. The proposed method uses degree of the node and some network parameters to predict its rank. These network parameters include network size, minimum, maximum, and average degree of the network. These parameters are estimated using random walk sampling techniques. The proposed method is validated on Barabasi-Albert networks. Simulation results show that the proposed method predicts the rank of higher degree nodes with more accuracy. The average error in the rank prediction is approximately $0.16\%$ of the network size. | cs.SI | cs |
Rank me thou shalln't Compare me
Akrati Saxena, Vaibhav Malik, S. R. S. Iyengar
{akrati.saxena, vaibhav.malik, sudarshan}@iitrpr.ac.in
Department of Computer Science and Engineering,
Indian Institute of Technology Ropar, India
Abstract. Centrality measures have been defined to quantify the im-
portance of a node in complex networks. The relative importance of a
node can be measured using its centrality rank based on the central-
ity value. In the present work, we predict the degree centrality rank of
a node without having the entire network. The proposed method uses
degree of the node and some network parameters to predict its rank.
These network parameters include network size, minimum, maximum,
and average degree of the network. These parameters are estimated us-
ing random walk sampling techniques. The proposed method is validated
on Barabasi-Albert networks. Simulation results show that the proposed
method predicts the rank of higher degree nodes with more accuracy.
The average error in the rank prediction is approximately 0.16% of the
network size.
1
Introduction
Complex networks have attracted researchers from the past few years. Com-
plex networks [1] have been the part of our day to day life such as friendship
networks [2], collaboration networks [3], World Wide Web [4], Internet [5], bi-
ological networks [6], and so on. In complex networks, objects are represented
by nodes and the relationship between a pair of nodes is represented by an edge
connecting them. Researchers have been studying the evolving phenomenon and
properties of these networks for a fairly long time.
All real world complex networks are sparse and follow some properties such
as small world phenomenon (six degrees of separation) [7], scale-free degree dis-
tribution [8], preferential attachment [9], high clustering coefficient [10], etc.
Each property shows a different aspect of these networks. For example, small
world phenomenon shows that no two nodes are far from each other. Real world
networks have high clustering coefficient, that shows how tightly knit a node
is in its neighborhood. In friendship networks, a user has high probability to
be friend with friends of her friends because of high trust factor and frequent
encounters. This gives birth to high clustering coefficient due to the increase in
number of triangular links. The topological structure of complex networks also
has meso-scale properties which include community structure [11], and core-
periphery structure [12, 13].
2
Except these properties, each node also possess some unique characteristics.
These properties can be measured using different centrality metrics. These cen-
trality measures compute the importance of a node under different contexts.
Some of these centrality measures can be computed using local information of
the node like degree centrality [14], and semi-local centrality measure [15]. Others
use global information of the network like closeness centrality [16], betweenness
centrality [17], eigenvector centrality [18], katz centrality [19], pagerank [20],
and so on. The computation of global centrality measures is very costly as they
require entire structure of the network.
These centrality measures assign an index value to each node. But in real life
applications, most of the time actual value is not important, what's important
is where you stand, not with respect to the mean but with respect to everyone
else. For example, in most of the entrance exams, percentile of the candidate is
considered for the shortlisting not the percentage, as percentile tells about the
rank. Similarly in social networks, nodes might be interested in computing their
rank based on different centrality measures.
In the present work, we predict the global rank of a node based on its degree.
The degree of a node denotes the total number of neighbors of the node. In social
networks, the degree rank of a node denotes how popular or strong a node is
in the given network. A node having more neighbors is stronger and has high
rank. Similarly in WWW network, degree rank of a node denotes the relative
importance of a particular article or topic that is associated with the web page.
One simple way to compute the degree rank of a node is, collect the degree
values of all nodes, and compare them to get the rank of the interested node.
This method requires complete structure of the network in hand. But it is not
feasible to collect and store the entire data on a single system, as the size of
complex networks is increasing very fast with time. These networks are highly
dynamic, and the collected dataset needs to be updated regularly. This has
inspired researchers to propose approximation algorithms based on the local
information. The local information of the node or the network can be collected
using various sampling techniques. Authors have used random walk sampling
techniques and its variations to estimate network parameters like network size
[21 -- 25], clustering coefficient [21], average degree [26], online polls [27], etc. These
approaches are storage efficient as a small snapshot of the dataset is collected to
process the request.
In this work, we propose a method to predict the degree rank of a node.
The proposed method uses power law degree distribution characteristic of the
network and few network parameters like network size, maximum, minimum and
average degree of the network. These parameters are estimated using random
walk sampling techniques in pre-processing steps. The network size is estimated
using the method proposed by Hardiman and Katzir [21]. The minimum and
maximum degree is estimated as the minimum and maximum degree available
in the sample. The average degree of the network is estimated using the method
proposed by Dasgupta et al. [26].
3
The proposed method is simulated on BA networks to validate its accu-
racy. The error in the predicted rank is computed as the modular difference of
the actual and the predicted rank. Simulation results show that the proposed
method estimates the rank with high accuracy. We have also proposed a prob-
abilistic method to estimate the degree rank of a node [28]. As per the best of
our knowledge, this is the first work of its kind1. The local estimation of the
global rank can help to identify influential nodes in the network. Identification
of influential nodes has been the core of various research problems like epidemic,
memetics [30], viral marketing, information diffusion [31], opinion formation,
and so on. The rest of this paper is organized as follows. Section 2 describes BA
model followed by the mathematical analysis of degree ranking method. Section
3 contains experimental results and the paper is concluded in section 4.
2 Model and Background
rank of a node u is defined as, Ra(u) = (cid:80)
In this section, we introduce the mathematical analysis to approximate degree
rank of a node. We will use following notations throughout our discussion. Let's
assume that the given graph G has n nodes. Minimum, maximum, and average
degree of the network are represented by kmin, kmax, and davg respectively. All
these parameters are estimated using sampling methods. Degree of a node u is
denoted by ku, that represents total number of neighbors of the node. Degree
v Xvu + 1, where Xvu is 1 when
deg(v) > deg(u) and 0 otherwise. It is also called actual degree rank of the
node in the given network G. The predicted degree rank of a node u is denoted
by Rp(u). Next, we discuss the preferential attachment model (BA model) to
generate scale-free synthetic networks.
2.1 BA Model
Barabasi and Albert proposed an evolutionary preferential attachment model
to generate synthetic networks that follows the properties of real world scale-
free complex networks [8]. This model starts with a seed graph that contains n0
disconnected nodes. At each time stamp, a new node is added and it is connected
with m already existing nodes. The probability (cid:81)(u) of an existing node u to
get a new connection depends on its degree ku. It is defined as,
(cid:81)(u) = ku(cid:80)
v kv
So, the nodes having higher degrees acquire more links over time, thereby
skewing the distribution towards lower degrees. Preferential attachment model
gives rise to power law degree distribution where, the probability f (k) of a node
having degree k is defined as,
1 This work has been published at [29].
4
f (k) = ck−γ
(1)
where, γ is the power law exponent, and for real world scale-free networks its
range is 2 < γ < 3. As the network grows, only a few nodes called hubs manage
to get a large number of links.
2.2 Degree Ranking
In this section, we propose a method to predict degree rank of a node in scale-
free networks. Let's consider a scale-free network G having n nodes that follows
power law degree distribution f . The probability of a node u having degree k is
defined as,
where, f (k) is power law function from equation (1).
P (ku = k) = f (k)
f (k) contains two parameters c and γ. First we compute the value of c. Using
the law of probability, the integration of f (k) from kmin to kmax will be equal to
1, where kmin and kmax are the minimum and maximum degree in the network.
(cid:82) kmax
(cid:82) kmax
kmin
f (k)dk = 1
ck−γdk = 1
c (kmin)1−γ−(kmax)1−γ
kmin
γ−1
= 1
c =
γ−1
(kmin)1−γ−(kmax)1−γ
To compute the value of γ, we use average degree davg of the network, that
can be written as,
After integration,
davg =(cid:82) kmax
davg =(cid:82) kmax
kmin
kmin
kf (k)dk
kck−γdk
davg = c k2−γ
min−k2−γ
max
γ−2
Using value of c, the equation will be,
davg = γ−1
davg = γ−1
max
γ−2 ( k2−γ
min−k2−γ
k1−γ
min−k1−γ
max−kγ−2
γ−2 ( kγ−2
max−kγ−1
kγ−1
max
min
min
)(kmaxkmin)
)(kmaxkmin)
where, kmin << kmax and 2 < γ < 3 for scale-free networks,
max
kγ−2
davg = γ−1
γ−2
kγ−1
davg = γ−1
max
γ−2 kmin
(kminkmax)
5
Now, the rank of a node u having degree ku = k can be estimated as,
i.e. γ = 2 + kmin
davg−kmin
Rp(u) = n − n(cid:82) k
Rp(u) = n − n(cid:82) k
f (k)dk + 1
ck−γdk + 1
kmin
kmin
After integration,
Using value of c,
Rp(u) = n − nc k1−γ−k1−γ
Rp(u) = n − nc k1−γ
min−k1−γ
1−γ
γ−1
min
+ 1
+ 1
+ 1
max
Rp(u) = n − n k1−γ
min−k1−γ
min−k1−γ
k1−γ
Rp(u) = n( k1−γ−k1−γ
min−k1−γ
k1−γ
)k1−γ − (
min−k1−γ
k1−γ
Rp(u) = ak1−γ + b
max
max
max
n
) + 1
nk1−γ
k1−γ
min−k1−γ
max
max
− 1)
Rp(u) = (
where, a =
network.
n
k1−γ
min−k1−γ
max
and b = nk1−γ
max
k1−γ
min−k1−γ
max
− 1. a and b are constants for a given
3 Simulation Results
The proposed method is simulated on BA networks of 100000−500000 nodes. BA
networks are generated with a seed graph having 10 nodes, and each new coming
node makes 10 connections using preferential attachment law. To simulate the
proposed method, we first need to estimate the required network parameters. The
network size is estimated using the method proposed by Hardiman and Katzir
[21], and the average degree is estimated using the method proposed by Dasgupta
et al. [26]. The network size estimation method converges when approximately
1% nodes of the network are sampled. The minimum and maximum degree is
estimated as the minimum and maximum degree available in the sample. To
measure the accuracy of the proposed method, the absolute error is computed
for each degree, that is defined as Absolute Error(k) = Actual Rank(k) −
P redicted Rank(k). The absolute error is averaged over all degrees to compute
the overall error for the network.
6
(a)
(c)
(b)
(d)
(e)
Fig. 1. Plots of actual and estimated rank on log-log scale for BA Network having
a)100000 b)200000 c)300000 d)400000 e)500000 nodes.
In Fig. 1, the actual and the predicted degree rank are plotted for BA net-
works. According to the method, highest degree node has rank 1. It can be
observed in Fig. 1 that the prediction for higher degree nodes is more accurate
than the lower degree nodes. This difference occurs because the power law de-
gree distribution function is integrated from minimum to maximum degree. It
assumes that the nodes of all degrees are present in the network, but it might not
be true for the generated networks. The one more reason is that the generated
networks may not follow perfect power law as per the estimated power law ex-
ponent. Table 1 shows the average error and standard deviation of the predicted
rank for all networks. The results show that the average error is approximately
0.16% of the network size. The average absolute error increases with the network
size, but the percentage average absolute error decreases with the network size.
The percentage average absolute error is computed as, (average absolute error
*100)/network size.
7
Table 1. Error in the Actual and Predicted Ranking
Number of Nodes Average Error Standard Deviation
100000
200000
300000
400000
500000
1833.64
2128.77
2580.50
4531.16
5057.44
335.02
389.63
447.87
600.52
631.58
4 Conclusion
In this work, we have proposed a method to estimate degree centrality rank of
a node without having the entire network. The proposed method is based on
the power law exponent of degree distribution of the network. The simulation
results show that the average error in the predicted rank is around 0.16% of the
network size. We will further validate the accuracy of the proposed method on
real world scale-free networks. This work can be applied to identify influential
nodes in real world networks.
In future, we will extend this work to estimate the lower and upper bound
on degree centrality rank of a node. With time, the size of complex networks is
increasing very fast. It will be of great help, if local information of the network
can be used to estimate the rank of a node based on global centrality measures
such as betweenness centrality, closeness centrality, pagerank, and so on.
References
1. Yaneer Bar-Yam. Dynamics of complex systems, volume 213. Addison-Wesley
Reading, MA, 1997.
2. Stanley Wasserman and Katherine Faust. Social network analysis: Methods and
applications, volume 8. Cambridge university press, 1994.
3. Mark EJ Newman. The structure of scientific collaboration networks. Proceedings
of the National Academy of Sciences, 98(2):404 -- 409, 2001.
4. R´eka Albert, Hawoong Jeong, and Albert-L´aszl´o Barab´asi. Internet: Diameter of
the world-wide web. Nature, 401(6749):130 -- 131, 1999.
5. Bernardo A Huberman and Lada A Adamic.
Internet: growth dynamics of the
world-wide web. Nature, 401(6749):131 -- 131, 1999.
6. Leland H Hartwell, John J Hopfield, Stanislas Leibler, and Andrew W Murray.
From molecular to modular cell biology. Nature, 402:C47 -- C52, 1999.
7. Stanley Milgram. The small world problem. Psychology today, 2(1):60 -- 67, 1967.
8
8. Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence of scaling in random networks.
science, 286(5439):509 -- 512, 1999.
9. Hawoong Jeong, Zoltan N´eda, and Albert-L´aszl´o Barab´asi. Measuring preferential
attachment in evolving networks. EPL (Europhysics Letters), 61(4):567, 2003.
10. Konstantin Klemm and Victor M Eguiluz. Highly clustered scale-free networks.
Physical Review E, 65(3):036123, 2002.
11. Aaron Clauset, Mark EJ Newman, and Cristopher Moore. Finding community
structure in very large networks. Physical review E, 70(6):066111, 2004.
12. Stephen P Borgatti and Martin G Everett. Models of core/periphery structures.
Social networks, 21(4):375 -- 395, 2000.
13. Akrati Saxena and SRS Iyengar. Evolving models for meso-scale structures. In 2016
8th International Conference on Communication Systems and Networks (COM-
SNETS), pages 1 -- 8. IEEE, 2016.
14. Marvin E Shaw. Some effects of unequal distribution of information upon group
performance in various communication nets. Journal of abnormal and social psy-
chology, 49(4):547 -- 553, 1954.
15. Duanbing Chen, Linyuan Lu, Ming-Sheng Shang, Yi-Cheng Zhang, and Tao Zhou.
Identifying influential nodes in complex networks. Physica a: Statistical mechanics
and its applications, 391(4):1777 -- 1787, 2012.
16. Gert Sabidussi. The centrality index of a graph. Psychometrika, 31(4):581 -- 603,
1966.
17. Linton C Freeman. A set of measures of centrality based on betweenness. Sociom-
etry, pages 35 -- 41, 1977.
18. Karen Stephenson and Marvin Zelen. Rethinking centrality: Methods and exam-
ples. Social Networks, 11(1):1 -- 37, 1989.
19. Leo Katz. A new status index derived from sociometric analysis. Psychometrika,
18(1):39 -- 43, 1953.
20. Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual web
search engine in: Seventh international world-wide web conference (www 1998),
april 14-18, 1998, brisbane, australia. Brisbane, Australia, 1998.
21. Stephen J Hardiman and Liran Katzir. Estimating clustering coefficients and size
of social networks via random walk.
In Proceedings of the 22nd international
conference on World Wide Web, pages 539 -- 550. International World Wide Web
Conferences Steering Committee, 2013.
22. Maciej Kurant, Carter T Butts, and Athina Markopoulou. Graph size estimation.
arXiv preprint arXiv:1210.0460, 2012.
23. Liran Katzir, Edo Liberty, and Oren Somekh. Estimating sizes of social networks
via biased sampling. In Proceedings of the 20th international conference on World
wide web, pages 597 -- 606. ACM, 2011.
24. Colin Cooper, Tomasz Radzik, and Yiannis Siantos. Estimating network parame-
ters using random walks. Social Network Analysis and Mining, 4(1):1 -- 19, 2014.
25. Oded Goldreich and Dana Ron. Approximating average parameters of graphs.
Random Structures & Algorithms, 32(4):473 -- 493, 2008.
26. Anirban Dasgupta, Ravi Kumar, and Tamas Sarlos. On estimating the average
degree. In Proceedings of the 23rd international conference on World wide web,
pages 795 -- 806. ACM, 2014.
27. Anirban Dasgupta, Ravi Kumar, and D Sivakumar. Social sampling. In Proceedings
of the 18th ACM SIGKDD international conference on Knowledge discovery and
data mining, pages 235 -- 243. ACM, 2012.
28. Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Estimating the degree centrality
ranking of a node. arXiv preprint arXiv:1511.05732, 2015.
9
29. Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Estimating the degree centrality
In 2016 8th International Conference on Communication Systems and
ranking.
Networks (COMSNETS), pages 1 -- 2. IEEE, 2016.
30. Yayati Gupta, Akrati Saxena, Debarati Das, and SRS Iyengar. Modeling memetics
using edge diversity. In Complex Networks VII, pages 187 -- 198. Springer, 2016.
31. Akrati Saxena, SRS Iyengar, and Yayati Gupta. Understanding spreading patterns
on social networks based on network topology. In 2015 IEEE/ACM International
Conference on Advances in Social Networks Analysis and Mining (ASONAM),
pages 1616 -- 1617. IEEE, 2015.
|
1412.8439 | 3 | 1412 | 2015-04-26T03:50:07 | Spy vs. Spy: Rumor Source Obfuscation | [
"cs.SI",
"cs.LG"
] | Anonymous messaging platforms, such as Secret and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we consider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying contact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles. We further consider a stronger adversarial model where a subset of colluding users track the reception of messages. We show that the adaptive diffusion provides a strong protection of the anonymity of the source even under this scenario. | cs.SI | cs | Spy vs. Spy: Rumor Source Obfuscation
Giulia Fanti
University of California,
Berkeley
[email protected]
Peter Kairouz
University of Illinois at
Urbana-Champaign
[email protected]
Pramod Viswanath
University of Illinois at
Urbana-Champaign
[email protected]
Sewoong Oh
University of Illinois at
Urbana-Champaign
[email protected]
5
1
0
2
r
p
A
6
2
]
I
S
.
s
c
[
3
v
9
3
4
8
.
2
1
4
1
:
v
i
X
r
a
ABSTRACT
Anonymous messaging platforms, such as Secret, Yik Yak
and Whisper, have emerged as important social media for
sharing one’s thoughts without the fear of being judged by
friends, family, or the public. Further, such anonymous
platforms are crucial in nations with authoritarian govern-
ments; the right to free expression and sometimes the per-
sonal safety of the author of the message depend on anonymity.
Whether for fear of judgment or personal endangerment, it
is crucial to keep anonymous the identity of the user who
initially posted a sensitive message. In this paper, we con-
sider an adversary who observes a snapshot of the spread
of a message at a certain time. Recent advances in rumor
source detection shows that the existing messaging proto-
cols are vulnerable against such an adversary. We introduce
a novel messaging protocol, which we call adaptive diffusion,
and show that it spreads the messages fast and achieves a
perfect obfuscation of the source when the underlying con-
tact network is an infinite regular tree: all users with the
message are nearly equally likely to have been the origin of
the message. Experiments on a sampled Facebook network
show that it effectively hides the location of the source even
when the graph is finite, irregular and has cycles.
Categories and Subject Descriptors
G.2.2 [Graph Theory]: Network problems, Graph algo-
rithms
Keywords
Anonymous Social Media; Rumor Spreading; Privacy
1.
INTRODUCTION
Microblogging platforms form a core aspect of the fabric of
the present Internet; popular examples include Twitter and
Facebook. Users propagate short messages (texts, images,
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
SIGMETRICS’15, June 15–19, 2015, Portland, OR, USA.
Copyright c(cid:13) 2015 ACM 978-1-4503-3486-0/15/06 ...$15.00.
http://dx.doi.org/10.1145/2745844.2745866.
videos) through the platform via local friendship links. The
forwarding of messages often occurs through built-in mech-
anisms that rely on user input, such as clicking “like” or
“share” with regards to a particular post. Brevity of mes-
sage, fluidity of user interface, and trusted party commu-
nication combine to make these microblogging platforms a
major communication mode of modern times. There has
been tremendous recent interest in the privacy implications
of these platforms, as evidenced by the explosive growth of
anonymous microblogging platforms, like Secret [1], Whisper
[2] and Yik Yak [3]. These platforms enable users to share
messages with friends without leaking the message author’s
identity. In such applications, it is crucial to hide the iden-
tity of the user who initially posted the message.
Existing anonymous messaging services store both mes-
sages and authorship information on centralized servers, which
makes them vulnerable to government subpoenas, hacking,
or direct company access. A more robust solution would
be to store this information in a distributed fashion; each
node would know only its own friends, and message author-
ship information would never be transmitted to any party.
Distributed systems are more robust to monitoring due to
lack of central points of failure. However, even under dis-
tributed architectures, simple anonymous messaging pro-
tocols (such as those used by commercial anonymous mi-
croblogging apps) are still vulnerable against an adversary
with side information, as proved in recent advances in ru-
mor source detection.
In this work, we study in depth a
basic building block of the messaging protocol that would
underpin truly anonymous microblogging platform – broad-
casting a single message on a contact network with the goal
of obfuscating the source under strong adversarial conditions.
Specifically, we consider contact networks that represent a
social graph among users of the service.
A natural strategy for preventing source identification by
an adversary would be to spread the message as fast as possi-
ble; with reliable connection to infrastructure like the Inter-
net, this could be in principle done nearly instantaneously.
If all users receive the message instantaneously, any user is
equally likely to have been the source. However, this strat-
egy is not available in many of the key real-life scenarios we
are considering. For instance, in social networks, messages
are spread based on users approving the message via lik-
ing, sharing or retweeting (to enable social filtering and also
to avoid spamming) – this scenario naturally has inherent
random delays associated with when the user happens to en-
counter the message and whether or not she decides to “like”
the message. Indeed, standard models of rumor spreading
in networks explicitly model such random delays via a dif-
fusion process: messages are spread independently over dif-
ferent edges with a fixed probability of spreading (discrete
time model) or an exponential time to spread (continuous
time model).
Related work. Anonymous communication has been a
popular research topic for decades. For instance, anony-
mous point-to-point communication allows a sender to com-
municate with a receiver without the receiver learning the
sender’s identity. A great deal of successful work has emerged
in this area, including Tor [8], Freenet [5], Free Haven [7],
and Tarzan [10]. In contrast to this body of work, we ad-
dress the problem of anonymously broadcasting a message
over an underlying contact network (e.g., a social network).
Anonymous broadcast communication has been most stud-
ied in context of the dining cryptographers’ (DC) problem.
We diverge from the vast literature on this topic [4, 6, 11,
12, 23] in approach and formulation. We consider statisti-
cal spreading models rather than cryptographic encodings,
accommodate computationally unbounded adversaries, and
consider arbitrary network structures rather than a fully
connected network.
Within the realm of statistical message spreading mod-
els, the problem of detecting the origin of an epidemic or
the source of a rumor has been studied under the diffusion
model. Recent advances in [20, 19, 24, 18, 9, 13, 25, 17, 16,
14, 15] show that it is possible to identify the source within a
few hops with high probability. Drawing an analogy to epi-
demics, we refer to a person who has received the message
as ‘infected’ and the act of passing the message as ‘spread-
ing the infection’. Consider an adversary who has access
to the underlying contact network of friendship links and
the snapshot of infected nodes at a certain time. The prob-
lem of locating a rumor source, first posed in [20], naturally
corresponds to graph-centrality-based inference algorithms:
for a continuous time model, [20, 19] used the rumor cen-
trality measure to correctly identify the source after time T
(with probability converging to a positive number for large
√
d-regular and random trees, and with probability propor-
T for lines). The probability of identifying the
tional to 1/
source increases even further when multiple infections from
the same source are observed [24]. With multiple sources
of infections, spectral methods have been proposed for esti-
mating the number of sources and the set of source nodes in
[18, 9]. When infected nodes are allowed to recover as in the
susceptible-infected-recovered (SIR) model, Jordan central-
ity was proposed in [13, 25] to estimate the source. In [25],
it is shown that the Jordan center is still within a bounded
hop distance from the true source with high probability, in-
dependent of the number of infected nodes. Under natural
and diffusion-based message spreading – as seen in almost
every content-sharing platform today – an adversary with
some side-information can identify the rumor source with
high confidence. We overcome this vulnerability by asking
the reverse question: can we design messaging protocols that
spread fast while protecting the anonymity of the source?
Model. We focus on anonymous microblogging built atop
an underlying contact network, such as Secret [1] over the
network of phone contacts and Facebook friends.
In such
systems, the designer has some control over the spreading
rate, by introducing artificial delays on top of the usual ran-
dom delays due to users’ approval of the messages. We
model this physical setup as a discrete-time system, where
any individual receiving a message approves it immediately
at the next timestep, at which point the protocol determines
how much delay to introduce before sending the message to
each of her uninfected neighbors. Given this control, the
system designer wishes to design a spreading protocol that
makes inference on the source of the message difficult. The
assumption that all nodes are willing to approve and pass
the message is not new. Such assumptions are common in
the analysis of rumor spreading [20, 19, 25], and our devia-
tion from those standard models is that we are operating in
discrete time and approvals are immediate.
Adversary. Following the adversarial model assumed in
prior work on rumor source detection [20, 19, 25], we as-
sume the adversary knows the whole underlying contact
network and, at a certain time, it observes a snapshot of
the state of all the nodes, i.e. who has received the mes-
sage thus far. This adversary is strong in the sense that
it sees the whole contact network as well as every node’s
state, but it is also limited in the sense that the adversary
is not aware of when (or from whom) a particular node re-
ceived the message. This model captures an adversary that
is able to indirectly observe the contents of users’ devices
without actively compromising the devices; for instance, if
the message in question contains the time and location of
a protest, then the adversary learns a snapshot of the in-
fection at a given point in time by observing who attends
the protest. This adversarial model also captures an adver-
sary that is able to monitor the network state more closely,
but only at a high cost. As such, it cannot afford to continu-
ously monitor state. We design a new anonymous messaging
protocol, which we call adaptive diffusion, that is inherently
distributed and provides strong anonymity guarantees under
this adversarial model. We discuss other plausible adversar-
ial models in Section 5.
Spreading. At time t = 0, a single user v∗ ∈ V starts to
spread a message on a contact network G = (V, E) where
users and contacts are represented by nodes and edges, re-
spectively. Upon receiving the message, a node can send the
message to any of its neighbors. We assume a discrete-time
system and model the delays due to user approval and in-
termittent network access via a deterministic delay of one
time unit. Therefore, a message always propagates with a
delay of at least one time unit. Our goal is to introduce
appropriate random delays into the system in order to ob-
fuscate the identity of the source v∗. After T timesteps,
let VT ⊆ V , GT , and NT (cid:44) VT denote the set of infected
nodes, the subgraph of G containing only VT , and the num-
ber of infected nodes, respectively. At a certain time T , an
adversary observes the infected subgraph GT and produces
an estimate v of the source v∗ of the message (with proba-
bility of detection PD = P(v = v∗)). Since the adversary is
assumed to not have any prior information on which node
is likely to be the source, we use the maximum likelihood
estimator
(1)
vML = arg max
v∈GT
P(GTv).
We wish to achieve the following performance metrics.
(a) We say a protocol has an order-optimal rate of spread
if the expected time for the message to reach n nodes
scales linearly compared to the time required by the
fastest spreading protocol.
Organization. The remainder of this paper is organized as
follows. To warm up, we introduce, in Section 2, two mes-
saging protocols customized for lines and trees. Combining
the key insights of these two approaches, we introduce, in
Section 3, a new messaging protocol called adaptive diffusion
and analyze its performance theoretically and empirically, in
Section 4. Section 5 discusses limitations and future work.
2. WARM-UP EXAMPLES
In this section, we discuss two special contact networks
as warm-up examples: a line and a regular tree with de-
gree larger than two. We provide two fully-distributed, cus-
tomized messaging protocols, one for each case, and show
that these protocols spread messages quickly while effec-
tively hiding the source. However, these protocols fail to
protect the identity of the source when applied to a broader
class of contact networks.
In particular, the “Line Proto-
col”, which is developed for line contact networks, reveals
the source with high probability when applied to a regu-
lar tree with degree larger than two. Similarly, the “Tree
Protocol”, developed for regular tree contact networks with
degree greater than two, reveals the source with high prob-
ability when applied to a line. In Section 3, we introduce a
novel messaging protocol, which we call adaptive diffusion,
that combines the key ideas behind the two approaches pre-
sented in this section.
2.1 Spreading on a line
Given a contact network of an infinite line, consider the
following deterministic spreading protocol. At time t = 1,
the source node infects its left and right neighbors. At
t ≥ 2, the leftmost and rightmost infected nodes spread the
message to their uninfected neighbors. Thus, the message
spreads one hop to the left and one hop to the right of the
true source at each timestep. This scheme spreads as fast
as possible, infecting NT = 2T + 1 nodes at time T , but the
source is trivially identified as the center of the infection.
Adding a little bit of randomness can significantly de-
crease the probability of detection. Consider a discrete-
time random diffusion model with a parameter p ∈ (0, 1)
where at each time t, an infected node infects its uninfected
neighbor with probability p. Using the analysis from [20]
where the continuous time version of this protocol was stud-
ied, we can show that this protocol spreads fast, infecting
E[NT ] = 2pT + 1 nodes on average at time T . Further,
the probability of source detection PD = P(vML = v∗) for
the maximum likelihood estimator scales as 1/(cid:112)p(1 − p)T .
With p = 1/2 for example, this gives a simple messaging
√
protocol with a probability of source detection vanishing at
a rate of 1/
T .
In what follows, we show that with an appropriate choice
of time-dependent randomness, we can achieve almost per-
fect source obfuscation without sacrificing the spreading rate.
The key insight is to add randomness such that all the in-
fected nodes are (almost) equally likely to have been the
origin of the infection (see Figure 2 and Equation (6)). This
can be achieved by adaptively choosing the spreading rate
such that the farther away the infection is from the source
the more likely it is to spread. We now apply this insight to
design precisely how fast the spread should be for each in-
fected node at any timestep. A node v is designed to infect
Figure 1: Illustration of a spread of infection when spreading
immediately (left) and under the adaptive diffusion (right).
(b) We say a protocol achieves a perfect obfuscation if the
probability of source detection for the maximum likeli-
hood estimator conditioned on n nodes being infected
is bounded by
P(cid:0) vML = v
∗NT = n(cid:1) =
.
(2)
(cid:16) 1
(cid:17)
1
n
+ o
n
Key insights. Figure 1 (left) illustrates an example of the
spread when the message is propagated immediately upon
reception. The source is indicated by a solid circle. This
scheme spreads the message fast but the source is trivially
identified as the center of the infected subgraph if the contact
network is an infinite tree. This is true independent of the
infection size. Even if we introduce some randomness at
each node, the source will still be identified within a few
hops. This is due to the fact that the source is close to some
notion of the center of the infected subgraph [20, 25].
Since we do not know a priori when the adversary is going
to attack, the main challenge is to ensure that the source is
equally likely to be anywhere in the infection at any given
time. Figure 1 (right) illustrates the main idea of our ap-
proach: we intentionally break the symmetry around the
source. This is achieved by combining two insights illus-
trated in the two warm-up examples in Section 2. The first
insight is that nodes farther away from the source should
spread the infection faster. The second insight is that the
spread should be coordinated in order to maintain a symmet-
ric structure centered around a ‘virtual source’ node. This
leads to the source node being anywhere in the infected sub-
graph with equal probability.
Contributions. We introduce a novel messaging proto-
col, which we call adaptive diffusion, with provable author
anonymity guarantees against strong adversaries. Our pro-
tocol is inherently distributed and spreads messages fast,
i.e., the time it takes adaptive diffusion to reach n users is
at most twice the time it takes the fastest spreading scheme
which immediately passes the message to all its neighbors.
We further prove that adaptive diffusion provides perfect
obfuscation of the source when applied to regular tree con-
tact networks. The source hides perfectly within all infected
users, i.e., the likelihood of an infected user being the source
of the infection is equal among all infected users. For a more
general class of graphs which can be finite, irregular and have
cycles, we provide results of numerical experiments on real-
world social networks and synthetic networks showing that
the protocol hides the source at nearly the best possible level
of obfuscation.
a neighbor at time t ∈ {1, 2, . . .} with probability
pv,t (cid:44) δH (v, v∗) + 1
(3)
where δH (v, v∗) is the hop distance between an infected node
v at the boundary of infection and the source v∗. The details
of this spreading model are summarized in Protocol 3 (Line
Protocol).
t + 1
,
The next proposition shows that this protocol achieves the
two main goals of an anonymous messaging protocol: order-
optimal spreading rate and close-to-perfect obfuscation.
Proposition 2.1. Suppose that the underlying contact net-
work G is an infinite line, and one node v∗ in G starts to
spread a message according to Protocol 3 (Line Protocol) at
time t = 0. At a certain time T ≥ 0 an adversary estimates
the location of the source v∗ using the maximum likelihood
estimator vML defined in Equation (1). The following prop-
erties hold for the Line Protocol:
(a) the expected number of infected nodes at time T is
E[NT ] = T + 1;
(b) the probability of source detection at time T is upper
bounded by
P(vML = v
∗
) ≤ 2T + 1
(4)
(c) the expected hop-distance between the true source v∗
(T + 1)2 ; and
and its estimate vML is lower bounded by
E[δH (v
∗
, vML)] ≥
T 3
9(T + 1)2 .
(5)
The proof of the above proposition can be found in Ap-
pendix B. Compared to the (fastest-spreading) determinis-
tic spreading model with a spreading rate of NT = 2T + 1,
The Line Protocol is slower by a factor of 2. This type of
constant-factor loss in the spreading rate is inevitable: the
only way to deviate from the deterministic spreading model
is to introduce appropriate delays. The probability of de-
tection is 2/E[NT ] + o(1/E[NT ]), which is almost perfect
obfuscation up to a factor of 2. Further, the expected dis-
tance of the true source from the ML source estimate scales
linearly with the size of the infection E[NT ], which is the
best separation one can hope to achieve.
To illustrate the power of the Line Protocol, we consider
a fixed T and a finite ring graph of size larger than 2T + 1,
and compare the protocol to a simple random diffusion. If
the source v∗ is chosen uniformly at random on the ring and
its message is spread according to the Line Protocol, then
the probability of the source being detected given a set of
infected nodes VT is
1
VT + O
,
VT2
(6)
for all k ∈ VT and VT ≤ 2T + 1. This follows from the
exact computation of the posterior distribution, which can
be found at the end of Appendix B. For an example with
VT = 101, Figure 2 illustrates how the Line Protocol flat-
tens the posterior distribution compared to the random dif-
fusion model. When messages are sent according to the ran-
√
dom diffusion model, the source can only hide in the central
T ), leading to a probability of
part, which has width O(
source detection on the order of 1/
√
T [20].
P(cid:0)v
∗
= k(cid:12)(cid:12) VT
(cid:1) =
(cid:16) 1
(cid:17)
)
T
G
k
=
∗
v
(
P
Node k
Figure 2: The Line Protocol has a close-to-uniform posterior
distribution P(v∗ = k VT = {1, . . . , 101}).
)
∗
v
=
v
(
P
(4)
Expected size of infection E[NT ]
Figure 3: Detection probability versus the average size of in-
fection on regular trees using Jordan center estimator, which
is the ML estimate in case of a line (d = 2). For d > 2, the
source is easily detected.
On an infinite line, the Line Protocol provides maximum
protection, since the probability of detection scales as 1/E[NT ]
for any T . When the Line Protocol is applied to regular
trees with degree larger than two, the infected subgraph
contains exponentially many paths starting at v∗ of length
close to T . In such cases, the Jordan center (i.e., the node
with the smallest maximum distance to every other node in
the graph) matches the source with positive probability, as
shown in Figure 3 for different d-regular trees.
2.2 Spreading on a regular tree
Consider the case when the underlying contact network is
an infinite d-regular tree with d larger than two. Analogous
to the line network, the fastest spreading protocol infects
all the uninfected neighbors at each timestep. This spreads
fast, infecting NT = 1 + d((d − 1)T − 1)/(d − 2) nodes at
time T , but the source is trivially identified as the center
of the infected subtree. In this case, the infected subtree is
a balanced regular tree where all leaves are at equal depth
from the source.
0 0.02 0.04 0.06 0.08 0.1 0.12 0 20 40 60 80 100line protocol diffusion; p=0.5 0.1 1 1 10 100 1000 10000d=5d=4d=3d=2bound in an adversary estimates the location of the source v∗ using
the maximum likelihood estimator vML. Then the following
properties hold for the Tree Protocol:
(a) the number of infected nodes at time T ≥ 1 is at least
d − 2
NT ≥ (d − 1)(T +1)/2
∗(cid:1) =
d − 1
P(cid:0)vML = v
;
(7)
(b) the probability of source detection for the maximum
likelihood estimator at time T is
(8)
(c) the expected hop-distance between the true source v∗
2 + (d − 2)NT
; and
Figure 4: Spreading on a tree. The red node is the message
source. Yellow nodes denote nodes that have been, are, or
will be the center of the infected subtree.
Now consider a random diffusion model. At each timestep,
each uninfected neighbor of an infected node is indepen-
In this case, E[NT ] =
dently infected with probability p.
1 + pd((d − 1)T − 1)/(d − 2), and it was shown in [20] that
the probability of correct detection for the maximum likeli-
hood estimator of the rumor source is P(vML = v∗) ≥ Cd for
some positive constant Cd that only depends on the degree
d. Hence, the source is only hidden in a constant number
of nodes close to the center, even when the total number of
infected nodes is arbitrarily large.
We now present a protocol that spreads the message fast
(NT = O((d−1)T /2)) and hides the source within a constant
fraction of the infected nodes (P(vML = v∗) = O(1/NT )).
This protocol keeps the infected subtree balanced: at any
time t, all the leaves of the infected subtree are at the same
hop distance from its center. Further, as we will see next, the
leaves of the infected subtree are equally likely to have been
the source. Figure 4 illustrates how this protocol spreads a
message on a regular tree of degree 3. At t = 1, node 0 (the
message author) infects one of its neighbors (node 1 in this
example) uniformly at random. Node 1 will be referred to
as the virtual source at t = 1. The virtual source at time t is
the center of the infected subtree at time 2t. At t = 2, node 1
infects all its uninfected neighbors, making the infected sub-
graph G2 a balanced tree with node 1 at the center. Among
the uninfected neighbors of node 1, one node is chosen to be
the new virtual source (node 2 in the example). The mes-
sage then spreads to the uninfected neighbors of node 2 at
time t = 3, and then to their neighbors at time t = 4 making
G4 a balanced tree with node 2 at the center. Notice that
any given time t, all leaves are equally likely to have been
the source. This follows form the symmetric structure of Gt.
The distributed implementation of this spreading algorithm
is given in Protocol 4 (Tree Protocol).
The Tree Protocol ensures that the source can hide among
the leaf nodes of the infected subtree, i.e. all leaves are
equally likely to have been the source. Since a significant
fraction of the infected nodes are at the leaf, this protocol
achieves an almost perfect obfuscation.
Proposition 2.2. Suppose that the underlying contact net-
work G is an infinite d-regular tree with d > 2, and one node
v∗ in G starts to spread a message according to Protocol 4
(Tree Protocol) at time t = 0. At a certain time T ≥ 1
and its estimate v is lower bounded by
, vML)] ≥ T
2
E[δH (v
∗
.
(9)
The proof of the above proposition can be found in Ap-
pendix C. Equation (7) shows that the spreading rate of the
Tree Protocol is O((d − 1)T /2), which is slower than the de-
terministic spreading model that infects O((d − 1)T ) nodes
at time T . This is inevitable, as we explained in relation to
the Line Protocol.
Although this protocol spreads fast and provides an al-
most perfect obfuscation on a tree with degree larger than
two, it fails when the contact network is a line. There are
only two leaves in a line, so at any given time T , the source
can be detected with probability 1/2, independent of the
size of the infected subgraph. Another drawback of this ap-
proach, is that even in the long run, not every node receives
the message. For instance, the neighbors of the source node
that are not chosen in the first step are never infected. In
the following section, we address these issues and propose a
new messaging protocol that combines the key ideas of both
spreading models presented in this section.
3. ADAPTIVE DIFFUSION
Section 2 showed that by changing the infection rate and
direction based on state variables, the source can hide from
the adversary. In particular, the messaging protocols pre-
sented in Sections 2.1 and 2.2 provide provable anonymity
guarantees for line graphs and d-regular trees with d > 2,
respectively. However, the Line Protocol fails to protect the
source on graphs with larger degree. Similarly, the Tree
Protocol fails to protect the source on a line and does not
pass the message to some of the nodes. To overcome these
challenges, we use ideas from the Line Protocol (nodes far-
ther away from the source spread message faster) and from
the Tree Protocol (keep the infected subgraph balanced and
keep the source closer to the leaves) to design a protocol that
achieves perfect obfuscation and spreads fast on all regular
trees, including lines. We call this protocol adaptive diffu-
sion to emphasize the fact that unlike diffusion, the protocol
adapts the infection rate and direction as a function of time.
We step through the intuition of the adaptive diffusion
spreading model with an example, partially illustrated in
Figure 5. Suppose that the underlying contact network is
an infinite d-regular tree. As illustrated in Figure 5, we
ensure that the infected subgraph Gt at any even timestep
t ∈ {2, 4, . . .} is a balanced tree of depth t/2, i.e. the hop dis-
tance from any leaf to the root (or the center of the graph) is
t/2. We call the root node of Gt the “virtual source” at time
4G3G2G1G2147630589t, and denote it by vt. We use v0 = v∗ to denote the true
source. To keep the regular structure at even timesteps, we
use the odd timesteps to transition from one regular subtree
Gt to another one Gt+2 with depth incremented by one.
Figure 5 illustrates two sample evolutions of infection, as
per adaptive diffusion. The source v∗ = 0 starts the infection
at t = 0. At time t = 1, node 0 infects node 1 and passes
the virtual source token to it, i.e. v2 = 1 (we only define
virtual sources for even timesteps). At time t = 1, node 1
infects its uninfected neighbors, nodes 2 and 3. Notice that
it requires two timesteps to infect nodes {1, 2, 3} in order to
spread infection to G2, which is a balanced tree of depth 1
rooted at node v2 = 1. At time t = 3, the adaptive diffusion
protocol has two choices, either to pass the virtual source
token to one of node 1’s neighbors that is not a previous
virtual source, for example node 2 (Figure 5 left), or to keep
the virtual source at node 1 (Figure 5 right). In the former
case, it again takes two timesteps to spread infection to G4,
which is a balanced tree of depth 2 rooted at node v4 = 2.
In the latter case, only one timestep is required, but we
add a unit time delay to be consistent with the previous
case. Hence, G3 = G4 which is a balanced tree of depth 2
rooted at node v4 = 1. This random infection process can be
defined as a time-inhomogeneous (time-dependent) Markov
chain over the state defined by the location of the current
virtual source {vt}t∈{0,2,4,...}.
By the symmetry of the underlying contact network (which
we assume is an infinite d-regular tree) and the fact that the
next virtual source is chosen uniformly at random among
the neighbors of the current virtual source, it is sufficient to
consider a Markov chain over the hop distance between the
true source v∗ and vt, the virtual source at time t. Therefore,
we design a Markov chain over the state
ht = δH (v
∗
, vt) ,
for even t. Figure 5 shows an example with (h2, h4) = (1, 2)
on the left and (h2, h4) = (1, 1) on the right.
At every even timestep, the protocol randomly determines
whether to keep the virtual source token (ht+2 = ht) or to
pass it (ht+2 = ht + 1). Using ideas from Section 2.1, we
will construct an time-inhomogeneous Markov chain over
{ht}t∈{2,4,6,...} by choosing appropriate transition probabil-
ities as a function of time t and current state ht. For an
even t, we denote this probability by
αd(t, h) (cid:44) P(cid:0) ht+2 = htht = h(cid:1) ,
(10)
where the subscript d denotes the degree of the underlying
contact network. For the running example, at t = 2, the vir-
tual source remains at the current node (right) with prob-
ability α3(2, 1), or passes the virtual source to a neighbor
with probability 1 − α3(2, 1) (left). The parameters αd(t, h)
fully describe the transition probability of the Markov chain
defined over ht ∈ {1, 2, . . . , t/2}. Let p(t) = [p(t)
h ]h∈{1,...,t/2}
denote the distribution of the state of the Markov chain at
h = P(ht = h). The state transition can be
time t, i.e. p(t)
represented as the following ((t/2) + 1) × (t/2) dimensional
column stochastic matrices:
αd(t, 1)
1 − αd(t, 1)
p(t+2) =
αd(t, 2)
1 − αd(t, 2)
. . .
. . .
αd(t, t/2)
1 − αd(t, t/2)
p(t) .
(11)
We treat ht as strictly positive, because at time t = 0, when
h0 = 0, the virtual source is always passed. Thus, ht ≥ 1
afterwards. We design the the parameters αd(t, h) to achieve
perfect hiding. Precisely, at all even t, we desire p(t) to be
p(t) =
d − 2
(d − 1)t/2 − 1
1
(d − 1)
...
(d − 1)t/2−1
∈ Rt/2 ,
for d > 2 and for d = 2, p(t) = (2/t)1t/2 where 1t/2 is all
ones vector in Rt/2. There are d(d− 1)h−1 nodes at distance
h from the virtual source, and by symmetry all of them are
equally likely to have been the source:
P(GTv
∗
, δH (v
∗
, vt) = h) =
=
1
d(d − 1)h−1 p(t)
h
d − 2
d((d − 1)t/2 − 1)
,
for d > 2, which is independent of h. Hence, all the infected
nodes (except for the virtual source) are equally likely to
have been the source of the origin. This statement is made
precise in Equation (14).
Together with the desired probability distribution in Equa-
tion (11), this gives a recursion over t and h for computing
the appropriate αd(t, h)’s. After some algebra and an initial
state p(2) = 1, we get that the following choice ensures the
desired Equation (11):
(cid:40) (d−1)t/2−h+1−1
(d−1)t/2+1−1
t−2h+2
t+2
αd(t, h) =
if d > 2
if d = 2
(12)
Figure 5: Adaptive diffusion over regular trees. Yellow nodes
indicate the set of virtual sources (past and present), and for
T = 4, the virtual source node is outlined in red.
With this choice of parameters, we show that adaptive dif-
fusion spreads fast, infecting Nt = O((d − 1)t/2) nodes at
time t and each of the nodes except for the virtual source is
equally likely to have been the source.
Theorem 3.1. Suppose the contact network is a d-regular
tree with d ≥ 2, and one node v∗ in G starts to spread a mes-
sage according to Protocol 1 at time t = 0. At a certain time
T ≥ 0 an adversary estimates the location of the source v∗
214100351112131G2G3G4G10254893761G2G34GGusing the maximum likelihood estimator vML. The following
properties hold for Protocol 1:
Protocol 1 Adaptive Diffusion
Require: contact network G = (V, E), source v∗, time T ,
(a) the number of infected nodes at time T is
(cid:40) 2(d−1)(T +1)/2−d
(d−2)
T + 1
NT ≥
+ 1 if d > 2
if d = 2
(13)
(b) the probability of source detection for the maximum
likelihood estimator at time T is
P (vML = v
∗
) ≤
d−2
2(d−1)(T +1)/2−d
(1/T )
if d > 2
if d = 2
(14)
(cid:26)
(c) the expected hop-distance between the true source v∗
and its estimate vML under maximum likelihood esti-
mation is lower bounded by
E[d(vML, v
∗
)] ≥ d − 1
d
T
2
.
(15)
Protocol 1 describes the details of the implementation of
adaptive diffusion. The first three steps are always the same.
At time t = 1, the rumor source v∗ selects, uniformly at
random, one of its neighbors to be the virtual source v2
and passes the message to it. Next at t = 2, the new virtual
source v2 infects all its uninfected neighbors forming G2 (see
Figure 5). Then node v2 chooses to either keep the virtual
source token with probability αd(2, 1) or to pass it along.
If v2 chooses to remain the virtual source i.e., v4 = v2,
it passes ‘infection messages’ to all the leaf nodes in the
infected subtree, telling each leaf to infect all its uninfected
neighbors. Since the virtual source is not connected to the
leaf nodes in the infected subtree, these infection messages
get relayed by the interior nodes of the subtree. This leads to
Nt messages getting passed in total (we assume this happens
instantaneously). These messages cause the rumor to spread
symmetrically in all directions at t = 3. At t = 4, no more
spreading occurs.
If v2 does not choose to remain the virtual source, it passes
the virtual source token to a randomly chosen neighbor v4,
excluding the previous virtual source (in this example, v0).
Thus, if the virtual source moves, it moves away from the
true source by one hop. Once v4 receives the virtual source
token, it sends out infection messages. However, these mes-
sages do not get passed back in the direction of the previous
virtual source. This causes the infection to spread asym-
metrically over only one subtree of the infected graph (G3
in left panel of Figure 5). In the subsequent timestep (t = 4),
the virtual source remains fixed and passes the same infec-
tion messages again. After this second round of asymmetric
spreading, the infected graph is once again symmetric about
the virtual source v4 (G4 in left panel of Figure 5).
Although adaptive diffusion obfuscates the source on infi-
nite regular trees, real world contact networks have cycles,
and degrees are irregular, and the size is finite. We study
how adaptive diffusion works under more realistic contact
networks.
4. GENERAL CONTACT NETWORKS
We study adaptive diffusion on general networks when the
underlying graph is cyclic, irregular, and finite.
degree d
else
Infection Message(G,vt−1,v,Gt)
vt−1 selects a random variable X ∼ U (0, 1)
if X ≤ αd(t − 1, h) then
for all v ∈ N (vt−1) do
Ensure: set of infected nodes VT
1: V0 ← {v∗}, h ← 0, v0 ← v∗
2: v∗ selects one of its neighbors u at random
3: V1 ← V0 ∪ {u}, h ← 1, v1 ← u
4: let N (u) represent u’s neighbors
5: V2 ← V1 ∪ N (u) \ {v∗}, v2 ← v1
6: t ← 3
7: for t ≤ T do
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22: procedure Infection Message(G,u,v,Vt)
23:
24:
25:
26:
27:
vt−1 randomly selects u ∈ N (vt−1) \ {vt−2}
h ← h + 1
vt ← u
for all v ∈ N (vt) \ {vt−1} do
Infection Message(G,vt,v,Vt)
if t + 1 > T then
t ← t + 2
if v ∈ Vt then
else
Vt ← Vt−2 ∪ {v}
for all w ∈ N (v) \ {u} do
Infection Message(G,v,w,Gt)
break
Infection Message(G,vt,v,Vt)
4.1
Irregular tree networks
We first consider tree networks with potentially different
degrees at the vertices. Although the degrees are irregu-
lar, we still apply adaptive diffusion with αd0 (t, h)’s chosen
for a specific d0 that might be mismatched with the graph
due to degree irregularities. There are a few challenges in
this degree-mismatched adaptive diffusion. First, finding
the maximum likelihood estimate of the source is not im-
mediate, due to degree irregularities. Second, it is not clear
a priori which choice of d0 is good. We first show an ef-
ficient message-passing algorithm for computing the max-
imum likelihood source estimate. Using this estimate, we
illustrate through simulations how adaptive diffusion per-
forms and show that the detection probability is not too
sensitive to the choice of d0 as long as d0 is above a thresh-
old that depends on the degree distribution.
Efficient ML estimation. To keep the discussion sim-
ple, we assume that T is even. The same approach can be
naturally extended to odd T . Since the spreading pattern
in adaptive diffusion is entirely deterministic given the se-
quence of virtual sources at each timestep, computing the
likelihood P(GTv∗ = v) is equivalent to computing the
probability of the virtual source moving from v to vT over
T timesteps. On trees, there is only one path from v to
vT and since we do not allow the virtual source to “back-
track”, we only need to compute the probability of every
virtual source sequence (v0, v2, . . . , vT ) that meets the con-
straint v0 = v. Due to the Markov property exhibited by
(cid:81)
t<T−1
t even
adaptive diffusion, we have P(GT{(vt, ht)}t∈{2,4,...,T}) =
P(vt+2vt, ht), where ht = δH (v0, vt). For t even,
P(vt+2vt, ht) = αd(t, ht) if vt = vt+2 and 1−αd(t,ht)
deg(vt)−1 oth-
erwise. Here deg(vt) denotes the degree of node vt in G.
Given a virtual source trajectory P = (v0, v2, . . . , vT ), let
JP = (j1, . . . , jδH (v0,vT )) denote the timesteps at which a
new virtual source is introduced, with 1 ≤ ji ≤ T . It al-
ways holds that j1 = 2 because after t = 0, the true source
chooses a new virtual source and v2 (cid:54)= v0.
If the virtual
source at t = 2 were to keep the token exactly once after
receiving it (so v2 = v4), then j2 = 6, and so forth. To find
the likelihood of a node being the true source, we sum over
all such trajectories
P(GTv0) =
(cid:88)
1
deg(v0)
δH (v0,vT )−1(cid:89)
(cid:123)(cid:122)
k=1
×
1
(cid:125)
deg(vjk ) − 1
(cid:89)
(cid:124)
t<T
t even
JP :P∈S(v0,vT ,T )
(cid:0)1{t+2 /∈JP}αd(t, ht) + 1{t+2∈JP}(1 − αd(t, ht))(cid:1) ,
(cid:125)
Av0
(cid:124)
(cid:123)(cid:122)
Bv0
(16)
where 1 is the indicator function and S(v0, vT , T ) = {P :
P = (v0, v2, . . . , vT ) is a valid trajectory of the virtual source}.
Intuitively, part Av0 of the above expression is the proba-
bility of choosing the set of virtual sources specified by P,
and part Bv0 is the probability of keeping or passing the
virtual source token at the specified timesteps. Equation
(16) holds for both regular and irregular trees. Since the
path between two nodes in a tree is unique, and part Av0 is
(approximately) the product of node degrees in that path,
Av0 is identical for all trajectories P. Pulling Av0 out of
the summation, we wish to compute the summation over all
valid paths P of part Bv0 (for ease of exposition, we will use
Bv0 to refer to this whole summation). Although there are
combinatorially many valid paths, we can simplify the for-
mula in Equation (16) for the particular choice of αd(t, h)’s
defined in (12).
Proposition 4.1. Suppose that the underlying contact net-
work G is an infinite tree with degree of each node larger than
one. One node v∗ in G starts to spread a message at time
t = 0 according to Protocol 1 with the choice of d = d0. At
a certain even time T ≥ 0, the maximum likelihood estimate
of v∗ given a snapshot of the infected subtree GT is
d0 − 1
(cid:89)
d0
arg max
v∈ GT \vT
deg(v)
v(cid:48)∈p(vT ,v)\{vT ,v}
deg(v(cid:48)) − 1
,(17)
[3, 2, 0, 2, 4/3, 3, 3, 3/2]. In this case, nodes 1, 6, and 7 are
most likely. When d0 is large, adaptive diffusion tends to
place the source closer to the leaves of the infected subtree,
so leaf nodes are more likely to have been the source.
Figure 6: Irregular tree G4 with virtual source v4.
Proof of Proposition 4.1. We first make two observa-
tions: (a) Over regular trees, P(GTu) = P(GTw) for any
u (cid:54)= w ∈ GT , even if they are different distances from the
virtual souce. (b) Part Bv0 is identical for regular and ir-
regular graphs, as long as the distance from the candidate
source node to vT is the same in both, and the same d0 is
used to compute αd0 (t, h). That is, let GT denote an in-
fected subtree over an irregular tree network, with virtual
source vT , and GT will denote a regular infected subtree
with virtual source vT . For candidate sources v0 ∈ GT and
v0 ∈ GT , if δH (vT , v0) = δH (vT , v0) = h, then Bv0 = Bv0 .
So to find the likelihood of v0 ∈ GT , we can solve for Bv0
using the likelihood of v0 ∈ GT , and compute Av0 using the
degree information of every node in the infected, irregular
subgraph.
To solve for Bv0 , note that over regular graphs, Av =
1/(d0 (d0 − 1)δH (v,vT )−1), where d0 is the degree of the regu-
lar graph. If G is a regular tree, Equation (16) still applies.
Critically, for regular trees, the αd0 (t, h)’s are designed such
that the likelihood of each node being the true source is
equal. Hence,
P(GTv0) =
d0(d0 − 1)δH (v0,vT )−1
× Bv0 ,
(18)
(cid:124)
1
(cid:123)(cid:122)
Av0
(cid:125)
is a constant that does not depend on v0. This gives Bv0 ∝
(d0 − 1)δH (vT ,v0). From observation (b), we have that Bv0 =
Bv0 . Thus we get that for a v0 ∈ GT \ {vT},
P( GTv0) = Av0 Bv0
(d0 − 1)δH (vT ,v0)
v(cid:48)∈p(vT ,v0)\{v0,vT }(deg(v(cid:48)) − 1)
After scaling appropriately and noting that p(vT , v0) =
δH (vT , v0) + 1, this gives the formula in Equation (17).
deg(v0)(cid:81)
∝
where vT is the (Jordan) center of the infected subtree GT ,
p(vT , v) is the unique path from vT to v, and deg(v(cid:48)) is the
degree of node v(cid:48).
To understand this proposition, consider Figure 6, which
was spread using adaptive diffusion (Protocol 1) with a choice
of d0 = 2. Then Equation (17) can be computed easily
for each node, giving [1/2, 1, 0, 1, 2/3, 1/2, 1/2, 1/4] for nodes
[1, 2, 3, 4, 5, 6, 7, 8], respectively. Hence, nodes 2 and 4 are
most likely.
Intuitively, nodes whose path to the center
have small degrees are more likely. However, if we repeat
this estimation assuming d0 = 4, then Equation (17) gives
Implementation and numerical simulations. We pro-
vide an efficient message passing algorithm for computing
the ML estimate in Equation (17), which is naturally dis-
tributed. We then use this estimator to simulate message
spreading for random irregular trees and show that when d0
exceeds a threshold (determined by the degree distribution),
obfuscation is not too sensitive to the choice of d0.
Av0 can be computed efficiently for irregular graphs with
a simple message-passing algorithm. In this algorithm, each
node v multiplies its degree information by a cumulative
likelihood that gets passed from the virtual source to the
leaves. Thus if there are NT infected nodes in GT , then Av0
213456784vAlgorithm 2 ML estimator of (17)
Input: infected network GT = ( VT , ET ), virtual source vT ,
time T , the spreading model parameter d0
P( GTv∗ = v)
Output: argmaxv∈ VT
1: Pv (cid:44) P( GTv∗ = v).
2: PvT ← 0
3: Av ← 1 for v ∈ VT \ {vT}
4: AvT ← 0
5: A ← Degree Message(GT , vT , vT , A)
6: P(GTvleaf ) ←
7: for all v ∈ VT \ {vT} do
8:
9:
10:
h ← δH (v, vT )
Bv ← P(GTvleaf ) · d0 · (d0 − 1)h−1
Pv ← Av · Bv
d0(d0−1)T /2−1
(cid:81)
t<T
t even
1
return argmaxv∈ VT
Pv
(1 − αd0 (t, t
2 ))}
if v = u then
for all w ∈ N (v) \ {u} do
A w ← Av/deg( w)
Degree Message( GT , v, w, A)
11: procedure Degree Message( GT , u, v, A)
12:
13:
14:
15:
16:
17:
18:
19:
if v is not a leaf then
A w ← Av · deg(v)/(deg( w) · (deg(v) − 1))
Degree Message( GT , v, w, A)
else
return A
2 , A4 = 1
for every v0 ∈ GT can be computed by passing O( NT ) mes-
sages. This message-passing is outlined in procedure ‘Degree
Message’ of Algorithm 2. For example, consider computing
A5 for the graph in Figure 6. The virtual source vT = 3
starts by setting A2 = 1
3 . This gives
A5, but to compute other other values of A w, the message
passing continues. Each of the nodes v ∈ N (3) in turn sets
A w for their children w ∈ N (v); this is done by dividing
deg(v) in Av with
Av by deg( w) and replacing the factor of
deg(v−1) . For example, node 5 would set A7 = A5
2 .This
step is applied recursively until reaching the leaves.
If vleaf ∈ GT is a leaf node and G is a regular tree, we get
As discussed earlier, Bv0 only depends on d0 and δH (vT , v0).
2 , and A5 = 1
2 · 3
1
1
P(GTvleaf) =
(cid:124)
d0(d0 − 1)T /2−1
1
(cid:123)(cid:122)
Avleaf
(cid:89)
(cid:124)
t<T
t even
(cid:125)
(1 − αd0 (t,
(cid:123)(cid:122)
Bvleaf
.
(19)
t
2
))
(cid:125)
If v0 is h < T /2 hops from vT , then for node v0 with
δH (v0, vT ) = h < T /2 over a regular tree,
P(GTv0) = P(GTvleaf) =
1
d0 · (d0 − 1)h−1 Bv0 .
1
Finally, Bv0 = Bv0 . So to solve for B5 in our example, we
compute P(GTvleaf ) for a 3-regular graph at time T = 4.
6 ·(1−α3(2, 1)) =
This gives P(G4vleaf ) = Avleaf ·Bvleaf = 1
9 . Thus B5 = P(G4vleaf )· d0 · (d0 − 1)h−1 = P(G4vleaf )· 3·
3 . This gives P( G45) = A5 · B5 = 1
(2)0 = 1
9 . The same can
be done for other nodes in the graph to find the maximum
likelihood source estimate.
We tested adaptive diffusion over random trees; each node’s
degree was drawn i.i.d. from a fixed distribution.
Figure 7 illustrates simulation results for random trees in
which each node has degree 3 or 4 with equal probability,
)
∗
v
=
v
(
P
Average size of infection, NT
Figure 7: The probability of detection by the maximum like-
lihood estimator depends on the assumed degree d0; the
source cannot hide well below a threshold value of d0.
averaged over 100,000 trials. By the law of large numbers,
the number of nodes infected scales as NT = eT E[log(D−1)] ∼
2.45T , where D represents the degree distribution of the un-
derlying random irregular tree. The value of d0 corresponds
to a regular tree with size scaling as (d0 − 1)T . Hence, one
can expect that for d0 − 1 < 2.45, the source is likely to be
in the center of the infection, and for d0 > 2.45 the source is
likely to be at the boundary of the infection. Since the num-
ber of nodes in the boundary is significantly larger than the
number of nodes in the center, the detection probability is
lower for d0−1 > 2.45. This is illustrated in the figure, which
matches our prediction. In general, d0 = 1 + (cid:100)e
E[log(D−1)](cid:101)
provides the best obfuscation, and it is robust for any value
above that.
In this plot, data points represent successive
even timesteps; their uniform spacing implies the message is
spreading exponentially quickly.
Figure 8 illustrates the probability of detection as a func-
tion of infection size while varying the degree distribution
of the underlying tree. The notation (3, 5) => (0.5, 0.5)
in the legend indicates that each node in the tree has de-
gree 3 or 5, each with probability 0.5. For each distribution
tested, we chose d0 to be the maximum degree of each de-
gree distribution. The average size of infection scales as
NT = eT E[log(D−1)] as expected, whereas the probability of
detection scales as (dmin − 1)−T = 2−T , which is indepen-
dent of the degree distribution. This suggests that adaptive
diffusion fails to provide near-perfect obfuscation when the
underlying graph is irregular, and the gap increases with the
irregularity of the graph.
4.2 Real World Networks
To understand how adaptive diffusion fares in realistic sce-
narios that involve cycles, irregular degrees, and finite graph
size, we ran the adaptive diffusion protocol over an under-
lying connectivity network of 10,000 Facebook users in New
Orleans circa 2009, as described by the Facebook WOSN
dataset [22]. We eliminated all nodes with fewer than three
friends (this approach is taken by Secret so users cannot
guess which of their friends originated the message), which
10010110210310410−310−210−1Average size of infection (NT)Probability of Detection, P(vML=v*) do=2do=3do=4do=5do=61/NT)
∗
v
=
v
(
P
)
∗
v
=
v
(
P
Average size of infection, NT
Average size of infection, NT
Figure 8: Adaptive diffusion no longer provides perfect ob-
fuscation for highly irregular graphs.
Figure 9: Near-ML probability of detection for the Facebook
graph with adaptive diffusion.
left us with a network of 9,502 users. Over this underlying
network, we selected a node uniformly at random as the ru-
mor source, and spread the message using adaptive diffusion
setting with d0 = ∞, which means that the virtual source is
always passed to a new node. This choice is to make the ML
source estimation faster, and other choices of d0 could out-
perform this naive choice. To preserve the symmetry of our
constructed trees as much as possible, we constrained each
infected node to infect a maximum of three other nodes in
each timestep. We also give the adversary access to the undi-
rected infection subtree that explicitly identifies all pairs of
nodes for which one node spread the infection to the other.
This subtree is overlaid on the underlying contact network,
which is not necessarily tree-structured. We demonstrate
in simulation (Figure 9) that even with this strong side in-
formation, the adversary can only identify the true message
source with low probability.
Using the naive method of enumerating every possible
message trajectory, it is computationally expensive to find
the exact ML source estimate since there are 2T possible tra-
jectories, depending on whether the virtual source stayed or
moved at each timestep.
If the true source is one of the
leaves, we can closely approximate the ML estimate among
all leaf nodes, using the same procedure as described in 4.1,
with one small modification: in graphs with cycles, the term
(deg(vjk )−1) from equation (16) should be substituted with
(degu(vjk )−1), where degu(vjk ) denotes the number of unin-
fected neighbors of vjk at time jk. Loops in the graph cause
this value to be time-varying, and also dependent on the lo-
cation of v0, the candidate source. We did not approximate
the ML estimate for non-leaves because the simplifications
used in Section 4.1 to compute the likelihood no longer hold,
leading to an exponential increase in the problem dimension.
This approach is only an approximation of the ML estimate
because the virtual source could move in a loop over the so-
cial graph (i.e., the same node could be the virtual source
more than once, in nonadjacent timesteps).
On average, adaptive diffusion reached 96 percent of the
network within 10 timesteps using d0 = 4. We also com-
puted the average distance of the true source from the es-
timated source over the infected subtree (Figure 10). We
see that as time progresses, so does the hop distance of the
estimated source from the true source. In social networks,
nearly everyone is within a small number of hops (say, 6
hops [21]) from everyone else, so this computation is not
as informative in this setting. However, it is relevant in
location-based connectivity graphs, which can induce large
hop distances between nodes.
5. DISCUSSION
Besides the adversarial model studied in this paper, anony-
mous messaging applications face challenges under alterna-
tive adversarial models that can occur in practice. Examples
include (a) an adversary that corrupts a subset of network
nodes through malware, bribery, or Sybil node creation in
order to access metadata like message timing and sender
identity; (b) an adversary that prevents nodes from follow-
ing the messaging protocol (e.g., via malware); or (c) an ad-
versarial network provider that monitor all network activity
and analyzes this activity retroactively.
All these adversarial attacks increase the chance of source
identification, which is a challenging problem for designing
anonymous protocols. To a large extent, de-anonymization
is an arms race in which there is always side information
for an adversary to exploit. The point is to make that ex-
ploitation as expensive and difficult as possible, thereby pre-
venting it from scaling. Within this arms race, anonymous
spreading protocols ensure that adversaries cannot use mes-
sage propagation patterns as a weapon.
6. REFERENCES
[1] Secret. https://www.secret.ly.
[2] Whisper. http://whisper.sh.
[3] Yik yak. http://www.yikyakapp.com/.
[4] D. Chaum. The dining cryptographers problem:
Unconditional sender and recipient untraceability.
Journal of cryptology, 1(1), 1988.
[5] I. Clarke, O. Sandberg, B. Wiley, and T.W. Hong.
Freenet: A distributed anonymous information storage
10010110210310−310−210−1Average size of infection (NT)Probability of Detection, P(vML=v*) (3,5)=>(0.5,0.5), do=5(3,6)=>(0.5,0.5), do=6(3,7)=>(0.5,0.5), do=7(3,10)=>(0.5,0.5), do=101/NT10010110210310−310−210−1100Average size of infection (NT)Probability of detection using ML leaf estimate α = 0 (Source = leaf)Lower bound on PD, 1/NT]
)
L
M
v
,
∗
v
(
H
δ
[
E
Timestep, T
Figure 10: Hop distance between true source and estimated
source over infection subtree for adaptive diffusion over the
Facebook graph.
and retrieval system. In Designing Privacy Enhancing
Technologies. Springer, 2001.
[6] H. Corrigan-Gibbs and B. Ford. Dissent: accountable
anonymous group messaging. In Proc. CCS. ACM,
2010.
[7] R. Dingledine, M.J. Freedman, and D. Molnar. The
free haven project: Distributed anonymous storage
service. In Designing Privacy Enhancing Technologies.
Springer, 2001.
[8] R. Dingledine, N. Mathewson, and P. Syverson. Tor:
The second-generation onion router. Technical report,
DTIC Document, 2004.
[9] V. Fioriti and M. Chinnici. Predicting the sources of
an outbreak with a spectral technique. arXiv preprint
arXiv:1211.2333, 2012.
[10] M.J. Freedman and R. Morris. Tarzan: A peer-to-peer
anonymizing network layer. In Proc. CCS. ACM, 2002.
[11] S. Goel, M. Robson, M. Polte, and E. Sirer. Herbivore:
A scalable and efficient protocol for anonymous
communication. Technical report, Cornell University,
2003.
[12] P. Golle and A. Juels. Dining cryptographers revisited.
In Advances in Cryptology-Eurocrypt 2004. Springer,
2004.
[13] Wuqiong Luo, W Tay, and Mei Leng. How to identify
an infection source with limited observations. 2013.
[14] E. A. Meirom, C. Milling, C. Caramanis, S. Mannor,
A. Orda, and S. Shakkottai. Localized epidemic
detection in networks with overwhelming noise. 2014.
[15] C. Milling, C. Caramanis, S. Mannor, and
S. Shakkottai. On identifying the causative network of
an epidemic. In Allerton Conference, pages 909–914,
2012.
[16] C. Milling, C. Caramanis, S. Mannor, and
S. Shakkottai. Detecting epidemics using highly noisy
data. In MobiHoc, pages 177–186, 2013.
[17] Chris Milling, Constantine Caramanis, Shie Mannor,
and Sanjay Shakkottai. Network forensics: Random
infection vs spreading epidemic. In Proceedings of the
12th ACM SIGMETRICS/PERFORMANCE Joint
International Conference on Measurement and
Modeling of Computer Systems, SIGMETRICS ’12,
pages 223–234, New York, NY, USA, 2012. ACM.
[18] B. A. Prakash, J. Vreeken, and C. Faloutsos. Spotting
culprits in epidemics: How many and which ones? In
ICDM, volume 12, pages 11–20, 2012.
[19] D. Shah and T. Zaman. Finding rumor sources on
random graphs. arXiv preprint arXiv:1110.6230, 2011.
[20] D. Shah and T. Zaman. Rumors in a network: Who’s
the culprit? Information Theory, IEEE Transactions
on, 57(8):5163–5181, Aug 2011.
[21] Johan Ugander, Brian Karrer, Lars Backstrom, and
Cameron Marlow. The anatomy of the facebook social
graph. arXiv preprint arXiv:1111.4503, 2011.
[22] Bimal Viswanath, Alan Mislove, Meeyoung Cha, and
Krishna P. Gummadi. On the evolution of user
interaction in facebook. In Proceedings of the 2nd
ACM SIGCOMM Workshop on Social Networks
(WOSN’09), August 2009.
[23] L. von Ahn, A. Bortz, and N.J. Hopper. K-anonymous
message transmission. In Proc. CCS. ACM, 2003.
[24] Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, and
Chee Wei Tan. Rumor source detection with multiple
observations: Fundamental limits and algorithms.
2014.
[25] K. Zhu and L. Ying. A robust information source
estimator with sparse observations. arXiv preprint
arXiv:1309.4846, 2013.
APPENDIX
A. LINE AND TREE PROTOCOLS
A.1 Line Protocol
v ← rightmost node in Vt
draw a random variable X ∼ U (0, 1)
if X ≤ (δH (v, v∗) + 1)/(t + 1) then
Protocol 3 Spreading on a line
Require contact network G = (V, E), source v∗, time T
Ensure: infected subgraph GT = (VT , ET )
1: V0 ← {v∗}
2: δH (v∗ − 1, v∗) ← 1 and δH (v∗ + 1, v∗) ← 1
3: t ← 1
4: for t ≤ T do
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
Vt ← Vt−1 ∪ {v + 1}
δH (v + 1, v∗) ← δH (v, v∗) + 1
v ← leftmost node in Vt
draw a random variable Y ∼ U (0, 1)
if Y ≤ (δH (v, v∗) + 1)/(t + 1) then
Vt ← Vt−1 ∪ {v − 1}
δH (v − 1, v∗) ← δH (v, v∗) + 1
t ← t + 1
Let the underlying contact network be an infinite line with
V = {...,−1, 0, 1, 2, ...} and E = {(i, i + 1) : i ∈ Z}. At time
t, an infected node v at the boundary spreads the infection to
its uninfected neighbor with probability pv,t given in Equa-
tion (3).
‘Infection’ means transmitting the message, the
2468101214100101Time (T)Hop distance between source and estimate α = 0 (Source = leaf)Lower bound, (d−1)/d * T/2hop-distance of the node (incremented by one), and the cur-
rent timestep since the start of the outbreak (incremented
by one). Note that this protocol is naturally distributed.
A.2 Tree Protocol
Protocol 4 Spreading on a tree
Require contact network G = (V, E), source v∗, time T
Ensure: infected subgraph GT = (VT , ET )
1: V0 ← {v∗}
2: s1,v∗ ← 0 and s2,v∗ ← 0
3: v∗ selects one of its neighbors u at random
4: V1 ← V0 ∪ {u}
5: s1,u ← 1 and s2,u ← 1
6: t ← 2
7: for t ≤ T do
8:
9:
10:
for all v ∈ Vt−1 with s2,v > 0 do
if s1,v = 1 then
random
v selects one of its uninfected neighbors u at
Vt ← Vt−1 ∪ {u}
s1,u ← 1 and s2,u ← s2,v + 1
s1,v ← 0
else
for all uninfected neighboring nodes w of v
Vt ← Vt−1 ∪ {w}
s1,w ← 0 and s2,w ← s2,v − 1
s2,v ← 0
t ← t + 1
11:
12:
13:
14:
15:
16:
17:
18:
19:
do
At time t = 0, the source node v∗ is initialized with
s1,v∗ = 1 and s2,v∗ = 0. At time t = 1, v∗ selects, uni-
formly at random, one of its neighboring nodes (say node u)
and passes the updated state variables s1,u = 1 and s2,u = 1
along with the message to u. The first state s1,u = 1 indi-
cates that node u is one of the ‘virtual sources’. The second
state s2,u = 1 indicates that node u will eventually be at
height 1 in the infected subtree. Afterwards, the protocol
iterates the following procedures. Any infected node v that
is not a future virtual source creates ‘offsprings’ that are not
virtual sources (s1,v(cid:48) = 0) and have heights decreased by one
(s1,v(cid:48) = s1,v−1). Any node v with height zero (i.e., s2,v = 0)
stops spreading the infection in order to ensure that v and
the true source are at the same depth from the center of Gt
for any t. An infected node v that is a future virtual source
proceeds similarly, with one difference: it chooses one of its
neighbors to be a virtual source with the second state incre-
mented by one, i.e. s2,v(cid:48) = s2,v + 1. Protocol 4 summarizes
this process and Figure 4 illustrates that if the contact net-
work is a regular tree, this process keeps the infected subtree
balanced and regular, with the true source hiding among the
leaves.
Figure 4 shows an example of this spreading algorithm.
At time t = 0, node v∗ = 0 starts spreading a rumor in the
network. At t = 1, node 0 infects node 1 and sets s1,1 = 1
and s2,1 = 1. At t = 2, node 1 infects node 3 and sets
s1,3 = 0 and s2,3 = 0. Node 1 also infects node 2 and sets
s1,2 = 1 and s2,2 = 2. At t = 3, node 2 infects node 4 and
sets s1,4 = 0 and s2,4 = 1. Node 2 also infects node 5 and
sets s1,5 = 1 and s2,5 = 3. Observe that node 3 will not
infect any of its neighbors because s1,3 = 0 and s2,3 = 0.
by sending a state information along with the message.
Each infected node u keeps two state variables: a binary
variable s1,u ∈ {0, 1} and a non-negative integer s2,u ∈
{0, 1, 2, . . . , t}. The binary state s1,u marks the future vir-
tual sources of the infected subtree; if s1,u = 1, then node u
will be the Jordan center of the graph at some point in the
future. The integer state s2,u keeps track of the eventual
‘height’ of node u in the infected subtree. In the example
above, node 3 will always be at the leaf, so it has s2,3 = 0,
where as node 9 is currently a leaf, but eventually will be
at height 2 and has s2,9 = 2, since node 5 will be at some
point a center of infected subtree of depth 3. These state
variables are computed for each node when it is infected,
and is constant over time.
B. PROOF OF PROPOSITION 2.1
Spreading rate. Consider the following time-dependent
random walk on N0 = {0, 1, . . .}. Let xt be the position of a
black dot at time t and assume that x0 = 0. At time t ≥ 1,
the dot can either move to the right: xt = xt−1 + 1 with
probability p(t, xt−1) = (xt−1 + 1)/(t + 1); or stay where it
is: xt = xt−1 with probability q(t, xt−1) = 1 − p(t, xt−1).
We claim that P (xT = k) = 1/(T + 1), for k ∈ {0, . . . , T}.
We will prove this by induction on T . Observe that for
T = 1, x1 = x0 + 1 = 1 with probability 1/2 and x1 = 0
with probability 1/2. Therefore, the claim is true for T = 1.
Assume it is true for T − 1. At t = T ,
P (xT = 0) = P (xT−1 = 0)
1 − 1
T + 1
=
1
T + 1
P (xT = T ) = P (xT−1 = T )
P (xT = k) = P (xT−1 = k − 1)
T
=
k
T + 1
T + 1
+
T + 1
1 − k + 1
T + 1
1
P (xT−1 = k)
=
,
T + 1
for k ∈ {1, . . . , T − 1}. Thus, the claim is true for any T .
Given v∗ and T , consider an infected subgraph GT gener-
ated by Protocol 3 (Line Protocol). GT can be decomposed
into two independent chains: the chain to the right of v∗ rep-
T and the chain to the left of v∗ represented by
resented by Gr
T ∪ {v∗}, where
T . Therefore, we can write GT = Gr
Gl
T ∈ {0, . . . , T}. The Line Protocol spreads on each
T,Gl
Gr
side of v∗ according to the time-inhomogeneous random walk
described above. Hence, Gr
T are independent
T and Gl
and identically distributed, and P (Gr
T = k) = 1/(T + 1)
for any k ∈ {0, . . . , T}. The number of infected nodes
T + 1 is the sum of two indepen-
NT = GT = Gr
(cid:26)
dent and uniformly distributed random variables. Thus, it
is distributed according to the triangular distribution:
k, k ≤ T + 1,
2(T + 1) − k, k ≤ 2T + 1,
P (NT = k) =
T + Gl
T ∪ Gl
1
(T + 1)2
(20)
Probability of detection. Assume that the adversary
observes an infected subgraph GT of size NT = GT = k.
Moreover, assume that the adversary knows T . Not knowing
T will only lead to worse performance. If k ≤ T + 1, then for
any v ∈ GT assumed to be the rumor source, we have that
Gr
T = k− kr − 1 with kr ∈ {0, 1, . . . , T}. There-
fore, P(GTv) = P({Gr
1/(T + 1)2. This means that all v ∈ GT are equally likely
T = k − kr − 1(cid:9)) =
T = kr} ∩(cid:8)Gl
T = kr, Gl
(cid:18)
(cid:18)
(cid:19)
1
(cid:19)
T = kr,
T = k − kr, Gl
and the maximum likelihood algorithm would select one
node v ∈ GT at random. Hence, the probability of de-
tecting the true source P(vM L = v∗GT , v∗) = 1/(T + 1)
whenever k ≤ T + 1.
If k > T + 1, then for some nodes
v ∈ GT , we have that Gr
T = k − kr − 1
with kr > T or Gr
T = kl with kl > T .
These nodes could not have generated GT in T timesteps
and therefore P(GTv) = 0 for all such nodes. The reader
can verify that there are 2k − 2T many such nodes. For the
other nodes, one can easily verify (similar to above) that
P(GTv) = 1/(T + 1)2. Therefore, the probability of detect-
ing the true source P(vM L = v∗GT , v∗) = 1/(2T − k + 1)
whenever k > T + 1. Putting it all together, we get that
Gl
C. PROOF OF PROPOSITION 2.2
First, under Protocol 4 (Tree Protocol), GT is a complete
(d − 1)-ary tree (with the exception that the root has d
children) of depth T /2 whenever T is even. GT is made up
of two complete (d − 1)-ary trees of depth (T − 1)/2 each
with their roots connected by an edge whenever T is odd.
Therefore, it follows that NT is a deterministic function of
T and is given by
NT =
1, T = 0,
− 2
2(d−1)(T +1)/2
d−2
d−2 − 2
d(d−1)T /2
d−2 , T ≥ 1, T odd ,
d−2 , T ≥ 2, T even ;
(26)
P(vM L = v
∗GT )P(GTv
∗
)
The lower bound on NT in Equation (7) follows immediately
from the above expression.
P(vM L = v
∗
) =
=
(cid:88)
T(cid:88)
GT
k=0
k + 1
1
2T(cid:88)
+
T +1
k + 1
(T + 1)2
1
2T − k + 1
2T − k + 1
(T + 1)2
2T + 1
(T + 1)2 .
=
(21)
Finally, observe that P(vM L = v∗) is not a function of v∗.
We can use the above analysis to compute the exact pos-
terior distribution of the Line Protocol when the underly-
ing contact network is a finite ring. To put a prior on the
source location, we fix the observation time T and consider
a finite ring of size larger than 2T + 1. Assuming uniform
prior for the source location on this finite ring, the next re-
mark provides the posterior distribution of the source, given
that we observe infected nodes {1, . . . , m} for some integer
m ≤ 2T + 1.
Remark B.1. Let the infected nodes be {1, 2, . . . , m}, then
∞(cid:88)
t=max{m−k,k−1}
1
(t + 1)2
− k(m − k + 1)
(cid:18) m + 1
(cid:19)
(t + 2)
∗
P(v
= kGT ) =
1
Zm
∞(cid:88)
∞(cid:88)
t=m−k
=
=
, (22)
for all k ∈ [m] where Zm is the normalizing constant to
ensure the probabilities sum to one.
Proof of Remark B.1. Denote the m infected nodes
by {1, . . . , m}, and let G∗ denote the infected subgraph.
Then, for k ≤ (1 + m)/2,
(t + 2)2
P(there exists a time T such that GT = G
∗v
∗
= k)
(23)
∗
P(Gt = G
(cid:16)
and Gt+1 (cid:54)= G
1 −(cid:16) t + 2 − k
t + 2
∗
∗v
= k)
(cid:17)(cid:16) t + 2 − (m − k + 1)
(24)
(cid:17)(cid:17)
t + 2
,
1
t=m−k
(1 + t)2
(25)
where the last line follows from Equation (20), where P(Gl
T =
T = m − k) = 1/(T + 1), and
k − 1) = 1/(T + 1), P(Gr
P(no infection at time t + 1Gt = G∗ and v∗ = k) = ((t +
2− k)(t + 1 + k− m)/(t + 2)2). For k ≥ (1 + m)/2, we have a
similar formula with summation starting from k − 1. With
the uniform prior on the finite ring, this proves Equation
(22).
For any given infected graph GT , it can be verified that
any non-leaf node could not have generated GT under the
Tree Protocol. In other words, P(GTv non-leaf node) = 0
and v could not have started the rumor. On the other hand,
we claim that for any two leaf nodes v1, v2 ∈ GT , we have
that P(GTv1) = P(GTv2) > 0. This is true because for
each leaf node v ∈ GT , there exists a sequence of state val-
ues {s1,u, s2,u}u∈GT
that evolves according to the Tree Pro-
tocol with s1,v = 1 and s2,v = 0. Further, the regularity of
the underlying graph G ensures that all these sequences are
equally likely. Therefore, the probability of correct rumor
source detection under the maximum likelihood algorithm
is given by PM L(T ) = 1/Nl,T , where Nl,T represents the
number of leaf nodes in GT . It can be also shown that Nl,T
and NT are related to each other by the following expression
This proves expression for P(cid:0)vML = v∗(cid:1) given in (8).
d − 1
Nl,T =
.
(d − 2)NT + 2
(27)
Expected distance. For any v∗ ∈ G and any T , E[δH (v∗, vML)]
is given by
∗
E[δH (v
, vML)] =
(cid:88)
(cid:88)
v∈G
GT
P(GTv
∗
)P(vML = v)δH (v
∗
, v).
(28)
As indicated above, no matter where the rumor starts from,
GT is a (d − 1)-ary tree (with the exception that the root
has d children) of depth T /2 whenever T is even. More-
over, vML = v with probability 1/Nl,T for all v leaf nodes
in GT . Therefore, the above equation can be solved exactly
to obtain the expression provided in the statement of the
proposition.
D. PROOF OF THEOREM 3.1
Spreading rate. Once again, under Protocol 1, GT is a
complete (d − 1)-ary tree (with the exception that the root
has d children) of depth T /2 whenever T is even. Whenever
T is odd, with probability α(T, h), GT is again such a (d−1)-
ary tree of depth (T + 1)/2. With probability 1 − α(T, h),
GT is made up of two (d − 1)-ary trees of depth (T − 1)/2
each with their roots connected by an edge. Therefore, it
follows that when d > 2, NT is given by
1, T = 0,
− 2
2(d−1)(T +1)/2
d−2
− 2
d(d−1)(T +1)/2
d−2
d−2 − 2
d(d−1)T /2
d−2 , T ≥ 1, T odd, w.p. (1 − α) ,
d−2 , T ≥ 1, T odd, w.p. α ,
d−2 , T ≥ 2, T even ;
(29)
NT =
Similarly, when d = 2, NT can be expressed as follows:
NT =
1, T = 0,
T + 1, T ≥ 1, T odd, w.p. (1 − α) ,
T + 2, T ≥ 1, T odd, w.p. α ,
T + 2, T ≥ 2, T even ;
(30)
The lower bound on NT in Equation (7) follows immediately
from the above expressions.
Probability of detection. For any given infected graph
GT , the virtual source vT cannot have been the source node,
since the true source always passes the token at timestep
t = 1. So P(GTv = vT ) = 0. We claim that for any two
nodes that are not the virtual source at time T , u, w ∈ GT ,
P(GTu) = P(GTw) > 0. This is true iff for any non-virtual-
T
source node v, there exists a sequence of virtual sources vi
i=0
that evolves according to Protocol 1 with v0 = v that results
in the observed GT , and for all u, w ∈ GT \ {vT}, this se-
quence has the same likelihood. In a tree, a unique path ex-
ists between any pair of nodes, so we can always find a valid
path of virtual sources from a candidate node u ∈ GT \{vT}
to vT . We claim that any such path leads to the formation
of the observed GT . Due to regularity of G and the sym-
metry in GT , for even T , P(GTv(1)) = P(GTv(2)) for all
v(1), v(2) ∈ GT with δH (v(1), vT ) = δH (v(2), vT ). Moreover,
recall that the αd(t, h)’s were designed to satisfy the distri-
bution in Equation 11. Combining these two observations
with the fact that we have (d − 1)h infected nodes h-hops
away from the virtual source, we get that for all v(1), v(2) ∈
GT \ {vT}, P(GTv(1)) = P(GTv(2)). For odd T , if the vir-
tual source remains the virtual source, then GT stays sym-
metric about vT , in which case the same result holds. If the
virtual source passes the token, then GT is perfectly sym-
metric about the edge connecting vT−1 and vT . Since both
nodes are virtual sources (former and present, respectively)
and T > 1, the adversary can infer that neither node was the
true source. Since the two connected subtrees are symmetric
and each node within a subtree has the same likelihood of
being the source by construction (Equation 11), we get that
for all v(1), v(2) ∈ GT \{vT , vT−1}, P(GTv(1)) = P(GTv(2)).
Thus at odd timesteps, P(vM L = v∗) ≥ 1/(NT − 2).
|
1808.06200 | 1 | 1808 | 2018-08-19T11:52:20 | Ensemble-based Overlapping Community Detection using Disjoint Community Structures | [
"cs.SI",
"physics.soc-ph"
] | While there has been a plethora of approaches for detecting disjoint communities from real-world complex networks, some methods for detecting overlapping community structures have also been recently proposed. In this work, we argue that, instead of developing separate approaches for detecting overlapping communities, a promising alternative is to infer the overlapping communities from multiple disjoint community structures. We propose an ensemble-based approach, called EnCoD, that leverages the solutions produced by various disjoint community detection algorithms to discover the overlapping community structure. Specifically, EnCoD generates a feature vector for each vertex from the results of the base algorithms and learns which features lead to detect densely connected overlapping regions in an unsupervised way. It keeps on iterating until the likelihood of each vertex belonging to its own community maximizes. Experiments on both synthetic and several real-world networks (with known ground-truth community structures) reveal that EnCoD significantly outperforms nine state-of-the-art overlapping community detection algorithms. Finally, we show that EnCoD is generic enough to be applied to networks where the vertices are associated with explicit semantic features. To the best of our knowledge, EnCoD is the second ensemble-based overlapping community detection approach after MEDOC [1]. | cs.SI | cs |
Ensemble-based Overlapping Community Detection
using Disjoint Community Structures
Tanmoy Chakraborty1, Saptarshi Ghosh2, Noseong Park3
1 Dept. of CSE, IIIT Delhi, India
2 Dept. of CSE, IIT Kharagpur, India
3 Dept. of Information Sciences and Technology, George Mason University,
[email protected], [email protected], [email protected]
(Accepted in Knowledge-Based Systems)
USA
Abstract
While there has been a plethora of approaches for detecting disjoint com-
munities from real-world complex networks, some methods for detecting
overlapping community structures have also been recently proposed. In this
work, we argue that, instead of developing separate approaches for detecting
overlapping communities, a promising alternative is to infer the overlapping
communities from multiple disjoint community structures. We propose an
ensemble-based approach, called EnCoD, that leverages the solutions produced
by various disjoint community detection algorithms to discover the overlap-
ping community structure. Specifically, EnCoD generates a feature vector
for each vertex from the results of the base algorithms and learns which fea-
tures lead to detect densely connected overlapping regions in an unsupervised
way. It keeps on iterating until the likelihood of each vertex belonging to its
own community maximizes. Experiments on both synthetic and several real-
world networks (with known ground-truth community structures) reveal that
EnCoD significantly outperforms nine state-of-the-art overlapping community
detection algorithms. Finally, we show that EnCoD is generic enough to be
applied to networks where the vertices are associated with explicit semantic
features. To the best of our knowledge, EnCoD is the second ensemble-based
overlapping community detection approach after MEDOC [1].
Keywords: Ensemble algorithm, Overlapping communities, Community
detection
Preprint submitted to Knowledge-Based Systems
August 21, 2018
1. Introduction
Real-world networks are complex, high-dimensional and multi-faceted,
thus can be interpreted in many different ways. A fundamental property of
a real-world network is its "community structure", which is often assumed
as organizational units in social networks [2], functional modules in biolog-
ical networks [3], scientific communities in citation networks [4], and so on.
Despite a huge amount of effort devoted in past decade or more [5, 6], the
problem of community detection (CD) has turned out to be more compli-
cated because of two reasons -- (i) CD is an ill-defined problem [5]; therefore
one can obtain multiple solutions for a given network, each of which is impor-
tant in its own way. Moreover a single objective function (even the "best", if
exists) may not be able to effectively model such vast dimensions present in
a network. (ii) The vertices in real-world networks often belong to multiple
communities [7, 8], leading to the community structure being overlapped.
None of the existing disjoint CD algorithms are able to detect overlapping
regions inside a community structure.
Although a growing body of literature is focusing on discovering the over-
lapping community structure after the introductory work of Palla et al. [7],
the number is considerably less compared to the vast amount of literature on
disjoint CD. Moreover, in recent years, Chakraborty et al. [9, 1] showed that
one can successfully detect overlapping regions inside a community struc-
ture by leveraging huge number of diverse and accurate disjoint community
structures.
In this paper, we attempt to utilize multiple views of the disjoint commu-
nity structure observed in a given network (obtained from different disjoint
CD algorithms) by merging these views, distilling all their good qualities
into an ensemble solution [10, 11]. The motivation for our work comes from
the fact that ensemble approaches have already been proved to be successful
in clustering and classification tasks [12]. Hence, ensemble approaches, if
designed properly, can perform well in overlapping community detection as
well. However, the challenge in applying ensemble techniques to network-
based analysis is due to the lack of sufficient information such as representa-
tive features of each vertex, extent of similarity between pair-wise vertices,
and so on.
Empirical observations and Motivation. Our algorithm is primarily
2
Figure 1: Conditional probability P (in y-axis) of (a) existence of an edge between
two vertices, and (b) common overlapping community (OC) membership of two
vertices in the ground-truth community structure of six real networks, given the
fraction of the base disjoint communities that both the vertices share. We conclude
that the more the vertices share common base disjoint communities, the more the
chance that they are connected in the graph and belong to the same overlapping
community.
built on two interesting empirical observations on six large real networks (see
Section 4 for dataset description). While analyzing the ground-truth commu-
nity structures of these networks, we find many solutions by running each of
the base disjoint CD algorithms on every single network. The solutions have
significant (dis)similarity with the ground-truth, corroborating the observa-
tion in [13]. We represent the memberships of each vertex in different base
disjoint communities by a feature vector. Then we examine the probability
of two vertices u and v being connected in the network, given that they have
ku,v fraction of common base community memberships. Figure 1(a) plots
this conditional probability for the six networks. We see an increasing re-
lationship, i.e., the more base disjoint communities a pair of vertices has in
common, the higher the probability of an edge connecting them.
Further, we examine the conditional probability that two vertices belong
to the same ground-truth overlapping community given that they have ku,v
fraction of common base disjoint community memberships. Once again we
observe a positive correlation in Figure 1(b). Thus, the probability of a pair
of vertices belonging to the same overlapping community increases with the
increase of their shared base community memberships. The above observa-
tions motivated us to develop an overlapping CD algorithm, by combining
3
disjoint community structures identified for a given network.
Ensemble-based overlapping community detection. Our method
iteratively learns major dimensions of features for vertices that lead to densely-
connected groups.
In practice, since base disjoint CD algorithms produce
many (and significantly different) community structures from a network, we
leverage this information to extract the latent feature information associated
with each vertex. 1 Our algorithm, named EnCoD is built on two hypotheses
-- first, an overlapping community is formed by a group of densely-connected
vertices; second, vertices within a community have significantly high fea-
ture similarity. We represent the memberships of each vertex in different
base disjoint communities by a feature vector, and then use the similarity
between two vertices. We then learn important features that may lead to
discover densely-connected overlapping communities [14, 15]. To the best of
our knowledge, EnCoD is the second algorithm after MEDOC [1] to propose
ensemble-based overlapping CD algorithm by leveraging several disjoint com-
munity structures. Note that other two algorithms, namely PEACOCK [16]
and PVOC [9] can detect overlapping community from a single disjoint com-
munity structure by applying an efficient post-processing technique. They
do not leverage multiple disjoint community structures.
Summary of the evaluation. Experiments are conducted on both syn-
thetic and six large real-world networks with known ground-truth overlapping
community structure. We experiment with various disjoint CD algorithms as
the base algorithms for EnCoD. For comparative evaluation, we choose seven
non-ensemble based overlapping CD algorithms. Additionally, we compare
EnCoD with PVOC [9] and MEDOC [1], two most recent overlapping CD
algorithms that leverage disjoint community structures. Few notable obser-
vations are as follows.
(i) EnCoD is almost independent of how perfect the base CD algorithms are;
however, stronger base algorithms have more impact in the aggregation stage
than the weaker base algorithms. Also, the accuracy of EnCoD never de-
creases with the increase in base solutions.
(ii) EnCoD tends to get saturated after aggregating a certain number of base
solutions, after which there is almost no effect on the final performance. How-
ever, the accuracy never decreases with the increase in base solutions.
1Note that the set of communities returned by a CD algorithm is termed as 'community
structure'.
4
(iii) On average, EnCoD outperforms the best baseline overlapping CD algo-
rithm in terms of the overlapping NMI metric (ON M I) [17], Ω index and
F-Score.
(iv) We further apply EnCoD to networks where, apart from the topological
structure, every vertex is associated with additional feature information. In
such cases, EnCoD systematically combines the features into the model and
produces more accurate overlapping community structure.
Contributions of the paper. The major contributions of the paper
are four-fold:
• Ensemble algorithms for community detection have rarely been stud-
ied. This paper will pave the way for enhancing the state-of-the-art on
ensemble based community detection.
• The idea of using the membership of a vertex in different disjoint com-
munity structures as features is unique and, to our knowledge, has not
been used earlier in community detection.
• Empirical results indicate that EnCoD is either as good as the best
baseline CD algorithm, or sometimes performs even better than that.
Therefore, one can rely on such ensemble framework instead of choosing
and picking the best one from the jungle of CD algorithms available at
present.
• The framework used in EnCoD is generalized enough to be used to com-
bine any feature set of vertices to detect community structure (as shown
in Section 6). Therefore, if the topology of a network is incomplete and
sparse in nature and the properties of vertices are available, one can
use the proposed framework to combine the features into the model for
overlapping community detection.
2. Related Work
Due to the abundance of literature on community detection (CD) algo-
rithms [5, 6, 18], we restrict our discussion to some selected works that we
deem as pertinent to our study. Two extensive survey articles on CD are [5]
and [6].
Traditional community detection algorithms. Most of the early
research in CD assumed the communities to be disjoint. Many different
5
CD approaches have been proposed, including, modularity optimization [19,
20, 21], information theoretic approaches [22], vertex similarity-based ap-
proaches [23], significance-based approaches [24], label propagation [25], diffusion-
based approach [26], and so on (see [5, 6] for surveys). Gradually, researchers
realized that in real-world networks, a vertex can belong to multiple com-
munities, resulting overlapping community structure. Palla et al. proposed
'CFinder' [7], the first ever method to detect overlapping communities based
on clique-percolation technique. Subsequently, several overlapping CD tech-
niques have been proposed, including modified modularity [27], fitness func-
tion [28], local density function [29], affinity propagation function [30], in-
tegrated approach [31], node location analysis based approach [32], non-
negative matrix factorization [8], and so on. Recently, Li et al. [33] proposed
a local spectral clustering for overlapping community detection. Huang et
al.
[34] proposed an overlapping community detection algorithm in het-
erogeneous social networks via the user model. Sattari and Zamanifar [35]
suggested a spreading activation-based label propagation algorithm for over-
lapping community detection in dynamic social networks. Notably, though
there have been several recent studies on the topic, the depth of study on
overlapping community detection is much lesser than that for the disjoint
case.
Ensemble-approach for community detection. Ensemble approach
has been well-studied in traditional data mining for clustering data points
(see [12] for a detailed review). These approaches can be classified into two
categories [12]: object co-occurrence based approaches and median parti-
tioning based approaches. However, this number is significantly less when
we talk about clustering vertices in the network. A pioneering attempt was
made by Dahlin and Svenson [10] to propose ensemble clustering for network
data. Raghavan et al.
[36] showed the effectiveness of merging outputs of
several community detection algorithms. Ovelgonne and Geyer-Schulz pro-
posed CGGC [37], an ensemble-based modularity maximization approach.
Kanawati proposed YASCA [38] that for each seed vertex considers its ego-
centric network, partitions the network in different ways and combines the
outputs. He further tuned two parameters -- quality and diversity of the par-
titions for final combination [39]. Recently, Lancichinetti and Fortunato [11]
proposed 'consensus clustering' which utilizes a consensus matrix for disjoint
community detection. However, all the above works focused on identifying
disjoint communities.
6
Recently, two algorithms, PEACOCK [16] and PVOC [9] argued that
intelligently post-processing a disjoint solution can lead to the detection of
overlapping community structure. PVOC was reported to outperform PEA-
COCK [9]. The difference between PVOC and EnCoD is that PVOC uses
a novel post-processing technique that modifies a given disjoint community
structure using a metric called 'permanence' [40, 41], whereas EnCoD does
not do any post-processing; rather it considers multiple disjoint community
structures and uses them as features of a vertex for detecting overlapping
regions. Another ensemble algorithm, called MEDOC [1] uses the idea of
meta community (community of communities).
It creates a multi-partite
network using the base disjoint community structure. After this, it runs
an existing CD algorithm to partition the multi-partite network. Finally, a
membership function is to determine the membership of a vertex to a com-
munity. EnCoD does not create any meta-community using base community
structures; rather it uses them to generate features for each vertex to be used
further in the optimization algorithm. In Section 5.2, we will show that our
algorithm outperforms both PVOC and MEDOC.
3. Ensemble-based Overlapping CD Algorithm
We design an overlapping CD algorithm by leveraging the solutions ob-
tained from several disjoint CD algorithms. This section details the proposed
overlapping CD algorithm, named EnCoD. We start by formally defining the
ensemble-based overlapping community detection problem.
Definition 1. (Ensemble-based Overlapping Community Detection)
Given a network G = (V, E) and a set of M disjoint community detection al-
gorithms AL = {Alm}M
m=1, we aim at grouping the vertices into communities
OC = {OC1, OC2,···} in such a way that a vertex may belong to multiple
i OCi = V and
(cid:64)i : OCi = φ.
communities and the following conditions are satisfied: (cid:83)
We now describe our algorithm, called EnCoD, an Ensemble based Over-
lapping Community Detection. The overall framework of the algorithm is
presented in Algorithm 1 and important notations are summarized in Table
1.
network G(V, E) and the set of M base algorithms AL = {Alm}M
Inputs to the algorithm: Two main inputs of the algorithm are the
m=1 which
7
Table 1: Important notations used in this paper.
Notation
G(V, E)
AL
Ck
m
Γm
Γ
¯a
ξ
OC
t
OC
ζ
τL
Fv
m=1, set of all M K base disjoint community structures
k=1, set of base disjoint community structures discovered by base algorithm
m }, base community structure discovered by algorithm Alm on kth vertex
Description
An undirected network with sets of vertices V and edges E
m=1}, set of M base disjoint CD algorithms
{AlM
{C 1k
m , ..., C ak
ordering
{Ck
m}K
Alm on K different vertex orderings
ΓM
Average size of a base community structure
¯aM K, approx. total number of communities in Γ
{OC1, OC2,···}, final overlapping community structure consisting of overlapping
communities
Overlapping community structure at iteration t of EnCoD
{τ1, τ2,···}, set of thresholds where τj corresponds to overlapping community OCj
Global community threshold used to control the community size
Feature vector of vertex v
yield disjoint community structures. Apart from these, one needs to specify:
K, number of vertex orderings of a particular network on which a base CD
algorithm will run;2 INV(v, C), an involvement function that will determine
to what extent v is a part of a base community C; SIM(cid:48)(C, v), a function
that will measure the similarity of a vertex v with a community C; and
τL, a threshold that confirms the minimum similarity value required by the
vertices in a community to remain together, failing which the community is
discarded. Possible definitions of these functions are discussed in Section 5.1.
Summary of the algorithm: Motivated by the ego-centric circle de-
tection algorithms proposed in [43, 44], we design EnCoD that aims at max-
imizing the likelihood of the membership of each node inside a community.
EnCoD starts by running all the base disjoint CD algorithms on different
vertex orderings3 of a network, which produce dissimilar base community
structures (Section 3.1). Following this, the base community information is
used to generate a feature vector for each vertex (Section 3.2); this in turn
transforms the vertices in the network into a feature space. The algorithm
now tries to infer the overlapping community structure from the vector repre-
sentation of vertices, by iteratively optimizing an objective function (detailed
in Section 3.3). The actual iteration starts by assigning each vertex to a sin-
2Previous research reported that most disjoint CD algorithms produce different com-
munity structures depending on the ordering of vertices in the input [42, 40, 11].
3We here use random vertex ordering strategy [42].
8
gleton community, and a high similarity threshold value is assigned to each
community to maintain high integrity among its constituent vertices. In each
iteration, the algorithm manipulates the community structure by randomly
removing vertices from their assigned communities and allocating vertices to
some unassigned communities, such that the similarity condition is not vio-
lated (Section 3.4). After each iteration, the similarity threshold associated
with each community is updated (Section 3.5). The iteration continues as
long as the value of the objective function does not decrease.
In the rest of the section, we elaborate the subroutines mentioned in
Algorithm 1.
3.1. Generate Base Communities
m = {C 1k
Assume that we are given a network G = (V, E) and M different base CD
algorithms AL = {Alm}M
m=1. For each such base algorithm Alm, EnCoD gen-
erates K different vertex orderings of G and runs Alm on each vertex ordering.
This results in K different community structures denoted as Γm = {Ck
k=1,
m } constitutes a specific
where each community structure Ck
partitioning of vertices in G. The size of each Ck
m might be different. We
choose to use different vertex orderings of G since it has been shown that
many of the disjoint CD algorithms produce different community structures
depending on the ordering of vertices in the input [40, 11]. Here we use ran-
dom vertex ordering strategy which ensures that the base algorithm starts
from different seed vertices without any predefined bias and produces diverse
community structures. At the end of this step, we obtain Γ, a set of M K
base community structures (Step 3 of Algorithm 1).
m ,··· , C ak
m}K
3.2. Generate Feature Vectors for Vertices
The ensemble step in Function 1 (which is invoked in step 5 of Algorithm
1) intends to leverage the base community structures Γ to construct the
feature vector of vertices.
Definition 2. (Feature vector for a vertex) Given a set of base com-
munity structures Γ, the feature vector of vertex v is denoted by Fv, whose
ith entry Fv(i) = P (Civ) indicates the probability of v being a member of
the base community Ci, given vertex v is observed. The length of Fv is
m. The value of P (Civ) is derived by mea-
Fv = ξ = (cid:80)
(cid:80)Ck
Ck
suring the involvement of v into Ci.
Γm∈Γ
m∈Γm
9
Algorithm 1: EnCoD: An Ensemble based Overlapping Community
Detection
Data: Network G(V, E);
A set of base algorithms AL = {Alm}M
K: No of iterations;
INV(., .): Involvement function;
SIM(cid:48)(., .): Vertex-to-community similarity function;
τL: Lower limit for community threshold
Result: Overlapping community structure OC
m=1;
1 Γ = φ
2 for each algorithm Alm ∈ AL do
Generate K different vertex orderings of G, run Alm on each vertex ordering and obtain K
disjoint community structures Γm. The size of each community structure Ck
different. Each such set is denoted by Ck
Γ = Γ ∪ Γm
m }
m , ..., Cak
m ∈ Γm is
m = {C1k
5 for each v ∈ V do
Fv = ExtractF eatures(v, Γ, INV);
// Initialization
7 OC = φ
8 OC0 = φ
9 ζ0 = φ
10 for each v ∈ V do
0 = {v}
0
0
13
14
12
11
OCv
OC0 = OC0 ∪ OCv
0 = ∞
τ v
ζ0 = ζ0 ∪ τ v
15 P logl = −1
16 Clogl = −1
17 t = 1
18 OCt = OC0
19 ζt = ζ0
20 while Clogl ≥ P logl do
// Final overlapping community structure
// Initial set of overlapping community
// Initial set of community threshold
// Each vertex is in each community
// Arbitrary high threshold
// Previous log likelihood
// Current log likelihood
// Current number of iterations
3
4
6
21
22
23
24
25
26
27
28
29
30
31
32
OC = OCt
P logl = Clogl
OCt+1 = M anipulateComm(V, OCt)
// Update thresholds and communities
for OCj
t+1 ∈ OCt+1 do
t+1 ← min{SIM(cid:48)(OCj
τ j
if τ j
t+1, v)v ∈ OCj
t+1}
t+1 < τL then
// Threshold condition is violated
OCt+1 ← OCt+1 (cid:114) {OCj
for each v ∈ OCj
t+1 do
t+1}
OCt+1 ← OCt+1 ∪ {v}
ζt+1 ← ζt+1 (cid:114) τ j
t+1
Clogl = lζt+1 (G; OCt+1) [Eq. 8]
t = t + 1
33 return OC
10
Function 1: ExtractF eatures(Current vertex: v, Set of
base disjoint communities: Γ, Involvement function: INV)
1 Fv = φ; Dv = 0; ξ = 0; AF (v) = φ;
2 for each Γm ∈ Γ do
// Auxiliary vector
;
for each Ck
m ∈ Γm do
for each C ∈ Ck
Measure dC
AFv = AFv ∪ {dC
v };
v ≥ Dv then
if dC
Dv = dC
v ;
m do
v = 1 − INV(v, C);
ξ = ξ + 1;
10 for each AFi(v) ∈ AF (v) do
Compute P (Civ) =
Fv = Fv ∪ {P (Civ)};
ξ.Dv +ξ−(cid:80)ξ
Dv−AFi(v)+1
k=1 AFk(v)
3
4
5
6
7
8
9
11
12
13 return Fv
We now describe how we compute Fv for a vertex v using Function 1. To
start with, we measure INV(v, C), the involvement v into each base commu-
nity C ∈ Ck
m (see Section 5.1 for the possible definitions of INV). Note if v is
not a part of a certain community C, we leave the corresponding field as zero.
The value returned by INV is subtracted from 1 to get the distance of v from
the community (Step 5). Following this, we construct an auxiliary feature
vector AF (v) for vertex v, which consists of elements indicating the distance
of v from each base community (Step 6). The number of communities ξ ∈ Γ
can be approximated by ξ = ¯aM K, where the average size of a community is
denoted by ¯a. Therefore, the size of AF (v) is same as ξ. Dv = maxi AFi(v)
denotes the maximum distance of v from any of the base community present
in Γ (Step 8).
To construct the actual feature vector Fv for vertex v, we measure the
probability associated with each base community Ci given that vertex v is
observed. For a given vertex v, the community label Ci is assumed to be
a random variable from a distribution with probabilities {P (Civ)}ξ
i=1. One
can provide a non-parametric estimation of such probabilities based on the
evidences of the data and the community structure. To transfer the distance
into probability (the smaller the distance, the larger the probability), we
use the following conditional probability [1] for vertex v to be a part of Ci
11
(Step 11):
Dv − AFi(v) + 1
ξ.Dv + ξ −(cid:80)ξ
P (Civ) =
k=1 AFk(v)
The denominator of the above equation ensures that (cid:80)ξ
(1)
i=1 P (Civ) = 1.
Adding 1 in the numerator ensures a non-zero probability for all vertex-
community pairs. For smaller distance values, P (Civ) increases proportion-
ately to Dv − AFi(v), i.e., the larger the deviation of AFi(v) from Dv, the
more the increase. As a consequence, the corresponding community Ci be-
comes more likely for v. Now we can construct the actual feature vector Fv
for v as Fv = {P (Ckv)}ξ
k=1 (Step 12). This process essentially maps a vertex
to a ξ-dimensional vector space.
3.3. Objective Function
After the ensemble step, each vertex is represented by a feature vec-
tor. Our method of detecting the overlapping community structure (denoted
by OC = {OC1, OC2,···}) aims at maximizing a certain objective function
which represents the likelihood of each vertex being a part of its own commu-
nity. The likelihood function assumes that if two vertices u and v are found
to have very similar feature vectors, then they -- (i) should be connected by
an edge in the network, and (ii) should stay in the same community. These
two assumptions are supported by the observations in Figure 1. We use the
knowledge of the edges in the network to validate the inferred community
structure.
To start with, let us define few measures required to formulate the ob-
jective function. Note that all the communities mentioned in this subsection
correspond to the overlapping communities that we aim to detect from a
network.
Definition 3. Similarity between two vertices. For vertices u and v, let
i=1 and Fv = {F i
u}ξ
Fu = {F i
v}ξ
i=1 represent their feature vectors respectively.
Then the similarity between two vertices u and v is calculated using the cosine
similarity among the feature vectors.
SIM(u, v) =
Fu.Fv
FuFv =
2
(2)
(cid:80)ξ
(cid:113)(cid:80)ξ
i=1 F i
2(cid:113)(cid:80)ξ
uF i
v
i=1 F i
u
i=1 F i
v
12
We also tried other similarity measures (see Section 5.1), and obtained best
results with cosine similarity. With this similarity measure, we further define
the similarity of a vertex with a community as follows.
Definition 4. Similarity between a vertex and a community. Given
a community OC and a vertex v, the similarity of v and OC is calculated as
the average similarity of v with all other vertices in OC.
(cid:80)
SIM(cid:48)(OC, v) =
u∈OC
SIM(u, v)
OC
(3)
Each community is associated with a minimum similarity threshold which
every vertex needs to satisfy in order to be a part of the community.
Definition 5. Similarity threshold per community. Each community
OCj in our model is assigned a similarity threshold τj in such a way that if
vertex v ∈ V is in OCj then it should satisfy SIM(cid:48)(OCj, v) ≥ τj.
Given OC = {OC1, OC2,···}, an overlapping community structure and
a set of thresholds ζ = {τ1, τ2,···}, we then define a membership similar-
ity between two vertices based on their membership in different overlapping
communities.
Definition 6. Membership similarity of pair-wise vertices. The mem-
bership similarity of two vertices u and v is defined in terms of their mem-
berships in different communities as follows:
where,
β(u, v) = exp{[β1(u, v)]2 − [β2(u, v)]2}
(cid:88)
(cid:88)
OCj :{u,v}⊆OCj
OCj :{u,v}(cid:42)OCj
β1(u, v) =
β2(u, v) =
(SIM(u, v) − τj + λ)
−1
(SIM(u, v) − τj + λ)
−1
(4)
(5)
We consider {u, v} ⊆ OCj if both the vertices u and v belong to the same
community OCj; whereas {u, v} (cid:42) OCj if OCj does not contain either u
or v or both. One should consider λ as large as possible so that individual
13
terms in the summation are always positive.
In practice, we set λ as the
maximum of all the threshold values corresponding to the communities men-
tioned in Definition 5 (i.e., λ = max{τ1, τ2,···}). The value of β1(u, v) (resp.
β2(u, v)) tends to become high if both u and v share (resp. do not share)
common communities with very high thresholds. Furthermore, the value of
membership similarity β(u, v) depends not only on the common community
memberships, but also on the threshold specific to the communities. In par-
ticular, with the increase of the number of the common communities where
both u and v belong to and the community threshold, the value of β(u, v)
also increases.
Given the membership similarity of all pair-wise vertices, we further define
the probability that a pair of vertices u and v are connected by an edge Eu,v
as follows:
p(Eu,v ∈ E) =
β(u, v)
1 + β(u, v)
(6)
Similarly, the probability of two vertices not being connected is p(Eu,v /∈
E) = 1 − p(Eu,v ∈ E). The value of p(Eu,v ∈ E) increases with the increase
in β(u, v), and add-one smoothing is applied to p(Eu,v ∈ E) in order to avoid
"divided by zero" situation. One can thus obtain the predicted probability
p(Eu,v ∈ E) from the information of the overlapping community structure OC
and the set of thresholds ζ. The idea is that, the more the similarity between
the feature vectors of two vertices, the common communities both of them
are part of and the similarity threshold of the common communities, the more
the membership similarity between them. Given the probability estimation,
our model should therefore assure that its resultant network corresponds to
the real network.
Let us assume that each edge is generated independently. Then the joint
probability of G and OC is estimated as:
Pζ(G; OC) =
p(Eu,v /∈ E)
(7)
(cid:89)
Eu,v∈E
(cid:89)
Eu,v /∈E
p(Eu,v ∈ E)
14
The log likelihood of the joint probability is:
lζ(G; OC) = log (Pζ(G; OC))
(cid:88)
log (p(Eu,v /∈ E))
(cid:88)
(cid:88)
(cid:88)
Eu,v∈E
Eu,v∈E
=
=
=
Eu,v /∈E
log (p(Eu,v ∈ E)) +
log (β(u, v)) − (cid:88)
φ(u, v) − (cid:88)
Eu,v∈V ×V
(u,v)∈E
Eu,v∈V ×V
log(1 + β(u, v))
(8)
log(1 + exp{φ(u, v)})
where φ(u, v) = log (β(u, v)) = ([β1(u, v)]2 − [β2(u, v)]2)
EnCoD attempts to maximize the objective function mentioned in Equa-
tion 8 (see line 31 in Algorithm 1) in order to obtain the final overlapping
community structure OC.
Function 2: M anipulateComm(Set of vertices: V, Current
overlapping community structure at iteration t: OC
t)
1 OCt+1 = OCt
2 for each v in V do
3
4
5
6
7
8
9
10
11
12
13
t = {OCj
t = {OCj
t ∈ OCt ∧ v ∈ OCj
t OCj
t }
S1v
t OCj
t ∈ OCt ∧ v /∈ OCj
t }
S2v
(cid:109)
// Rand(x, y): a random number between x and y
p1 ← Rand(1, S2v
t )
t
(cid:109)
ACv
S1v
t
p2 ← Rand(1, S1v
t )
t
RCv
S1v
t
Choose randomly OCAC such that OCAC ⊆ S2v
for each OCj
t+1 ←(cid:108) p1+S1v
t+1 ←(cid:108) p2+S1v
t ∈ OCAC do
t+1 ∪ {v}
t+1 ← OCj
OCj
Choose randomly OCRC such that OCRC ⊆ S1v
for each OCj
t ∈ OCRC do
(cid:114) {v}
t+1 ← OCj
t+1
14
OCj
15 return OCt+1
t , OCAC = ACv
t+1
t , OCRC = RCv
t+1
3.4. Manipulate Community Structure
The framework for manipulating the overlapping community structure in
each iteration is shown in Function 2. The function originally starts with
the initializations mentioned in lines 7-9 of Algorithm 1. Initially at itera-
tion t = 0, each vertex v is assigned to a separate community OC v
0 with a
15
very high threshold value τ v
0 . In every iteration, we change the memberships
of v by removing it randomly from certain communities it belongs to, and
assigning it to certain communities where it did not belong to. The thresh-
old corresponding to each community is updated accordingly such that the
constraint in Definition 5 is not violated. For a certain community Cj, if
threshold τj falls below a certain lower limit τL, the community is discarded
because such a community is too heterogeneous to represent a dense group
in our model. The value of τL is empirically determined as described in Sec-
tion 5.1. Since we intend to discover the communities of each vertex, in every
iteration, we concentrate more on those vertices which are yet assigned to
less number of communities, than those vertices which are already assigned
to many communities. Therefore, with the increase in the number of com-
munities a vertex is already part of after iteration t, it is less likely that the
community membership of v is manipulated at iteration t + 1.
t , OC 2
t = {OC 1
t OC j
t ∈ OC
t ∧ v ∈ OC j
At each iteration t, the function M anipulateComm takes the set of
t ,···}. Then for each vertex v,
overlapping communities OC
t } indicates the set of communities where
t = {OC j
S1v
t ∧ v /∈ OC j
t }
v belongs to at iteration t. Similarly, S2v
indicates those set of communities where v is currently not a member of.
t+1 denote the number of communities to add v to, and RC v
t+1
denote the number of communities to remove v from. These variables are
measured as follows:
t+1 ←
(cid:24) p2 + S1v
(cid:24) p1 + S1v
t = {OC j
t OC j
t ∈ OC
, RC v
t+1 ←
Now, let AC v
(cid:25)
t
AC v
S1v
t
(cid:25)
t
S1v
t
(9)
t) such that the value of RC v
t+1 to add v to, never exceeds S2v
t) such that the number of
Here, p1 is a random integer chosen from [1,S2v
t, indicating the number
communities AC v
of v's current communities. Similarly, p2 is an integer randomly chosen from
t (number
[1,S1v
of communities that v is currently part of). Note both the values AC v
t+1 and
t, ensuring that, the more
RC v
the number of communities v is currently part of, the less the manipulation
of v in the current iteration, and vice versa.
t+1 tend to decrease with the increase of S1v
t+1 is less than or equal to S1v
After selecting the number of communities v is to be added to and to be
t randomly
t+1 and assign v to OCAC (Step 12). Similarly, we
t+1 many communities (indicated by the set OCRC) from
removed from, we choose the set of communities OCAC from S2v
such that OCAC = AC v
randomly choose RC v
16
t and remove v from it (Step 14). The corresponding changed communities
S1v
are updated accordingly.
3.5. Update Thresholds and Compute Objective Function
Once the manipulation of the current overlapping community structure is
over (as described above), we obtain a new overlapping community structure
OC
t+1. The next task is to update the threshold corresponding to the new
overlapping community structure (Steps 23-31 in Algorithm 1). For commu-
nity OC j
t+1 as the minimum value of
all the similarities of the OC j
t+1 itself, i.e.,
t+1} (Step 25). This assignment ensures
t+1 = min{SIM(cid:48)(OC j
t+1, v)v ∈ OC j
τ j
that Definition 5 is never violated.
t+1's constituent vertices with OC j
t+1 ∈ OC
t+1, we set the new threshold τ j
t+1 falls below τL, we discard OC j
Apart from the minimum threshold assigned to each community, we also
maintain another global threshold τL, which ensures the overall coherence
among the members in each community. Once all the community-centric
thresholds are updated, we further check whether all these thresholds are
higher than τL (Step 26). If some threshold τ j
t+1 corresponding to commu-
nity OC j
t+1 and set each of its constituent
members as a separate community (Steps 26 -- 29). The value of τL controls
the size of the final overlapping communities -- a higher value of τL results in
smaller community size. The selection of the value of τL is described later in
Section 5.1.
Finally, we compute the log likelihood after the current iteration lζt+1(G; OC
using Equation 8 (Step 31) and compare it with lζt(G; OC
t) (Step 20). If the
former is greater than the latter, we keep the current community structure
OC
t+1 and the current set of thresholds ζt+1 and continue the iteration.
Otherwise, we discard the updated sets and retain the sets obtained in the
previous iteration (Step 21). We terminate the process when there is no
sufficient increase of the log likelihood. Note that this step is not shown in
Algorithm 1 (which rather shows that the iteration immediately stops once
the condition is violated) as it depends on the users' confidence on the num-
ber of iterations she wants to continue after the log likelihood condition is
violated. In practice, continuing the iterations ensures that the algorithm
does not get stuck at any local optima of the objective function.
3.6. Complexity Analysis
EnCoD terminates when it reaches a maxima of the objective function and
the objective function does not change further. In the worst case, after any
t+1)
17
iteration the maximum number of overlapping communities is V and the
maximum number of vertices within each community is also V . Therefore,
the runtime after each iteration is O(V + OC). Importantly, a manipula-
tion of the current community structure is only possible if the log likelihood
increases. Therefore, EnCoD generally converges after a finite number of it-
erations. In practice, we assume that the local maxima is reached if the log
likelihood does not change after V iterations.
Note that, since EnCoD is an ensemble algorithm, it requires the running
of all base algorithms. However, speedup might be achieved by parallelizing
the base algorithms, or by using fewer base algorithms (potentially at the
cost of performance, as analyzed later in Section 5).
Table 2: Description of the real-world networks (τ : avg. edge-density per com-
munity, ¯c: avg. community size, Vc: avg. number of community memberships per
vertex).
Community type
Reference
Network
Senate
Flickr
Coauthorship Researcher
Youtube
LiveJournal
Orkut
User
User
User
Vertex type Edge type
Senate
User
Similar voting pattern Congress
Friendship
Collaborations
Friendship
Friendship
Friendship
Joined group
Publication venues
User-defined group
User-defined group
User-defined group
[45]
[46]
[3]
[8]
[8]
[8]
Vc
4.76
18.96
10.45
2.27
3.09
95.93
Network
Senate
Flickr
Coauthorship
Youtube
LiveJournal
Orkut
# vertices # edges
1,884
80,513
391,526
1,134,890
3,997,962
3,072,441
16,662
5,899,882
873,775
2,987,624
34,681,189
117,185,083
# communities
110
171
8,493
8,385
310,092
6,288,363
τ
0.65
0.046
0.231
0.732
0.536
0.245
¯c
81.59
470.83
393.18
43.88
40.02
34.86
4. Experimental Setup
In this section, we describe the datasets and the experimental setup used to
evaluate the performance of EnCoD.
4.1. Datasets
We use two types of network datasets to evaluate various CD algorithms:
(1) Synthetic networks: We use the LFR benchmark model [47] to gen-
erate synthetic networks along with their ground-truth communities. We
18
follow the parameters configuration suggested in [9] while generating net-
works: number of vertices N = 10, 000, average degree ¯k = 50, maximum
degree kmax = 150, maximum community size cmax = 150, minimum com-
munity size cmin = 50, percentage of overlapping vertices On = 15%, number
of communities to which a vertex belongs Om = 20, and mixing parameter
µ = 0.3 (representing the ratio of inter- and intra-community edges; the lower
the value of µ, the better the communities are). For each configuration, we
create 100 such LFR networks and report the average result. (2) Real-world
networks: We use six real-world networks of widely different scales, whose
ground-truth communities are available a priori (see Table 2).
4.2. Evaluation Metrics
To compare the detected overlapping community structure with the ground-
truth, we use three standard metrics: (1) Overlapping Normalized Mutual
Information (ON M I) [17], (2) Omega (Ω) Index [8], and (3) F-Score [8].
4.3. Base Disjoint CD Algorithms for Aggregation:
There exist numerous disjoint CD algorithms, which differ in the way
they define the community structure. Here we select the following disjoint
CD algorithms from different categories based on their working principles:
(i) Modularity-based approach: FastGreedy [21], Louvain [19] and CNM [20];
(ii) Node similarity-based approach: WalkTrap [23]; (iii) Compression-based
approach: InfoMap [22]; (iv) Diffusion-based approach: Label Propagation
[25]. EnCoD ensembles the outputs of all these six algorithms and generates
the feature vectors for the vertices.
4.4. Baseline Algorithms:
We compare EnCoD with the following seven non-ensemble based overlap-
ping CD algorithms that cover different types of overlapping CD heuristics:
OSLOM [24], EAGLE [48], COPRA [49], SLPA [50], MOSES [51], BIG-
CLAM [8] and IEDC [31]. We further compare EnCoD with PVOC [9] and
MEDOC [1] which are the most recent algorithms that use disjoint commu-
nity structure to detect the overlapping communities.
5. Experimental Results
In this section, we discuss how the performance of EnCoD depends on various
parameters, and compare its performance with state-of-the-art overlapping
19
Figure 2: Change in accuracy of EnCoD with different values of the algorithmic
parameters. We vary µ (the mixing parameter of LFR) from 0.1 to 0.8. In (c)
and (d), we vary K and τL respectively and report the accuracy for three different
LFR and Senate networks.
CD algorithms. We run EnCoD on both synthetic and real-world networks,
and compare its performance with that of seven state-of-the-art overlapping
CD algorithms.
5.1. Parameter Selection
For parameter selection in EnCoD, we perform experiments over LFR networks
of widely-varying quality of ground-truth community structures, obtained by
varying the mixing parameter µ from 0.1 to 0.8 with the increase of 0.1.
• Involvement Function (INV): The following two functions are used to
quantify what extent a vertex is involved in a community [1]: (i) Closeness
(cid:80)
Centrality measures how close vertex v is from other vertices where v is
a part of, i.e.,
u∈C dist(u,v), where dist(u, v) is the shortest distance from
u to v; (ii) Permanence [40] measures how permanent is vertex is in its
D(v)Emax(v) − (1 − cin(v, G[C])), where
own community, i.e., P erm(v, C) = I(v,G[C])
G[C] is the induced subgraph of C, D(v) is the total degree of v, I(v, G[C])
C
20
is the internal degree of v w.r.t. G[C], Emax(v) is the maximum external
connections to any one of the external communities of v, and cin(v, G[C]) is
the clustering coefficient of v w.r.t. G[C] (see more in [40])4. Figure 2(a)
shows that the performance of EnCoD tends to be always superior with INV
as permanence.
• Similarity between two vertices (SIM): Although in Definition 3, we
have mentioned to measure the similarity between the feature vectors of two
vertices using cosine similarity, we also measure the similarity with Pearson
correlation coefficient between two feature vectors. Cosine similarity turns
out to be the better similarity measure than Pearson correlation coefficient
(see Figure 2(b)).
• Number of iterations (K): We set K as a function of the number of
vertices N in the network. The analysis in Figure 2(c) confirms that for
most of the networks, especially the ones which possess distinct community
structure (such as LFR network with µ = 0.1, Senate), the performance of
EnCoD converges at K = 0.2V . We therefore consider this value as default.
• Global threshold (τL): τL controls the size of the overlapping communi-
ties -- the size changes inversely with the value of τL. We vary τL from 0.05
to 0.50 (in steps of 0.05) and observe that the maximum accuracy is attained
at τL = 0.20 for most of the networks (Figure 2(d)).
Therefore, unless otherwise stated, we will report the results of EnCoD with
the following parameter settings: INV = permanence, SIM = cosine, K =
0.2V and τL = 0.20.
5.2. Comparative Evaluation
Here we perform a two-fold evaluation of EnCoD with the baseline algo-
rithms.
Comparison with state-of-the-art overlapping CD algorithms. We
run EnCoD and seven other state-of-the-art overlapping CD algorithms on
default LFR network and six real-world networks, and compare the output
with the ground-truth community structures in terms of three evaluation
metrics. Tables 3, 4, and 5 show the performance of the competing methods
in terms of ONMI, Ω Index and F-Score respectively.
4We also checked the performance of the algorithm by simply assigning 1 to
the entry of v's feature vector if it belongs to the corresponding community, and 0
otherwise (without measuring its involvement). However, we did not obtain good
results.
21
Figure 3: Effect of base CD algorithms: performance of EnCoD after (a) removing
base algorithms in isolation, i.e., one at a time, (b) removing base algorithms one
after another. When all base algorithms are removed, EnCoD does not work (N.A.).
Table 3: Performance (ONMI) of the competing algorithms w.r.t. the ground-
truth community structure of LFR and six real-world networks.
Algorithm
LFR Senate Flickr Coauth Youtube LiveJ Orkut
0.436
0.217
OSLOM
0.504
0.870
COPRA
0.87
0.798
SLPA
0.537
0.783
MOSES
0.714
EAGLE
0.174
0.741
BIGCLAM 0.791
IEDC
0.771
0.587
0.84
0.87
EnCoD
0.798
0.688
0.579
0.512
0.714
0.728
0.732
0.84
0.410
0.393
0.639
0.369
0.492
0.705
0.384
0.82
0.429
0.413
0.607
0.388
0.712
0.701
0.356
0.81
ONMI
0.546
0.624
0.585
0.391
0.195
0.654
0.398
0.78
0.158
0.197
0.276
0.395
0.158
0.678
0.453
0.79
Overall, EnCoD shows the best performance, followed by BIGCLAM. The
absolute average ONMI of EnCoD for all the networks taken together is 0.82,
which is 14.08% higher than BIGCLAM (0.71). The absolute average values
of Ω index and F-Score for EnCoD are 0.80 and 0.80 respectively.
5.3. Effect of Base Algorithms
One can anticipate some noise in the ensemble process due to those base
CD algorithms which are generally weak in detecting accurate communities.
Therefore we test which base algorithm has the most effect on the final
output of EnCoD. To this end, we first consider all base algorithms together
and measure the performance of EnCoD. Subsequently, we remove each base
22
Table 4: Performance (Ω Index) of the competing algorithms w.r.t. the ground-
truth community structure of LFR and six real-world networks.
Ω Index
Algorithm
LFR Senate Flickr Coauth Youtube LiveJ Orkut
0.563
0.735
OSLOM
0.717
0.472
COPRA
0.82
0.577
SLPA
0.525
0.563
MOSES
0.666
EAGLE
0.787
0.701
BIGCLAM 0.735
0.613
0.765
IEDC
0.84
0.82
EnCoD
0.656
0.656
0.82
0.765
0.765
0.765
0.743
0.82
0.395
0.641
0.79
0.592
0.543
0.706
0.452
0.79
0.592
0.592
0.592
0.691
0.543
0.657
0.435
0.79
0.10
0.15
0.15
0.25
0.20
0.667
0.565
0.75
0.415
0.674
0.83
0.622
0.570
0.708
0.421
0.83
Table 5: Performance (F-Score) of the competing algorithms w.r.t. the ground-
truth community structure of LFR and six real-world networks.
F-Score
Algorithm
LFR Senate Flickr Coauth Youtube LiveJ Orkut
0.112
OSLOM
0.506
COPRA
0.562
SLPA
0.562
MOSES
EAGLE
0.112
BIGCLAM 0.731
IEDC
0.821
0.90
EnCoD
0.387
0.72
0.886
0.498
0.498
0.626
0.598
0.72
0.48
0.48
0.64
0.48
0.426
0.707
0.667
0.80
0.25
0.55
0.35
0.35
0.45
0.720
0.489
0.80
0.259
0.570
0.311
0.415
0.466
0.754
0.549
0.83
0.579
0.526
0.316
0.474
0.474
0.692
0.703
0.79
0.421
0.421
0.632
0.474
0.579
0.718
0.705
0.79
algorithm in isolation (i.e., one at a time) and compare the change in accuracy
due to the removal. Figure 3(a) shows that for all the removals, the accuracy
decreases significantly. InfoMap (which has been shown to be the best among
all the base algorithms [22]) seems to be the one for which the accuracy of
EnCoD deteriorates significantly. But Label Propagation and WalkTrap seem
to have less effect on the performance of EnCoD.
In another experiment, we remove the base algorithms one after another
(not in isolation), and report the performance of EnCoD in Figure 3(b). Even
with only the two 'weakest' base CD algorithms (WalkTrap and Label Prop-
agation), EnCoD achieves more than 80% of its performance when all six base
algorithms are used.
In general, these results indicate that combining results from all sorts of
(strong or weak) base CD algorithms is important to enhance the final per-
formance of the ensemble method. Importantly, using more base algorithms
23
Table 6: Comparison of EnCoD with PVOC and MEDOC on different networks.
Network
LFR
Senate
Flickr
Coauthorship
Youtube
LiveJournal
Orkut
PVOC
MEDOC
EnCoD
F-Score Ω Index ONMI F-Score Ω Index ONMI F-Score Ω Index ONMI
0.75
0.69
0.62
0.64
0.63
0.74
0.69
0.78
0.73
0.65
0.68
0.63
0.72
0.72
0.79
0.71
0.67
0.69
0.67
0.71
0.75
0.80
0.78
0.70
0.74
0.70
0.80
0.79
0.78
0.80
0.73
0.71
0.66
0.76
0.81
0.82
0.76
0.71
0.70
0.64
0.78
0.80
0.90
0.79
0.72
0.80
0.80
0.83
0.79
0.84
0.82
0.75
0.79
0.83
0.79
0.82
0.87
0.84
0.79
0.78
0.82
0.81
0.84
never decreases the performance of the ensemble method.
Comparison with PVOC and MEDOC. As mentioned earlier, EnCoD is
the fourth algorithm after PEACOCK [16], PVOC [9] and MEDOC [1] which
use disjoint community structure to detect the overlapping communities5.
PVOC has been proved to outperform PEACOCK [9]; hence we compare
EnCoD with PVOC along with MEDOC and present the results in Table 6.
For all the networks, EnCoD performs significantly better than both PVOC
and MEDOC. The performance of EnCoD (PVOC, MEDOC) averaged over all
the datasets is as follows -- ONMI: 0.82 (0.74, 0.75), Ω Index: 0.81 (0.75, 0.70),
F-Score: 0.80 (0.68, 0.76).
The superior performance of EnCoD over PVOC and MEDOC is poten-
tially due to the following reason. In a sense, the final performance of both
PVOC and MEDOC depends upon the performance of a single CD algo-
rithm. PVOC brings in the overlapping property as a post-processing step
after finding a single disjoint community structure, and hence the quality
of the overlapping community structure is dependent upon that of the dis-
joint community structure found initially. MEDOC uses a CD algorithm to
partition the multi-partite network that is created using the base disjoint
community structures; hence the quality of the final overlapping commu-
nity structure depends on the performance of the CD algorithm used over
the multi-partite network. On the other hand, EnCoD obtains the features
of vertices from the disjoint community structures given by several disjoint
CD algorithms, and uses these features in an optimization setting. Thus the
performance of EnCoD does not depend upon that of any one CD algorithm,
and it can effectively learn from multiple disjoint community structures.
5Recall that MEDOC is an ensemble algorithm that uses multiple disjoint community
structures, whereas PEACOCK and PVOC apply a post-processing on a single disjoint
community structure to detect overlapping regions
24
6. Community Detection with Vertex Features
In Section 3, one could notice that the solutions of the base algorithms are
used to derive only the feature vector of each vertex. This approach is useful
for most real networks, where additional information about the vertices is
unavailable or difficult to obtain [8]. However, we hypothesize that if vertex-
centric features are available along with the network structure, our algorithm
can equally be effective to adopt these features. In this case, one needs to
replace the ensemble-based features with the real features associated with
each vertex (i.e., Step 3 in Algorithm 1 is not required in this case).
To show the generic adaptation of EnCoD for overlapping community de-
tection on networks where vertex-features are available, we set the following
experimental framework. We acquire a coauthorship network6 of Computer
Science domains, used in [4], where vertices are authors and edges repre-
sent collaborations, with at least one paper written by the adjacent authors.
There are 24 research areas (such as Algorithms, Data Mining, etc.), and
each paper is annotated with one or more research areas. The (overlapping)
ground-truth communities are marked by the publication venues (confer-
ences/journals). The network contains 103, 677 vertices, 352, 183 edges and
1, 705 communities.
To obtain vertex features, we assign each author a with a feature vector
Fa of size 24 where Fa(i) denotes the fraction of papers published by a in
the ith research area. We run all seven competing algorithms (see Section 4)
along with modified non-ensemble based EnCoD (we call it MEnCoD) and detect
the underlying community structure. We further consider SPAEM [2], a joint
probabilistic model to detect communities by combining node attributes and
topological structure, as another baseline. Table 7 shows the performance of
all the competing algorithms along with EnCoD and MEnCoD. We observe that
MEnCoD is superior to all other competing algorithms (followed by EnCoD).
7. Conclusion
We proposed EnCoD, the second ensemble algorithm for overlapping com-
munity detection by leveraging the outputs of many disjoint CD algorithms.
We examined the dependencies of our algorithm on different parameters. We
showed that EnCoD significantly outperforms several standard overlapping
6This network is different from the one mentioned in Table 2.
25
Table 7: Performance of the competing algorithms on coauthorship network
with vertex feature (O=OSLOM, C=COPRA, S=SLPA, M=MOSES, E=EAGLE,
B=BIGCLAM, I=IEDC, PV = PVOC, ME=MEDOC, SP = SPAEM).
F-Sc
Ω
ONMI
O
0.78
0.76
0.80
C
0.76
0.80
0.81
S
0.81
0.83
0.83
M
0.78
0.78
0.81
E
0.75
0.78
0.75
B
0.79
0.76
0.79
I
0.73
0.76
0.80
PV ME
0.76
0.74
0.74
0.73
0.76
0.79
SP EnCoD
0.83
0.80
0.86
0.84
0.81
0.86
MEnCoD
0.84
0.87
0.88
CD algorithms, and can be used for detecting the overlapping community
structure of networks whose vertices are associated with features.
There is still a lack of proper theoretical explanations to justify the su-
periority of network-based ensemble approaches. Also, since all base CD
algorithms are not equally important in terms of community assignment for
vertices (as observed in Section 5.3), it might be possible to retain only the
most important base CD algorithms through a correlation study or a machine
learning-based approach. This could also potentially reduce the runtime cost
of the algorithm. We plan to explore this possibility in future.
Acknowledgement
The authors thank the anonymous reviewers and the editor for their con-
structive suggestions that helped to improve the paper. The first author
would like to acknowledge the support of Ramanujan Faculty Fellowhsip and
the Infosys Center for Artificial Intelligence, IIIT Delhi, India.
References
[1] T. Chakraborty, N. Park, V. S. Subrahmanian, Ensemble-based algo-
rithms to detect disjoint and overlapping communities in networks, in:
ASONAM, San Fransisco, USA, 2016, pp. 73 -- 80.
[2] F. Zhang, Community detection based on links and node features in
social networks, in: MMM, Sydney,NSW, Australia, 2015, pp. 418 -- 429.
[3] G. Palla, I. J. Farkas, P. Pollner, I. Der´enyi, T. Vicsek, Fundamental
statistical features and self-similar properties of tagged networks, New
J. Phys. 10 (12) (2008) 123026.
[4] T. Chakraborty, S. Sikdar, V. Tammana, N. Ganguly, A. Mukherjee,
Computer science fields as ground-truth communities: their impact, rise
and fall, in: ASONAM, ACM, Niagara, Canada, 2013, pp. 426 -- 433.
26
[5] S. Fortunato, Community detection in graphs, Physics Reports 486 (3-5)
(2010) 75 -- 174.
[6] J. Xie, S. Kelley, B. K. Szymanski, Overlapping community detection in
networks: The state-of-the-art and comparative study, ACM Comput.
Surv. 45 (4) (2013) 43:1 -- 43:35.
[7] G. Palla, I. Derenyi, I. Farkas, T. Vicsek, Uncovering the overlapping
community structure of complex networks in nature and society, Nature
435 (7043) (2005) 814 -- 818.
[8] J. Yang, J. Leskovec, Overlapping community detection at scale: A
nonnegative matrix factorization approach, in: WSDM, Rome, Italy,
2013, pp. 587 -- 596.
[9] T. Chakraborty, Leveraging disjoint communities for detecting overlap-
ping community structure, J. Stat. Mech 2015 (5) (2015) P05017.
[10] J. Dahlin, P. Svenson, Ensemble approaches for improving community
detection methods, CoRR abs/1309.0242 (2013).
[11] A. Lancichinetti, S. Fortunato, Consensus clustering in complex net-
works, Nature Scientific Reports (2) (2012).
[12] R. Xu, D. Wunsch, II, Survey of clustering algorithms, Trans. Neur.
Netw. 16 (3) (2005) 645 -- 678.
[13] T. Chakraborty, Z. Cui, N. Park, Metadata vs. ground-truth: A myth
behind the evolution of community detection methods, in: Companion
Proceedings of the The Web Conference, 2018, pp. 45 -- 46.
[14] Z. Li, Y. Yang, J. Liu, X. Zhou, H. Lu, Unsupervised feature selection
using nonnegative spectral analysis, in: AAAI, 2012, pp. 1026 -- 1032.
URL http://dl.acm.org/citation.cfm?id=2900728.2900874
[15] Z. Li, J. Tang, Weakly supervised deep matrix factorization for social
image understanding, Trans. Img. Proc. 26 (1) (2017) 276 -- 288. doi:
10.1109/TIP.2016.2624140.
URL https://doi.org/10.1109/TIP.2016.2624140
27
[16] S. Gregory, Finding overlapping communities using disjoint community
in: Complex Networks: CompleNet, Springer-
detection algorithms,
Verlag, Berlin, Heidelberg, 2009, pp. 47 -- 61.
[17] A. F. McDaid, D. Greene, N. J. Hurley, Normalized mutual infor-
mation to evaluate overlapping community finding algorithms, CoRR
abs/1110.2515 (2011).
[18] T. Chakraborty, A. Dalmia, A. Mukherjee, N. Ganguly, Metrics for
community analysis: A survey, ACM Comput. Surv. 50 (4) (2017) 54:1 --
54:37. doi:10.1145/3091106.
URL http://doi.acm.org/10.1145/3091106
[19] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfold-
ing of communities in large networks, J. Stat. Mech 2008 (10) (2008)
P10008.
[20] A. Clauset, M. E. J. Newman, , C. Moore, Finding community structure
in very large networks, Phys. Rev. E 70 (6) (2004) 066111.
[21] M. E. J. Newman, Fast algorithm for detecting community structure in
networks, Phys. Rev. E 69 (6) (2004) 066133.
[22] M. Rosvall, C. T. Bergstrom, Maps of random walks on complex net-
works reveal community structure, PNAS 105 (4) (2008) 1118 -- 1123.
[23] P. Pons, M. Latapy, Computing communities in large networks using
random walks, J. Graph Algorithms Appl. 10 (2) (2006) 191 -- 218.
[24] A. Lancichinetti, F. Radicchi, J. J. Ramasco, S. Fortunato, Finding
statistically significant communities in networks, PLoS ONE 6 (4) (2011)
e18961.
[25] U. N. Raghavan, R. Albert, S. Kumara, Near linear time algorithm to
detect community structures in large-scale networks, Phy. Rev. E 76 (3)
(2007) 036106.
[26] U. N. Raghavan, R. Albert, S. Kumara, Near linear time algorithm to
detect community structures in large-scale networks, Phys. Rev. E 76
(2007) 036106.
28
[27] D. Chen, M. Shang, Z. Lv, Y. Fu, Detecting overlapping communities
of weighted networks via a local algorithm, Physica A 389 (19) (2010)
4177 -- 4187.
[28] F. Havemann, M. Heinz, A. Struck, J. Glser, Identification of overlap-
ping communities and their hierarchy by locally calculating community-
changing resolution levels, JSTAT 2011 (01) (2011) P01023.
[29] J. Baumes, M. K. Goldberg, M. S. Krishnamoorthy, M. Magdon-Ismail,
N. Preston, Finding communities by clustering a graph into overlapping
subgraphs., in: IADIS AC, 2005, pp. 97 -- 104.
[30] F. Ding, Z. Luo, J. Shi, X. Fang, Overlapping community detection by
kernel-based fuzzy affinity propagation, in: ISA, 2010, pp. 1 -- 4.
[31] M. Hajiabadi, H. Zare, H. Bobarshad, Iedc: An integrated approach
for overlapping and non-overlapping community detection, Knowledge-
Based Systems 123 (2017) 188 -- 199.
[32] W. Zhi-Xiao, L. Ze-chao, D. Xiao-fang, T. Jin-hui, Overlapping commu-
nity detection based on node location analysis, Knowledge-Based Sys-
tems 105 (2016) 225 -- 235.
[33] Y. Li, K. He, K. Kloster, D. Bindel, J. Hopcroft, Local spectral clustering
for overlapping community detection, ACM Trans. Knowl. Discov. Data
12 (2) (2018) 17:1 -- 17:27.
[34] M. Huang, G. Zou, B. Zhang, Y. Liu, Y. Gu, K. Jiang, Overlapping com-
munity detection in heterogeneous social networks via the user model,
Information Sciences 432 (2018) 164 -- 184.
[35] M. Sattari, K. Zamanifar, A spreading activation-based label propaga-
tion algorithm for overlapping community detection in dynamic social
networks, Data & Knowledge Engineering 113 (2018) 155 -- 170.
[36] U. N. Raghavan, R. Albert, S. Kumara, Near linear time algorithm to
detect community structures in large-scale networks, Phys. Rev. E 76
(2007) 036106.
[37] M. Ovelgonne, A. Geyer-Schulz, An ensemble learning strategy for graph
clustering, in: Graph Partitioning and Graph Clustering, Vol. 588 of
Contemporary Mathematics, AMS, 2012, pp. 187 -- 206.
29
[38] R. Kanawati, Yasca: An ensemble-based approach for community de-
tection in complex networks, in: COCOON, Springer, Cham, 2014, pp.
657 -- 666.
[39] R. Kanawati, Ensemble selection for community detection in complex
networks, in: SCSM, Springer, CA, USA, 2015, pp. 138 -- 147.
[40] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, S. Bhowmick,
On the permanence of vertices in network communities, in: SIGKDD,
New York, USA, 2014, pp. 1396 -- 1405.
[41] P. Agarwal, R. Verma, A. Agarwal, T. Chakraborty, Dyperm: Maxi-
mizing permanence for dynamic community detection, in: Advances in
Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference,
PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings,
Part I, 2018, pp. 437 -- 449.
[42] T. Chakraborty, S. Srinivasan, N. Ganguly, S. Bhowmick, A. Mukherjee,
Constant Communities in Complex Networks, Nature Scientific Reports
3.
[43] J. Mcauley, J. Leskovec, Discovering social circles in ego networks, ACM
TKDD 8 (1) (2014) 4:1 -- 4:28.
[44] T. Chakraborty, S. Patranabis, P. Goyal, A. Mukherjee, On the forma-
tion of circles in co-authorship networks, in: SIGKDD, Sydney, NSW,
Australia, 2015, pp. 109 -- 118.
[45] L. G. S. Jeub, P. Balachandran, M. A. Porter, P. J. Mucha, M. W.
Mahoney, Think locally, act locally: Detection of small, medium-sized,
and large communities in large networks, Phys. Rev. E 91 (2015) 012821.
[46] X. Wang, L. Tang, H. Liu, L. Wang, Learning with multi-resolution
overlapping communities, Knowl. Inf. Syst. 36 (2) (2013) 517 -- 535.
[47] A. Lancichinetti, S. Fortunato, Benchmarks for testing community de-
tection algorithms on directed and weighted graphs with overlapping
communities, Phy. Rev. E 80 (2009) 016118.
[48] K. C. H. Shen, X. Cheng, M. B. Hu, Detect overlapping and hierarchical
community structure in networks, Physica A 388 (8) (2009) 1706 -- 1712.
30
[49] S. Gregory, Finding overlapping communities in networks by label prop-
agation, New J. Phys. 12 (10) (2010) 103018.
[50] J. Xie, B. K. Szymanski, Towards linear time overlapping community
detection in social networks, in: PAKDD, Malaysia, 2012, pp. 25 -- 36.
[51] A. McDaid, N. Hurley, Detecting highly overlapping communities with
model-based overlapping seed expansion, in: ASONAM, Odense, Den-
mark, 2010, pp. 112 -- 119.
31
|
1709.04015 | 1 | 1709 | 2017-09-12T18:48:16 | Network Clocks: Detecting the Temporal Scale of Information Diffusion | [
"cs.SI",
"cs.DS"
] | Information diffusion models typically assume a discrete timeline in which an information token spreads in the network. Since users in real-world networks vary significantly in their intensity and periods of activity, our objective in this work is to answer: How to determine a temporal scale that best agrees with the observed information propagation within a network? A key limitation of existing approaches is that they aggregate the timeline into fixed-size windows, which may not fit all network nodes' activity periods. We propose the notion of a heterogeneous network clock: a mapping of events to discrete timestamps that best explains their occurrence according to a given cascade propagation model. We focus on the widely-adopted independent cascade (IC) model and formalize the optimal clock as the one that maximizes the likelihood of all observed cascades. The single optimal clock (OC) problem can be solved exactly in polynomial time. However, we prove that learning multiple optimal clocks(kOC), corresponding to temporal patterns of groups of network nodes, is NP-hard. We propose scalable solutions that run in almost linear time in the total number of cascade activations and discuss approximation guarantees for each variant. Our algorithms and their detected clocks enable improved cascade size classification (up to 8 percent F1 lift) and improved missing cascade data inference (0.15 better recall). We also demonstrate that the network clocks exhibit consistency within the type of content diffusing in the network and are robust with respect to the propagation probability parameters of the IC model. | cs.SI | cs | Network Clocks: Detecting the Temporal Scale of
Information Diffusion
Daniel J. DiTursi∗†
Gregorios A. Katsios∗
Petko Bogdanov∗
∗Department of Computer Science
State University of New York at Albany
Albany, NY 12222
†Department of Computer Science
Siena College
Loudonville, NY 12211
7
1
0
2
p
e
S
2
1
]
I
S
.
s
c
[
1
v
5
1
0
4
0
.
9
0
7
1
:
v
i
X
r
a
Abstract-Information diffusion models typically assume a
discrete timeline in which an information token spreads in the
network. Since users in real-world networks vary significantly in
their intensity and periods of activity, our objective in this work
is to answer: How to determine a temporal scale that best agrees
with the observed information propagation within a network?
A key limitation of existing approaches is that they aggregate
the timeline into fixed-size windows, which may not fit all network
nodes' activity periods. We propose the notion of a heterogeneous
network clock: a mapping of events to discrete timestamps that
best explains their occurrence according to a given cascade
propagation model. We focus on the widely-adopted independent
cascade (IC) model and formalize the optimal clock as the one
that maximizes the likelihood of all observed cascades. The single
optimal clock (OC) problem can be solved exactly in polynomial
time. However, we prove that learning multiple optimal clocks
(kOC), corresponding to temporal patterns of groups of network
nodes, is NP-hard. We propose scalable solutions that run in
almost linear time in the total number of cascade activations
and discuss approximation guarantees for each variant. Our
algorithms and their detected clocks enable improved cascade
size classification (up to 8% F1 lift) and improved missing cascade
data inference (0.15 better recall). We also demonstrate that the
network clocks exhibit consistency within the type of content
diffusing in the network and are robust with respect to the
propagation probability parameters of the IC model.
I. INTRODUCTION
Models for information propagation in social networks
assume a discrete timeline over which the information
spreads [8, 9]. At the same time, real-world network data
is collected at different
temporal resolutions e.g. minutes,
hours, weeks. Hence, a common step before analyzing real-
world data is to define a temporal scale to aggregate events in
the network into discrete snapshots. Such aggregations make
the implicit assumption that there exists a single temporal
resolution that works well for all network nodes and periods of
activity. Empirical studies of social network activity, however,
demonstrate a wide variance in activity levels across users
and across time [13, 18, 19],
thus challenging the above
assumption. How can we account for heterogeneity in user
activity over time when analyzing information propagation
data from real-world networks?
To address the above problem, we propose the problem of
detecting data-driven heterogeneous temporal aggregations for
information diffusion under the widely-adopted independent
cascade (IC) model [8, 7]. We formalize the problem as finding
the temporal aggregation that maximizes the likelihood of
3
4
5
1
0
2
6
X (1)
∆1 = (cid:104)1, 1(cid:105)(cid:104)2, 5(cid:105)(cid:104)6, 6(cid:105)
LL(∆1) = −13.9
X (2)
∆2 = (cid:104)1, 2(cid:105)(cid:104)3, 4(cid:105)(cid:104)5, 6(cid:105)
LL(∆1) = −16.3
∆1,2 = (cid:104)1, 1(cid:105)(cid:104)2, 2(cid:105)(cid:104)3, 6(cid:105)
LL(∆1,2) = −34.6
1
6
2
2
0
6
0
4
3
5
5
4
3
1
2
Fig. 1. An example network and two cascades X (1) and X (2) with their
original measured activation times between 1 and 6. Assuming an independent
cascade with spontaneous activation probability pe = 0.001 and a neighbor
propagation probability pn = 0.1, the best clock for X (1) is ∆1 with a
log-likelihood LL = −13.9 and the best clock for X (2) is ∆2 with LL =
−16.3. An optimal clock that maximizes the likelihood of both cascades is
∆1,2, which is suboptimal for the individual cascades.
observed cascades according to the IC model. We allow this
aggregation to vary across time and across users, driven by
the likelihood of observed data. We refer to such an optimal
temporal aggregation as a network clock: a discrete timeline
with time steps determined by user activity as opposed to
regular intervals of "wall-clock" time.
The example in Fig. 1 involves a small graph of 7 nodes
(left) and two cascades X 1 and X 2 (right), which are observed
over the duration of 6 discrete time steps. A cascade is a
sequence of activation events with their originally measured
times define the original time resolution of observed cascades.
On the right, cascades are presented as directed graphs where
edges denote the possibility of influence from an activated
node to a network neighbor which is activated at a later time
(the horizontal position of nodes corresponds to their original
time of activation). Using the original
time resolution for
cascade X 1 will render nodes 5 and 0 being as spontaneous
activations, since IC requires that potential influence nodes are
activated in the immediately preceding time step. Such view
of time will result in a low IC likelihood as activations through
the network have typically higher-likelihood. Thus, using the
original time resolution as a network clock will poorly capture
how nodes influenced each other.
Alternatively, the clock ∆1 aggregates the middle 4 time
ticks into a single time step, i.e. the activations of nodes 2
and 5 are treated as simultaneous, with the activation of 6
preceding them and that of 0 immediately following. As all
activations except the first are now explained by the immedi-
ately prior influence of a neighbor, this clock maximizes the
likelihood of the observed activations being produced by an
IC process.
In our running example (Fig. 1), the clocks ∆1 and ∆2 that
optimize the two cascades separately are both different from
each other and from the clock that maximizes the likelihood
of both cascades considered together (∆1,2). Imposing the
same overall clock on all users and all cascade instances
may be overly restrictive. Different users might engage in the
information propagation at different times depending on their
interest, overall activity, time zone, etc. In addition, different
information, e.g. videos vs. text, may spread at different rates
and at different times. Hence, we also consider the problem
of finding multiple clocks for a single dataset.
Knowledge of the network clocks can improve a variety of
applications. Based on past propagation, one can predict likely
times of future activity and allocate computational resources
to handle the user traffic accordingly. In addition, clocks may
enable classification of cascades future sizes [6] and the type
of non-text information (e.g. video and photos) without deep
content analysis, but instead by relying on similarities to other
annotated content. The latter may unlock applications such
as automated hash-tagging for improved social media stream
access. Given knowledge of community-specific clocks, one
can also impute missing activations [20, 14], which in turn
can be used for better influence maximization in the face of
a deadline (e.g. elections or ticket sales), and the improved
quality of simulations of diffusion processes.
Our contributions in this work are as follows:
1. We introduce the novel concept of heterogeneous network
clocks: optimal temporal aggregations for observed informa-
tion diffusion in social media. We show that while the single
network clock (OC) problem can be solved polynomially, the
multiple network clocks (kOC) problem is NP-hard.
2. We provide an exact solution for OC that, while polyno-
mial, is impractical for non-trivial instances. We also propose
fast solutions for both OC and kOC, capable of processing
instances with millions of nodes and cascade activations.
3. We demonstrate the utility of the network clocks for
multiple applications, boosting the performance of existing
algorithms for cascade size prediction (increase in F1-measure
by 8%) and cascade completion (improving recall by 0.2 or
more) in both synthetic and real-world data.
II. PROBLEM FORMULATION AND COMPLEXITY
A. Preliminaries
We denote a static directed network as G(V, E) with nodes
V and edges E ⊆ V × V . We refer to individual instances
of diffusion processes over time through this network as
cascades. Thus, a cascade Xi = {(u, t)} is a set of node-
time pairs, each representing the activation of node u at time
t, where the set of all observed cascades in a data set is
X = {X1, . . . , Xm}. We assume a discrete timeline where
1 and T are the times of the first and last activation events in
X, respectively. We also assume that each cascade activates a
vertex at most once.
Among the multiple models for cascade processes, we focus
on the well-studied independent cascade (IC) model initially
is that, with respect
introduced by Goldenberg et al. [8]. The key intuition behind
the model
to a given cascade, each
node may be in only one of three states: inactive, active, or
previously activated. The critical notion in this model is that
nodes can only influence neighbors for a single time period
after activation. In other words, a node that is activated at
time t increases the likelihood that its neighbors activate at
time t + 1, but not at t + 2 or any later time.
The IC model has two key parameters: the probability pn
that a newly activated node activates any network neighbor,
and the probability pe that an inactive node "spontaneously"
activates due to external factors. Note that the above assumes
homogeneous activation probabilities for all nodes and neigh-
bor links. Our methods are directly applicable to the non-
homogeneous IC setting where probabilities may differ across
nodes and edges, but we do not explore that setting here. We
assume that pe is much smaller than pn; otherwise the network
structure becomes much less important. As suggested by the
name of the model, all activation events are presumed to be
independent of each other.
The set of incoming neighbors of u is denoted by N (u) =
{v (v, u) ∈ E}; these are the nodes that can potentially
influence u. The set of nodes activated as part of a cascade
X at time t is denoted by A(X, t). The activation time of
node v within cascade X is denoted as X(v). Finally, the
set of newly active neighbors of v at time t are denoted as
C(X, v, t) = A(X, t − 1) ∩ N (v), i.e. those are the nodes
that can potentially activate v at time t.
Given the above definitions, we can quantify the a priori
likelihood that node v is part of cascade X at time t as follows:
L(v, X, t) =
1, if X(v) < t i.e. v is already in X
1 − (1 − pe)(1 − pn)C(X,v,t), o/w.
(1)
This likelihood reflects the possibility of a node being activated
by at least one contagious neighbor or by sources external
to the network. In order to characterize the likelihood of
all independent observations, we use the common practice
of working with log-likelihoods. Thus, the log-likelihood of
node v joining X at time t is LL(X, v, t) = log L(X, v, t).
For convenience, we also define the log likelihood of v not
joining X at time t as LL(X, v, t) = log 1 − L(X, v, t). We
can now quantify the log-likelihood of all observed cascades
X and their activation events as:
(cid:40)
(cid:88)
T(cid:88)
(cid:0) (cid:88)
(cid:88)
LL(v, X, t)(cid:1)
LL(X) =
X∈X
t=1
u∈A(X,t)
v /∈A(X,t)
LL(u, X, t) +
(2)
Note that the independence assumption across cascades and
activation events results in the above sum of log-likelihoods.
B. Network clocks and likelihood improvement
The independent cascade model assumes discrete time of
events and that all nodes are participants in the diffusion
process at every time step. Such assumption enforces a uni-
form mapping of "wall-clock" time to network events across
the entire network, and thus, renders IC models infeasible to
interpret information diffusion in real-world networks, which
are often not governed by a single clock.
For example, consider an online social network user who
checks her feed upon waking up, once or twice during lunch
break, and several times in the evening. No uniform timeline
can explain her activity sessions well - short time steps will
make morning activity appear unrelated to posts that came in
overnight, while long time steps may lose information about
rapid responses that occur in the evening. A heterogeneous
division of the timeline, which we term a network clock is
needed to accurately explain such activity.
A network clock ∆ is a partitioning of T into contiguous
segments of the original
timeline corresponding to "new"
discrete time steps. In effect, the events that occur within
each interval of the timeline are considered to be simultaneous.
In the example from Fig. 1, the clock ∆1 for cascade X (1)
partitions the time into intervals (cid:104)1, 1(cid:105),(cid:104)2, 5(cid:105) and (cid:104)6, 6(cid:105), which
renders the activations of nodes 2 and 5 simultaneous.
Formally, a network clock ∆ = {δ1, . . . , δf} is a set of
adjacent non-overlapping time intervals δi = (cid:104)ts, te(cid:105) that span
the original timeline T, i.e. :
ts(δi) ≤ te(δi), ts(δi) = te(δi−1) + 1,∀i.
The two extreme clocks are the maximum aggregation (i.e.
all original timestamps are simultaneous): ∆max = {(cid:104)1, T(cid:105)},
and the minimum aggregation, corresponding to the original
timeline: ∆min = {(cid:104)1, 1(cid:105), . . . ,(cid:104)T, T(cid:105)}. The total number of
possible clocks is 2T−1, since we can either split or not
between any two consecutive points in (cid:104)1, T(cid:105).
time t. Given a clock ∆,
For a fixed clock ∆, we treat δi as individual consecutive
time steps (indexed by i); however, as necessary we also
use δ∆(t) to denote the unique interval δ ∈ ∆ containing
the original
the set of active
nodes at period δ is all activations that happened during δ,
t=ts(δ) A(X, t); other temporal entities
are similarly mapped from the original times t to periods δ. We
can now redefine the clock likelihood of an observed activation
during interval δi following interval δi−1 as:
L(v, X, δi ← δi−1) =
denoted A(X, δ) =(cid:83)te(δ)
(cid:40)
1, when X(v) < ts(δi)
1 − (1 − pe)(1 − pn)C(X,v,δi), o/w.
(3)
Note that the set of contagious neighbors of v at time δi are
determined by the preceding interval: C(X, v, δi) = N (v) ∩
A(X, δi−1). As a result, different clocks will result in different
likelihoods of observed events. We denote the log-likelihood
of all events given a clock as LL(X∆), defined analogously
to Eq. 2, where the sum over t and selection of active nodes
is replaced by a sum over clock intervals.
Our goal is to find a clock (if any) that provides a better
explanation of observed cascades X than the timeline of ∆max,
a default clock that groups all events into a single step. A clock
improvement I(X∆) is the increase in likelihood compared
to that of the default clock:
I(X∆) = LL(X∆) − LL(X∆max).
In our example in Fig. 1 the default clock ∆max will
render the activation of all nodes spontaneous (i.e. activated
from external sources) due to the lack of preceding time
steps, and thus, of contagious neighbors. The log-likelihood
of cascade X (1) (in red) under the default clock ∆max is
L(X (1)∆min) = −23.5, while the same quantity for clock
∆1 is L(X (1)∆1) = −13.9, hence the improvement of ∆1
for cascade X (1) is I(X (1)∆1) = 9.6. Similarly, the improve-
ment of the clock ∆1,2 when both cascades are considered
simultaneously can be calculated as I({X (1), X (1)}∆1,2) =
−34.6 − (−40) = 5.4.
C. Optimal network clock problems: OC and kOC
We are now ready to define our clock optimization prob-
lems: the Optimal clock problem (OC) which seeks to identify
a temporal clock that best explains all observed cascades; and
the k-Optimal Clock problem (kOC) which maps nodes in the
network to one of k ≤ V clocks corresponding to different
temporal behaviors of network users. We show that the former
can be solved in polynomial time, while the latter is NP-hard.
Definition 1. [Optimal clock problem (OC)] Given a net-
work G, a set of cascade observations X, and probabilities pe
and pn, find the clock ∆∗ = argmax∆ I(X∆).
Problem OC asks for the single partition of time that best
captures the temporal properties of all observed cascades X
given the IC model. The problem is most applicable in cases
where either all of the network nodes have similar temporal
habits of social network interactions (e.g. 9am-5pm office
workers), or when cascades progress in a similar fashion.
In such cases it is desirable to detect this shared temporal
behavior across the whole network.
Unlike a homogeneous clock, the optimal solution of OC
will adaptively segment time in order to increase the likelihood
of observed data. Thus, periods of bursty activity may be
partitioned into more steps, while those of relatively low
activity combined into a single step. The number of potential
clocks is 2T−1; nevertheless, OC admits a polynomial-time
exact solution based on dynamic programming discussed in
detail in the following section.
The assumption of a single temporal clock shared among
all network nodes might be too stringent considering the size,
scope and heterogeneity of real-world OSN users. Beyond
9am-5pm office worker activity patterns, we might observe
those of high-school or college students, stay-at-home parents
or seniors and in addition all these diverse demographics may
reside in different time zones, while still participating in the
same global OSN. To account for such diverse population of
users we also consider a multiple clock version of the problem,
where each node "follows" a single clock.
One can think of a clock as how the events are temporally
perceived from the viewpoint of a node. Instead of imposing
the same clock on all nodes, we can model different behav-
ioral patterns as multiple clocks that individual nodes follow.
(cid:16)
max
∆∈D
(cid:17)
(cid:88)
v∈V
LL(X(v)∆) − LL(X(v)∆min)
Given a set of clocks D = {∆1, ∆2..., ∆k}, we define their
improvement as:
I(XD) =
, (4)
where X(v) denotes the activations of node v in all cascades
in X. Note that I(XD) can be evaluated in polynomial time if
the set of clocks D is predefined by calculating the likelihood
of each node v's activations according to each clock.
In our example in Fig. 1 clock ∆1,2 is the best single
clock when considering both cascades X = {X (1), X (2)};
however, under this clock, the influence from 6 → 5 in X (1)
is discounted since 6 is activated in the first interval of ∆1,2,
while 5 is activated in its third interval. Similarly, the potential
influences from 1 → 3 and 3 → 4 in X (2) are discarded as
all of those activations are rendered simultaneous according to
∆1,2. Consider, however, a second alternative clock for these
cascades ∆ = (cid:104)1, 3(cid:105)(cid:104)4, 4(cid:105)(cid:104)5, 6(cid:105). The improvement of both
clocks will exceed that of ∆1,2 alone, i.e. I(X∆1,2, ∆) >
I(X∆1,2), since the likelihoods of the activations of nodes 3
and 4 will increase by being reassigned to ∆, thus considering
all of their potential network activations.
Definition 2. [k-Optimal clock problem (kOC)] Given a
network G, a set of cascade observations X, probabilities pe
and pn, and a positive integer k > 0 find the set of clocks
D∗ = argmaxD I(XD), s.t. D ≤ k.
For values of k = 1 or k ≥ V , kOC can be solved in
polynomial time. k = 1 is equivalent to the OC problem
and can be solved using dynamic programming as discussed
in the next section, and when the budget of clocks exceeds
the number of graph nodes, k ≥ V , we can find the single
best clock that optimizes the improvement of a given node's
activations and then assign this clock to the node. However,
for general k < V we show that the problem is NP-hard by a
reduction from Graph coloring to a decision version of kOC.
Theorem 1. kOC is NP-hard.
Proof. We show a reduction from k-Graph Vertex Coloring
(kVC) to a decision version of kOC. Given a graph, kVC asks
for a mapping of each node to at most k colors such that no
two colors are adjacent. Let kOC-B be a decision version of
kOC asking if there exist k clocks s.t. I(XD) > B, B > 0. To
construct the reduction we will need to show how we obtain
an instance kOC from an instance of kVC and also set the
values of B and k.
Given a kVC instance G(V, E) we create an instance of
kOC involving a graph G(cid:48)(V (cid:48), E(cid:48)) with V + 2E nodes,
4E edges and 4E cascades using the gadget in Fig. 2. For
every kVC edge (u, v), we create four cascades involving two
activations each. The later activations of each of the cascades
involve nodes corresponding to the nodes in the kVC instance,
while the earlier activations involve unique other nodes. For
example, the gadget corresponding to edge (0, 1) in Fig. 2
involves the four cascades spanning times [1−4]. Two cascades
"end" with the equivalent node to 0 in kOC: (a01, t1) → (0, t2)
and (b01, t3) → (0, t4); and another two with the equivalent
∆1
∆1
∆1
∆2
∆2
∆2
∆2
∆03
∆03
∆03
∆03
∆03
2
0
3
b01
4
0
1
1
5
a02
c02
d02
t: 1
a01
c01
d01
C
O
k
C
V
k
8
0
2
2
2
9
a23
c23
d23
3
6
0
7
b02
0
1
10
2
11
12
13
b23
2
3
3
a12
c12
d12
14
1
15
16
b12
1
2
2
Fig. 2. Gadget used in the reduction from Vertex Coloring (kVC) to kOC.
of node 1: (c01, t1) → (1, t4) and (d01, t1) → (1, t4). Note
that it is not possible to devise a single clock that renders all
4 latter activations ((0, t2),(0, t4),and the two (1, t4)) of the
cascades non-spontaneous, i.e. there is no set of splits in time
that will "cut" all 4 cascade activation edges exactly once.
Applying this transformation for each kVC edge we obtain
an instance of 4E cascades, where a pair of cascades coin-
cides in time only if they are within the same gadget. We set
the log-likelihood requirement as B = 4E log pn, where we
set pe and pn such that log pe < 2E log pn. In other words,
we require k clocks that ensure that all latter gadget activations
are non-spontaneous.
If there exists a kVC solution, one can create a correspond-
ing kOC solution by assigning one clock per color ensuring
that all activations of the corresponding nodes of that color
are non-simultaneous in each gadget. This is possible since
nodes of the same color will never appear in the same gadget.
Consider, as an example, the set of corresponding 4 clocks
for a 4-coloring of the kVC instance in Fig. 2. Alternatively,
assume there exists a kOC solution in which every cascade
activation edge is cut exactly once by the clock assigned to
the later node. Then all activations of a given end-node will
be rendered network-induced by at least one clock and we
can assign colors in the kVC instance based on this clock
assignment ensuring that colors will not be adjacent.
III. ALGORITHMS FOR OPTIMAL CLOCK DETECTION
Next we present our solutions for OC and kOC. We
first demonstrate that an exact solution for OC is possible
in polynomial time employing dynamic programming (DP).
Its complexity, however, makes it challenging to apply to
real-world instances; hence we propose a fast and accurate
greedy (GR) alternative. Although kOC is NP-hard, we show
that the improvement function is monotonic and submodular
with respect to the set of solution clocks, leading to greedy
generalizations GRDP and GR2 of our single clock solutions,
the former featuring an approximation guarantee. Tbl. I sum-
marizes the algorithms and results discussed in this section.
A. Single-clock approaches
While there are O(2T−1) possible clocks for a timeline of
T original steps, we show that we can compute the optimal
one by considering O(T 2) intervals and employing dynamic
programming. Let S : {δe
s = (cid:104)s, e(cid:105)} be the set of all possible
Algorithm Problem Complexity Asymptotic Time Guarantee
DP
GR
GRDP
GR2
OC
OC
kOC
kOC
Poly
Poly
NP-hard
NP-hard
O(X4)
O(kX4)
O(mX log(X))
O(kmX log(X))
TABLE I
Exact
1 − 1/e
ALGORITHMS, COMPLEXITY AND APPROXIMATION GUARANTEES.
sub-intervals of the timeline [1, T ], where 1 ≤ s ≤ e ≤ T
denote the start and end of the interval. Note that there is a
quadratic number of possible intervals S = T (T + 1)/2. Let
also δe← denote the set of all intervals ending at e and starting
at a time no later than e. Let the improvement of v in cascade
X over interval δe
s ← δs−1
s given a preceding interval δs−1
I(v, X, δe
be:
b
LL(v, X, δe
LL(v, X, δe
0
b
) =
s ← δs−1
s ← δs−1
b
b
)
) − log pe
if X(v) > e
if X(v) ∈ δe
s
if X(v) < s,
(5)
b
b
b
s ← δs−1
) = N (v) ∩ A(X, δs−1
) is the interval log-likelihood of
where LL(v, X, δe
v defined as in Eq. 3 with the set of active neighbors of v
s ← δs−1
). Note that in the
C(X, v, δe
above definition we subtract the log-likelihood of the default
clock ∆min in case the activation of v is within the interval
X(v) ∈ δe
s to quantify the improvement due to v's activation.
s is defined
The total improvement of the interval transition δe
as the sum of all node improvements in all cascades:
s ← δs−1
s ← δs−1
We will denote with I∗(δe
X∈X
s, X) the best improvement of log-
s, over all sequences
likelihood up-to and including interval δe
of preceding intervals. In other words, I∗(δe
s, X) is the optimal
clock up to time e, such that the last interval in the clock is
s. We can recursively define this quantity as:
δe
(cid:88)
(cid:88)
I(v, X, δe
, X) =
I(δe
v∈V
(6)
).
b
b
I∗(δe
s, X) = max
δ∈δs−1←
I∗(δ, X) + I(δe
s ← δ, X)
.
(7)
(cid:104)
(cid:105)
The maximum in the definition is taken over the set of all
s: δs−1← . Based on the
intervals ending immediately before δe
above definition, the improvement of the best clock is the
maximum over the best improvements of intervals ending at T ,
i.e. I(X∆∗) = argmaxδ∈δT← I∗(δ, X). This equivalence gives
us the blueprint for a dynamic programming (DP) solution that
progressively computes the improvement of all T (T + 1)/2
intervals and uses back-tracking to retrieve the optimal clock.
Alg. 1 presents the steps of the DP algorithm based on
Eq. 7 producing the optimal solution of OC. Steps 1-3 compute
the best improvement for the base cases of the recursion, i.e.
all intervals staring at t = 1 which do not have preceding
intervals. Since no nodes are active before this time, all
activations are considered spontaneous, and thus the individual
1 ← ∅, X) are
node improvement scores and the cumulative I(δe
all zero. The nested loops in Steps 4-9 incrementally compute
the best
improvement (Step 6) of intervals of increasing
starting position and record the preceding interval that leads to
the best improvement to be later used by backtracking (Step
1, X) = I(δe
1 ← ∅, X) = 0 // Init. intervals starting at t=1
Algorithm 1 DP
Require: Graph G, set of cascades X
Ensure: Clock ∆∗ solution to OC
1: for e = 1 . . . T do
I∗(δe
2:
3: end for
4: for s = 2 . . . T do
5:
6:
7:
8:
9: end for
10: δT
11: Reconstruct ∆∗ by recursively following bt() starting from bt(δT
b )
12: return ∆∗
I∗(δe
bt(δe
end for
b = argmaxδ∈δT← I∗(δ, X) // Last interval of ∆∗
for e = s . . . T do
s , X) = max
s ) = δs−1
(cid:2)I∗(δ, X) + I(δe
s ← δ, X)(cid:3)
is the maximizer in I∗(δe
, where δs−1
δ∈δs−1←
s , X)
b
b
C = ∅ // Set of independent cut positions
for t in increasing activation times of all (u, t(cid:48), X) ∈ X do
Algorithm 2 GR
Require: Graph G, set of cascades X
Ensure: Clock ∆
1: ∆ = {(cid:104)1, T(cid:105)}
2: Ea = {(u, v, X)(u, v) ∈ E, X(u) < X(v)} // Active edges
3: repeat
4:
5:
6:
7:
8:
9:
10:
11:
12: until C == ∅
13: return ∆
Add active edges (u, v, X) to Ea(t) s.t. X(v) = t
Compute I(Ea(t))
if I(Ea(t)) > 0 then add-or-drop((t, Ea(t)) → C) end if
Remove active edges (u, v, X) from Ea(t) s.t. X(u) = t
end for
if C (cid:54)= ∅ then Add all cuts C to ∆ end if
7). Note that at the time at which interval δe
s is considered,
the best improvement of all immediately preceding intervals
I∗(δs−1← , X) is already available, thus allowing the recursive
computation of I∗(δe
s, X) in Step 6. Finally, the interval of
best improvement is selected among those that end at T and
the optimal clock is reconstructed by backtracking from this
interval using bt() (Steps 10-11).
DP Complexity: Alg. 1 runs in time O(XT 3), where X
denotes the number of all activations in all cascades. This is
due to the nested loops (Steps 4-9) which consider all O(T 2)
intervals and the maximization in line 6 which iterate over
s. The complexity
O(T ) preceding intervals of the current δe
does not depend on the full graph G(V, E), since only nodes
participating in the cascades and downstream neighbors need
to be considered (the likelihood of non-active nodes without
active neighbors can be computed in constant time for any
interval). In addition, when there are time steps without acti-
vations one can "drop" such intervals in a pre-processing step,
effectively letting activations define the original time points.
In this case the complexity becomes effectively O(X4).
While DP solves OC exactly in polynomial time, its com-
plexity is prohibitive for large real-world instances. GR is a
top-down greedy approach that scales almost linearly, adding
one partition at a time by splitting existing intervals, starting
from the default clock ∆max. The greedy aspect is in the
selection of the next split based on maximum improvement of
the score.
The steps of GR are outlined in Alg. 2. It initializes the
solution with the default aggregate clock ∆max (Step 1) and
computes all active edges Ea within cascades such that the
source and destination are active preserving the temporal order
(Step 2). It then iteratively tries to add groups of independent
cuts C that do not intersect common active edges in Steps
3-12. C is empty at the beginning of each iteration (Step 4).
The inner loop (Steps 5-10) is essentially a modified sweep
line algorithm in 1D [16], where the segments are defined
by active edges in Ea. Going from small to large times t of
all activations in X, we first add active edges that "end" at t
to Ea(t) (Step 6) and recompute the improvement I(Ea(t))
based on "current" active edges Ea(t) and based on whether
they have been already cut by previous sweeps (Step 7). If the
improvement at time t exceeds 0, we attempt to add the cut
(t, Ea(t)) to the C (Step 8). A cut is added if (i) it does not
have shared activations with any other cut in C, or (ii) in the
case it does, it is added if its improvement exceeds that of the
unique cut it shares active edges with. This logic in add-or-
drop()(Step 8) ensures that C maintains the set of independent
time cuts of highest improvement at every round of the outer
loop. In Step 9 we remove active edges ending at t, since they
will not be considered at t + 1. If C is not empty (Step 12)
we add all cuts to ∆ and update their active edges to a cut
state, which affects the improvement computations on Step 7
in subsequent iterations. Finally, if no new cuts were identified
we terminate the loop and return the clock (Steps 12-13).
GR complexity: Each sweep requires O(X log(Ea)) time,
since we move through the activations and maintain the cur-
rently active edges (that enter and exit only) once the structure
Ea(t), where the log factor comes from maintaining them in
a heap structure that support add (Step 6) and delete (Step
9). Since Ea grows slower than O(X2) the sweeps take
O(X log(X)). Generating all Ea in Step 2 might in general
be higher than O(X log(X)) for very dense networks, but
assuming that the average degree grows as O(log V ) this step
will not exceed in complexity a single sweep. The number of
sweeps can also reach m = O(X) if we make one cut at
a time on every sweep, but such instances will have lots of
overlapping active edges in time. The total time is log-linear
O(mX log(X)) if we assume that not too many sweeps m
are performed. As demonstrated in the evaluation section, GR
scales near-linearly to large real-world instances and produces
very high-quality solutions (> 90% of optimal).
B. Multi-clock approaches
Unlike OC, kOC is NP-hard. We propose a greedy GRDP
solution and show that it ensures a (1 − 1/e)-approximation.
Theorem 2. I(XD) is monotonic and submodular as a
function of the set of clocks D.
Proof. The monoticity is due to the maximization in the
definition of the improvement (Eq. 4): I(D ∪ ∆) ≥ I(D),
since in the worst case no node will "select" ∆ rendering the
improvement unchanged due to its addition.
Given two nested sets of clocks D ⊆ C and ∆ /∈ C,
let us consider four surjective (onto) functions from nodes
V to clocks: fD, fD∪∆, fC and fC∪∆ mapping any node v
I(D ∪ ∆) − I(D) ≥ I(C ∪ ∆) − I(C),
to the clock (among the set in the function's subscript) that
maximizes the node improvement. The submodularity property
holds due to the following three possibilities for any v ∈ V :
• fD∪∆(v) (cid:54)= ∆. This implies that fC∪∆(v) (cid:54)= ∆. As a result
fD(v) = fD∪∆(v) and fC(v) = fC∪∆(v), and v contributes
zero to both sides of the inequality.
• fD∪∆(v) = ∆ and fC∪∆(v) (cid:54)= ∆. Then v makes a positive
contribution to the LHS and zero contribution to the RHS.
• fD∪∆(v) = fC∪∆(v) = ∆. Then v contributes positively to
both sides. However, I(v, ∆) ≥ I(v, C) ≥ I(v, D) because fC
has access to all of the clocks that fD does; it will not assign
v to a lower-scoring clock.
Corollary 1.
selection of k clocks ensures a (1 − 1/e)-apx. for kOC.
[Apx. of GRDP (due to [11])] A greedy
To construct a Greedy solution for kOC we need to be able
to find the best next clock ∆ to add to an existing solution
of selected clocks D. Let fD(v) be a surjective function
mapping every node to the clock ∆ ∈ D that maximizes the
improvement due to v in all cascades I(v, X∆). Generalize
the improvement of a node given previous clocks D as:
I(v, X, δe
s ← δs−1
D) =
max{0, I(v, X, δe
b
b
s ← δs−1
b
b
) − I(v, XfD(v))},
s ← δs−1
(8)
where I(v, XfD(v)) is the improvement due to v's activation
as part of cascade X in the best clock that v is mapped to
in the solutions so far fD(v). We can similarly generalize the
definitions in Eqs. 6, 7 to account for already selected clocks
s ← δs−1
, XD)
obtaining the total interval improvement I(δe
s, XD) by using
and the optimal interval improvement I∗(δe
D) in the corresponding definitions. Based
I(v, X, δe
on the above, we generalize DP (fD(v)) to return the clock
of best improvement given a selected clocks set D by passing
an additional parameter fD(v) and replacing all improvement
functions in DP (Steps 2,6,7,10) with the corresponding im-
provements given D. The overall GRDP algorithm starts with
an empty set of clocks and incrementally adds the next best
clock returned by DP (fD(v)).
GRDP selects the best next clock greedily and is, thus,
guaranteed to return a solution of at least (1 − 1/e)OP T due
to Corr. 1. It, however, has a complexity O(kX4).As a fast
alternative, we also extend GR (Alg. 2) to obtain a double-
greedy GR2 scheme. It also calls incrementally a version
of GR (fD(v)) with the additional parameter that allows for
improvement evaluation, conditional on the best node scores
from previously selected clocks D in (Step 7) of Alg. 1. The
complexity of GR2 is O(kX2) in the worst case.
IV. EXPERIMENTAL EVALUATION
We evaluate the scalability and quality of our methods
for optimal clock detection and demonstrate their utility for
several applications in both synthetic and real world data. All
experiments are performed on a single core conventional PC
architecture and implemented in Java (single-threaded).
Evaluation datasets are summarized in Tbl. II. Our Twitter
dataset includes propagation of URLs over two months within
X (cid:80) X minX Duration
V
1000
¯E
2200
Synthetic
5000
Twitter [13] 3331 1.2m 7685
Flickr-s [4]
4.2m 278
66k
Flickr-b [4]
127k 8.4m 3176
185k
117k
200k
1m
30
5
500
200
N/A
3/12-4/12
9/04-3/09
9/04-3/09
TABLE II
DATASETS USED FOR EVALUATION.
(a) Clocks Twitter (conservative news)
∆
163
739
193
V %I
83
1038
226
16
1
8
∆0:
∆1:
∆2:
(b) Clock statistics
Fig. 3. Example of a kOC solution in Twitter for 500 conservative media
cascades obtained by GR2. (a): Interval separators over the period 03/12-
04/12 for the first three clocks: ∆0, ∆1, ∆2. (b): Statistics of the clocks,
their mapping to nodes and % improvement towards the final solution.
a snowball subnetwork of the Twitter follower graph including
3.3k users [13]. We expand shortened URLs from tweet mes-
sages and focus on domains of popular news and commentary
websites (e.g. foxnews, breitbart, thehill) as well as photo and
video domains, e.g. youtube, instagram, etc. Unique URLs
tweeted by at least 5 nodes form individual cascades resulting
in 7.6k cascades and 117k total activations.
We also employ anonymized data from Flickr including
friendship links and favourite photo markings from [4]. We
treat each photo as a cascade over the friendship graph initiated
by the owner of the photo (first activation) while subsequent
users marking the photo as a favorite comprise the rest of
the activation events within the photo cascade. We create two
datasets for evaluation: all cascades of sizes exceeding 500
(Flikr-s) and all cascades of sizes exceeding 200 (Flikr-b).
We also scale-free structured synthetic networks of at least
1000 nodes and sample IC cascades (pn = 0.1, pe = 0.001).
To simulate the temporal heterogeneity of real-world activa-
tions, we randomly stretch each original time step to multiple
time steps and distribute its activations uniformly in the
resulting time steps. This ensures that the relative order of
non-simultaneous activations is conserved.
A. Clock discovery: scalability, quality and stability
We first evaluate our solutions and discuss obtained clocks
in real and synthetic data and than move on to several
applications. The clocks obtained by applying GR2 (k = 3) to
the Twitter network are presented in Fig. 3. The very first
clock ∆0 exhibits a relatively more regular partitioning of
the timeline compared to the following clocks (Fig. 3(a)).
Intuitively, it captures the best overall time partitioning that
best explains all underlying cascades. The following clocks
"improve" the resolution for activations of certain nodes in
the network. About 25% of the nodes get assigned to the
second clock ∆1 and less than a tenth of a percent of the
nodes to clock ∆2 (Tbl. 3(b)). Similar diminishing returns are
also observed in the percentage of improvement to the overall
likelihood contributed by each clock (Col: %I in Tbl. 3(b)).
Scalability and quality. We investigate the relative quality
of the clocks obtained by GR and various homogeneous
aggregations of time compared to the optimal solution ∆opt
found with DP for a single clock (OC) in terms of relative
likelihood improvement I(∆)/I(∆opt) in Fig. 4(a). GR's
improvement consistently exceeds 90% of the optimal. We also
plot the results for homogeneous time aggregations of fixed
windows of 1 through 10 original time steps. As expected,
no homogeneous clock will work as well because activation
rates vary with time, requiring a varying data-driven temporal
resolution. When the temporal resolution is too high,
the
cascades are fragmented; while when it is too low, many
activations appear spontaneous. Only by allowing the reso-
lution to change with time (i.e. OC solutions) do we obtain
an effective model of cascade behavior. GR's near-optimal
solution quality is critical, since DP algorithm does not scale
to large instances, namely its execution time exceeds 1.5h on
even modest instance sizes Fig. 4(b). In contrast, GR scales
nearly linearly with the number of activations and discovers
high-quality clocks in real-world data with as many as one
million activations (see Fig. 5(c)).
In the multi-clock (kOC) setting, we observe similar trends
for GRDP and GR2. While GRDP provides a guarantee of a
(1 − 1/e)-approximate solution, its reliance on DP limits its
scalability to large instances. As observed in Figs. 4(c),4(d),
the quality of GR2's solutions closely match those of GRDP
with more than an order of magnitude execution speed-up.
We perform similar evaluation on Twitter and Flickr data
as well. The quality trends for Flickr-b for a single clock
discovery are presented in Fig. 5(a). Ideally one should
compare I(∆) to I(∆opt) (found using DP), as we did in
Fig. 4(a); however, because these networks are larger, this was
impractical for all but the smallest instances. GR's improve-
ment score closely matches that of DP up to 200 activations
and persistently dominates fixed-width aggregations for larger
instances. Similar behaviour in terms of quality is observed for
Twitter OC and for both datasets for multiple clock discovery
kOC (figures omitted due to space constraints).
Fig. 5(c) shows the runtime for GR on our three real-world
data sets. Of particular interest is the fact that Twitter, though
a much smaller instance, requires greater execution time for an
equivalent number of activations than Flickr. This is because
running time of GR is affected by the network density and
our Twitter network is much denser. Sparser data (e.g. using
@mentions instead of follows) would likely allow for much
faster execution. While the largest size of Flickr-b requires
several hours to extract a clock, it is worth mentioning that it
0101-Mar13-Mar25-Mar06-Apr18-Apr30-Apr2(a) Quality
(b) Time
(c) Quality kOC
(d) Time kOC
Fig. 4. Solution quality and execution time for synthetic data.
(a) Comparison against the optimal improvement score I(∆opt) for the clock found by GR
and several homogeneous clocks. (b) Comparison of execution time for DP and GR. (c),(d) Solution quality I(∆) and execution time vs number of clocks
discovered by GRDP and GR2 on two datasets, one with 300 activations and one with 500 activations. Note that I(∆) increases with more activations, as
there are more possiblities for improvement over the baseline clock ∆max.
B. Applications of optimal clocks
Next we apply detected clocks for improved missing cas-
cade data and cascade size and topic prediction.
Inferring missing cascade activations. Due to limitations on
API usage of OSNs or privacy restrictions, only a partial ob-
servation of the diffusion process are typically available [20, 5,
14]. Hence, in order to accurately detect information sources,
estimate virality along edges or maximize the influence of
campaigns it is important to infer unobserved cascade partici-
pants based on the network structure and the partially available
cascade information. Zong et al. [20] study this problem in the
context of IC and propose approximate algorithms for the NP-
hard problem of optimal cascade reconstruction.
To illustrate the importance of using an appropriate network
clock for this application, we adopt the WPCT algorithm [20]
to infer missing activations in both synthetic and real-world
data, while comparing the accuracy due to the original and
optimal clocks. WPCT attempts to reconstruct a feasible
cascade tree based on partial observed activations. A cascade
tree is feasible if the distance from a cascade's source to
every observed activation is equal to the time of activation
(assuming the source is activated at t = 0). To allow for
cascades with multiple sources, we use a modified version of
WPCT that returns a forest so long as all observed activations
are reachable from one of the cascade sources. Because
this is an NP-hard problem [20], the algorithm may fail to
find such a forest even when one exists. Working with an
appropriate timeline, thus become critical for the algorithm
and the completion applications overall.
The success rate of WPCT in finding a viable forest
(measured as the fraction of cascades that obtained feasi-
ble trees) is one measure of performance and the quality
of predicted missing activation a second one. To test
the
algorithm, we begin with complete cascades and then hide
activations, removing them from the data provided to WPCT.
Each activation in a cascade has a fixed probability of being
removed independent of all other activations, except that the
first and last activation of each cascade are always kept since
the algorithm has no chance of discovering them. Considering
these hidden activations as true positives and any other non-
observed nodes as false positives, we measure precision and
recall for obtained solutions.
(a) Flickr-b Quality
(b) Reg. Clock Quality
(c) Time
Fig. 5. (a): Likelihood improvement of GR compared to DP and homogeneous
clocks (AGGX, MIN) in Flickr. Similar quality trends persist for GR2 versus
GRDP in Twitter and using multiple clocks (omitted due to space limitation).
(b): Comparison of many different homogeneous clocks to GR using 19k
activations on Flickr-s. (c): Execution time for detecting a single clock in all
three real datasets. Multiple clock detection (omitted) shows an increase in
runtime that is linear in k.
processes a million activations in a 8.4m-edge network with
effectively 10s of millions of active edges. For kOC, the trends
are the similar to those in synthetic data (omitted due to space).
Most notably, GR2 remains linear in k, since it performs the
same call to DP for each round of clock discovery.
Sensitivity to pn and pe. IC' propagation pn and spontaneous
activation pe probabilities are the only two parameters for our
algorithms. Hence, a natural question is: How stable is the
clock w.r.t. these probabilities? In practice pe and pn have
minimal impact on the produced clocks for large ranges of
their settings. We performed both synthetic and real-world data
experiments that systematically vary both parameters, namely
pe
taking values between 0.001 (i.e. spontaneous activations
pn
are very unlikely) and 1 (i.e. activations are equally driven by
external sources and the network). The clocks detected by our
algorithms in synthetic data were identical in all cases where
pe < pn; only when the parameters were equal was there a
change in the optimal clock. For real-world data, there was
more sensitivity with some changes appearing at pe ≥ 0.2pn;
however, even in these cases the obtained clocks were largely
unchanged. Note that large settings of pe (comparative to pn)
attempts to fit to a diffusion process that is predominantly
driven by external forces due to the sheer number of nodes,
and hence the network structure's effect is minimal.
1006000.00.51.0# of activationsI(D) / I(Dopt)GRMINAGG2AGG5AGG10100600030006000# of activationsTime (s)DPGR07501500kI(D)1234GRDP 300GR2 300GRDP 500GR2 500kTime (s)12340.01110010kGRDP 300GR2 300GRDP 500GR2 500030060090001000200030004000# of activationsI(D)AGG20AGG5MINGRDP0.000.250.50Intv. length / TI(D)030k60k90kGRXTime (s)250k1M101001k10kTwitterFlickr−sFlickr−b(a) Synthetic Success stretch
(b) Synthetic F1 stretch
(c) Synthetic success
(d) Synthetic F1
(e) Twitter success
(f) Twitter recall
(g) Flickr success
(h) Flickr recall
Fig. 6. Comparison of solution quality for the cascade completion problem in [20]. M IN are results using the original timings (∆min). GR are results
after remapping times according to the clock found by our greedy algorithm. AGG-match are results after remapping times onto a homogenous clock with
the same number of intervals as the one found by GR. (a)-(d) show synthetic data; (e)-(h) show real-world data.
To generate synthetic data for this experiment, random
cascades with at least 30 activations were created on a fixed,
scale-free network. To emulate the delays in a real-world net-
work, these cascades were then stretched: a random clock with
a known average interval length was generated, and then each
cascade had its times remapped onto that clock. For example,
if the third interval in a clock was (cid:104)5, 8(cid:105), then an activation
at t = 3 would be remapped randomly onto a time between
5 and 8, inclusive. The results on synthetic data are shown in
Figs.6(a)-6(b). Each figure shows three traces: the result after
applying the clock found by GR, the result after applying a
homogeneous clock with the same number of intervals as the
GR clock (AGG-match), and the baseline (MIN) using the
original timeline (∆min). Using the GR clock greatly increases
the success rate when cascades have been stretched, which
would be the case when the temporal resolution is too high.
It also outperforms both alternatives for any rate of hiding
activations from the algorithm. The spike in success rate at
extremely high hidden-activation rates (Fig. 6(c)) stems from
the removal of constraints. To complete a cascade tree, one
of simply needs to recover any path from source to the few
remaining activations of appropriate length. The prediction
of missing nodes (F1 measure), however, decreases for large
drop rate due to the large number of possible candidates
Fig. 6(d). Essentially, while the recall for such cases is still
high, precision decreasses drastically.
In real-world data, we only vary the probability of hiding
activations. Both networks are quite dense, resulting in huge
number of candidates for completion and thus high false
positive rates in all cases; hence, we only plot recall instead of
F1-measure. The Twitter network is so dense that the homo-
geneous clock outperforms GR on the success rate measure
(Fig. 6(e); there are so many possible paths that at a matching
level of temporal resolution (same number of intervals as in
a GR clock, but homogeneous in length), it becomes very
likely that a feasible tree can be found. Most of these solutions
F1 w/o Clock F1 w Clock
Data
Twitter
Flickr-b
m
10
20
30
300 . . . 500
600
700
CASCADE SIZE PREDICTION AIDED BY DETECTED CLOCKS.
0.67
0.66
0.7
0.66
0.62
0.61
TABLE III
0.67
0.71
0.76
0.66
0.69
0.67
#casc.
1280
664
309
1177 . . . 271
173
94
are, however, incorrect, as indicated by the much lower recall
rate of AGG-match than that of GR in Fig. 6(f). In Flickr's
less-dense network, GR outperforms both alternatives on both
metrics (Figs. 6(g)-6(h)).
Predicting cascade size based on initial observations is
another relevant application we consider. Recently Cheng et
al [6] considered multiple features of the m-prefix of observed
cascades (the first m activations) to predict the eventual size
of cascades.The authors observed that temporal features have
highest impact on prediction accuracy [6]. Naturally, precisely
these features will be most affected by inappropriate temporal
aggregations of the timeline. For example, in cascades initiated
late at night, observing a large time-lag to the morning acti-
vations might make the cascade prefix appear slow-growing
and bias its prediction to limited future growth. Hence, we
investigate the potential for improvement of size prediction
based on learned network clocks.
We employ only the temporal features proposed in [6]
and set-up the same prediction problem: given the first m
activations, how likely is it
that a cascade exceeds size
αm, α ≥ 1? We set α such that the considered cascades
are balanced between the small (X < αm) and large
(X ≥ αm) class. In [6], α was set to 2 as this produced
balanced prediction problems, however, the appropriate setting
for our datasets is α ≈ 1.5, as our cascade size distributions
have a different slant. We compare the F1-measure in cross-
validation of the temporal features according to (i) the original
times of activation (col. 3 in Tbl. III) and the same according
123450.00.20.40.6Avg. interval lengthSuccess rate123450.000.100.20Avg. interval lengthF1−measure0.20.40.60.80.00.20.4Fraction of hidden activationsSuccess rateGRMINAGG−match0.20.40.60.80.00.20.4Fraction of hidden activationsF1−measure0.10.20.30.40.50.00.20.40.60.8Fraction of hidden activationsSuccess rate0.10.20.30.40.50.000.10Fraction of hidden activationsRecall0.10.20.30.40.50.00.20.40.6Fraction of hidden activationsSuccess rate0.10.20.30.40.50.00.20.40.6Fraction of hidden activationsRecallGRMINAGG−matchComparison
Liberal v.s. Conservative
Text v.s. Visual
#acts. per class minX #casc. ACC
56.2%
57.5%
5301
15132
55
342
30
20
TABLE IV
CASCADE TOPIC PREDICTION AS A PROXY FOR CLOCK CONSISTENCY.
to the clock obtained by GR (col. 4 in Tbl. III), considering
prefixes of increasing size m in Twitter and Flickr.
In Twitter the optimal clock enables 7% lift of the F1
measure for m = 20 and 8% for m = 30, and performs on
par with the original clock for shorter prefixes. A significant
improvement due to the optimal clock in Flickr occurs for
prefixes of size 600 and higher. The cascades in Flickr tend
to be very large and a big number of the original activations
are disconnected in the network and hence do not allow the
clock to boost the informativeness of the features. This might
be due to many popular photos being featured, thus inducing
non-network driven favorite markings. The optimal clock
provides a significant prediction improvement (m ≥ 600) and
if combined with possible other features (tags,text) it might
aide to even better performance for actual prediction.
Topical consistency of clocks. Do similar topics and informa-
tion types spread similarly in the network? In this application,
we are interested to quantify the level of consistency of the
optimal clocks for information of the same type. We use
clock-based cascade topic prediction quality as a proxy for
clock consistency. We prepare two classification tasks listed
in Tbl. IV. In the first case we select URLs from liberal
(Huffington post and the hill) and conservative (Breitbart and
Foxnews) outlets such that the total number of activations
match in each class and we predict (using leave-one-out
validation) the accuracy of placing a cascade in its own
category simply based on the likelihoods of the cascades
according to the two clocks detected based on the remainder
of the categories. We repeat the same for news URLs (Text)
versus Visual content (photo/video).
The accuracy in both settings is significantly above random
(50% will be random due to the balanced number of activations
per class and,
thus, similar size clocks). This observation
alludes to different content spreading according to different
conserved clocks-a direction we plan to pursue in the future
after obtaining a larger annotated corpus of simultaneous
cascades. Similar evaluation is not possible in Flickr as the
data is anonymized. It is also important to note that the clock
likelihood is not
the best predictor of cascade topic (e.g.
content and users profiles would likely yield much higher
quality), however, we use this task only as a proxy for clock
consistency within topics/content.
V. RELATED WORK
To the best of our knowledge, we are the first to propose
algorithms for model-driven heterogeneous time aggregations
of dynamic network data on information cascades. Previously,
varying time windows have been proposed by Yang et al [19]
to mine progression stages in event sequences; however, this
work assumes independent sequences and no network struc-
ture involved, while we are interested in network diffusion
processes. The effect of homogeneous temporal aggregations
of the timeline in dynamic networks is a better-studied [12,
3, 17, 2]. Different fixed window sizes and their effect of the
resulting smoothness of time series of network statistics was
consisdered in [17, 3]. Significant differences in the structural
features of networks formed by aggregating mobile phone call
records at different resolutions was observed in [12], and the
effect of aggregation window size on predicting changes in
the network was studied in [2].
All above problems clearly demonstrate the need to select
an optimal aggregation for evolving networks. However, the
focus in all of them is on smoothness of global or local
network statistics and the proposed approaches select a ho-
mogeneous time scale, i.e. each aggregation window is the
same length of time. We demonstrate in experiments that
such homogeneous aggregations are inadequate for explaining
observed information cascades, while our in-homogeneous
network clock solutions are superior in terms of likelihood
of observed cascades and for several applicatios.
Other approaches for cascade completion were also con-
sidered [14], as well as the problem of missing data when
trying to limit cascades [1]. Providing information about the
optimal clock to such algorithms could potentially improve
their overall performance similar to the ones we considered.
Other applications to which clock data could be applied
include influence maximization [10] and estimation of the
diffusion probabilities of IC [15].
VI. CONCLUSION
We proposed network clocks: heterogeneous partitions of
the timeline that best explain observed information propaga-
tion cascades in real-world networks with respect to the inde-
pendent cascade model (IC). We showed an optimal dynamic
programming solution DP for the single optimal clock (OC)
problem and a scalable greedy alternative GR that matches
(within 10%) DP's quality, but is able to detect clocks in
an 8.4-million-edges Flickr network and more than a million
activations of nodes within cascades. We demonstrated that
the multi-clock problem (kOC) is NP-hard and proposed both
a (1 − 1/e)-approximation GRDP and a fast and accurate
heuristic GR2. The detected clocks enable improved cascade
size classification (up to 8% F1 lift) and improved missing
cascade data inference (0.15 better Recall) in Twitter and
Flickr, compared to using the original time or fixed-window
aggregations of time.
REFERENCES
[1] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of
misinformation in social networks. In ACM WWW, 2011.
[2] M. Budka, K. Musial, and K. Juszczyszyn. Predicting the evolution of
social networks: optimal time window size for increased accuracy. In
Proc. PASSAT SocialCom, pages 21–30. IEEE, 2012.
[3] R. S. Caceres, T. Berger-Wolf, and R. Grossman. Temporal scale of
processes in dynamic networks. In IEEE ICDM Workshops, 2011.
[4] M. Cha, A. Mislove, and K. P. Gummadi. A Measurement-driven
Analysis of Information Propagation in the Flickr Social Network. In
Proc. WWW, Madrid, Spain, April 2009.
[5] Z. Chen, H. Tong, and L. Ying. Full diffusion history reconstruction in
networks. In Proc IEEE Big Data, 2015.
[6] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec.
Can cascades be predicted? In Proceedings of the 23rd international
conference on World wide web, pages 925–936. ACM, 2014.
[7] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex
systems look at the underlying process of word-of-mouth. Marketing
letters, 12(3):211–223, 2001.
[8] J. Goldenberg, B. Libai, and E. Muller. Using complex systems analysis
to advance marketing theory development: Modeling heterogeneity
effects on new product growth through stochastic cellular automata.
Academy of Marketing Science Review, 2001:1, 2001.
[9] M. Granovetter. Threshold models of collective behavior. American
journal of sociology, pages 1420–1443, 1978.
[10] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing the spread of
In Proc. ACM SIGKDD, pages
influence through a social network.
137–146. ACM, 2003.
[11] A. Krause and D. Golovin. Submodular function maximization. In Chap-
ter in Tractability: Practical Approaches to Hard Problems. Cambridge
University Press, 2012.
[12] G. Krings, M. Karsai, S. Bernhardsson, V. D. Blondel, and J. Saramaki.
Effects of time window size and placement on the structure of an
aggregated communication network. EPJ Data Science, 1(4):1–16, 2012.
[13] K. Macropol, P. Bogdanov, A. K. Singh, L. Petzold, and X. Yan. I act,
therefore i judge: Network sentiment dynamics based on user activity
In Proc. of the 2013 IEEE/ACM Int'l Conf. on Advances in
change.
Social Networks Analysis and Mining, pages 396–402. ACM, 2013.
[14] E. Sadikov, M. Medina, J. Leskovec, and H. Garcia-Molina. Correcting
In Proc. of the fourth int'l
for missing data in information cascades.
conf. on Web search and data mining, pages 55–64. ACM, 2011.
[15] K. Saito, R. Nakano, and M. Kimura.
Prediction of information
diffusion probabilities for independent cascade model. In Knowledge-
based intelligent information and engineering systems, pages 67–75.
Springer, 2008.
[16] M. I. Shamos and D. Hoey. Geometric intersection problems.
In
Foundations of Computer Science, 1976., 17th Annual Symposium on,
pages 208–215. IEEE, 1976.
[17] R. Sulo, T. Berger-Wolf, and R. Grossman. Meaningful selection of
In Proc. of the Eighth
temporal resolution for dynamic networks.
Workshop on MLG, pages 127–136. ACM, 2010.
[18] A. Tagarelli and R. Interdonato. Time-aware analysis and ranking of
lurkers in social networks. Soc. Net. Anal. and Mining, 5(1):46, 2015.
[19] J. Yang, J. McAuley, J. Leskovec, P. LePendu, and N. Shah. Finding
In Proc. of the
progression stages in time-evolving event sequences.
23rd int'l conf. on World Wide Web, pages 783–794. ACM, 2014.
[20] B. Zong, Y. Wu, A. K. Singh, and X. Yan.
Inferring the underlying
structure of information cascades. In Data Mining (ICDM), 2012 IEEE
12th International Conference on, pages 1218–1223. IEEE, 2012.
|
1506.03847 | 1 | 1506 | 2015-06-11T21:35:25 | GMine: A System for Scalable, Interactive Graph Visualization and Mining | [
"cs.SI"
] | Several graph visualization tools exist. However, they are not able to handle large graphs, and/or they do not allow interaction. We are interested on large graphs, with hundreds of thousands of nodes. Such graphs bring two challenges: the first one is that any straightforward interactive manipulation will be prohibitively slow. The second one is sensory overload: even if we could plot and replot the graph quickly, the user would be overwhelmed with the vast volume of information because the screen would be too cluttered as nodes and edges overlap each other. GMine system addresses both these issues, by using summarization and multi-resolution. GMine offers multi-resolution graph exploration by partitioning a given graph into a hierarchy of com-munities-within-communities and storing it into a novel R-tree-like structure which we name G-Tree. GMine offers summarization by implementing an innovative subgraph extraction algorithm and then visualizing its output. | cs.SI | cs | GMine: A System for Scalable, Interactive Graph
Visualization and Mining
Jose F. Rodrigues Jr.*, Hanghang Tong+, Agma J. M. Traina*, Christos Faloutsos+, Jure Leskovec+
*University of Sao Paulo, Brazil
{junio,agma}@icmc.usp.br
+Carnegie Mellon University, USA
+{htong,christos,jure}@cs.cmu.edu
5
1
0
2
n
u
J
1
1
]
I
S
.
s
c
[
1
v
7
4
8
3
0
.
6
0
5
1
:
v
i
X
r
a
Abstract—Several graph visualization tools exist. However,
they are not able to handle large graphs, and/or they do not allow
interaction. We are interested on large graphs, with hundreds
of thousands of nodes. Such graphs bring two challenges: the
first one is that any straightforward interactive manipulation
will be prohibitively slow. The second one is sensory overload:
even if we could plot and replot the graph quickly, the user
would be overwhelmed with the vast volume of information
because the screen would be too cluttered as nodes and edges
overlap each other. GMine system addresses both these issues, by
using summarization and multi-resolution. GMine offers multi-
resolution graph exploration by partitioning a given graph into
a hierarchy of com-munities-within-communities and storing it
into a novel R-tree-like structure which we name G-Tree. GMine
offers summarization by implementing an innovative subgraph
extraction algorithm and then visualizing its output.
I. INTRODUCTION
An important support for graph exploration is interactive
visualization, which can help to quickly identify the main
components of a graph, its outliers, the most important edges
and communities of related nodes. Interaction-enabled visual-
ization allows to pick detailed and contextualized information
on demand,
interact with nodes and edges and determine
topology aware arrangements for clearer inspection.
However, up-to-date applications have produced graphs on
the order of hundred thousand nodes and possibly million
edges (referenced from here on as large graphs). Large graphs
can be found in numerous real-life settings: web graphs (web
pages, pointing to others with hypertext links) [3], computer
communication graphs (IP addresses sending packets to other
IP addresses), recommendation systems [4], who-trusts-whom
networks [5], bipartite graphs of web-logs of who visits what
page; blogs and similar. At this magnitude, efficient graph vi-
sualization becomes prohibitive because of the excessive pro-
cessing power requirements that prevent interaction. Besides
that, hundred-thousand-node drawings result in unintelligible
cluttered images that do not aid the users cognition. To face
these challenges we present a system that explores two new
ideas to address scalability in large graph visualization. The
first idea establishes a hierarchical partitioned arrangement
from a graph in order to allow multi-resolution visualization.
The second idea utilizes an innovative algorithm to extract a
subgraph of interest based on an initial set of target nodes.
Our system uses either or both of these ideas to process large
graphs bypassing the aforementioned limitations of massive
graph drawing. The proposed interface permits to navigate
through the levels of a graph hierarchy and also to mine
subgraphs information for targeted graph exploration.
The remaining of this paper is structured as follows. Section
II introduces the DBLP dataset that will be used along this
work. Section III describes our multi-resolution visualization
idea and section IV illustrates our subgraph extraction algo-
rithm. Section V concludes the work.
II. DBLP DATASET
Throughout this text we employ the DBLP dataset to illus-
trate the functionalities of our system. This dataset originates
from the Digital Bibliography & Library Project (or DBLP).
DBLP is a publicly available database of publication data
that embraces authors (also co-authors) from the Computer
Science community and their published works. Its content is
periodically updated and detailed information from DBLP can
be achieved at http://dblp.uni-trier.de/. The version of DBLP
dataset that we use defines a graph with n = 315,688 nodes
and e = 1,659,853 edges, where each node represents an
author of a publication and each edge denotes a co-authoring
relationship between two authors.
III. GRAPH HIERARCHY CREATION,
STRUCTURING AND VISUALIZATION
Our first idea to deal with massive graphs is the use of a
commu-nities-within-communities structured visualization. In
the next sections we overview the steps to come up with such
proposal at the same time that we describe its features for
visualization and interaction.
A. The G-Tree structure
For this work, initially we need to recursively and hierar-
chically partition a given graph. We adopted the methodology
named k-way partitioning (however any partitioning method-
ology fits our system). That is, given a graph G = (V,E) with
V = n, we want to have k subsets V1,V2, ...,Vk of V , such
that Vi ∩Vj = /0 for i (cid:54)= j, Vi = n/k and ∪iVi = V . Also, the
partitioning must minimize the number of edges of E whose
incident vertices belong to different subsets. This partitioning
methodology is implemented by METIS, whose details are
found in the work by Karypis and Kumar [2] and in related
works.
Proceedings of the 32nd international conference on Very Large Data Bases, 2006
Hence, given a graph, we perform a sequence of recursive
partitionings to achieve a hierarchy of communities-within-
communities. At each recursion, each partition is submitted to
a new partitioning cycle that will create another set of parti-
tions. This process repeats until we get the desired granularity
for the partitions (communities). For each new set of partitions,
a new subtree is embedded in an R-tree like structure. At each
new level of the tree, the tree nodes (communities) just created
will have the formerly partitioned tree node as their parent. We
call this structure G-Tree (named after Graph-Tree), which is
the data structure that supports our system, illustrated in figure
1. The references for the graph nodes properly said are at the
bottom level of the tree. The entire structure is stored in a
single file and the nodes are transferred to main memory only
when necessary.
Fig. 1.
together with its graph recursive structuring.
G-Tree structure, which we utilize for our visualization system
To demonstrate our methodology, we recursively partition
DBLP dataset into 5 hierarchy levels each with 5 partitions.
The dataset, thus, is broken into 54 + 1, or 626, communities
with an average of 500 nodes per community. The commu-
nities reflect the connectivity (number of edges) among their
members according to METIS partitioning algorithm.
B. Visualization and Interaction
We propose an innovative interactive presentation for large
graphs. For this purpose, our system promotes the navigation
across the levels of the tree that represents the hierarchical
partitioning of a large graph. As the user interacts with the
visualization, the system keeps track of the connectivity among
communities of nodes at different levels of the partitioned
graph. When the user changes the focus position on the tree
structure, the system works on demand to calculate and present
contextual information.
When we display a graph as
communities-within-
communities, we have new representations for graph drawing,
as illustrated in figure 2. Besides conventional nodes and edges
that appear only at the bottom level of the tree (leaf nodes),
we also have community nodes, that comprehend a number
of sub communities and nodes, and we have connectivity
edges, that represent the number of edges between community
nodes. These connectivity edges represent the number of edges
between nodes from the original graph, but that are in different
communities. The storage and management of this information
is out of the scope of this demonstration paper.
Fig. 2. Conventional nodes and an edge to denote relationship. Leaf com-
munity nodes, subgraphs and a connectivity edge to denote how many nodes
from the communities have an edge to connect them. Non-leaf community
nodes, sub communities and connectivity edges.
These features are illustrated in figure 3, which presents
a sequence of interactive actions taken by the user when
navigating in DBLP dataset. In figure 3(a), it is possible to
see DBLP partitioned into 5 communities in its first hierarchy
level, and other 5∗5, or 25 communities in its second hierarchy
level. At this point, 3 communities are highly connected to
every other community and also highly connected among
their 5 sub communities. The other 2 first-level communities
are relatively isolated from the other 3 and totally isolated
among their sub communities. One can conclude that
the
3 highly connected communities hold long term active and
collaborating authors, while the other 2 hold casual,
less
productive authors who seldom interact with each other. In
figure 3(b) we focus on community s034 and verify that its
sub communities are isolated from each other. A deeper focus
in community s034 in figure 3(c) shows that among its sub
communities (highlighted), only two of these sub communities
present an edge. Our system allows to inspect this specific
outlier edge to reveal that authors “D. B. Miller” and “R. G.
Stockton” define this co-authoring relation for their unique
DBLP publication dated from 1989. It is also possible to
execute a label query to locate a specific author within the
hierarchy, as for example author Jiawei Han in figure 3(d).
In figure 3(e) we go to its subgraph community and verify
other important nodes surrounding this author. In figure 3(f)
we interact with the graph to discover author Ke Wang, which
is another very active author who has worked for years with
author Jiawei Han.
The exploration of communities of nodes instead of all
the nodes at a time,
the way we are doing, allows the
perception of the relationships among communities of nodes.
This way it
is possible to trace the distribution of edges
among communities, their connectivity degree and their scope
of connectivity. It is also possible to pick outlier edges for
suspicious connections between communities. The user can
focus at different communities of nodes according to his/her
interest and browse the levels of the hierarchy in order to
identify interesting connections or to inspect specific graph
nodes.
At
the user can access a
subgraph that is part of the larger graph being analyzed. To
do so, the system brings the correspondent graph nodes from
disk to memory and draws them inside the region attributed
to its parent community (tree node). Then this area of the
visualization scene becomes a regular area for graph drawing.
the bottom level of the tree,
Copyright VLDB Endowment
1196
Proceedings of the 32nd international conference on Very Large Data Bases, 2006
“Tomahawk ” principle, because the chosen nodes remind of
a tomahawk ax when shown on G-Tree method, illustrated
in figure 4. That is, in order to limit the number of items
presented at a time, we make use of G-Tree structure to
determine a well-established context every time in response
to user interaction. Thus, as the user chooses a community
node to focus on, we traverse the tree in order to gather the
desired node of interest, its sons and its siblings. Then we
plot only these items inside the minimum node that bears this
contextualization, see figure 3(b). We argue that the Tomahawk
principle can provide a minimum contextualization to the user
by presenting nodes above, beneath and by the side of a node
of interest.
Fig. 4. The Tomahawk principle to help decide what to exhibit according
to user interaction.
IV. CONNECTION SUBGRAPH
EXTRACTION
Our second idea to deal with massive graphs is the use
of a novel algorithm for connection subgraph extraction. Our
algorithm, which is not to be detailed in this demonstration
work, aims to maximize what we call “goodness score” of the
nodes within a subgraph. To reach this goal, an independent
random walk with restart is simulated for each source node,
and the goodness score of a node is computed by the steady-
meeting probability that the random particles will finally meet
each other at the given node. Then, a dynamic programming is
used to discover important paths iteratively. The proposed al-
gorithm can deal with multi-source queries, while the existing
one [1] is restricted to pairwise source queries.
A typical scenario to apply connection subgraph extraction
is “given an initial set of interesting individuals, find a small
number of individuals from a large social network that can
best capture the relationship among the individuals of the
initial set”. For large graphs, extracting a small (say, with
tens of nodes) yet representative connection subgraph brings
feasibility to large graph visual exploration. Also, due to the
multi-faced nature of many real life relationships, connection
subgraphs provide a better way to describe such kind of
relationships if compared to single path descriptions.
For (limited static) demonstration, a connection subgraph
with 30 nodes extracted from the whole DBLP dataset is
plotted in figure 5. The initial query set in figure 5 is composed
of three authors from the database community: “Philip S. Yu”,
“Flip Korn” and “Minos N. Garofalakis”. In figure 5, instead
Fig. 3. DBLP dataset navigation. (a) First 5 main communities and its 25 sub
communities. (b) Contextualization of community s034. (c) Closer look and
complete expansion of community s034. (d) We locate author Jiawei Han. (e)
Subgraph community of author Jiawei Han. (f) Interaction with the subgraph
reveals co-author Ke Wang as one of the main contributors to Jiawei Han.
For this subgraph, besides basic interaction (zoom, pan and
details on demand) the user can also ask for the calculation
of metrical features corresponding to this subgraph only. Our
system supports the following calculations: degree distribution,
number of hops, number of weak components, number of
strong components and page rank calculation for the nodes.
GMine also offers pop up node information, edge expansion
and edition of nodes and edges.
C. The Tomahawk Principle
The presentation of the node communities together with
the edges that connect them may cause sensory overload.
This is due to the fact that every community can potentially
be connected to every other community. This problem is
aggravated if the graph has many hierarchy levels exhibited
simultaneously when communities are expanded to show their
content. To cope with this aspect of our multi-resolution graph
visualization, we propose to display a small, but carefully
chosen set of communities. We refer to this method as the
Copyright VLDB Endowment
1197
Proceedings of the 32nd international conference on Very Large Data Bases, 2006
of a thousand nodes graph, one can concentrate on a subgraph
of interest extracted from the original graph. The magnitude of
the subgraph is thousand fold smaller than the original dataset
and the subgraph being visualized is directly related to the
interconnection defined by our initial set of target nodes.
On the visualization, if the user moves the mouse over a
node, GMine pops up more information about that node - in
the example, one can see Prof. H. V. Jagadish data and his
edges highlighted. Prof. Jagadish has direct connection with
Flip Korn, and 1-step-away connections with Dr. Philip Yu
and Dr. Minos Garofalakis.
Fig. 6.
(a) A 200 nodes subgraph extracted from DBLP dataset. (b) The
same graph presented as three partitions. (c) One level down the hierarchy
and we have three other communities inside the community highlighted in
(b). (d) Zoom in the community highlighted in (c) and another level down
the hierarchy. We reach the very nodes of the graph.
Fig. 5.
Illustration for connection subgraph extraction.
In our system, subgraph extraction can be utilized alone or
combined to communities-within-communities visualization.
Alone, one can extract a subgraph of interest from a given large
graph. Combined, (see figure 6), it can be used to generate a
subgraph to be hierarchically partitioned for visualization or,
alternatively, it can be used to generate a subgraph from an
existing graph partition.
Figure 6 illustrates the combination of subgraph extraction
and com-munities-within-communities visualization. Figure,
6(a) displays a 200 nodes subgraph extracted from the DBLP
dataset. In figure 6(b) it possible to see this subgraph parti-
tioned into 3 main communities. In figures 6(c) and 6(d) we go
deeper into the hierarchy to analyze the connectivity between
communities and, finally, the very nodes of the graph.
V. CONCLUSIONS
We have demonstrated a system that supports the visu-
alization of large graphs in an interactive environment. In
our tool the user can navigate through the graph structure
in a hierarchical fashion, having different perspectives of the
graph arrangement, varying from multiple resolution levels
to detailed inspection of specific graph nodes. The system
also supports an innovative subgraph extraction algorithm that
can speed up large graph exploration by concentrating on a
targeted subset of the graph.
The benefits of our ideas come from its compartmented
graph management that promotes scalability while keeping
visual comprehension. The scalability is due to the fact that
smaller parts of the graph are processed one at a time instead of
the whole graph at every cycle. Visual comprehension derives
from limited visual data presentation in contrast to cluttered
visualizations generated when large graphs are entirely drawn.
it
is
not
Due
space
limitations
the GMine
possible
for
functionalities. Therefore,
to
to
show all
a
better exposition, we have GMine available online at
http://www.cs.cmu.edu/junio/GMine,
where
the software, datasets and videos can be downloaded. For
VLDB demonstration session, we plan to let the interested
VLDB participants interact directly with the system, possibly
checking for their name,
their connection-subgraphs with
their colleagues, and zooming in and out their corresponding
communities.
VI. ACKNOWLEDGEMENTS
This work has been supported by FAPESP (Sao Paulo State
Research Foundation), CNPq (Brazilian National Research
Foundation), CAPES (Brazilian Committee for Graduate Stud-
ies), National Science Foundation, (PITA) Pennsylvania Infras-
tructure Technology Alliance and donations from Intel, NTT
and Hewlett-Packard. Any opinions, findings and conclusions
or recommendations expressed here are those of the author(s)
and do not necessarily reflect the views of the funding parties.
REFERENCES
[1] C. Faloutsos, K. S. McCurley, and A. Tomkins.
Fast discovery of
connection subgraphs. In KDD, pages 118–127, 2004.
[2] George Karypis and Vipin Kumar. Multilevel graph partitioning schemes.
In IEEE/ACM International Conference on Parallel Processing, pages
113–122, Oconomowoc, Wisconsin, USA, August 1995.
[3] S. R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Trawling
the web for emerging cyber-communities. Computer Networks, 31(11-
16):1481–1493, 1999.
[4] J. Leskovec, A. Singh, and J. Kleinberg. Patterns of influence in a
In PAKDD, volume 3918, pages 380–389.
recommendation network.
Springer-Verlag, 2006.
[5] R. Matthew, R. Agrawal, and P. Domingos. Trust management for the
semantic web. In 2nd ISWC, pages 351–368, 2003.
Copyright VLDB Endowment
1198
|
1608.08331 | 1 | 1608 | 2016-08-30T05:20:41 | Analysis of Home Location Estimation with Iteration on Twitter Following Relationship | [
"cs.SI"
] | User's home locations are used by numerous social media applications, such as social media analysis. However, since the user's home location is not generally open to the public, many researchers have been attempting to develop a more accurate home location estimation. A social network that expresses relationships between users is used to estimate the users' home locations. The network-based home location estimation method with iteration, which propagates the estimated locations, is used to estimate more users' home locations. In this study, we analyze the function of network-based home location estimation with iteration while using the social network based on following relationships on Twitter. The results indicate that the function that selects the most frequent location among the friends' location has the best accuracy. Our analysis also shows that the 88% of users, who are in the social network based on following relationships, has at least one correct home location within one-hop (friends and friends of friends). According to this characteristic of the social network, we indicate that twice is sufficient for iteration. | cs.SI | cs | Analysis of Home Location Estimation
with Iteration on Twitter Following Relationship
Shiori Hironaka Mitsuo Yoshida Kyoji Umemura
Department of Computer Science and Engeneering,
Toyohashi University of Technology,
Toyohashi, Aichi, Japan
[email protected], [email protected], [email protected]
6
1
0
2
g
u
A
0
3
]
I
S
.
s
c
[
1
v
1
3
3
8
0
.
8
0
6
1
:
v
i
X
r
a
Abstract -- User's home locations are used by numerous social
media applications, such as social media analysis. However,
since the user's home location is not generally open to the
public, many researchers have been attempting to develop a
more accurate home location estimation. A social network that
expresses relationships between users is used to estimate the
users' home locations. The network-based home location esti-
mation method with iteration, which propagates the estimated
locations, is used to estimate more users' home locations. In this
study, we analyze the function of network-based home location
estimation with iteration while using the social network based
on following relationships on Twitter. The results indicate that
the function that selects the most frequent location among the
friends' location has the best accuracy. Our analysis also shows
that the 88% of users, who are in the social network based on
following relationships, has at least one correct home location
within one-hop (friends and friends of friends). According to
this characteristic of the social network, we indicate that twice
is sufficient for iteration.
Keywords -- network-based home location estimation;
label
propagation; Twitter
I. INTRODUCTION
Social media provides content with user data, and user data
is used to analyze the content of social media. Based on this
feature, the user's attributes are used for social media analysis
and numerous applications. There are various user attributes
such as gender, hobbies, and the user's home location. Among
the various user attributes, this study focuses on the user's
home location. However, since the user's home location is
not generally open to the public, many researchers have
been attempting to develop a more accurate home location
estimation.
There are three ways of location estimation mainly: the
the network-based
content-based method (e.g.,
method [3], and the hybrid method (e.g., [4]) that is based on
both of content and network. The network-based method has
an advantage that does not depend on languages. In this study,
we focus on the network-based home location estimation.
[2]),
[1],
The network-based home location estimation is a method
that can estimate a user's home location by using a social
network that expresses relationships between users. The first
approach for network-based location estimation is using the
home locations of friends [5], [6], [7]. The next approach
is to estimate more home locations by using home location
978 -- 1 -- 5090 -- 1636 -- 5/16/$31.00 c(cid:13) 2016 IEEE
estimation with iteration [8], [9], in order to improve the esti-
mation coverage using the first approach. The social network is
generally created from the following relationships on Twitter1
(follow-follower relationship) between users. However, we
need to know the performance of network-based home location
estimation with iteration using the social network based on
following relationship.
In this study, we analyze the function of network-based
home location estimation with iteration while using the social
network based on following relationships on Twitter. Accord-
ing to the characteristic of a social network on Twitter, twice
is described as a sufficient iteration count in the social network
based on the following relationships.
II. SPATIAL LABEL PROPAGATION
In the network-based location estimation method, the home
location of users is estimated based on the social network and
a few parts of the assigned user's home locations. We define
the social network as a simple directed graph, the node as a
user, and the edge as the relationship between the users. The
user's home location is expressed as a label assigned to the
node.
Spatial label propagation (SLP) [8] imports the idea of label
propagation [10] to network-based home location estimation.
SLP is a way of applying the home location estimation method
using the labels of the adjacent nodes iteratively. SLP is
capable of estimating a greater number of nodes, and performs
well in a sparse graph. In addition, SLP can estimate home
locations using labels of non-adjacent nodes.
SLP has two parameters, the select function and the iteration
count. We use the network-based home location estimation
method using adjacent labels as the select function. In this
study, we use four network-based home location estimation
methods using adjacent labels as the select function, explained
in Section II-A to II-D. The select function of node u defined
as Select(u) uses only the following information: Nu is a set
of adjacent nodes of node u, and a set of labels of Nu.
We use the following variables for explanation: L is a set
of learning data (nodes), Nu is a set of adjacent nodes of
node u, A is a set of labels (areas), lu is a correct label of
1https://twitter.com/
node u, dist(a, b) is the distance between labels a and b. The
distance between labels is the geographic distance between
two centroids of areas corresponding with the labels calculated
by Hubeny's distance formula.
A. Probability Model
Probability Model [5] is the method that selects the label
(home location) having the highest likelihood of the target
node, with the model of the probability that there is an edge
at
the geographic distance. When the geographic distance
between the nodes is d, the probability of the edge being
present p(d) is expressed in (1), where a, b and c are the static
parameters of a real number. We use a = 0.0019, b = 0.196,
c = −1.05 in original paper [5]. Home location of the node
u is estimated by (2) using the probability model2.
(cid:89)
(cid:89)
v∈L
p(d) = a(d + b)c
γl(l) =
[1 − p(dist(l, lv))]
γ(l, u) =
p(dist(l, lv))
1 − p(dist(l, lv))
P robabilityM odel(u) = arg max
v∈Nu∩L
l∈{lnn∈Nu∩L}
(1)
γl(l)
γ(l, u)
(2)
B. Majority Vote
Majority Vote [6] is the method that selects the most
frequent label (home location) among the labels of the adjacent
nodes (friends). The hypothesis based on this method is that
the majority of my friends live the same location with me.
In the original paper [6], the concept of majority may be
ambiguous. The paper does not specify the majority when two
or more labels are the most frequent in the labels of adjacent
nodes. Therefore, in this study, we preferentially choose a label
which appears frequently in the entire social network. The
method is expressed in (3), where arg max* is defined that
returns a set of the equivalent.
Su = arg max*
l∈{lnn∈Nu∩L}
M ajorityV ote(u) = arg max
{vv ∈ Nu ∩ L, l = lv}
{nn ∈ L, l = ln}
l∈Su
(3)
This method contains two parameters, the range of the num-
ber of adjacent nodes and the minimum number of votes. Since
other methods do not have the corresponding parameters, the
maximum range is selected for the Majority Vote method. The
range of the number of adjacent nodes of the user is zero to
infinity, and the minimum number of votes is zero.
C. Geometric Median
Geometric Median [8] is the method that selects the geo-
metric median among the labels of the adjacent nodes. The
method is expressed in (4).
(cid:88)
GeometricM edian(u)
= arg min
l∈{lnn∈Nu∩L}
x∈Nu∩L,n(cid:54)=x
dist(l, lx)
(4)
2We make up for γl(l) to equation γ(l, u) because it is thought that the
equation used in the original paper is incorrect.
D. Random Neighbor
Random Neighbor is the baseline method that selects ran-
domly among the labels of the adjacent nodes. This method is
expressed in (5), where choice(S) is the function that selects
an element randomly from the set S.
RandomN eighbor(u) = lchoice(Nu∩L)
(5)
III. DATASET
In this study, we analyze home location estimation of
Twitter users using the social network based on following
relationships. We use home location data and their social
network for the experiment, and we describe the details below.
Specifically, the home location data contains 52,508 users, and
the social network includes 8,003,858 nodes and 40,453,444
edges.
A. Home Location from Geo-tagged Tweets
In this study, a home location is an area of the city, as
expressed in the previous study [6]. We find a city where the
coordinate of the geo-tagged tweet is included, and we use
the city as the area. Furthermore, we assume that a user is
active mainly around their home location. We assign the home
location as the most frequent city where the user posts geo-
tagged tweets at least five times to the user who posts geo-
tagged tweets more than 365 times.
We collected 250,564,317 geo-tagged tweets posted in the
includes Japan3 in 2014, using the Twitter
rectangle that
Streaming API4. We excluded tweets posted by BOT accounts.
As a result, we assigned home locations to 71,166 users.
B. Social Network based on Following Relationship
Twitter users can follow other users by subscribing to the
users' tweets. A followee is the user who is following, and a
follower is the user who follows the user. The followee and
follower relationships are called following relationships. In this
study, we create a social network based on following relation-
ships. At first, we collect two sets of following relationships of
the users to which a home location can be assigned; followees
of the user5 and followers of the user6. Then, we merge the
two sets, and create a social network by making an edge when
the users follow one another mutually.
We collected the following relationships among the users
who were assigned a home location. We were able to collect
the following relationships of 52,508 users among the 71,166
users in July 2015, and their social network had 8,003,858
nodes and 40,453,444 edges.
IV. EXPERIMENT AND DISCUSSION
In this section, we conduct experiments to compare the
select functions. We first describe the experimental setup.
Then, we present results and analysis, and provide some
discussion regarding those results.
3Range of lat. 20◦ to 50◦N and long. 110◦ to 160◦E.
4https://dev.twitter.com/streaming/reference/post/statuses/filter
5https://dev.twitter.com/rest/reference/get/friends/ids
6https://dev.twitter.com/rest/reference/get/followers/ids
A. Experimental Setup
The evaluation is based on a 10-fold cross-validation with
52,508 users who were assigned a home location. We compare
four select functions with the social network created by the
following relationships.
The experimental results are reported with their precision,
recall and F1 (f-measure). We have defined precision as the
ratio of users that have been correctly estimated a home
location, recall as the ratio of users that have been correctly
estimated a location to the users in the test dataset, and F1
as the harmonic mean of precision and recall. In addition,
we use the coverage that shows the ratio of users who can
be estimated for analysis. Because isolated nodes exist in the
social network, the maximum coverage is not 100%. We also
evaluate by mean error distance and median error distance
based on the distance between correct and estimated locations.
The calculation of six metrics can be seen in (6), where X
is the set of estimated users, T is the set of test users, lu is the
home location of user u, eu is the estimated location of user
u, DU is the set of distance dist(lu, eu) of all users u ∈ U,
mean(A) is the function that returns the mean value in the
set A, and median(A) is the function that returns the median
value in the set A. The evaluation value is the mean of the
metrics for each fold.
P recision(T, X) =
Recall(T, X) =
T ∩ X
{uu ∈ T ∩ X, lu = eu}
{uu ∈ T ∩ X, lu = eu}
2 ∗ P recision(T, X) ∗ Recall(T, X)
P recision(T, X) + Recall(T, X)
T ∩ X
T
Coverage(T, X) =
T
F 1(T, X) =
(6)
M eanErrorDistance(T, X) = mean(DT∩X )
M edianErrorDistance(T, X) = median(DT∩X )
B. Results and Analysis
We evaluate four select functions using the social network
based on following relationships. We show the evaluation
results, which changes the select functions by changing the
iteration count from one to six in Fig. 1. The Majority Vote
method has the highest precision and recall in all iterations.
The Probability Model method has the second best precision
and recall. The highest precision and recall are achieved
when the iteration count
is two. The Geometric Median
method features small differences between the maximum and
minimum values of precision and recall. The coverage for a
single iteration is 0.745, and the coverage after two iterations
is approximately 0.986. This comparison with the select func-
tions is not consistent with using the social network based on
mention relationships reported in the previous study [8].
Fig. 2 shows the evaluation results by mean and median
error distance. The Geometric Median method has the lowest
mean error distance in all iterations. The Majority Vote and
Probability Model methods have lower median error distances
on the second iteration.
(a) Precision
(b) Recall
(c) F1
Fig. 1. The precision, recall and F1 with four select functions. The Majority
Vote method has the highest precision and recall. The highest precision and
recall is achieved when the iteration count is two.
00.050.10.150.20.250.30.35123456PrecisionIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median00.050.10.150.20.250.30.35123456RecallIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median00.050.10.150.20.250.30.35123456F1Iteration CountMajority VoteProbability ModelRandom NeighborGeometric MedianThe hypothesis that the SLP improves F1 is that the esti-
mated location can be trusted as sufficiently as the assigned
home location. The select functions can have higher precision
when setting parameters, such as the number of adjacent
nodes to estimate. There is a trade-off between precision and
recall. There is a possibility that the select function having
high precision can reliably estimate home location. A detailed
analysis of select functions will likely be presented in a future
study.
We analyze the distribution of the distance on the graph to
the user having the same home location in the social network.
Fig. 3 shows the percentage of the users of each distance.
"-" indicates the percentage of the users who are not able to
reach a user that has the same home location. Approximately
88% of users have a user having at least one same home
location within one-hop (friends and friends of friends). For a
higher recall, to estimate the correct home location to a greater
number of users is important. The result indicates that the
iteration count of SLP is sufficient with two times calculation.
C. Discussion
As indicated in Fig. 1,
the Majority Vote method had
the best performance in our experiments. Jurgens et al. [8]
have shown that the Geometric Median method has higher
performance than the other three select functions, excluding
the Probability Model method, which was not used. Two
reasons can be considered for this result: the difference of
the size of the home location, and the difference of the
relationships in the social network.
is considered that
Firstly, the home location is different in size and shape. The
Majority Vote method estimates a home location by selecting
the majority area. It
the Majority Vote
method is more affected by the size of the area and the shape
of the area than the other methods because the number of
votes becomes the same value when the area is too small.
Therefore, a certain number of votes is necessary to conduct
an accurate estimation. We have defined a home location as
an area of a city in Japan. This definition could be a reason
that the Majority Vote method had the best performance in our
experiment.
Secondly, the relationship of the social network that it is
based on is different. Our study uses the social network based
on following relationships, which is used in previous stud-
ies [6], [7], [11]. By contrast, some previous studies [8], [3]
have used the social network based on mention relationships.
McGee et al. [12] reported that the ratio of friends located
geographically near changes with the relationship between the
users. It is considered that the best select function changes
through this feature of the social network.
V. CONCLUSION
(a) Mean Error Distance
(b) Median Error Distance
Fig. 2. The mean error distance and median error distance with four select
functions. The Geometric Median method has the lowest mean error distance
in all iterations. The Majority Vote and Probability Model methods have lower
median error distances at iteration two.
We analyzed the select functions of SLP using a social
network based on following relationships. As a result, we
revealed that the Majority Vote method that selects the most
frequent location among the friends' locations had the highest
precision and recall. We also indicated that the iteration count
Fig. 3. The distribution of the distance on the graph to the user having the
same home location. "-" indicates the percentage of the users who are not
able to reach a user that has the same home location. The distance to the
adjacent node (friend) is zero-hop. Approximately 88% of users have a user
having at least one same home location within one-hop (friends and friends
of friends).
050100150200250123456Mean Error DistanceIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median0102030405060123456Median Error DistanceIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median0102030405060-012345Percentage of UsersDistance on the Graph [hop]of SLP is sufficient with two times calculation, because, since
88% of users are in the social network based on following
relationships, in which users' possessed at least one correct
home location within one-hop (friends and friends of friends).
REFERENCES
[1] Z. Cheng, J. Caverlee, and K. Lee, "You Are Where You Tweet: A
Content-Based Approach to Geo-locating Twitter Users," in Proceedings
of the 19th ACM International Conference on Information and Knowl-
edge Management, 2010, pp. 759 -- 768.
[2] J. Mahmud, J. Nichols, and C. Drews, "Home Location Identification
of Twitter Users," ACM Transactions on Intelligent Systems and Tech-
nology, vol. 5, no. 3, pp. 47:1 -- 47:21, 2014.
[3] D. Jurgens, T. Finethy, J. Mccorriston, Y. T. Xu, and D. Ruths, "Geolo-
cation Prediction in Twitter Using Social Networks: A Critical Analysis
and Review of Current Practice," in Proceedings of the 9th International
AAAI Conference on Web and Social Media, 2015, pp. 188 -- 197.
[4] R. Li, S. Wang, H. Deng, R. Wang, and K. C.-C. Chang, "Towards
Social User Profiling: Unified and Discriminative Influence Model for
Inferring Home Locations," in Proceedings of the 18th ACM Interna-
tional Conference on Knowledge Discovery and Data Mining, 2012, pp.
1023 -- 1031.
[5] L. Backstrom, E. Sun, and C. Marlow, "Find Me If You Can: Improving
Geographical Prediction with Social and Spatial Proximity," in Proceed-
[6] C. A. Davis Jr., G. L. Pappa, D. R. R. de Oliveira, and F. de L.
Arcanjo, "Inferring the Location of Twitter Messages Based on User
Relationships," Transactions in GIS, vol. 15, no. 6, pp. 735 -- 751, 2011.
[7] J. McGee, J. Caverlee, and Z. Cheng, "Location Prediction in Social
Media Based on Tie Strength," in Proceedings of
the 22nd ACM
International Conference on Information and Knowledge Management,
2013, pp. 459 -- 468.
[8] D. Jurgens, "That's What Friends Are For: Inferring Location in Online
Social Media Platforms Based on Social Relationships," in Proceedings
of the 7th International AAAI Conference on Weblogs and Social Media,
2013, pp. 273 -- 282.
[9] L. Kong, Z. Liu, and Y. Huang, "SPOT: Locating Social Media Users
Based on Social Network Context," Proceedings of the VLDB Endow-
ment, vol. 7, no. 13, pp. 1681 -- 1684, 2014.
ings of the 19th International Conference on World Wide Web, 2010, pp.
61 -- 70.
[10] X. Zhu, Z. Ghahramani, and J. Lafferty, "Semi-Supervised Learning Us-
ing Gaussian Fields and Harmonic Functions," International Conference
on Machine Learning, vol. 20, no. 2, pp. 912 -- 919, 2003.
[11] D. Rout, K. Bontcheva, D. Preoiuc-Pietro, and T. Cohn, "Where's
@wally?: A Classification Approach to Geolocating Users Based on
their Social Ties," in Proceedings of the 24th ACM Conference on
Hypertext and Social Media, 2013, pp. 11 -- 20.
[12] J. McGee, J. A. Caverlee, and Z. Cheng, "A Geographic Study of Tie
Strength in Social Media," in Proceedings of the 20th ACM International
Conference on Information and Knowledge Management, 2011, pp.
2333 -- 2336.
|
1706.07624 | 1 | 1706 | 2017-06-23T10:05:54 | Social Bots: Human-Like by Means of Human Control? | [
"cs.SI"
] | Social bots are currently regarded an influential but also somewhat mysterious factor in public discourse and opinion making. They are considered to be capable of massively distributing propaganda in social and online media and their application is even suspected to be partly responsible for recent election results. Astonishingly, the term `Social Bot' is not well defined and different scientific disciplines use divergent definitions. This work starts with a balanced definition attempt, before providing an overview of how social bots actually work (taking the example of Twitter) and what their current technical limitations are. Despite recent research progress in Deep Learning and Big Data, there are many activities bots cannot handle well. We then discuss how bot capabilities can be extended and controlled by integrating humans into the process and reason that this is currently the most promising way to go in order to realize effective interactions with other humans. | cs.SI | cs | Running head: SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?1
Social Bots: Human-Like by Means of Human Control?
Christian Grimme, Mike Preuss, Lena Adam, and Heike Trautmann
{christian.grimme, mike.preuss, lena.adam, trautmann}@uni-muenster.de
University of Münster
Department of Information Systems
Leonardo-Campus 3
48419 Münster, Germany
7
1
0
2
n
u
J
3
2
]
I
S
.
s
c
[
1
v
4
2
6
7
0
.
6
0
7
1
:
v
i
X
r
a
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
2
Abstract
Social bots are currently regarded an influential but also somewhat mysterious factor in
public discourse and opinion making. They are considered to be capable of massively
distributing propaganda in social and online media and their application is even
suspected to be partly responsible for recent election results. Astonishingly, the term
'Social Bot' is not well defined and different scientific disciplines use divergent
definitions. This work starts with a balanced definition attempt, before providing an
overview of how social bots actually work (taking the example of Twitter) and what
their current technical limitations are. Despite recent research progress in Deep
Learning and Big Data, there are many activities bots cannot handle well. We then
discuss how bot capabilities can be extended and controlled by integrating humans into
the process and reason that this is currently the most promising way to go in order to
realize effective interactions with other humans.
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
Social Bots: Human-Like by Means of Human Control?
Contents
Abstract
Social Bots: Human-Like by Means of Human Control?
Introduction
Definition and Taxonomy of Social Bots
Social Bots
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bots Not Regarded as Social Bots . . . . . . . . . . . . . . . . . . . . . . . . .
Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automation using Social Bots
A simple reactive Twitter Bot example . . . . . . . . . . . . . . . . . . . . . .
Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A Social Bot with human-like behavior . . . . . . . . . . . . . . . . . . . . . .
Extending bot functionality . . . . . . . . . . . . . . . . . . . . . . . . .
Experimental evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . .
Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hybrid Social Bots
Hybridization as low-cost mimicry approach . . . . . . . . . . . . . . . . . . .
Hybridization as strategy against rule-based detection mechanisms . . . . . . .
Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Comparison of Bots and average accounts
. . . . . . . . . . . . . . . . .
A comment on detection mechanisms and hybridization . . . . . . . . . .
Conclusion
References
3
2
3
4
5
7
9
10
11
11
11
12
13
14
15
16
17
18
19
19
20
21
21
31
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
4
Introduction
Social media is a phenomenon that exists for a bit more than a decade now
(Facebook went online 2004, Twitter in 2006). For the first time, a large part of the
world population is enabled to participate in direct and partly world-wide visible
information exchange.
Together with the increasing importance of the social media in all-day live and a
growing reach of these networks, their use (or misuse) for orchestrated information
distribution in terms of advertisement up to political propaganda becomes attractive for
different stakeholders. Due to the underlying technical nature of the communication
medium, automated and thus cost efficient access to social media channels is easy. Like
for email services several years ago, social media channels are used for simple
spamming (Tynan, 2012). However, since about 2010, reports on trolling or automated
so-called social bot activity in social media increase - especially with a focus on political
manipulation and propaganda (Chu, Gianvecchio, Wang, & Jajodia, 2010; Elliott, 2014;
Fredheim, 2013). Today, it is not doubted that social bots have a high societal impact
(Cordy, 2017), whatever the approaches realizing them currently are. This leaves
research with new and multidisciplinary challenges: Detecting and fighting automated
and orchestrated manipulation via social media necessitates insights and understanding
of motivation, processes, economics, and current limits of manipulation. Computer
scientists track networks, measure interactions, build algorithms, and are concerned
with security issues, but are unfamiliar with communication aspects and effects. Social
scientists have to understand new (semi-automatic) ways of distributing information or
propaganda and answer questions of possible societal impact. Both have to collaborate
with statisticians and researchers in the area of artificial intelligence to understand
challenges and limits of developing big data-based detection mechanisms.
As a first step, this work covers technical details and processes, economic
considerations, as well as limits of automated manipulation via social networks in a
multi-disciplinary way and provides some baseline for further discussion. For an initial
common understanding, we review the existing interpretations of the term "social bots"
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
5
and propose a consolidated definition. This definition is complemented by a
comprehensive discussion and classification of automated actors in the web.
Then, we focus on the technical details and challenges in the development of social
bots. We first show the construction and implementation principle of a responsive
Twitter bot and extend this implementation to a framework for realizing human-like
behavior. Additionally, the second concept is validated by a social bot experiment at
Twitter, applying 30 of our social bots for gaining followers and distributing (ethically
harmless) content. For both concepts we discuss the costs of realization.
In a final step, we address the existing gap of automation on the behavioral level
and automation on the communication level. Here, we argue that it is currently most
cost efficient to automate bots on a behavioral level, while content generation and
bot-human-communication is still steered by humans. In the context of the performed
bot network experiment, we empirically show that current automatic detection
mechanisms cannot significantly distinguish hybrid bots from human users.
Definition and Taxonomy of Social Bots
When journalists, bloggers, or scientists report on social bots and their potential
influence on society, many of these articles provide an own definition of the term "social
bot". Very often, these definitions strongly differ from each other, some focusing on
technical details, others highlighting social interaction. Sometimes, the definitions even
contradict each other or explicitly exclude a class of "social bots" others include.
Although the capabilities and effects of social bots taking part in public internet
communication are more and more discussed, no common understanding of the vehicle
itself has evolved.
As the term itself suggests, definitions stem from a mixed, partly social science
and partly technical perspective, while the weighting of the perspectives is usually up to
the respective definition's author.
From a technical perspective, the term "bot" is often related to robots, automation
and algorithms (Maréchal, 2016). All of these terms are certainly part of the
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
6
understanding of social bots, however, their equivalent substitution interweaves
technically different concepts like algorithms and robots in a simplistic way and may
lead to misunderstandings. Geiger (2016) defines social bots-in a more exact but still
very general way-as automated software agents. Emmer (interviewed in
Heinrich-Böll-Stiftung (2017)) adds properties like artificial intelligence and the ability
to autonomously act in the web.
The social science perspective usually addresses the social or political implications
of the actions of social bots. Woolley (2016) states that social bots "mimic human social
media users" and "manipulate public opinion and disrupt organizational
communication". He also defines so called "political bots" as a special case of social
bots. Hegelich (2016) highlights that social bots are hidden actors with a political
agenda. He explicitly distinguishes them from "chat bots" or other "assistants". A wider
definition which specifically considers the communication behavior is given by
Frischlich, Boberg, and Quandt (2017). The authors point out, that the imitation of
human communication (behaviour) is a key feature of social bots. This certainly also
includes chat bots. Even more general, Kollanyi, Howard, and Woolley (2016) consider
interaction with other users through automated social media as key property of social
bots. Interestingly, social media platforms like Facebook recently recognized possible
effects of social bots by admitting "false amplifications", however, they do not use the
term "social bot" throughout their publication (Weedon, Nuland, & Stamos, 2017).
Many application examples of social bots are presented in a recent overview paper
by Ferrara, Varol, Davis, Menczer, and Flammini (2016). This work allows to identify
many types of bots and check the available definitions. Additionally, the authors give a
good but (in our view) slightly too tight definition of social bots: "A social bot is a
computer algorithm that automatically produces content and interacts with humans on
social media, trying to emulate and possibly alter their behavior." We will keep several
aspects of this definition but do not restrict ourself to social media alone. Additionally,
we include the communication aspect introduced by Frischlich et al. (2017) and cover
the interaction property by referring to agent behavior:
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
7
The term "Social Bot" is a superordinate concept which summarizes
different types of (semi-) automatic agents. These agents are designed to
fulfill a specific purpose by means of one- or many-sided communication in
online media.
The most significant difference to other definitions is that we define social bots as
a high-level concept which comprises many types of specific bots. Additionally, our
definition covers:
• fully automated as well as partly human-steered bot action,
• autonomous action (agent-like),
• an orientation towards a goal,
• multiple modes of communication,
• and a wider ecosystem (all online media).
In the following paragraphs, we give several examples of social bots and specific
sub-types as well as of bots which are not covered by our definition and, thus, are not
supposed to be social bots.
Social Bots
The most popular type of a social bot is the chat bot, „a software system, which
can interact or "chat" with a human user in natural language such as English." (Shawar
& Atwell, 2007a). The oldest and best known chat bot may be Joseph Weizenbaums
ELIZA. It was able to participate in a discussion on psychological topics, controlled by
scripts that discover context by identifying keywords (Weizenbaum, 1966). By means of
pattern matching, ELIZA answered questions in a very human like manner, so
sometimes participants did not even recognize that they talked to a machine instead of
a real therapist. The recent wave of chat bot development probably originated in the
context of the "Loebner Prize" competition1, where Hugh Loebner set the task to find
the most human-like acting program (Mauldin, 1994).
Nevertheless, chat bots are only as intelligent as their scripts and the databases
1http://www.loebner.net/Prizef/loebner-prize.html
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
8
behind those scripts are. That is why they are often developed only for specific topics.
Nowadays, lots of different chat bots with different aims exist 2. Meanwhile, companies
often use chat bots to handle customer service issues. One can find them "in daily life,
such as help desk tools, automatic telephone answering systems, tools to aid in
education, business and e-commerce." (Shawar & Atwell, 2007b). As chat bots are
created to communicate in dialogs with specific users or customers, a multitude of chat
platforms are conceivable, e.g. private chats of social media pages, as well as other
online media like email or help sections on private company websites. The bots partly
replace human interaction and are often used to do simple preprocessing tasks, e.g.,
figuring out the right contact person for a specific service issue.
Whereas chat bots focus on one-to-one communication, spam bots are developed
to reach a large audience. The goal of this one-to-many communication is spreading
information, advertisements or fishing links, without involving the recipient. As they
were used to communicate a certain message on behalf of a company, group, or person,
they nevertheless fall into the category of social bots.
As mentioned earlier, political bots can be seen as a special type of social bots
with the aim to spread political content or participate in political discussions on online
platforms (Woolley, 2016). Political bots are designed by politically oriented groups to
represent their opinions and mindsets. A typical goal of political bots is, e.g., boosting
the popularity of a specific idea or person on a (social) media platform, by generating
'likes' or 'follows'. Furthermore, political bots may make use of the characteristics of
chat bots or spam bots. They discover public conversations, posts and comments by
identifying keywords and intervene or flood them with own (propagandistic) content.
Whether political bots are able to participate in simple conversations with other users
or just spread spam in a not reactive way is just a question of the aim (and technical
skill) of the operator and the code behind the bot profile. Human-like political bots
that act on social media platforms as Twitter and Facebook or comment in forums are
potentially capable to influence other users. Especially, if there are many bots
2https://www.chatbots.org
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
9
cooperating in bot networks, they are able to arise a potentially undeserved awareness
to political moods. Examples of potential bot armies were, e.g., discovered in the
context of the U.S. presidential election 2016. Bessi and Ferrara (2016) found out that
nearly 19 percent of all election-related Twitter posts during this time were made by
bots. Furthermore, the German news page "Spiegel Online" reports on parties which
considered the usage of social bots supporting their election campains for the German
parliamentary elections of 2017 (Pfaffenzeller, 2017; Rosenbach, 2016).
Another type of social bots is the class of mobile phone assistants. Software like
Apples Siri3 is designed to manage human to machine communication with the input of
natural language. Nearly any possible functionality of the mobile phone can be used
just by voice commands. In this case, the social bot acts as a translator between human
users and the phone. With the help of voice recognition and keyword identification, the
program figures out appropriate actions or search results for the user.
Bots Not Regarded as Social Bots
Bots that are not covered by our definition of social bots are, e.g., content
management bots, aka 'curator bots'. The job of a curator bot is to manage or collect
content and to present it in an easy-to-digest way to humans. In contrast to social bots,
for curator bots the communication aspect is not pronounced; they only work 'silently'
with content. Wikipedia bots are an appropriate example for this class of bots.
Pywikibot4 helps users to nurture articles by deleting superfluous whitespace,
generating links to related pages or correcting typos. Another example of content bots
are data aggregation bots which are built to manage data and are used for analysis only.
Game bots help their users to be successful in games. Tasks of these bots can be
as various as the games they are used in. Game bots can act as opponents in order to
enable training, help to navigate through the game or can be used for cheating or just
as stand-in for short periods of unavailability (afk). So-called farming bots as e.g. in
3https://www.apple.com/de/ios/siri/
4https://www.mediawiki.org/wiki/Manual:Pywikibot/Overview
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
10
games like World of Warcraft5 assume simple tasks and free players from
time-consuming but necessary duties (Mitterhofer, Kruegel, Kirda, & Platzer, 2009).
Nowadays, game bots that realize all these functions and more are available in USB
stick format from graphics card vendors. Instead of social bots, game bots focus not on
communication and interaction but exclusively on substituting users by imitation.
Service-Level-Agreement (SLA) negotiators focus on machine-to-machine
communication. These bots are built to handle Service Level Agreements
autonomously. Again, there is no human communication or interaction aspect regarding
this class of bots, which is why they are not covered by our definition of social bots.
Discussion
As also shown by the categorization into social and not social bots above, we see
the human-machine interaction as a key-factor. Social bots automate social interaction
via communication Every online medium where human communication through publicly
visible posts, chats, comment-functions, direct messages, etc., takes place, is a possible
point of connection for the involvement of social bots. Nevertheless, our definition of
social bots should be seen more or less as a high-level concept. Social bots appear as
different from each other as the reasons they were built for, and have to be discussed in
their specific context. Having a look at the mentioned examples, one can see that there
are more and different tasks for social bots than to influence people. Some social bots
just substitute their users by assuming duties or handle simple preprocessing tasks.
Announcements as Facebook's support for group bots and bot repositories6 lead us to
expect that social bots are going to be a more and more pervasive part of our internet
experience in the coming years. When discussing the possibilities of social bots to
influence single users up to whole societies, we shall therefore employ more precise
notions and terms.
5https://www.worldofwarcraft.com/
6https://techcrunch.com/2017/03/29/facebook-group-bots/
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
11
Automation using Social Bots
The application of social bots for multiple purposes (from advertisement to
propaganda) implies different technical challenges as well as economic considerations to
be handled. On the one hand, costs are rapidly increasing in terms of technical
complexity (e.g. for making social bots more human-like). On the other hand, simple
technical realizations may have a big enough impact to maximize monetary or
social/political revenue in some cases. In the following sections, we will present a most
simple technical realization of a social bot and extend it to a moderately complex
behavioral human-like actor on Twitter-trying to keep costs rather low. We then
present an experiment using 30 of those Twitter bots and lead over to an economic
discussion of hybrid extensions of social bots in the next chapter.
A simple reactive Twitter Bot example
One of the most simple ways to develop a reactive social bot adopts the Twitter
Stream API7. This basically means, that we listen to the ongoing worldwide Twitter
activity and react to arriving posts. More formally, we use a Twitter Stream Listener
component that registers with Twitter and additionally implement a simple actuator
component which is triggered by incoming Twitter posts and uses the Twitter REST
API8 to reply to these posts, if applicable. Figure 1 provides a schematic overview of
the components and data flow of the social bot. For the full implementation details
using the Python tweepy9 framework, refer to the listing given in appendix A. Note
that due to bandwidth management of the public Twitter Stream, only a subset of posts
will reach the listener. Depending on the registered topics and activity at the platform,
only about 1% up to 40% (in very restricted cases also more) of the actual traffic may
arrive at the listener (Ferrara et al., 2016).
Functionality. The presented social bot enables us to react on twitter posts
directly, answering to the sender. In our implementation, the Twitter Stream listener
7https://dev.twitter.com/streaming/overview
8https://dev.twitter.com/rest/public
9http://www.tweepy.org/
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
12
consumes the current Twitter Stream with respect to a given set of hash tags or topics.
Thereby, we are able to adapt to a specific context or domain of interest. Although the
current implementation only greets the user of current post, the functionality of the
actuator can easily be extended. The application of this bot ranges from simple
demonstration (and greeting) purposes to simple service activities based on
standardized responses, e.g.:
• Returning the weather forecast for a city or region mentioned in the current post.
Therefore, the actuator may use external weather information sources like
OpenWeatherMap10.
• Answering questions on specific topics detected in the current post. Using the
Google Knowledge Graph11, a mighty ontology network can be connected to the
bot, covering an enormous knowledge base.
• In a political context: Respond to specific topics and confront users (usually
independent of content posted) with a number of fixed political statements.
Only these three application examples demonstrate the potential of a very simple
social bot implementation comprising not more than 30 lines of code for a fully
functional frame.
Costs. Obviously, the costs for developing a simple service social bot can almost
be neglected. Implementation time is certainly lower than one hour for a medium
experienced developer (including error handling code, which is not provided in our
listing). The main effort has to be put into the setup for the bot's Twitter account and
access to the Twitter API. Therefore, a standard Twitter account must be created and
connected to a mobile number for developer access. Both can easily be done in an
anonymous way using a fake email address and an invalid or anonymously registered
mobile number.
Clearly, the behavior of the presented bot can easily be detected as automated
action. No human recipient of a message will consider it to be sent by another human.
Instant reaction, permanent activity, and restricted capabilities to analyze content and
10https://openweathermap.org/api
11https://developers.google.com/knowledge-graph/
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
13
react dynamically will expose the social bot as such.
A Social Bot with human-like behavior
Development of a social bot with sophisticated human-like behavior addresses
three main challenges:
1. Producing credible and "intelligent" content, which is accepted as such by human
consumers.
2. Leaving a trace of human-like meta-data in social networks.
3. Creating an adequate (often balanced) network of friends or followers to spread
information.
While the first challenge is a rather open issue in science and even the more in
practice (we will comment on this later), the second aspect can be handled to a certain
extent by imitating human actions in social networks sticking to normal human
temporal and behavioral patterns. This includes performing activities in a typical
day-night-cycle, carefully measured actions at the social media platform, as well as
variability in actions and timing. Thus, at Twitter, a bot should pause actions to
simulate phases of inactivity (e.g. sleep or work), limit posting and re-tweeting
activities to a realistic, human-like level, and vary these pauses and limits.
Another key issue is to grow a network of followers or friends. For social media, a
network of friends implies a certain reach: the larger the network of followers, the more
Twitter users receive distributed content of the respective account. To create a network,
Lehmann (2013) proposes an effective strategy based on a simple observation: users
follow other users hoping that those follow back again (which they often do, if the
pro-active profile does not obviously look bot-like), thereby establishing a friendship
relation. In case this does not happen within a certain time span (i.e. the other user
does not follow back), the one-sided connection is often dissolved to keep a balanced
following-follower-ratio. An exception to this are very prominent accounts with usually
strongly imbalanced following-follower-ratios (far more followers than followed users) or
accounts that are mainly used to distribute advertisement (far more followed users than
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
14
followers). These clearly indicate not human-like behavior and are used for
bot-detection. The overall principle of "follow-for-follow" is not only respected by most
human users but can also be applied to grow the follower network of a bot account.
Extending bot functionality. The previously presented simple social bot can
easily be extended to fulfill the challenges two and three. Therefore, several Actuators
are created that independently perform specific actions on Twitter. Considering the
schematic depiction in Figure 2, we briefly describe the important components:
CollectionActuator: This component listens to the Twitter stream and stores user
names as candidates to follow later on. The selection of following candidates can
be made with respect to different characteristics like the following-follower-ratio
(i.e. balanced accounts are preferred), activity on Twitter (potential multiplicators
are preferred), Tweet properties (e.g. users sending popular tweets are preferred).
BotProfile: The personal profile of a social bot is defined using a dedicated component
which stores all constraints and guidelines to simulate a certain behavior. Here,
the day-night-cycle and rest periods can be defined, general parameters for the
posting and re-tweeting behavior can be set, and an individual following behavior
is formulated. Note that all settings should be guidelines only, in order to add
some random variability. The component also provides functionality to request
the next action time for all other actuators. This function interprets the given
behavior values and (adding some random noise), proposes the next action.
FollowActuator: This actuator ensures a continuous execution and management of the
follow-for-follow procedure. With respect to the BotProfile, the component follows
a certain amount of previously collected users (see CollectionActuator) and
supervises reactions. Is a contacted user follows back, the component adds this
user as friend. In case of no response within a certain time window (i.e. 24 hours),
the one-sided friendship is canceled and the user is blacklisted.
PostActuator: This Actuator enables the bot to post or re-tweet on Twitter. Therefore,
a database of individual tweets and collected tweets is accessed. The amount of
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
15
actions is determined by the BotProfile.
PictureActuator: The ability to post pictures on Twitter is implemented by this
Actuator. Analog to the behavior of the PostActuator, pictures and matching
comments are extracted from a picture database and posted on Twitter.
Experimental evaluation.
In order to evaluate our mimicry approach for
human behavior in the real-world context, we set up an experiment comprising 30
Twitter bots. In cooperation with the German TV station Pro7, we created 30 fake
profiles, see also Table 1, and equipped them with the social bot framework described
before. Each bot ran the same code, however, we individualized the bot profiles and
Twitter Stream listeners. Each social bot had its own day-night-cycle, activity pattern,
and following behavior. Additionally, each bot listened for an individual set of topics
within the Twitter Stream. Overall, the experiment was divided into three phases:
1. Build a network of followers over a setup and testing period of 2 days and the
following 8 days of combined action. Thus, the experiment lasted 10 days in total
of which only the 8 productive days were documented. Note that half of the social
bots were mutually befriended by default, while the second half started with no
followers at all.
2. Publish content in a coordinated way to test the potential of setting a trend on
Twitter. The published content was devised by human actors and only distributed
by the bots.
3. Reveal the social bot identity of the respective fake accounts to followers and the
public (supported by a TV documentary on the experiment, which is available in
German12).
Especially phase one demonstrated, that the follow-for-follow approach could
successfully be applied to acquire followers automatically. As shown in Figure 3, the
amount of followers continuously increased for the evaluated eight days, resulting in
12http://www.prosieben.de/tv/galileo/videos/2016347-social-bots-das-experiment-clip
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
16
about 1350 followers after this short time period. During the second phase, two
(harmless and humorous) hash tags were promoted to test the reach of the acquired
followers. Although the hash tag briefly appeared in the German top 100 trending
topics, a significant trend could not be established. However, phase three showed, that
many human followers had been deceived by the fake bot identities and actions.
Reactions from Twitter users were different ranging from disappointment to anger and
from amusement to disbelieve.
Although our experiment is only a snap-shot of what is possible by applying
human-like acting social bots, some important insights can be extracted:
• Tedious tasks as building a follower network, as well as posting and re-tweeting
content, may be automated without being exposed as bot.
• The automatically generated network can be used to spread content to all
followers at any point in time. This will cause at least brief visibility and possibly
push a topic in order to reach wider popularity.
• Human users can easily be deceived by simple, but fairly realistic social bots
behaviors.
Certainly, an important ingredient for the success of our social bots was-besides
the human like behavior patterns-the human-generated content published by all bots.
As mentioned before, we used manually generated content to be spread by the bots. We
include the discussion of this aspect into our cost review.
Costs. The development time of the extended Twitter bot (less than two days)
can still be neglected compared to the functionality and benefit of automation provided
by the general framework. The more tedious task was to generate all thirty fake
accounts on Twitter. Thereafter, we were able to deploy the same code thirty times with
only minor adaptations regarding the individual configuration of each bot. Then, phase
one (growing the network) was performed by all bots without any human intervention.
Likewise, publishing content in phases two and three needed no intervention.
However, content was not automatically generated but provided by humans. We decided
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
17
to do so after reasoning on the following to questions: What would have been the costs
of generating content automatically, and what quality of content can be achieved?
Implementing the generation of intelligent and creative content for our hash tags
would have cost far more effort than setting up the whole social bot framework. Simple
approaches based on templates still require some human interaction and lack creativity.
More complex generators based on learned patterns still follow firm rule sets, which
limits the variability of linguistic expression. Both probably would have had reduced
the credibility of our social bots due to repetitive content. Furthermore, due to the
application of thirty cross-linked social bots and their continuous re-tweeting behavior,
a single message was repeated many times by other bots and followers, thereby
extending its range automatically.
Hybrid Social Bots
The extended social bot framework presented in the previous chapter is able to
mimic human behavior on the action level, i.e. a social bot is able to automatically
create a follower network, and manage content. Content production, however, is done
by human actors. Figure 4 qualitatively shows the automation-orchestration
relationship of human users and simple social bots as single actors and as human troll
farm or "bot army" respectively. Hybrid social bots are, with respect to automation, an
intermediate class of fully automated (behavioral simple) bots and purely human users.
Used under orchestration, communication approaches and activity patterns of single
actors differ: The army of simple bots is often following a mere client server model with
rather similar acting single bots and little autonomy per agent. Hybrid bot networks
are certainly still centrally controlled. Each bot, however, possesses a behavioral
autonomy, which mimics human behavior. In contrast, Human troll farms are acting on
a central interest, context or overall goal but have the highest autonomy per agent. For
them, a central content generation becomes dispensable.
In this chapter, we argue that hybridization of bots is an effective (compared to an
army of social bots) and low-cost (compared to a human troll farm) approach to gain a
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
18
high potential of influence via social media by simulating human behavior and speech.
We will show that a network of these hybrid bots is able to sufficiently outsmart current
automatic detection mechanisms as BotOrNot13 (Varol, Ferrara, Davis, Menczer, &
Flammini, 2017).
Hybridization as low-cost mimicry approach
The current societal opinion on bot technology seems to be driven by recent
success stories of AI, for example the prominently featured wins of an AI against
world-class Go players. These successes follow to a large part from the development of
deep learning algorithms (Lecun, Bengio, & Hinton, 2015) that are a) able to employ
big data collections for learning and b) benefit from extreme parallelization. However,
at the core of deep learning successes, we see human competitive (or even better)
pattern matching and modeling capabilities. It is not at all trivial to use these
capabilities to establish creative tasks, and especially human communication skills are
still beyond of what algorithms can do.
Riedl (2016) gives an overview and vision of how AI can approach computational
interactive narrative, which requires that computers can understand human
communication and react adequately. Attempts in this direction are currently still very
limited, as, e.g. shown by Martin, Harrison, and Riedl (2016) in terms of computational
improvisation in relatively open (not targeted) communication.
Existing chat bots can answer simple questions in a limited domain of their
expertise but lack skills to participate in an open discussion. Recent attempts to
improve their capabilities include the ParlAI14 platform published by Facebook, but
these approaches are currently active research directions. Whereas progress in
modification of images is astonishing (Zhu, Park, Isola, and Efros (2017) provides a tool
that can translate images to other styles, e.g., the style of a specific painter), this is not
yet possible for working with text, which is, in this respect, considered much more
13https://botometer.iuni.iu.edu
14https://code.facebook.com/posts/266433647155520/parlai-a-new-software-platform-for-dialog-
research/
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
19
complex than image translations.
In the related fields of computational creativity and procedural content generation
(mainly for games), we see similar problems, which has led to so-called mixed initiative
approaches (Liapis, Smith, & Shaker, 2016) where a human designer and a computer
program work together, taking turns, in order to reach a specific design goal. Without
human interaction, the available methods would not be able to produce results in a
human compatible style. At least for the time being, it is seemingly mandatory to
employ hybrid approaches in order to establish results that can be taken for generated
by a human and thereby appear human-like.
Hybridization as strategy against rule-based detection mechanisms
In order to evaluate our social bots against state-of-the-art detection mechanisms,
we confronted them with the BotOrNot service provided by Indiana University (Varol
et al., 2017). The BotOrNot service tries to state on the overall probability that a
submitted Twitter account is automated. Therefore, the service compares previously
learned patterns regarding the account's meta data, network, behavioral timing,
friendship relations, sentiment, and content. The authors report of more than 1, 150
features that constitute the patterns in all the named high-level classes. Finally, the
results of all indicators are aggregated to a value in [0, 1] which represents a probability
of an account being controlled by a social bot. Table 1 shows the overall rating for each
continuously active social bot account of our experiment. Obviously, the probability
ranges between 0.37 and 0.6 with an average of 0.48. That confirms, in average, no clear
bot-identification is possible for our social bots.
In order to judge on the quality of these score distribution for our bots, we
generate a baseline distribution of score BotOrNot values of worldwide user accounts.
Methodology. As basis for user extraction we used data from the Twitter
Decahose Stream, which provides a random 10% sample of worldwide Twitter traffic.
The Twitter Decahose Stream provides roughly 300 posts per second. This sums up to
about 160 GB of data per day. From this huge data sample of a single day, we extracted
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
20
unique user accounts at four points in time: midnight, morning (6 am), noon (12 am),
and evening (6pm) to respect possible effects of the day-night-cycle. The gathered user
accounts (about 1200) were classified by using the BotOrNot-API provided by the
BotOrNot service. As our Social bots acted in the German language domain, we
additionally extracted only German user accounts at the same points in time for a
second, localized baseline distribution of scores.
Comparison of Bots and average accounts. The comparison of our social
bots' overall scores to the baseline distributions for the worldwide and and German users
is shown in Figure 5. Although the bots cannot clearly be classified as bots with respect
to the score measure, in retrospective evaluation, their score is significantly higher than
the baseline score of our sample score from the worldwide and German Twitter Stream.
To further analyze these findings, we additionally take a look at the detailes
meta-features provided by BotOrNot and the according scores.
Content-related features: Figure 6 shows the detailed results for the sentiment, content,
and language scores. For the sentiment score features like happiness, valence,
arousal, and dominance as well as polarization and emoticon statistics of tweets
are evaluated and aggregated. Here our bots obviously behave like baseline
German users. Both, German users and bots are generally scored higher than the
worldwide baseline, which may be caused by the fact, sentiment analysis for the
German language is more difficult than for e.g. English. The same observation
can be made for the content feature, which aggregates tweet length and entropy.
Here, the bot also range in the German baseline. Language features combine
statistics on part-of-speech tags in tweets, i.e. low level features on the tagged or
annotated grammar and context of words used in the tweets. Here, a significant
difference to both baselines is observed. The reason for this may be the high
amount of slang terms and thus grammatically complex structure of tweets used
to push a topic in phase 2 of our social bot experiment.
Meta data-related features: For meta data features we observe that our bots behave in
average similar to the German user baseline, except for the user score. The user
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
21
score aggregates account-specific meta data information like age of the account
and profile description as well as frequency and temporal development of actions
on Twitter. Especially for these features, our experimental bot accounts are
certainly too short-lived to be classified human-like. All other meta-features,
however, confirm human-likeness of the social bot behavior-especially, when we
consider friendship features, networking and temporal behavior. Here, no
significant difference to the German baseline accounts can be identified.
A comment on detection mechanisms and hybridization. The evaluation
of our social bot network showed that multiple features of a state-of-the-art detection
tool like BotOrNot can be bypassed. Especially the scores "attacked" by our automation
framework (friendship, network, temporal behavior) are not distinguishable for bots and
the evaluated random German account sample. Only features on content and the user
profile showed some indications for bot behavior. These indicators, however, are only
identifiable due to an a-priori grouping of the known social bot accounts. If confronted
with a single bot account, the BotOrNot detection mechanism does not provide a
sufficient overall score to identify any of our social bots as such.
Conclusion
With this paper, we have contributed an interdisciplinary perspective on social
bot taxonomy, degrees of automation, developmental costs, and the benefit and
importance of human interaction for making social bots invisible for modern detection
mechanisms. In detail, we gave a consolidated definition of social bots and applied it to
known variants of automated actors in the web. From a more technical perspective, we
provided insight into the implementation and costs necessary to deploy simple but
reactive social bots in Twitter. To increase credibility, we extended the simple bot
implementation by mimicking human behavior in temporal and operational properties.
Content production was left to human controllers leading to a hybrid bot network. We
experimentally deployed such a network and demonstrated its principle applicability.
Tedious tasks were automated (like collecting followers, re-tweeting, or posting
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
22
human-prepared content). Finally, we discussed the costs and current technological
limits for full human-like hybridization. Futhermore, by means of an empirical analysis
from the Twitter bot experiment and average user data extracted from the Twitter
Decahose Stream, we have shown that hybrid social bots are able to bypass important
indicators of current rule-based detection mechanisms as BotOrNot.
Our results reveal several new challenges for future research in social bot
detection: The next big challenge for detection systems will be to identify hybrid social
bots, which expose real human behavior, on the one hand, and automatic patterns in
some actions, on the other hand. We assume, that rule-based methods will not suffice
for these tasks. In fact, adaptive and real-time detection mechanisms, which are able to
reconfigure and learn are necessary to react on changing behavioral patterns almost
instantly. Additionally, we believe that the inclusion of human interaction into hybrid
social bots should shift the focus from purely automatic detection systems to hybrid
detection systems that are able to judge on content, background strategies and
distributed narratives by the inclusion of human (possibly crowd) intelligence.
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
23
Table 1
List of all Twitter bots used during the experiment including the probability of being a
Twitter bot determined by BotOrNot for each account.
Bot name
Bot Twitter ID
BotOrNot Bot name
Bot Twitter ID
BotOrNot
803538518014300160
MagaritaWolff
803584267653709824
KumlehnLisa
803580625911480320
DreysKatharina
803575433862283264
LaurySamsy
803577951040180224
Eva_Omaha
Jonas_Der_Baum 803581393393643520
803580666260705281
NickyTheMan1
ruediwig
803579187344904192
803271431400394752
Kalle_dod
Shagggy_93
803274850768920576
803583207069351936
Luise_D2
803584623594897409
hoppendorf
sabinepeterson7
803585050721783808
803988474416295937
ullaschoene80
40% 44Maler
39% FlorianWanken
49% IHeulach
53% porryflo12
46% DiamondGirl_97
37% kenny_boy300
42% Saschamachtsgut
56% ollerbaum121
54% DinoDingi
46% wernerbbbright
58% The_pfist
51% hansemeister11
57% wendtneraxxxy
54%
803586351807479809
803586889802465280
803917039597473792
803915544755847168
803595282969755648
803278016709332994
803279247804628992
803574359281598464
803582934376738816
803584898271444992
803881433840361472
803901587827621889
803912137630420992
40%
47%
47%
48%
40%
42%
41%
52%
60%
48%
47%
54%
56%
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
24
Figure 1. Components and data flow of simple Twitter bot realization using the Twitter
Stream API.
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
25
Figure 2. Components and data flow of our advanced social bot with behavioral
settings, follow-for-follow mechanism, and human-like activity profile.
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
26
Figure 3. The plot shows the growth of the follower network for the initial Twitter bot
setup in about one week. 27 of initially 30 Twitter bots continuously performed the
follow-for-follow strategy automatically without any human intervention. Potential
followers were selected from the Twitter stream regarding individual topics.
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
27
Figure 4. Qualitative classification of the potential influence of humans and bots in
social media with respect to automation and orchestration.
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
28
Figure 5. Statistics of the overall BotOrNot score values for our the social bot network
(red box plots, grouped into bots that initially act as single entity or group respectively)
contrasted with two baseline overall scores for a set of sample users. The sample users
are taken from the worldwide (green box plots) and German (light green box plots)
Decahose Twitter stream at four points in time. The analysis was performed using the
BotOrNot API.
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
29
Figure 6. Detailed statistics of three meta features (sentiment, content, and language)
for our social bots (red) and the baseline accounts worldwide (green) and from
Germany (light green).
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
30
Figure 7. Detailed statistics of four meta features (friendship, network, temporal, and
user) for our social bots (red) and the baseline accounts worldwide (green) and from
Germany (light green).
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
31
References
Bessi, A., & Ferrara, E. (2016). Social bots distort the 2016 us presidential election
online discussion. First Monday, 21(11).
Chu, Z., Gianvecchio, S., Wang, H., & Jajodia, S. (2010). Who is Tweeting on Twitter:
Human, Bot, or Cyborg? In Proceedings of the 26th annual computer security
applications conference (pp. 21–30). New York, NY, USA: ACM. doi:
10.1145/1920261.1920265
Cordy, J. (2017). The social media revolution: Political and security implications (Draft
CDS Report No. [064 CDSDG 17 E]). NATO Parliamentary Assembly,
Sub-Committee on Democratic Governance. Retrieved from
http://www.nato-pa.int
Elliott, C. (2014, Mai). The readers' editor on. . . pro-Russia trolling below the line on
Ukraine stories. online.
(http://www.theguardian.com/commentisfree/2014/may/04/pro-russia-trolls-
ukraine-guardian-online)
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social
bots. Commun. ACM, 59(7), 96–104.
Fredheim, R. (2013). Putin's bot army – part one: a bit about bots. online.
(http://quantifyingmemory.blogspot.co.uk/2013/06/putins-bots-part-one-bit-
about-bots.html)
Frischlich, L., Boberg, S., & Quandt, T. (2017). Online hate speech. In K. Kaspar,
L. Grässer, & A. Riffi (Eds.), (chap. Un-menschlicher Hass: Die Rolle von
Empfehlungsalgorithmen und Social Bots für die Verbreitung von Cyberhate).
kopaed.
Geiger, R. S. (2016). Bot-based collective blocklists in twitter: the counterpublic
moderation of harassment in a networked public space. Information,
Communication & Society, 19(6), 787–803. Retrieved from
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
32
http://dx.doi.org/10.1080/1369118X.2016.1153700
Hegelich, S. (2016). Invasion der Meinungs-Roboter. Analysen & Argumente,
221(2016), 1–9.
Heinrich-Böll-Stiftung. (2017, 02). Social bots.
https://www.boell.de/de/2017/02/09/social-bots.
Kollanyi, B., Howard, P. N., & Woolley, S. C. (2016). Bots and automation over twitter
during the u.s. election (Tech. Rep. No. Data Memo 2016.4).
www.politicalbots.org: Oxford, UK: Project on Computational Propaganda.
Lecun, Y., Bengio, Y., & Hinton, G. (2015, 5). Deep learning. Nature, 521(7553),
436–444. doi: 10.1038/nature14539
Lehmann, S. (2013, 12). You are here because of a robot.
https://sunelehmann.com/2013/12/04/youre-here-because-of-a-robot/.
Liapis, A., Smith, G., & Shaker, N. (2016). Mixed-initiative content creation. In
Procedural content generation in games (pp. 195–214). Cham: Springer
International Publishing. doi: 10.1007/978-3-319-42716-4\_11
Maréchal, N. (2016). Automation, algorithms, and politics when bots tweet: Toward a
normative framework for bots on social networking sites (feature). International
Journal of Communication, 10(0).
Martin, L. J., Harrison, B., & Riedl, M. O. (2016). Improvisational computational
storytelling in open worlds. In F. Nack & A. S. Gordon (Eds.), Interactive
storytelling: 9th international conference on interactive digital storytelling, icids
2016, los angeles, ca, usa, november 15–18, 2016, proceedings (pp. 73–84). Cham:
Springer International Publishing. doi: 10.1007/978-3-319-48279-8\_7
Mauldin, M. L. (1994). Chatterbots, tinymuds, and the turing test: Entering the
loebner prize competition. In Aaai (Vol. 94, pp. 16–21).
Mitterhofer, S., Kruegel, C., Kirda, E., & Platzer, C. (2009). Server-side bot detection
in massively multiplayer online games. IEEE Security & Privacy, 7(3).
Pfaffenzeller, M. (2017, Mar). Bundestagswahlkampf: CDU erwägt Einsatz von
Chatbots. SPIEGEL ONLINE. Retrieved from
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
33
http://www.spiegel.de/netzwelt/web/cdu-peter-tauber-erwaegt-einsatz
-von-chatbots-im-bundestagswahlkampf-a-1141207.html
Riedl, M. O. (2016). Computational narrative intelligence: A human-centered goal for
artificial intelligence. CoRR, abs/1602.06484. Retrieved from
http://arxiv.org/abs/1602.06484
Rosenbach, S., Marcel. (2016, Oct). Internet-Kommentare von Automaten: AfD will im
Wahlkampf Meinungsroboter einsetzen. SPIEGEL ONLINE. Retrieved from
http://www.spiegel.de/netzwelt/netzpolitik/
afd-will-im-wahlkampf-social-bots-einsetzen-a-1117707.html
Shawar, B. A., & Atwell, E. (2007a). Chatbots: are they really useful? In Ldv forum
(Vol. 22, pp. 29–49).
Shawar, B. A., & Atwell, E. (2007b). Different measurements metrics to evaluate a
chatbot system. In Proceedings of the workshop on bridging the gap: Academic
and industrial research in dialog technologies (pp. 89–96).
Tynan, D. (2012, Apr). Social Spam is taking over the Internet. Retrieved from
http://www.itworld.com/article/2832566/it-management/
social-spam-is-taking-over-the-internet.html
Varol, O., Ferrara, E., Davis, C., Menczer, F., & Flammini, A. (2017). Online
human-bot interactions: Detection, estimation, and characterization. Retrieved
from https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15587
Weedon, J., Nuland, W., & Stamos, A. (2017, 04). Information operations on facebook
(Tech. Rep. No. 1). Facebook, Inc.
Weizenbaum, J. (1966). Eliza-a computer program for the study of natural language
communication between man and machine. Communications of the ACM, 9(1),
36–45.
Woolley, S. (2016). Automating power: Social bot interference in global politics. First
Monday, 21(4).
Zhu, J., Park, T., Isola, P., & Efros, A. A. (2017). Unpaired image-to-image translation
using cycle-consistent adversarial networks. CoRR, abs/1703.10593. Retrieved
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
34
from http://arxiv.org/abs/1703.10593
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
35
Appendix
Code of a Simple Twitter Bot
The following code is a fully functional Twitter bot which continuously tracks the
Twitter stream for a given hash tag (#Hashtag) and instantly replies to the sender with
a simple 'Hello'. Please note, that login information for the Twitter API has been
obscured and some error handling code has been removed for brevity.
import tweepy
from tweepy . parsers import RawParser
# f o l l o w e d
t o p i c
and
i d e n t i t y
o f
b o t
search_topics = ['# Hashtag ']
bot_identity = 'twitter_name '
# API o b j e c t
api = None
# I m p l e m e n t s
b o t
class TwitterActuator :
s i m p l e
a c t i o n s
def act(self , status ):
if not api is None:
username = status . author . screen_name
tweettext = status .text
if not username == bot_identity :
print('Received :' + tweettext + '\n')
# t w e e t
t h e w o r l d
t o
api. update_status ('Hello @' + username + '.')
# S t r e a m L i s t e n e r
class TwitterStreamListener ( tweepy . StreamListener ):
on t w i t t e r
( r e a c t s
p o s t s )
actuator = None
t h e
# s e t
def setActuator (self , actuator ):
a c t u a t o r
self. actuator = actuator
t h e
# C a l l
p o s t s
def on_status (self , status ):
a c t u a t o r
i f
a p p e a r
i n s t r e a m
self. actuator .act( status )
# Main P r o g r a m
SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?
36
if __name__ == '__main__ ':
try:
auth = tweepy . OAuthHandler (' ∗∗∗ ', ' ∗∗∗ ')
auth. set_access_token (' ∗∗∗ ', ' ∗∗∗ ')
api = tweepy .API( auth_handler =auth ,
parser = RawParser (), wait_on_rate_limit =True)
twitterBot = TwitterActuator ()
twitterListener = TwitterStreamListener ()
twitterListener . setActuator ( twitterBot )
myStream = tweepy . Stream (auth = api.auth ,
listener = twitterListener )
myStream .filter (track= search_topics , languages =['en'],
encoding ='utf−8')
finally :
print('Program end.')
|
1909.01132 | 1 | 1909 | 2019-08-29T04:15:25 | PageRank algorithm for Directed Hypergraph | [
"cs.SI",
"cs.LG",
"stat.ML"
] | During the last two decades, we easilly see that the World Wide Web's link structure is modeled as the directed graph. In this paper, we will model the World Wide Web's link structure as the directed hypergraph. Moreover, we will develop the PageRank algorithm for this directed hypergraph. Due to the lack of the World Wide Web directed hypergraph datasets, we will apply the PageRank algorithm to the metabolic network which is the directed hypergraph itself. The experiments show that our novel PageRank algorithm is successfully applied to this metabolic network. | cs.SI | cs | PageRank algorithm for Directed Hypergraph
Loc Tran
1
, Tho Quan
2
, and An Mai
3
1
John von Neumann Institute, VNU-HCM, Ho Chi Minh City, Vietnam (E-mail:
[email protected])
Ho Chi Minh City University of Technology, VNU-HCM, Ho Chi Minh City, Vietnam (E-mail:
3
John von Neumann Institute, VNU-HCM, Ho Chi Minh City, Vietnam (E-mail:
[email protected])
[email protected])
Preprint submitted to RGN Publications on 29/6/2018
Abstract
During the last two decades, we easily see that the World Wide Web's link structure is
modeled as the directed graph. In this paper, we will model the World Wide Web's link
structure as the directed hypergraph. Moreover, we will develop the PageRank algorithm
for this directed hypergraph. Due to the lack of the World Wide Web directed hypergraph
datasets, we will apply the PageRank algorithm to the metabolic network which is the
directed hypergraph itself. The experiments show that our novel PageRank algorithm is
successfully applied to this metabolic network.
2010 AMS Classification: 05C85
Keywords and phrases: directed hypergraph, Laplacian, metabolic network,
PageRank algorithm
2
Article type: Research article
1 Introduction
With the quick growth of the World Wide Web during the last two decades, information retrieval
introduces growing theoretical and practical challenges. With the huge amount of information
inflowing the World Wide Web every second, it becomes more difficult and more difficult to
retrieve information from the Web. This explains why the existence of a search engine is as
important as the existence of the web itself. Since the appearance of the web, there has been a
fundamental talk in the web research community to develop the rapid, effective, and precise search
engines.
This paper will be chiefly discussing about the most common search engine nowadays which is
Google. The mathematical theory behind the Google search engine is the PageRank algorithm,
which was presented by Sergey Brin and Lawrence Page [1]. In 1998, Brin and Page were PhD
students at Stanford University, USA. Then they took a leave of absence from their Ph.D. to
concentrate on developing their Google model. Their original paper describing the PageRank
algorithm is used nowadays by Google to create the rankings of the web pages of the World Wide
Web.
A search engine contains three important modules: a crawler, and an indexer, and a query engine
[2]. The crawler gathers and stores data from the web. Data is stored in the indexer which mines
information from the data gathered from the crawler. The query engine responds to the queries
from customers. The PageRank algorithm (i.e. one of the ranking algorithms), part of the query
engine, ranks the web pages in the order of their "importance" to the query. The ranking is attained
by the contribution of a score to each web page of the World Wide Web.
PageRank is a ranking algorithm of web pages of the World Wide Web. The PageRank algorithm
exploits the link structure of the web. The World Wide Web's link structure forms a directed graph
where the web pages are the nodes of the directed graph and the links are the directed edges of the
directed graph. The web page (i.e. the node of the directed graph) is considered "important" if it
is pointed to by other "important" web pages.
During the last two decades, we easily recognized that the World Wide Web's link structure was
modeled as the directed graph. Moreover, the PageRank algorithm was developed for this directed
graph only. In general, this model, the directed graph, is not the best and the generalized model
for the World Wide Web's link structure. In this paper, we will model the World Wide Web's link
structure as the directed hypergraph [3, 4]. This work, to the best of our knowledge, has not been
investigated up to now. However, due to the lack of the World Wide Web directed hypergraph
datasets, we will exploit the metabolic network dataset that is available from [5]. This metabolic
network can easily be represented as the directed graph or the directed hypergraph. We will show
clearly how to construct the directed graph and the directed hypergraph from this metabolic
network. Then our next task is to develop the PageRank algorithm for the directed hypergraph.
This is the novel work. Moreover, we will define the un-normalized and the symmetric normalized
directed hypergraph Laplacian in this paper. In the future, if the World Wide Web's directed
hypergraph datasets are available, then the directed hypergraph Laplacian based semi-supervised
learning will be developed in order to solve the spam detection problem. We can easily see that
the applications of the directed hypergraph are huge.
We will organize the paper as follows: Section 2 will introduce the preliminary notations and
definitions used in this paper. Section 3 will introduce the PageRank algorithm for the directed
hypergraph. Section 4 will introduce the definitions of the un-normalized and symmetric
normalized directed hypergraph Laplacian and their applications. Section 5 will show the
experimental results. Section 6 will conclude this paper and discuss the future direction of
researches.
2 Preliminary notations and definitions
Given the directed hypergraph 𝐻 = (𝑉, 𝐸) where V is the set of vertices and E is the set of hyper-
arcs. Each hyper-arc 𝑒 ∈ 𝐸 is written as 𝑒 = (𝑒𝑇𝑎𝑖𝑙, 𝑒𝐻𝑒𝑎𝑑). The vertices of e are denoted by 𝒆 =
𝑒𝑇𝑎𝑖𝑙 ∪ 𝑒𝐻𝑒𝑎𝑑. 𝑒𝑇𝑎𝑖𝑙 is called the tail of the hyper-arc e and 𝑒𝐻𝑒𝑎𝑑 is called the head of the hyper-
arc e. Please note that 𝑒𝑇𝑎𝑖𝑙 ≠ ∅, 𝑒𝐻𝑒𝑎𝑑 ≠ ∅, 𝑒𝑇𝑎𝑖𝑙 ∩ 𝑒𝐻𝑒𝑎𝑑 = ∅.
The directed hypergraph 𝐻 = (𝑉, 𝐸) can be represented by two incidence matrices 𝐻𝑇𝑎𝑖𝑙 and
𝐻𝐻𝑒𝑎𝑑.
These two incidence matrices 𝐻𝑇𝑎𝑖𝑙 and 𝐻𝐻𝑒𝑎𝑑 can be defined as follows
ℎ𝑇𝑎𝑖𝑙(𝑣, 𝑒𝑇𝑎𝑖𝑙) = {1 𝑖𝑓 𝑣 ∈ 𝑒𝑇𝑎𝑖𝑙
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑) = {1 𝑖𝑓 𝑣 ∈ 𝑒𝐻𝑒𝑎𝑑
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Let 𝑤(𝑒) be the weight of the hyper-arc e. Let W be the diagonal matrix containing the weights
of hyper-arcs in its diagonal entries.
From the above definitions, we can define the tail and head degrees of the vertex v and the tail
and head degrees of the hyper-arc e as follows
𝑑𝑇𝑎𝑖𝑙(𝑣) = ∑ 𝑤(𝑒)ℎ𝑇𝑎𝑖𝑙(𝑣, 𝑒𝑇𝑎𝑖𝑙)
𝑒∈𝐸
𝑑𝐻𝑒𝑎𝑑(𝑣) = ∑ 𝑤(𝑒)ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑)
𝑒∈𝐸
𝑑𝑇𝑎𝑖𝑙(𝑒) = ∑ ℎ𝑇𝑎𝑖𝑙(𝑣, 𝑒𝑇𝑎𝑖𝑙)
𝑣∈𝑉
𝑑𝐻𝑒𝑎𝑑(𝑒) = ∑ ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑)
𝑣∈𝑉
𝑇𝑎𝑖𝑙 , 𝐷𝑣
𝐻𝑒𝑎𝑑 , 𝐷𝑒
𝑇𝑎𝑖𝑙 , and 𝐷𝑒
𝐻𝑒𝑎𝑑 be four diagonal matrices containing the tail and head
Let 𝐷𝑣
degrees of vertices and the tail and head degrees of hyper-arcs in their diagonal entries
𝑇𝑎𝑖𝑙
respectively. Please note that 𝐷𝑣
are the 𝑅𝐸∗𝐸 matrices.
3 PageRank algorithm for directed hypergraph
𝑇𝑎𝑖𝑙 are the 𝑅𝑉∗𝑉 matrices and 𝐷𝑒
𝐻𝑒𝑎𝑑 and 𝐷𝑣
𝐻𝑒𝑎𝑑 and 𝐷𝑒
From [4], we know that the transition probability of the random walk on directed hypergraph can
be defined as follows
𝑝(𝑢, 𝑣) = ∑ 𝑤(𝑒)
𝑒∈𝐸
ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙)
ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑)
𝑑𝑇𝑎𝑖𝑙(𝑢)
𝑑𝐻𝑒𝑎𝑑(𝑒)
From the above definition, the transition probability matrix P of the random walk on the directed
hypergraph can be defined as follows
𝑃 = 𝐷𝑣
𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒
𝐻𝐻𝑒𝑎𝑑𝑇
𝐻𝑒𝑎𝑑−1
𝑇𝑎𝑖𝑙−1
Next, we need to prove that the row sum of P is 1.
We have that
ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙)
ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑)
𝑑𝑇𝑎𝑖𝑙(𝑢)
𝑑𝐻𝑒𝑎𝑑(𝑒)
∑ ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑)
𝑣∈𝑉
𝑑𝐻𝑒𝑎𝑑(𝑒)
ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙)
𝑑𝑇𝑎𝑖𝑙(𝑢)
∑ 𝑝(𝑢, 𝑣) = ∑ ∑ 𝑤(𝑒)
𝑣∈𝑉
𝑣∈𝑉
𝑒∈𝐸
ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙)
1
= ∑ 𝑤(𝑒)
𝑒∈𝐸
𝑑𝑇𝑎𝑖𝑙(𝑢)
= ∑ 𝑤(𝑒)
𝑒∈𝐸
1
𝑑𝑇𝑎𝑖𝑙(𝑢)
=
∑ 𝑤(𝑒)ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙)
𝑒∈𝐸
= 1
So, we easily see that 𝑝(𝑢, 𝑣) ≥ 0, ∀𝑢, 𝑣 and ∑
, ∀𝑣. Then we can conclude that
P is the stochastic matrix. Following the work from [1], the PageRank vector 𝜋 of the directed
hypergraph is the left dominant eigenvector of the transition probability matrix P of the random
walk on the directed hypergraph. In the other words, the PageRank vector 𝜋 of the directed
hypergraph is the solution of the following equation
𝑝(𝑢, 𝑣) = 1
𝑣∈𝑉
𝜋𝑇 = 𝜋𝑇𝑃
Moreover, we know that the above equation can easily be solved by the Power method.
4 Directed hypergraph Laplacian
In this section, we give two novel definitions of the directed hypergraph Laplacian which are un-
normalized directed hypergraph Laplacian and symmetric normalized directed hypergraph
Laplacian.
Let S be the diagonal matrix containing all elements of PageRank vector 𝜋 of the directed
hypergraph in its diagonal entries.
The un-normalized directed hypergraph Laplacian can be defined as follows
𝐿 = 𝑆 −
𝑇𝑎𝑖𝑙 −1
𝑆𝐷𝑣
𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒
𝐻𝑒𝑎𝑑−1
𝐻𝐻𝑒𝑎𝑑𝑇
𝑇𝑎𝑖𝑙−1
+ (𝐷𝑣
𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒
𝐻𝑒𝑎𝑑−1
𝐻𝐻𝑒𝑎𝑑𝑇
)𝑇𝑆
2
The symmetric normalized directed hypergraph Laplacian can be defined as follows
𝐻𝑒𝑎𝑑−1
𝐻𝑒𝑎𝑑−1
𝑇𝑎𝑖𝑙−1
𝑇𝑎𝑖𝑙−1
1
𝐻𝐻𝑒𝑎𝑑𝑇
𝑆−
2 + 𝑆−
1
2(𝐷𝑣
𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒
1
2𝐷𝑣
𝑆
𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒
𝐻𝐻𝑒𝑎𝑑𝑇
)𝑇𝑆
1
2
𝐿𝑠𝑦𝑚 = 𝐼 −
From these two definitions, we can develop the directed hypergraph Laplacian Eigenmaps
algorithms, the spectral directed hypergraph clustering algorithms, and the directed hypergraph
Laplacian based semi-supervised learning algorithms. These are our future works.
5 Experiments and Results
2
Datasets
Due to the lack of the World Wide Web directed hypergraph datasets, we use the metabolic
network dataset that is available from [5]. This metabolic network is itself the directed hypergraph.
Thus, we don't need to transform it to the directed hypergraph. This metabolic network contains
72 metabolites (i.e. nodes of the directed hypergraph) and 95 reactions (i.e. hyper-arcs of the
directed hypergraph). However, in the experiment, we just use 50 metabolites that are both in the
head AND in the tail of some hyper-arcs. In the other words, we can avoid the case that the tail
degree OR the head degree of the metabolite is zero. Moreover, we just use 75 reactions that the
tail degree AND the head degree of the hyper-arc are not zero. In the other words, we set that
𝑒𝑇𝑎𝑖𝑙 ≠ ∅ AND 𝑒𝐻𝑒𝑎𝑑 ≠ ∅.
Finally, we have the metabolic network (i.e. the directed hypergraph dataset) that has 50
metabolites (i.e. nodes of the dataset) and 75 reactions (i.e. hyper-arcs of the dataset).
Experiments
𝑇𝑎𝑖𝑙, 𝐷𝑣
𝐻𝑒𝑎𝑑 , 𝐷𝑒
𝑇𝑎𝑖𝑙, and 𝐷𝑒
In the experiment, we initially construct 𝐻𝑇𝑎𝑖𝑙 and 𝐻𝐻𝑒𝑎𝑑 matrices. Then we can construct
𝐻𝑒𝑎𝑑 matrices. Finally, we can compute the transition probability
𝐷𝑣
matrix P of the random walk on the directed hypergraph.
In order to obtain the PageRank vector of the directed hypergraph, we compute the left dominant
eigenvector of the matrix P. The following table 1 and table 2 show the 10 highest rank values of
10 metabolites in the directed hypergraph and the names of these 10 metabolites that have highest
ranks.
Rank order
Rank values
1
2
3
4
5
6
7
8
9
10
0.6366
0.2640
0.2321
0.2180
0.2087
0.2039
0.2006
0.1941
0.1798
0.1701
Table 1: The rank values of 10 highest ranks
Rank order
Names of
1
2
3
4
5
6
metabolites with
highest ranks
H
Nicotinamide-
adenine-
dinucleotide-
reduced
ADP
Phosphate
ATP
Nicotinamide-
adenine-
dinucleotide-
phosphate
H
Pyruvate
Nicotinamide-
adenine-
dinucleotide
Coenzyme-A
7
8
9
10
Table 2: The names of 10 metabolites that have highest ranks
6 Conclusions
In this paper, we develop the PageRank algorithm for the directed hypergraph. We successfully
apply it to the metabolic network which is the directed hypergraph itself. This is the novel work
not only in web mining field but also in bio-informatics field. In the future, we will develop the
directed hypergraph Laplacian based semi-supervised learning in order to solve the spam detection
problem since two directed hypergraph Laplacian was defined in this paper.
Moreover, in the future, we will also try to develop the directed hypergraph p-Laplacian semi-
supervised learning method. This method is worth investigated because of its hard nature and its
close connection to PDE on directed hypergraph field.
Acknowledgement
This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under
grant number B2018-20-07.
References
[1] Brin, Sergey, and Lawrence Page. "The anatomy of a large-scale hypertextual web search
engine." Computer networks and ISDN systems 30.1-7 (1998): 107-117.
[2] Bonato, Anthony. A course on the web graph. Vol. 89. American Mathematical Soc., 2008.
[3] Ausiello, Giorgio, Paolo G. Franciosa, and Daniele Frigioni. "Directed hypergraphs: Problems,
algorithmic results, and a novel decremental approach." Italian conference on theoretical
computer science. Springer, Berlin, Heidelberg, 2001.
[4] Ducournau, Aurélien, and Alain Bretto. "Random walks in directed hypergraphs and
Image
application
semi-supervised
Understanding 120 (2014): 91-102.
[5] http://systemsbiology.ucsd.edu/Downloads/EcoliCore
segmentation." Computer Vision and
to
image
|
1712.00139 | 3 | 1712 | 2018-02-22T23:30:47 | The Size Conundrum: Why Online Knowledge Markets Can Fail at Scale | [
"cs.SI"
] | In this paper, we interpret the community question answering websites on the StackExchange platform as knowledge markets, and analyze how and why these markets can fail at scale. A knowledge market framing allows site operators to reason about market failures, and to design policies to prevent them. Our goal is to provide insights on large-scale knowledge market failures through an interpretable model. We explore a set of interpretable economic production models on a large empirical dataset to analyze the dynamics of content generation in knowledge markets. Amongst these, the Cobb-Douglas model best explains empirical data and provides an intuitive explanation for content generation through concepts of elasticity and diminishing returns. Content generation depends on user participation and also on how specific types of content (e.g. answers) depends on other types (e.g. questions). We show that these factors of content generation have constant elasticity---a percentage increase in any of the inputs leads to a constant percentage increase in the output. Furthermore, markets exhibit diminishing returns---the marginal output decreases as the input is incrementally increased. Knowledge markets also vary on their returns to scale---the increase in output resulting from a proportionate increase in all inputs. Importantly, many knowledge markets exhibit diseconomies of scale---measures of market health (e.g., the percentage of questions with an accepted answer) decrease as a function of number of participants. The implications of our work are two-fold: site operators ought to design incentives as a function of system size (number of participants); the market lens should shed insight into complex dependencies amongst different content types and participant actions in general social networks. | cs.SI | cs | The Size Conundrum: Why Online Knowledge Markets Can Fail
at Scale
Chase Geigle
University of Illinois (UIUC)
[email protected]
Himel Dev
University of Illinois (UIUC)
[email protected]
Qingtao Hu
University of Illinois (UIUC)
[email protected]
8
1
0
2
b
e
F
2
2
]
I
S
.
s
c
[
3
v
9
3
1
0
0
.
2
1
7
1
:
v
i
X
r
a
Jiahui Zheng
Peking University
[email protected]
ABSTRACT
In this paper, we interpret the community question answering web-
sites on the StackExchange platform as knowledge markets, and
analyze how and why these markets can fail at scale. A knowl-
edge market framing allows site operators to reason about market
failures, and to design policies to prevent them. Our goal is to pro-
vide insights on large-scale knowledge market failures through an
interpretable model. We explore a set of interpretable economic pro-
duction models on a large empirical dataset to analyze the dynamics
of content generation in knowledge markets. Amongst these, the
Cobb-Douglas model best explains empirical data and provides an
intuitive explanation for content generation through the concepts
of elasticity and diminishing returns. Content generation depends
on user participation and also on how specific types of content (e.g.
answers) depends on other types (e.g. questions). We show that
these factors of content generation have constant elasticity-a per-
centage increase in any of the inputs leads to a constant percentage
increase in the output. Furthermore, markets exhibit diminishing
returns-the marginal output decreases as the input is incremen-
tally increased. Knowledge markets also vary on their returns to
scale-the increase in output resulting from a proportionate in-
crease in all inputs. Importantly, many knowledge markets exhibit
diseconomies of scale-measures of market health (e.g., the percent-
age of questions with an accepted answer) decrease as a function
of the number of participants. The implications of our work are
two-fold: site operators ought to design incentives as a function of
system size (number of participants); the market lens should shed
insight into complex dependencies amongst different content types
and participant actions in general social networks.
CCS CONCEPTS
• Information systems → Data mining; Social networks;
KEYWORDS
community question answering; knowledge market; content gener-
ation; diseconomies of scale
This paper is published under the Creative Commons Attribution 4.0 International
(CC BY 4.0) license. Authors reserve their rights to disseminate the work on their
personal and corporate Web sites with the appropriate attribution.
WWW 2018, April 23–27, 2018, Lyon, France
© 2018 IW3C2 (International World Wide Web Conference Committee), published
under Creative Commons CC BY 4.0 License.
ACM ISBN 978-1-4503-5639-8/18/04.
https://doi.org/10.1145/3178876.3186037
Hari Sundaram
University of Illinois (UIUC)
[email protected]
ACM Reference Format:
Himel Dev, Chase Geigle, Qingtao Hu, Jiahui Zheng, and Hari Sundaram.
2018. The Size Conundrum: Why Online Knowledge Markets Can Fail at
Scale. In WWW 2018: The 2018 Web Conference, April 23–27, 2018, Lyon,
France. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3178876.
3186037
1 INTRODUCTION
In this paper, we analyze a large group of community question
answering (CQA) websites on StackExchange network through
the Economic lens of a market. Framing StackExchange sites as
knowledge markets has intuitive appeal: in a hypothetical knowl-
edge market, if no one wants to answer questions, but only ask,
or conversely, there are individuals who want to only answer but
not ask questions, the "market" will collapse. What, then, is the
required relationship among actions (say between questions and
answers) in such a knowledge market for us to deem it healthy?
Are larger markets with more participants healthier since there will
be more people to ask and answer questions?
Studying CQA websites through an economic lens allows site
operators to reason about whether they should grow the user base.
Since most of the popular CQA websites (e.g. Quora, StackExchange)
do not charge participants, but instead depend on site advertise-
ments for revenue, there is a natural temptation for operators of
these sites to grow the user base so that there is increase in revenue.
As we show in this paper, for most StackExchange sites, growth
in the user base is counter-productive in the sense that they turn
unhealthy-specifically, more questions remain unanswered.
Explaining the macroscopic behavior of knowledge markets is
important, yet challenging. One can regress some variable of in-
terest (say number of questions) on variables including number of
users, time spent in the website among others. However, explaining
why the regression curve looks the way it does is hard. As we show
in this work, using an economic lens of a market allows us to model
dependencies between number of participants and the amount of
content, and to predict the production of content.
Our main contribution is to model CQA websites as knowledge
markets, and to provide insight on the relationship between size
and health of these markets. To this end, we develop models to
capture content generation dynamics in knowledge markets. We
analyze a set of basis functions (the functional form of how an
input contributes to output) and interaction mechanisms (how the
inputs interact with each other), and identify the optimal power
basis function and the interactive essential interaction form using a
prediction task on the outputs (questions, answers, and comments).
This form is the well-known Cobb-Douglas form that connects
production inputs with output. Using the best model fits for each
StackExchange site, we show that the Cobb-Douglas model predicts
the production of content with high accuracy.
The Cobb-Douglas function provides an intuitive explanation
for content generation in StackExchange markets. It demonstrates
that, in StackExchange markets, (1) factors such as user participa-
tion and content dependency have constant elasticity-percentage
increase in any of these inputs will have constant percentage in-
crease in output; (2) in many markets, factors exhibit diminishing
returns-decrease in the marginal (incremental) output (e.g., answer
production) as an input (e.g. number of people who answer) is
incrementally increased, keeping the other inputs constant; (3) mar-
kets vary according to their returns to scale-the increase in output
resulting from a proportionate increase in all inputs; and (4) many
markets exhibit diseconomies of scale-measures of health decrease
as a function of overall system size (number of participants).
There are two reasons why we see diminishing returns in the
StackExchange markets. First, the total activity of participants for
any StackExchange market unsurprisingly follows a power-law
pattern. What is interesting is that the power-law exponent falls
with increase in size for most markets, implying that new users
do not participate in the same manner as earlier users. Second, we
can identify a stable core of users who actively participate for long
periods of time, contributing to the market health.
Finally, we show diseconomies of scale through experiments
on system size, analysis of health metrics, and user exchangeabil-
ity. For most StackExchange markets, we see that as system size
grows, the ratio of answers to questions falls below a critical point,
when some questions go unanswered. Furthermore, using health
metrics of the number of questions with an accepted answer, and
the number of questions with at least one answer, we observe that
most StackExchange markets decline in health with increase in
size. Finally, we compare the top contributors with the bottom con-
tributors to see if they are "exchangeable." Most StackExchange
markets are not exchangeable in the sense the contributions of
the top and the bottom contributors are qualitatively different and
differ in absolute terms. These experiments on diseconomies of
scale are consistent with the insight from Cobb-Douglas model of
production that predicts diminishing returns.
2 RELATED WORK
Our work draws from, and improves upon, several research threads.
Sustainability. Srba and Bielikova [35] conducted a case study
on why StackOverflow, the largest and oldest of the sites in StackEx-
change network, is failing. They shed some insights into knowledge
market failure such as novice and negligent users generating low
quality content perpetuating the decline of the market. However,
they do not provide a systematic way to understand and prevent
failures in these markets. Wu et al. [41] introduced a framework for
understanding the user strategies in a knowledge market-revealing
the importance of diverse user strategies for sustainable markets.
In this paper, we present an alternative model that provides many
interesting insights including knowledge market sustainability.
Activity Dynamics. Walk et al. [39] modeled user-level activity
dynamics in StackExchange using two factors: intrinsic activity
decay, and positive peer influence. However, the model proposed
there does not reveal the collective platform dynamics, and the
eventual success or failure of a platform. Abufouda [1] developed
two models for predicting the interaction decay of community mem-
bers in online social communities. Similar to Walk et al. [39], these
models accommodate user-level dynamics, whereas we concentrate
on the collective platform dynamics. Wu and Zhang [42] proposed
a discrete generalized beta distribution (DGBD) model that reveals
several insights into the collective platform dynamics, notably the
concept of a size-dependent distribution. In this paper, we improve
upon the concept of a size-dependent distribution.
Economic Perspective. Kumar et al. [24] proposed an eco-
nomic view of CQA platforms, where they concentrated on the
growth of two types of users in a market setting: users who provide
questions, and users who provide answers. In this paper, we concen-
trate on a subsequent problem-the "relation" between user growth
and content generation in a knowledge market. Butler [9] proposed
a resource-based theory of sustainable social structures. While they
treat members as resources, like we do, our model differs in that
it concentrates on a market setting, instead of a network setting,
and takes the complex content dependency of the platform into
consideration. Furthermore, our model provides a systematic way
to understand successes and failures of knowledge markets, which
none of these models provide.
Scale Study. Lin et al. [27] examined Reddit communities to
characterize the effect of user growth in voting patterns, linguistic
patterns, and community network patterns. Their study reveals
that these patterns do not change much after a massive growth
in the size of the user community. Yla et al. [44] investigated the
effects of crowd size on solution quality in StackExchange com-
munities. Their study uncovers three distinct levels of group size
in the crowd that affect solution quality: topic audience size, ques-
tion audience size, and number of contributors. In this paper, we
examine the consequence of scale on knowledge markets from a
different perspective by using a set of health metrics.
Stability. Successes and failures of platforms have been studied
from the perspective of user retention and stability [12, 16, 22, 30].
Notably, Patil et al. [30] studied the dynamics of group stability
based on the average increase or decrease in member growth. Our
paper examines stability in a different manner-namely, by consid-
ering the relative exchangeability of users as a function of scale.
User Growth. Successes and failures of user communities have
also been widely studied from the perspective of user growth [6,
21, 25, 32, 45]. Kairam et al. [21] examined diffusion and non-
diffusion growth to design models that predict the longevity of
social groups. Ribeiro [32] proposed a daily active user prediction
model which classifies membership based websites as sustainable
and unsustainable. While this perspective is important, we argue
that studying the successes and failures of communities based on
content production can perhaps be more meaningful [23, 47, 48].
Modeling CQA Websites. There is a rich body of work that
extensively analyzed CQA websites [3, 5, 10, 34, 40], along with user
behavior [4, 19, 31, 38, 46], roles [15, 26], and content generation [7,
14, 43]. Notably, Yang et al. [43] noted the scalability problem of
CQA-namely, the volume of questions eventually subsumes the
capacity of the answerers within the community. Understanding
and modeling this phenomenon is one of the goals of this paper.
3 PROBLEM FORMULATION
The goal of this paper is to develop a model for content generation
in knowledge markets. Content is integral to the success and failure
of a knowledge market. Therefore, we aim to better understand the
content generation dynamics.
A model for content dynamics should have the following prop-
erties: macro-scale, explanatory, predictive, minimalistic, compre-
hensive.
Macro-scale: The model should capture content generation dy-
namics via aggregate measures. Aggregate measures help us un-
derstand the collective market by summarizing a complex array of
information about individuals, which is especially important for
policy-making.
Explanatory: The model should be insightful about the behavior
of a knowledge market. Understanding market behavior is a crucial
first step in designing policies to maintain a resilient, sustainable
market.
Predictive: The model should allow us to make predictions about
future content generation and resultant success or failure. These
market predictions are integral to the prevention and mitigation of
market failures.
Minimalistic: The model should have as few parameters as nec-
essary, and still closely reflect the observed reality.
Comprehensive: The model should encompass content genera-
tion dynamics for different content types (e.g., question, answer,
comment) in varieties of knowledge markets. This is important
for developing a systematic way to understand the successes and
failures of knowledge markets.
In remaining sections we propose models that meet the aforemen-
tioned requirements, and show that our best-fit model accurately
reflects the content generation dynamics and resultant successes
and failures of real-world knowledge markets.
4 MODELING KNOWLEDGE MARKETS
In this section, we introduce economic production models to cap-
ture content generation dynamics in real-world knowledge markets.
We first draw an analogy between economic production and content
generation, and report the content generation factors in knowledge
markets (Section 4.1). Then, we concentrate on the knowledge mar-
kets in StackExchange-presenting production models for different
content types (Section 4.2).
4.1 Preliminaries
Economic production mechanisms well describe content generation
in knowledge markets. In economics, production is defined as the
process by which human labor is applied, usually with the help of
tools and other forms of capital, to produce useful goods or services-
the output [36]. We assert that participants of a knowledge market
function as labor to generate content such as questions and answers.
Analogous to economic output, content contributes to participant
utility.
Motivated by the production analogy, we design macroeconomic
production models to capture content generation dynamics in
knowledge markets. In these models, instead of directly model-
ing content generation as a dynamic process (function of time), we
model it in terms of associated factors which are dynamic.
There are two key factors that affect content generation in knowl-
edge markets, namely user participation and content dependency.
User participation is the most important factor in deciding the
quantity of generated content. The participation of more users in-
duce more questions, answers, and other contents in a knowledge
market. Content dependency also affects the quantity of gener-
ated content for different types. Content dependency refers to the
dependency of one type of content (e.g., answers) on other type
of content (e.g., questions). In absence of questions, there will be
no answers in a knowledge market, even in the presence of many
potential participants who are willing to answer.
4.2 Modeling StackExchange
StackExchange is a network of community question answering
websites where each site is based on a focused topic. Each user of the
StackExchange network participates in one or more of these sites
based on their interests. StackExchange sites are free knowledge
markets where participants generate content for non-monetary
reputation-based incentives. These markets are diverse, varying
in theme (subject matter), size (number of users and amount of
activity), and age (number of days in existence).
We design production models for three primary content types in
StackExchange: questions (the root content), answers (which nest
below questions), and comments (which can nest either beneath
questions or answers). Based on the content dependency and user
roles in content generation, we propose the following relationships
for question, answer and comment generation in StackExchange
(see Table 1 for notation).
Table 1: Notation used in the model
Symbol Definition
Uq(t)
Ua(t)
Uc(t)
Nq(t)
Na(t)
q
c (t)
N
N a
c (t)
Nc(t)
fx
# of users who asked questions at time t
# of users who answered questions at time t
# of users who made comments at time t
# of active questions at time t
# of answers to active questions at time t
# of comments to active questions at time t
# of comments to active answers at time t
# of comments to active questions/answers at time t
The functional relationship for content type x
There is a single factor in generating Nq questions: the number
of users Uq who ask questions (askers).
Nq = fq(Uq)
There are two key factors in generating Na answers: the number
of questions Nq, and the number of users Ua who answer questions
(answerers).
Na = fa(Nq , Ua)
There are two types of comments: comments on questions, and
comments on answers. Accordingly, there are three key factors in
generating Nc comments: the number of questions Nq, the number
of answers Na, and the number of users Uc who make comments
(commenters).
N
q
c = fcq(Nq , Uc)
N a
c = fc a(Na, Uc)
q
c + N a
Nc = N
c
The aforementioned relationships imply that the amount of gen-
erated content of each type depends on the function describing its
factor dependent growth, and the availability of factor(s). These
relationships make three assumptions. First, different content types
interact only through their use of factors. Second, the functional
relationships depend on the consumption or usage of each factor.
Third, the functional relationships depend on the interaction among
the factors-how the factors of a particular content type interact.
Now, we transform the functional relationships into production
models by first choosing a basis function to capture how a content
type consumes its factor(s), and then choosing an interaction type
to capture the interaction among factors.
Basis Function. We use a basis function to capture the effect
of a given factor on a particular content type. While there is a
variety of basis functions available for regression, we consider
three basis functions widely used in economics and growth mod-
eling [13]: power- д(x) = ax λ; exponential- д(x) = abx ; and
sigmoid- д(x) =
Interaction among the Factors. We use an aggregate function
to capture the interaction among multiple factors of a given content
type. Specifically, we consider the pairwise interaction functions
listed in Table 2.
1+e k(x−x0)
L
.
λ1
q , a2U
We combine a basis function and an interaction type to design
production models for different content types. For example, answer
generation can be modeled using power basis and essential interac-
λ2
tion as Na = min(a1N
a ). We consider twelve such possible
models (combination of three basis and four interaction type) for
answer and comment generation in StackExchange.
User Role Distribution. A fundamental assumption of our
model is the awareness of user roles (e.g., asker, answerer, and com-
menter) and their distribution (e.g., how many users are askers?).
We empirically observe that all StackExchange markets have a sta-
ble distribution of user roles. In fact, given the number of users, we
can accurately predict the number of participants for each role.
We apply linear regression to determine the number of partic-
ipants Ux of a particular role x ∈ {q, a, c} from the number of
users U in a StackExchange market. For each market, we compute
three distinct coefficients of determination, R2, for predicting three
roles (asker, answerer, and commenter) using linear regression. In
Figure 1 we show the distribution of R2 for regressing user roles
across 156 StackExchange markets. We use letter value plots1 to
present these distributions-showing precise estimates of their tail
behavior. We observe that, in most markets, the R2 values are close
to 1. Further, the tail capturing low R2 values consists of markets
with a relatively small number of monthly users.
Number of Users. The number of users is the only free input to
our content generation models; the remaining inputs are functions
of the number of users. In all these models, the growth or decline
of number of users is exogenous-determined outside the model,
by non-economic forces.
1The letter-value plot display information about the distribution of a variable [20].
It conveys precise estimates of tail behavior using letter values; boxplots lack such
precise estimation.
Table 2: Pairwise interaction between factors with contour
Essential: Essential factors are both re-
quired for content generation, with zero
marginal return for a single factor. For
a pair of essential factors, content gen-
eration is determined by the more limit-
ing factor: z = min(y1, y2) [37]. This is
known as Liebig's law of the minimum.
Interactive Essential: In interactive es-
sential interaction, we get diminishing
return (instead of zero return) for a sin-
gle factor: z = y1y2 [37]. If factors are
consumed using power basis function,
i.e., yi = ax λ
i , it captures Cobb-Douglas
production function.
Antagonistic: For antagonistic factors,
content generation is determined
solely by the availability of the fac-
tor which yields the largest return:
z = max(y1, y2) [37]. This interaction
implies that the production process has
maximum possible efficiency.
Substitutable: Factors that can each sup-
port production on their own are sub-
stitutable relative to each other: z =
w1y1+w2y2 [37]. This implies that there
exists some equivalence between the
two factors. This is analogous to the
general additive models.
Figure 1: The distribution of coefficient of determination,
R2, for regressing user roles across 156 StackExchange. In
most StackExchange, the role distribution is stable-as man-
ifested by the arrangement of R2 in letter-value plots.
5 DATASET
We collected the latest release (September, 2017) of the StackEx-
change dataset. This snapshot is a complete archive of all activities
in StackExchange sites. There are 169 sites in our collected dataset.
012345y1012345y2z=1z=2z=3z=min(y1,y2)012345y1012345y2z=1z=2z=3z=y1y2012345y1012345y2z=5z=4z=3z=max(y1,y2)012345y1012345y2z=1z=3z=5z=y1+y2AnswererAskerCommenter0.00.20.40.60.81.0Coe(cid:29).ofDetermination,R2For the purpose of empirical analysis, we only consider the sites
that have been active for at least 12 months beyond the ramp up
period (site created, but few or no activity). There are 156 such sites.
The age of these sites vary from 14 months to 111 months, number
of users from 1,072 to 547,175, and the number of posts (questions
and answers) from 1,600 to 1,985,869. Further, the sites have small
overlaps in user base; therefore, we can reasonably argue that the
underlying markets are independent.
Figure 2: The log-scale distribution of number of months
(age), number of users, and number of posts for 156 Stack-
Exchange sites.
In Figure 2 we present letter value plots (in log-scale) to show
the distribution of number of months (age), number of users, and
number of posts for 156 StackExchange sites.
6 EVALUATING OUR PROPOSED MODELS
In this section, we identify optimal models (basis and interaction)
based on the accuracy of fitting content generation time series
observed in our dataset (Section 6.1), and evaluate the performance
of the optimal models in predicting content volume in long run
(Section 6.2).
6.1 Model Fitting
We fit each variant of production model (basis and interaction),
for each content type, to the observed content generation time
series (monthly granularity), in each StackExchange site. Notice
that among the different variants of production models, the models
using power or exponential basis have a parsimonious set of pa-
rameters. For example, answer generation model using power basis
function requires only three parameters for interactive essential
interaction (See Section 4.2), and four parameters for remaining in-
teraction types. In contrast, answer generation model using sigmoid
basis function requires five parameters for interactive essential in-
teraction, and six parameters for remaining interaction types.
Parameter Estimation. We learn the best-fit parameters for
capturing the observed content generation time series. We restrict
some parameters of our production models to be non-negative,
e.g., non-negative exponents in power basis. These restrictions
are important because the underlying factors positively affect the
output. We use the trust-region reflective algorithm [8] to solve
our constrained least square optimization problem. The algorithm
is appropriate for solving non-linear least squares problems with
constraints.
(cid:113) 1
T
T
RMSE
; AIC = T ∗ln( 1
Evaluation Method. We evaluate fitting accuracy using four
metrics: root mean square error (RMSE), normalized root mean
square error (NRMSE), explained variance score (EVS), and Akaike
information criterion (AIC). Given two series for each content type,
T
the observed series N(t), and the prediction N(t) of the series by a
model with k parameters, we compute the four metrics as follows:
T
t =1(N(t) − N(t))2; NRMSE =
RMSE =
;
max(N(t))−min(N(t))
EVS = 1− V ar(N(t)− N(t))
t =1(N(t)− N(t))2) + 2k.
V ar(N(t))
Among the four metrics, RMSE and NRMSE are error metrics (low
value implies good fit), AIC is an information theoretic metric to
capture the trade-off between model complexity and goodness-of-
fit (low value implies good model), and EVS refers to a model's
ability to capture variance in data (high value implies good model).
Fitting Results. We compare the fitting accuracy of production
models for all StackExchange sites using the four metrics. Each
metric is summarized via the mean, across all sites, for each con-
tent type. We use content generation time series with monthly
granularity as observed data. We found that the models with the
exponential and sigmoid basis functions do not fit the data for many
StackExchange sites. Accordingly, in Table 3 we only present the
results for production models with the power basis and different
interaction types. Notice that the models with interactive essen-
tial interaction outperform the remaining models for all metrics
and content types. We performed paired t-tests to determine if the
improvements for interactive essential interaction are statistically
significant; the results are positive with p < 0.01.
Table 3: The comparison of fitting accuracy of production
models (with power basis and different interaction types)
for all StackExchange sites. The models with interactive es-
sential interaction outperform the remaining models for all
metrics and content types. The improvements for interac-
tive essential interaction are statistically significant, vali-
dated via paired t-tests, where p < 0.01.
Content
Question
Answer
Comment
Interaction
Type
Single Factor
Essential
I. Essential
Antagonistic
Substitutable
Essential
I. Essential
Antagonistic
Substitutable
Avg.
Avg.
RMSE NRMSE
25.74
70.31
64.62
72.77
68.90
146.64
137.23
155.97
155.43
0.09
0.09
0.08
0.09
0.09
0.08
0.08
0.09
0.09
Avg.
EVS
0.79
0.79
0.83
0.78
0.81
0.83
0.85
0.82
0.82
Avg.
AIC
104.47
208.82
196.39
210.96
207.61
328.25
318.24
334.12
335.10
Thus we use production models with power basis and interactive
essential interaction for prediction tasks.
6.2 Forecasting Content Generation
We apply production models with power basis and interactive es-
sential interaction to forecast content volume in long run-one
#ofMonths101102#ofUsers103104105106#ofPosts103104105106year ahead in the future. Specifically, we train each model using
the content generation data from the first 12 months (beyond the
ramp period), and then examine how well the model forecasts con-
tent dynamics in the next 12 months. We validate the forecasting
capability by examining the overall prediction error (NRMSE).
We compute the prediction NRMSE across all StackExchange
sites, and summarize the results using the mean (µ) and variance
(σ)- (i) question: µ = 0.11, σ = 0.08; (ii) answer: µ = 0.12, σ = 0.09;
(iii) comments: µ = 0.11, σ = 0.10. Notice that our models can
forecast future content dynamics with high accuracy. We performed
these experiments for different time granularity, e.g., week, month,
quarter, and reached a consistent conclusion. We do not report
these results for brevity.
7 CHARACTERIZING KNOWLEDGE
MARKETS
In this section, we characterize the knowledge markets in Stack-
Exchange. We explain the best-fit models and their foundations
(Section 7.1), reveal two key distributions that control the markets
(Section 7.2), and uncover the stable core that maintains market
equilibrium (Section 7.3).
7.1 Model Interpretation
First, we explain the best-fit models found in Section 6.1. We observe
that content generation in StackExchange markets are best modeled
through the combination of power basis and interactive essential
interaction. In addition, we found that the best-fit exponents (λ
parameter in basis д(x) = ax λ, where x is a factor) of these models
lie between 0 and 1 (inclusive), for all factors of all content types,
for all StackExchange markets.
A model that uses the power basis (where exponents lie between
0 and 1) and interactive essential interaction is known as the Cobb-
Douglas production function [18]. In its most standard form for
production of a single output z with two inputs x1 and x2, the
function is:
z = ax
λ1
1 x
λ2
2 .
Here, the coefficient a represents the total factor productivity-the
portion of output not explained by the amount of inputs used in
production [18]. As such, its level is determined by how efficiently
the inputs are utilized in production. The exponents λi represent
the output elasticity of the inputs-the percentage change in output
that results from the percentage change in a particular input [18].
The Cobb-Douglas function provides intuitive explanation for
content generation in StackExchange markets. In particular, the
explanation stands on three phenomena or principles: constant
elasticity, diminishing returns, and returns to scale.
Constant Elasticity. In StackExchange markets, factors such
as user participation and content dependency have constant elas-
ticity-percentage increase in any of these inputs will have con-
stant percentage increase in output [18], as claimed by the cor-
responding exponents in the model. For example, in academia
(Na = 6.93N 0.18
), a 1% increase in number of answerers (Ua)
leads to a 0.65% increase in number of answers (Na).
Diminishing Returns. For a particular factor, when the expo-
nent is less than 1, we observe diminishing returns-decrease in
q U 0.65
a
the marginal (incremental) output as an input is incrementally in-
creased, while the other inputs are kept constant [18]. This "law
of diminishing returns" has many interesting implications for the
StackExchange markets, including the diminishing benefit of hav-
ing a new participant in a market. For example, in academia, if the
number of answerers is 100, then the marginal contribution of a
new answerer is c(1010.65−1000.65) = 0.129c, where c is a constant;
in contrast, if the number of answerers is 110, then the marginal
contribution of a new answerer is c(1110.65 − 1100.65) = 0.125c.
Thus, for answer generation in academia, including a participant
when the number of participants (system size) is 110 is likely to
be less beneficial compared to including a participant when the
system size is 100.
Returns to scale. The knowledge markets in StackExchange
vary in terms of scale efficiency, as manifested by their returns to
scale-the increase in output resulting from a proportionate increase
in all inputs [18]. If a market has high returns to scale, then greater
efficiency is obtained as the market moves from small- to large-
scale operations. For example, in academia, for answer generation,
the returns to scale is 0.18 + 0.65 = 0.83 < 1. The market becomes
less efficient as answer generation is expanded, requiring more
questions and answerers to increase the number of answers by
same amount.
7.2 Two Key Distributions
Next, we discuss two key distributions that control content genera-
tion in knowledge markets, namely participant activity and subject
POV (perspective). These two distributions induce the three phe-
nomena reported in section 7.1.
Participant Activity. The distribution of participant activities
implicitly drives a market's return in terms of user participation,
as manifested by the corresponding exponent. For example, in a
hypothetical knowledge market where each answerer contributes
equally, the answer generation model should be Na = AN
a . In
reality, the distribution of participant activities is a size dependent
distribution controlled by the number of participants (system size).
As the system size increases, most participants contribute to the
head of the distribution (few activities), whereas very few join the
tail (many activities).
q U 1.0
λ1
Figure 3: The visibility of size dependent distribution:
strong-android; moderate-apple; and weak-biology. In
most StackExchange markets, the power-law exponent de-
creases with system size, similar to android. In other mar-
kets, there exists a non-zero correlation between system size
and power-law exponent.
100200300400500#ofUsers,U-1.8-1.6-1.4-1.2-1.0-0.8Power-lawExp.,αandroid2004507009501200#ofUsers,Uapple5080110140170#ofUsers,UbiologyWe systematically reveal the size dependent distribution for
participant activities in three steps. First, we empirically a fit power-
law distribution to the activities of participants in a month, for each
month, for each StackExchange market. We follow the standard
procedure to fit a power-law distribution [2]. We observe that the
power-law well describes the monthly activity distributions. Second,
we plot the exponents of the power-law against the number of
participants for all observed months in a market, for each market in
StackExchange. We observe that for most StackExchange markets,
the power-law exponent decreases as the system size increases.
Third, we apply linear regression to reveal the relationship between
power-law exponent and system size. We observe that in general
power-law exponent is negatively correlated with system size. This
negative correlation is strongly visible in big knowledge markets
that have at least 500 monthly participants in each month.
In Figure 3 we present empirical evidence of the size dependent
distribution for answer generation in three StackExchange markets:
android, apple, and biology. We choose these examples to cover
three possible visibilities of the size dependent distribution, as
manifested by the correlation between the power-law exponent and
system size-strong correlation (r2 ≥ 0.5), moderate correlation
(0.3 ≤ r2 < 0.5), and weak correlation (r2 < 0.3).
Subject POV. The distribution of subject POV implicitly drives
a market's return in terms of content dependency, as manifested
by the corresponding exponent. Subject POV refers to the num-
ber of distinct perspectives on a particular content (e.g., questions)
that imposes a conceptual limit to the number of dependent con-
tents (e.g., answers). For example, an open-ended question such as
'What's your favorite book?' has many possible answers, whereas
a close-ended question such as 'What's the solution for 3x+5 = 2?'
has a single correct answer. In reality, most questions are neither
completely open-ended nor completely closed; however, from an
answerer's perspective, there's a diminishing utility in answering
a question that already has an answer. This diminishing utility
varies from question to question-questions asking for recommen-
dations attract many answers, whereas questions seeking factual
information attract few answers.
7.3 Uncovering the Stable Core
We uncover a stable user community in each StackExchange market,
that maintains the dynamic equilibria-the increase or decrease in
overall user community does not affect the Cobb-Douglas models.
We assert that this stable user community generates a large fraction
of high-threshold contents that require more effort, e.g, answers and
comments, whereas the remaining users are unstable and contribute
a small fraction of high-threshold contents.
We reveal the presence of the stable core by summarizing the
answer contribution of users with different tenure levels (# of active
months). First, for each StackExchange market, we apply equal-
width binning to categorize its users into five tenure levels. Then,
we plot the distribution of monthly answer contribution by the
users of each category using a letter-value plot. We present the
letter-value plots for android in Figure 4. We observe that monthly
answer contribution is an increasing function of tenure level-the
users who contribute for many months also contribute a large
number of answers.
Figure 4: The distribution of monthly answer contribution
of users with different # of active months, for android. The
users who contribute for many months also contribute a
large number of answers.
8 FAILURES AT SCALE
In this section, we discuss how and why knowledge markets may
fail at scale. We first empirically examine diseconomies of scale
(Section 8.1), then analyze the effects of scale on market health
(Section 8.2), and finally study user exchangeability under scale
changes (Section 8.3).
8.1 Diseconomies of Scale
First, we examine disceconomies of scale-the ratio of answers
to questions declining with the increase in number of users. The
opposite of diseconomies is economies, when the ratio increases
with the increase in number of users. The concept of diseconomies
is important because a decrease in the answer to question ratio
implies an increase in the gap between market supply (answer)
and demand (question). In fact, if the ratio falls below 1.0, the gap
becomes critical-guaranteeing there will be some questions with
no answers.
In Figure 5 we present the economies and diseconomies of scale
in three StackExchange markets: cstheory, puzzling and supe-
ruser. We choose these examples to cover three cases: strong dis-
economies, strong economies, and weak economies. Among the
three markets, superuser shows strong diseconomies of scale: if
Figure 5: Diseconomies/economies of scale: the ratio of
answers to questions decreasing/increasing with the in-
crease in number of users. Most StackExchange mar-
kets exhibit diseconomies of scale. Examples: strong
diseconomies-superuser; weak economies-puzzling; and
strong economies-cstheory.
1-130102030#ofAnswers14-2627-39#ofMonthsandroid40-5253-6520003500500065008000#ofUsers,U0.61.32.02.73.4Econ.Ratio,Na/qsuperuserCobb-Douglas2004006008001000#ofUsers,UpuzzlingCobb-Douglas100150200250300#ofUsers,UcstheoryCobb-Douglasthe number of users increases by 1%, then the answer to question
ratio declines by 0.95%. The other two markets show economies of
scale, where cstheory shows strong economies: if the number of
users increases by 1%, then the answer to question ratio increases
by 0.8%; and puzzling shows weak economies: if the the number of
users increases by 1%, then the answer to question ratio increases
by 0.2%. Note that most markets, especially the ones with more
than 500 monthly active participants, exhibit diseconomies of scale
similar to superuser. Only five markets exhibit strong economies of
scale in StackExchange: cstheory, expressionengine, puzzling,
ja_stackoverflow, and softwareengineering.
The Cobb-Douglas curves well fit the empirical trends of economies
and diseconomies (as shown in Figure 5). We derive these curves by
dividing the answer models by the corresponding question models,
and subsequently developing curves that capture economies and
diseconomies (Na/q) as a function of number of users (system size).
We get similar curves via log regression. Between the two model
types, the Cobb-Douglas models provide better explanation.
The Cobb-Douglas models well explain the economies and dis-
ceconomies of scale. As per the models, the primary cause of dis-
ceconomies is the difference between the diminishing returns of
questions and answers for user participation. In other words, in
most markets, for user input, the marginal question output is higher
compared to the marginal answer output, i.e., an average user is
likely to ask more questions and provide few answers. This causes
the ratio of answers to questions to decline with an increase in the
number of users.
8.2 Analyzing Health
Next, we examine the disadvantage of scale through two health
metrics: H1-the fraction of answered questions (questions with
at least one answer); and H2-the fraction of questions with an
accepted answer (questions for which the asker marked an answer
as accepted). H1 and H2 capture the true gap between market supply
(answers) and demand (questions). An increase in the number of
users may cause a decline in H1 and H2, as both metrics are related
to the ratio of answers to questions. In fact, if the ratio falls below
1.0, it guarantees the decline of both metrics.
In Figure 6 we present the health advantage and disadvantage
of scale (through H1 and H2) for three StackExchange markets:
cstheory, puzzling and superuser. We observe that the results
are consistent with our analysis of economies and diseconomies-
cstheory exhibits health advantage at scale, puzzling remains
stable, whereas superuser exhibits disadvantage at scale. These
three examples cover the possible health effects of scale in knowl-
edge markets.
8.3 Effects on Exchangeability
Finally, we empirically study the effects of scale on user exchange-
ability. By exchangeability, we specifically mean the gap between
the top contributors and other participants in a knowledge market.
Studying this gap is important because it can reveal if a market's
success or failure depends on a small group of users.
To empirically study user exchangeability, we define two metrics
that reflect the gap between the top contributors and other par-
ticipants in a knowledge market. Note that, we only consider the
Figure 6: Health disadvantage/advantage of scale: H1-
the fraction of answered questions, and H2-the fraction
of questions with accepted answer, decreasing/increasing
with the increase in number of users. Most StackEx-
change markets exhibit health disadvantage at scale. Ex-
amples: disadvantage-superuser; neutral-puzzling; and
advantage-cstheory.
active participants who contributed at least one content. The first
metric E1 is defined as the ratio of contribution between the top
5% and the bottom 5% of users. For computing E1, we measure the
contribution of a user v as the ratio N v
a/q of the number of answers
N v
a provided by the user to the number of questions N v
q asked by
the user. Notice that E1 is a ratio based metric and we define user
contribution to be consistent with this metric. The second metric
E2 is defined as the sum of two distances: (i) the distance between
Figure 7: User exchangeability under scale: the gap (E1
and E2) between the top contributors and other partici-
pants in a knowledge market decreasing or increasing with
the increase in number of users. Most markets exhibit a
large gap between the top contributors and other partici-
pants. Examples: high dissimilarity-superuser; moderate
dissimilarity-puzzling; and low dissimilarity-cstheory.
200035005000650080000.20.40.60.81.0HealthMetric,H1superuser2004006008001000puzzling100150200250300cstheory20003500500065008000#ofUsers,U0.20.40.60.81.0HealthMetric,H22004006008001000#ofUsers,U100150200250300#ofUsers,U200035005000650080001030507090Exch.Metric,E1superuser2004006008001000puzzling100150200250300cstheory20003500500065008000#ofUsers,U1030507090Exch.Metric,E22004006008001000#ofUsers,U100150200250300#ofUsers,Uthe contribution of the top 5% of users and the median 5% of users,
and (ii) the distance between the contribution of the median 5% of
users and the bottom 5% of users. For computing E2, we measure
the contribution of a user v as a tuple < N v
q >, consisting of
the number of answers N v
a provided by the user and the number of
questions N v
q asked by the user. Notice that E2 is an interval based
metric and we define user contribution to be consistent with this
metric. While both metrics have certain limitations, e.g., they are
sensitive to outliers, these metrics allow us to comprehend user
exchegeability to some extent.
a , N v
In Figure 7 we present the exchangeability of users under scale
changes (through E1 and E2) for three StackExchange markets:
cstheory, puzzling and superuser. Among the three markets,
superuser exhibits the highest gap between the top contributors
and the other participants. However, as the number of participants
increases, this gap decreases, i.e., the users become more exchange-
able. In contrast, cstheory exhibits the lowest gap between the top
contributors and the other participants. However, as the number of
participants increase, this gap increases, i.e., the users become less
exchangeable.
9 IMPLICATIONS
Our work promotes two new research directions-size-dependent
mechanism design and content dependency in social media-while
advancing several others-metrics of market health, power law of
participation, and microfoundations of knowledge markets.
Size-Dependent Mechanism Design. We reveal that the health
of a knowledge market depends on the market's size. A natural
implication of this dependency is that site operators should adjust
mechanisms based on the number of participants. For example,
a site operator can decide between retaining existing users (via
incentives) and attracting new users (via advertising) based on the
number of participants and their activity distribution.
Content Dependency in Social Media. We observe that many
social media platforms support several possible user actions with
"complex dependencies". For example, in Facebook, a post is the
root content (primary), comments on the post nest below the post
(secondary), and replies to these comments nest beneath the origi-
nal comments (tertiary). Further, a user can react to any of these
content types with several possible reactions. Overall user activ-
ity in Facebook is distributed across these possible actions with
complex dependencies, which drives the platform's health.
Metrics of Market Health. We demonstrate the presence of
diseconomies of scale with several metrics that partially capture the
health of a knowledge market. While we concentrate on content-
generation based production metrics, our concepts can be extended
for page-view based consumption metrics as well. Also, there is
room for developing new health metrics that capture a more de-
tailed picture of a knowledge market's health including market
efficiency-the degree to which market price (amount of responses
and reactions) is an unbiased estimate of the true value of the
investment (user effort in content generation) [11].
Power Law of Participation. In StackExchange markets, a
small fraction of the user community participate in high-engagement
activities (e.g., linking similar questions), whereas the larger fraction
participate in low-threshold activities (e.g., voting). This asymme-
try leads to a Power Law of Participation [29]. We assert that both
low-threshold and high-engagement activities are required for a
knowledge market's survival, and should proportionately increase
with the increase in number of participants. However, in reality,
for most knowledge markets, the size of the user community con-
tributing high-engagement activities does not scale with the system
size. This creates a "gap" between market supply and demand, and
consequently affects market health.
Microfoundations of Knowledge Markets. The size-dependent
distribution of user contribution implies that users who join a com-
munity later in its lifecycle exhibit different behavior than those
who were present from the beginning. This very well may imply
that the distribution of individual user behaviors (not just their over-
all production) is "also" a function of the system size. We should
expect to see a stable user behavior distribution over time for mar-
kets that appear to be more scale-insensitive; preliminary results
suggest that this may indeed be the case [17].
10 LIMITATIONS
We discuss several limitations of our work. First, the economic
production models do not account for user growth. While there
exist several user growth models for two-sided markets [24], mem-
bership based websites [32], and online social networks [6, 21, 45],
it would be useful to introduce economic user growth models that
complement our proposed content generation models. Specifically,
there is a need to develop resource-based user growth models that
account for market health. A potential direction in this research
is to extend the Malthusian growth model [28]. Second, the pro-
posed production models inherit the fundamental assumptions
of macroeconomics: an aggregate is homogeneous (without look-
ing into its internal composition), and aggregates are functionally
related etc. [33]. It would be useful to empirically study these as-
sumptions for real-world knowledge markets.
11 CONCLUSION
In this paper, we examined the CQA websites on StackExchange
platform through an economic lens by modeling them as knowl-
edge markets. In particular, we designed a set of production models
to capture the content generation dynamics in these markets. The
resulting best-fit model, Cobb-Douglas, predicts the production of
content in StackExchange markets with high accuracy. We showed
that the model provides intuitive explanations for content genera-
tion. Specifically, it reveals that factors of content generation such
as user participation and content dependency have constant elastic-
ity; in many markets, factors exhibit diminishing returns; markets
vary according to their returns to scale; and finally many markets
exhibit diseconomies of scale. We further investigated these prog-
noses by showing the presence of diseconomies of scale in terms
of content production, and several measures of market health. The
implications of our work are two-fold: site operators need to design
incentives as a function of number of participants; there is a need
to develop Economic lenses that can shed insights into the com-
plex dependencies amongst different content types and participant
actions in general social networks.
REFERENCES
[1] Mohammed Abufouda. 2017. Community Aliveness: Discovering Interaction
Decay Patterns in Online Social Communities. CoRR abs/1707.04477 (2017).
arXiv:1707.04477 http://arxiv.org/abs/1707.04477
[2] Lada A Adamic. 2000.
Zipf, power-laws, and pareto-a ranking tuto-
rial. Xerox Palo Alto Research Center, Palo Alto, CA, http://ginger. hpl. hp.
com/shl/papers/ranking/ranking. html (2000).
[3] Lada A. Adamic, Jun Zhang, Eytan Bakshy, and Mark S. Ackerman. 2008. Knowl-
edge Sharing and Yahoo Answers: Everyone Knows Something. In Proceedings
of the 17th International Conference on World Wide Web (WWW '08). ACM, New
York, NY, USA, 665–674. https://doi.org/10.1145/1367497.1367587
[4] Pal Aditya, Chang Shuo, and Konstan Joseph, A. 2012. Evolution of Experts in
Question Answering Communities. In Proceedings of the 6th International AAAI
Conference on Weblogs and Social Media.
[5] Ashton Anderson, Daniel Huttenlocher, Jon Kleinberg, and Jure Leskovec. 2012.
Discovering Value from Community Activity on Focused Question Answering
Sites: A Case Study of Stack Overflow. In Proceedings of the 18th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining (KDD '12).
ACM, New York, NY, USA, 850–858. https://doi.org/10.1145/2339530.2339665
[6] Lars Backstrom, Dan Huttenlocher, Jon Kleinberg, and Xiangyang Lan. 2006.
Group Formation in Large Social Networks: Membership, Growth, and Evolution.
In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining (KDD '06). ACM, New York, NY, USA, 44–54. https:
//doi.org/10.1145/1150402.1150412
[7] Ricardo Baeza-Yates and Diego Saez-Trumper. 2015. Wisdom of the Crowd or
Wisdom of a Few?: An Analysis of Users' Content Generation. In Proceedings of
the 26th ACM Conference on Hypertext & Social Media (HT '15). ACM, 69–74.
https://doi.org/10.1145/2700171.2791056
[8] Mary Ann Branch, Thomas F Coleman, and Yuying Li. 1999. A subspace, interior,
and conjugate gradient method for large-scale bound-constrained minimization
problems. SIAM Journal on Scientific Computing 21, 1 (1999), 1–23.
[9] Brian S Butler. 2001. Membership size, communication activity, and sustainability:
A resource-based model of online social structures. Information systems research
12, 4 (2001), 346–362.
[10] Yan Chen, TECK-HUA HO, and YONG-MI KIM. 2010. Knowledge market design:
A field experiment at Google Answers. Journal of Public Economic Theory 12, 4
(2010), 641–664.
[11] Aswath Damodaran. 2002. Investment Valuation: Tools and Techniques for Deter-
mining the Value of Any Asset. Wiley.
[12] Katherine Ellis, Moises Goldszmidt, Gert Lanckriet, Nina Mishra, and Omer
Reingold. 2016. Equality and Social Mobility in Twitter Discussion Groups. In
Proceedings of the Ninth ACM International Conference on Web Search and Data
Mining (WSDM '16). ACM, New York, NY, USA, 523–532. https://doi.org/10.1145/
2835776.2835814
[13] Desta Fekedulegn, Siútáin Mártín Pádraig Mac, and Jim J. Colbert. 1999. Parameter
Estimation of Nonlinear Models in Forestry. Finnish Society of Forest Science and
the Finnish Forest Research Institute (1999).
[14] Emilio Ferrara, Nazanin Alipourfard, Keith Burghardt, Chiranth Gopal, and
Kristina Lerman. 2017. Dynamics of Content Quality in Collaborative Knowledge
Production. In Proceedings of the Eleventh International Conference on Web and
Social Media, ICWSM 2017, Montréal, Québec, Canada, May 15-18, 2017. 520–523.
[15] Adabriand Furtado, Nazareno Andrade, Nigini Oliveira, and Francisco Brasileiro.
2013. Contributor Profiles, Their Dynamics, and Their Importance in Five Q&A
Sites. In Proceedings of the 2013 Conference on Computer Supported Cooperative
Work (CSCW '13). ACM, 1237–1252. https://doi.org/10.1145/2441776.2441916
[16] David Garcia, Pavlin Mavrodiev, and Frank Schweitzer. 2013. Social Resilience
in Online Communities: The Autopsy of Friendster. In Proceedings of the First
ACM Conference on Online Social Networks (COSN '13). ACM, New York, NY, USA,
39–50. https://doi.org/10.1145/2512938.2512946
[17] Chase Geigle, Himel Dev, Hari Sundaram, and Chengxiang Zhai. 2018. Discovering
and Analyzing Action-Based Roles in Community Question Answering Networks.
Technical Report.
[18] Glossary of economics. 2017. Glossary of economics - Wikipedia, The Free
(2017). https://en.wikipedia.org/wiki/Glossary_of_economics
Encyclopedia.
[Online; accessed 30-October-2017].
[19] Benjamin V. Hanrahan, Gregorio Convertino, and Les Nelson. 2012. Modeling
Problem Difficulty and Expertise in Stackoverflow. In Proceedings of the ACM
2012 Conference on Computer Supported Cooperative Work Companion (CSCW '12).
ACM, New York, NY, USA, 91–94. https://doi.org/10.1145/2141512.2141550
[20] Heike Hofmann, Hadley Wickham, and Karen Kafadar. 2017. Letter-Value Plots:
Boxplots for Large Data. Journal of Computational and Graphical Statistics 26, 3
(2017), 469–477. https://doi.org/10.1080/10618600.2017.1305277
[21] Sanjay Ram Kairam, Dan J. Wang, and Jure Leskovec. 2012. The Life and Death
of Online Groups: Predicting Group Growth and Longevity. In Proceedings of the
Fifth ACM International Conference on Web Search and Data Mining (WSDM '12).
ACM, New York, NY, USA, 673–682. https://doi.org/10.1145/2124295.2124374
[22] Komal Kapoor, Mingxuan Sun, Jaideep Srivastava, and Tao Ye. 2014. A Hazard
Based Approach to User Return Time Prediction. In Proceedings of the 20th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD
'14). ACM, New York, NY, USA, 1719–1728. https://doi.org/10.1145/2623330.
2623348
[23] Robert E. Kraut and Andrew T. Fiore. 2014. The Role of Founders in Building
Online Groups. In Proceedings of the 17th ACM Conference on Computer Supported
Cooperative Work & Social Computing (CSCW '14). ACM, New York, NY, USA,
722–732. https://doi.org/10.1145/2531602.2531648
[24] Ravi Kumar, Yury Lifshits, and Andrew Tomkins. 2010. Evolution of Two-sided
Markets. In Proceedings of the Third ACM International Conference on Web Search
and Data Mining (WSDM '10). ACM, New York, NY, USA, 311–320. https://doi.
org/10.1145/1718487.1718526
[25] Ravi Kumar, Jasmine Novak, and Andrew Tomkins. 2006. Structure and Evolution
of Online Social Networks. In Proceedings of the 12th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining (KDD '06). ACM, New York,
NY, USA, 611–617. https://doi.org/10.1145/1150402.1150476
[26] Varun Kumar and Niranjan Pedanekar. 2016. Mining Shapes of Expertise in Online
Social Q&A Communities. In Proceedings of the 19th ACM Conference on
Computer Supported Cooperative Work and Social Computing Companion (CSCW
'16 Companion). ACM, New York, NY, USA, 317–320. https://doi.org/10.1145/
2818052.2869096
[27] Zhiyuan Lin, Niloufar Salehi, Bowen Yao, Yiqi Chen, and Michael Bernstein. 2017.
Better When It Was Smaller? Community Content and Behavior After Massive
Growth. In Proceedings of the 11th International AAAI Conference on Web and
Social Media.
[28] Thomas Robert Malthus. 1809. An essay on the principle of population, as it affects
the future improvement of society. Vol. 2.
[29] Ross Mayfield. 2006. Power Law of Participation. (2006). http://ross.typepad.
com/blog/2006/04/power_law_of_pa.html [Online; accessed 30-October-2017].
[30] Akshay Patil, Juan Liu, and Jie Gao. 2013. Predicting Group Stability in Online
Social Networks. In Proceedings of the 22Nd International Conference on World
Wide Web (WWW '13). ACM, 1021–1030. https://doi.org/10.1145/2488388.2488477
[31] Liu Qiaoling and Agichtein Eugene. 2011. Modeling Answerer Behavior in
Collaborative Question Answering Systems. In Proceedings of the 33rd European
conference on Advances in information retrieval.
[32] Bruno Ribeiro. 2014. Modeling and Predicting the Growth and Death of
Membership-based Websites. In Proceedings of the 23rd International Confer-
ence on World Wide Web (WWW '14). ACM, New York, NY, USA, 653–664.
https://doi.org/10.1145/2566486.2567984
[33] Christopher A Sims. 1980. Macroeconomics and reality. Econometrica: Journal of
the Econometric Society (1980), 1–48.
[34] Ivan Srba and Maria Bielikova. 2016. A Comprehensive Survey and Classification
of Approaches for Community Question Answering. ACM Trans. Web 10, 3,
Article 18 (Aug. 2016), 63 pages. https://doi.org/10.1145/2934687
[35] Ivan Srba and Maria Bielikova. 2016. Why is Stack Overflow Failing? Preserving
IEEE Software 33, 4 (July
Sustainability in Community Question Answering.
2016), 80–89. https://doi.org/10.1109/MS.2016.34
[36] Jim Stanford. 2008. Economics for Everyone: On-Line Glossary of Terms &
Concepts. (2008).
[37] David Tilman. 1980. Resources: A Graphical-Mechanistic Approach to Com-
petition and Predation. The American Naturalist 116, 3 (1980), 362–393. https:
//doi.org/10.1086/283633 arXiv:https://doi.org/10.1086/283633
[38] Utkarsh Upadhyay, Isabel Valera, and Manuel Gomez-Rodriguez. 2017. Uncover-
ing the Dynamics of Crowdlearning and the Value of Knowledge. In Proceedings
of the Tenth ACM International Conference on Web Search and Data Mining (WSDM
'17). ACM, 61–70. https://doi.org/10.1145/3018661.3018685
[39] Simon Walk, Denis Helic, Florian Geigl, and Markus Strohmaier. 2016. Activity
Dynamics in Collaboration Networks. ACM Trans. Web 10, 2, Article 11 (May
2016), 32 pages. https://doi.org/10.1145/2873060
[40] Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, and Ben Y. Zhao.
2013. Wisdom in the Social Crowd: An Analysis of Quora. In Proceedings of the
22Nd International Conference on World Wide Web (WWW '13). ACM, 1341–1352.
https://doi.org/10.1145/2488388.2488506
[41] Lingfei Wu, Jacopo A. Baggio, and Marco A. Janssen. 2016. The Role of Diverse
Strategies in Sustainable Knowledge Production. PLoS ONE (2016).
[42] Lingfei Wu and Jiang Zhang. 2011. Accelerating growth and size-dependent
distribution of human online activities. Phys. Rev. E 84 (Aug 2011), 026113. Issue
2. https://doi.org/10.1103/PhysRevE.84.026113
[43] Jie Yang, Alessandro Bozzon, and Geert-Jan Houben. 2015. "Harnessing Engage-
ment for Knowledge Creation Acceleration in Collaborative Q&A Systems". In
Proceedings of the 23rd International Conference on user Modeling, Adaptation, and
Personalization (UMAP), Francesco Ricci, Kalina Bontcheva, Owen Conlan, and
Séamus Lawless (Eds.). 315–327.
[44] Tausczik Yla, Wang Ping, and Joohee Choi. 2017. Which Size Matters? Effects of
Crowd Size on Solution Quality in Big Data Q&A Communities. In Proceedings
of the 11th International AAAI Conference on Web and Social Media.
[45] Chengxi Zang, Peng Cui, and Christos Faloutsos. 2016. Beyond Sigmoids: The
NetTide Model for Social Network Growth, and Its Applications. In Proceedings
of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining (KDD '16). ACM, New York, NY, USA, 2015–2024. https://doi.org/
10.1145/2939672.2939825
[46] Jun Zhang, Mark S. Ackerman, and Lada Adamic. 2007. Expertise Networks
in Online Communities: Structure and Algorithms. In Proceedings of the 16th
International Conference on World Wide Web (WWW '07). ACM, New York, NY,
USA, 221–230. https://doi.org/10.1145/1242572.1242603
[47] Haiyi Zhu, Jilin Chen, Tara Matthews, Aditya Pal, Hernan Badenes, and Robert E.
Kraut. 2014. Selecting an Effective Niche: An Ecological View of the Success
of Online Communities. In Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 301–310.
https://doi.org/10.1145/2556288.2557348
[48] Haiyi Zhu, Robert E. Kraut, and Aniket Kittur. 2014. The Impact of Membership
Overlap on the Survival of Online Communities. In Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems (CHI '14). ACM, New York,
NY, USA, 281–290. https://doi.org/10.1145/2556288.2557213
|
1807.06124 | 1 | 1807 | 2018-07-16T21:43:52 | Computational Social Dynamics: Analyzing the Face-level Interactions in a Group | [
"cs.SI"
] | Interactional synchrony refers to how the speech or behavior of two or more people involved in a conversation become more finely synchronized with each other, and they can appear to behave almost in direct response to one another. Studies have shown that interactional synchrony is a hallmark of relationships, and is produced as a result of rapport. %Research has also shown that up to two-thirds of human communication occurs via nonverbal channels such as gestures (or body movements), facial expressions, \etc.
In this work, we use computer vision based methods to extract nonverbal cues, specifically from the face, and develop a model to measure interactional synchrony based on those cues. This paper illustrates a novel method of constructing a dynamic deep neural architecture, specifically made up of intermediary long short-term memory networks (LSTMs), useful for learning and predicting the extent of synchrony between two or more processes, by emulating the nonlinear dependencies between them. On a synthetic dataset, where pairs of sequences were generated from a Gaussian process with known covariates, the architecture could successfully determine the covariance values of the generating process within an error of 0.5% when tested on 100 pairs of interacting signals. On a real-life dataset involving groups of three people, the model successfully estimated the extent of synchrony of each group on a scale of 1 to 5, with an overall prediction mean of $2.96%$ error when performing 5-fold validation, as compared to 26.1% on the random permutations serving as the control baseline. | cs.SI | cs | Computational Social Dynamics: Analyzing the Face-level Interactions in a
Group
Nicholas Watkins and Ifeoma Nwogu
Department of Computer Science, Rochester Institute of Technology
Rochester, NY
8
1
0
2
l
u
J
6
1
]
I
S
.
s
c
[
1
v
4
2
1
6
0
.
7
0
8
1
:
v
i
X
r
a
Abstract- Interactional synchrony refers to how the speech
or behavior of two or more people involved in a conversation
become more finely synchronized with each other, and they
can appear to behave almost in direct response to one another.
Studies have shown that interactional synchrony is a hallmark
of relationships, and is produced as a result of rapport. In
this work, we use computer vision based methods to extract
nonverbal cues, specifically from the face, and develop a model
to measure interactional synchrony based on those cues. This
paper illustrates a novel method of constructing a dynamic
deep neural architecture, specifically made up of intermediary
long short-term memory networks (LSTMs), useful for learning
and predicting the extent of synchrony between two or more
processes, by emulating the nonlinear dependencies between
them. On a synthetic dataset, where pairs of sequences were
generated from a Gaussian process with known covariates,
the architecture could successfully determine the covariance
values of the generating process within an error of 0.5%
when tested on 100 pairs of interacting signals. On a real-life
dataset involving groups of three people, the model successfully
estimated the extent of synchrony of each group on a scale of
1 to 5, with an overall prediction mean of 2.96% error when
performing 5-fold validation, as compared to 26.1% on the
random permutations serving as the control baseline.
I. INTRODUCTION
Research in Social Psychology has shown extensively that
in cohesive groups, individuals typically mirror each other's
facial expressions and facial articulations [3]. Furthermore, in
groups with established rapport, typically individuals provide
feedback to others' opinions using facial features. Thus
the ability to measure the extent of interactional synchrony
among the members in a group can be used as a metric for
cohesion or rapport within that group.
Developing and maintaining rapport is a critical compo-
nent of successful interactions in different social settings. For
example, it has been shown in that in organizational settings,
using techniques of rapport management in the interpersonal
communication between leaders and team members can lead
to building more positive relationships in the organization,
which in turn can result in higher quality of work[8]. In a
separate study from Japan[16] that investigated prisoners'
reasons for confessions when being interrogated, partici-
pants who experienced a relationship-focused interviewing
style, which stressed active listening and rapport-building
while talking about their criminal incidents directly, were
more likely to confess. In yet another study on interracial
mentoring relationships, findings suggested that affect and
rapport were the key features in facilitating more positive
outcomes[12]. In general, rapport management
is a key
component of social dynamics1and a quantitative measure of
the extent of rapport can prove to be very useful in difference
social constellations.
We expect pairs or groups of
individuals with high
cohesion and established rapport to exhibit the mirroring
effect, a form of interactional synchrony. The mirroring
effect
is a phenomenon which occurs when individuals
mimic each other's behavior subconsciously to gain and
keep rapport[3]. Thus, we expect the cohesion of a group
to directly correspond the extent of synchrony occurring.
Interactional synchrony can be manifested in various forms
other than mirroring which is the most common. These
include entrainment at the voice prosody level, convergence
(when people in a group initially behave very differently
from each other but eventually begin to behave similarly),
mimicking, which is a type of mirroring but with time delays,
etc..
To this end, to better understand interactional synchrony,
we study coupled or interacting processes, where given two
or more time series signals, our goal is to determine if and
how much they are interacting. This general problem has
numerous applications such as modeling human impact in
social dynamics (as described above), explaining weather
patterns, studying financial markets and their dependences,
etc. In this work, we focus on studying how well individuals
are interacting with each other in a given social context.
We abstract our concept of processes by examining mea-
surements over time (e.g. once every second) and refer to
these sets of time series X and Y . We say two time series
X, Y are synchronous if their corresponding processes are
interacting, i.e. if the patterns in X are influenced by Y or
vice versa. We assume that interaction always has an impact
on the process.
II. PAST RELATED WORK ON COMPUTATIONAL
SYNCHRONY
While the notion of interactional synchrony has been
studied extensively in the Social Psychology literature, much
less work has been reported in the computational analysis
literature on this subject. Delaherche et al. [5] presented
an extensive survey of synchrony evaluation from a mul-
tidisciplinary perspective, focusing on psychologists' coding
1Social dynamics refers to the behavior of groups, which results from the
interactions of individual group members. It also refers to the study of the
relationship between individual-level interactions and group-level behaviors.
methods, non-computational evaluation and early machine
learning techniques.
Rudimentary forms of synchrony analysis has long been
performed using covariance measures in statistics, however,
this only works if the processes have a liner relation. But
in real-life settings, such interactions can be nonlinear.
Although most covariate time series are synchronous, not
all synchronous data is covariate, such as is the case when
synchronous data are nonlinearly coupled. Additionally, syn-
chronous data can have a similar noise pattern (with an
underlying independent trend) or have a nonuniform delay.
These cases would all fail under traditional variance analysis.
Synchronicity analysis has also been previously approached
by using coupled hidden Markov models (cHMMs) [2],
[14] to classify taichi movements, under the assumption
that different parts of the body moving in taichi will be
synchronous to each other. Although cHMMs are power-
ful, they cannot model irregular delays between the two
sequences. Furthermore, due to the stringent Markovian
assumption2, they are often heavily augmented to be useful.
Li et al. [13] presented a supervised model used to predict
the outcomes of video-conferencing conversations in the
context of new recruit negotiations, again making the Markov
assumption on interactional synchrony between the inter-
locutors. Yu et al. [17] presented a technique to investigate
interactive synchrony in facial expressions and showed using
the Pearson's correlation measure, that synchrony features
were effective at detecting deception; Hammal et al. [9]
evaluated the temporal coordination of head movements in
couples with history of interpersonal violence and Chu et al.
[4] developed a search-based technique for unsupervised,
accelerated, multi-synchrony detection. In much of the model
based works described, first-order Markov assumptions are
made for modeling interactional synchrony.
Group cohesion analysis (not in the context of synchrony)
has been previously approached by using using SVMs on
extracted audiovisual features from group meeting videos
labeled as having high or low cohesion by human annotators
[10]. In this paper we describe our work on studying group
cohesion using a neural network model, specifically the long
short-term memory (LSTM). Our method is advantageous
over the aforementioned ones in that our model uses less
preset features, we are injecting less bias into the model and
it is well-suited to classify, process and predict time series
data given time lags of unknown size and duration between
events.
III. METHOD
In this section, we present our techniques for synthetic data
generation, feature extraction and selection from the real-
life dataset and interactional synchrony measurement via the
LSTM. We also describe the process of obtaining a form of
ground truth via human annotations, since labels were not
provided for the data. LSTMs are a class of recursive neural
networks (RNN) which use memory cells to "remember"
2The kth order Markov assumption states that only the t − k, t − k +
1, ..., t − 1, t measurements impact the t + 1 measurement
2
prior computations. LSTMs and RNNs are frequently used
for time series prediction and classification. The memory
cells of LSTM networks cause the time series they generate
to adhere to higher orders of the Markov property. They
are therefore capable of learning and modeling arbitrary
sequential functions (given the neural topology is sufficiently
complex).
Fig. 1. An unrolled LSTM network showing the repeating module U with
four interacting layers internally, along with inputs {xi} and outputs {hi}.
A. Synthetic data
To sufficiently ensure our approach would be successful
on a variety of different applications, we generated syn-
thetic data with desired levels of synchronousity. We took
inspiration from Jamali's method of generating correlated
Gaussian processes [11] and added a post processing step
to ensure the data need not necessarily be correlated (but
merely synchronous). We also implemented a rudimentary
tread feature that allows us to prescribe a trend to both time
series. The extended version of the algorithm is described in
more detail in Algorithm 1.
Algorithm 1 Data generating process
1: procedure DATAGEN(len, C, f1(t, x), f2(t, x), delay)
2:
3:
4:
5:
6:
7:
8:
9:
10:
Sxx = f f t(Cxx)
Syy = f f t(Cyy)
Sxy = f f t(Cxy)
u = SampleGaussian(len)
v = SampleGaussian(len)
U = f f t(u)
V = f f t(v)
β = 1
(cid:17)
Sxy
Sxx∗Syy
α = β + cos−1(cid:16)
Cq =(cid:112)Syy ∗ cos(α)
Dq =(cid:112)Syy ∗ sin(α)
√
√
Sxx ∗ cos(α)
√
Sxx ∗ sin(α)
Aq =
Bq =
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23: end procedure
X = Aq ∗ U T + Bq ∗ V T
Y = Cq ∗ U t + Bq ∗ V T
x∗ = if f t(X)
y∗ = if f t(Y )
x = x∗[1 + delay :]
y = y∗[1 : −delay]
Return [f1(1, x1), ..., f1(len, xlen)],
[f2(1, y1), ..., f2(len, ylen)]
htxt+x x σtanh σx tanh σUht-1xt-1Uht+1xt+1htctct-1ht-1ct+1ht+13
interaction, resulting in a total of four videos - one at the
overall group level showing body movements and three at
the individual level showing mainly the face. Figure 3 shows
sample frames from one of the videos depicting the overall
group interaction as well as the faces of individual partici-
pants in the group. The database contains a total of 172,800
frames, with 1,800 frames for each of 96 participants.
Fig. 3.
participant face level.
Examples of video frames from the dataset - group level and
1) Data Processing: Each individual's facial expression
was parsed using OpenFace [1], an open-source toolkit capa-
ble of facial landmark detection, head pose estimation, facial
action unit recognition, and eye-gaze estimation. Action units
(AUs) correspond to various muscle groups on the face and
can range from being fully activated to not activated[6].
For each trio in a group, we took the top 3 most active
action units. We defined the activity of an action unit as the
mean average deviation. The amount of mirroring directly
corresponds to our definition of synchrony (as increased
synchrony between the facial behavior in pairs of individuals
indicates mirroring); thus, for our neural network to detect
mirroring, it must detect synchrony (by proxy).
We took these action units and measured them through
time, thus obtaining a collection of behavioral signals (based
on the face). These signals can be seen as a high order
coupled Markov process as individual channels interacted
with each other.
2) Human annotations: In the absence of ground truth
data, we requested five individuals labelers to review the
videos in the dataset and provide an aggregate group syn-
Fig. 4. OpenFace output on a sample frame showing the facial landmarks
used to compute action units, head pose and eye gaze.
Fig. 2.
synthetically generated.
Examples of synchronized pairs of random variable sequences
Examples of the outputs of the data generating process
for a pair of synchronized 100-length sequences are shown
in Figure 2. The left image is a basic pair of stationary
synchronized sequences: the middle image shows another
pair of synchronized sequences, but shifted by one unit of
time - note that the sequences are not exactly the same, rather
they are random sequences generated by the same stochastic
process. The right
image shows a pair of synchronized
sequences where one of the signals is quasi-periodic and the
other is trending If the covariance between the two signals
is given as:
and we train an ample number of
signal pairs with the neural network structure presented in
Section III-C using a regression loss on Φ12, we are able to
effectively recover this value back when tested with newly
generated signals with known covariances. Details of the
experiment and results are given in Section IV.
(cid:20)Φ11 Φ12
Φ21 Φ22
(cid:21)
B. The Sayette Group Formation Task dataset
We are testing this approach on a dataset obtained from
Girard et al. [7] which was drawn from a larger study on
the impact of alcohol on group formation processes [15].
All participants in the study were previously unacquainted
and met for the first time at the experiment. They were
instructed to consume a beverage and then engage with
two other study participants. The groups of interlocutors
were made up of three such subjects who were engaged for
about 30-40 minutes of unstructured interactions. The data
provided for this study focused on a 1 minute portion of the
entire video where the collectors believed the participants
in the group had become sufficiently acquainted with each
other. Unfortunately, the associated labels for the videos were
not provided. Separate wall-mounted cameras faced each
participant and another camera captured the overall group
4
IV. TESTING AND RESULTS
In this section, we first define the different performance
measures used to evaluate the architecture and then describe
the overall testing methodology, both for the synthetic and
the real datasets. Lastly, we provide the results obtained from
both sets of experiments.
A. Performance measures
To test the effectiveness of our model, we computed the
mean of the absolute percent error µe given as:
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Yi − Yi
Yi
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
N(cid:88)
i=1
µe =
1
N
(cid:118)(cid:117)(cid:117)(cid:116) 1
N
(cid:32)
N(cid:88)
i=1
(cid:33)2
Yi − Yi
Yi
− µ
Additionally, we computed the standard deviation of
percent error σe given as:
chrony score based on their perception of how well the group
was interacting. The scores were in the range of 1 to 5,
with 1 implying the group was completely unsynchronized, 5
being completely synchronized. The labelers were instructed
to judge overall synchrony so that even if two people in the
group are interacting well with each other, but not with the
third person, the group could not receive a high score. To
account for the subjectivity in the labeling, we computed
the total variances for the scores provided by all but one of
the labelers (we did this five times), and removed the set of
annotations that caused the largest variance in the set. We
also spot-checked the variances across each group and when
this was larger than a preset threshold, had additional ad
hoc labelers re-score the video - this was done for only two
groups in the entire dataset. The average score obtained from
the labelers was now considered as the human impression
of synchrony, the new gold-standard we used to train the
network.
C. LSTM Model
σe =
Finally, we computed the standard statistical measure, R2
also known as the coefficient of determination, as:
(cid:80)N
(cid:80)N
i=1(Yi − Yi)2
i=1 Yi − µ
R2 = 1 −
is the ground-truth synchronicity measure (or
where Yi
measure of cohesion) of the ith group, Yi is the model's
prediction on the same ith group and N is the total number
of groups.
For synthetic data,
the "group" is the pair of signals
generated using the DATAGEN algorithm. For the more
complex real-life scenario, the group consists of the data
from the three people in conversation. Each person's data
consists of 3 AUs.
B. Testing methodology
The testing methodologies are similar for the synthetic and
the real-life datasets, where the time series data is input to
an LSTM architecture, the output codes from all the LSTMs
are fed into a fully-connected dense neural network and the
algorithm is trained using a regression-based mean-squared
error (MSE) loss (Figure 5).
As proof-of-concept, we first tested the network on the
synthetic dataset to attempt to recover the covariate measure
between the two interacting signals (this is known since we
generated the data). We trained the network on 100 pairs
of signals, each signal having a length of 1000. Using an
overlapping window of length 100 and a stride of 1, we
extracted pairs of sub-signals which were fed into the LSTM
architecture where 80% was used for training and 20% for
validation. During training, each pair of sub-signals extracted
with the overlapping window is input to the network and
Fig. 5.
An LSTM network to predict the synchrony among 3 sets of
input signals, where each set has 3 channels. For the first layer, not all
the connections are shown in the diagram for the sake of clarity, but every
channel of data from each person is connected to all the input nodes of every
LSTM network. Note: the number of LSTM networks does not necessarily
equal the number of sets at the input.
We implement an LSTM network followed by a fully
connected layer to predict the extent of interaction between
two or more sets of input signals. The network utilizes
a lookback feature of one second (or 30 frames). It
is
important to note that the number of LSTM networks does
not necessarily have to be equal to the number of sets at
the input. More information is provided on how we selected
the optimal number of input networks in Section IV. All
neurons use the ReLU activation function. For the real-life
data, since we are analyzing 3 different action units (the
3 most prominently changing AUs), in the first layer, each
LSTM network has a neuron for each channel of the input
for all individuals. A simplified model can be seen in Figure
5.
labeled with the overall synchrony metric which in this case
is the covariate value between the entire signals.
Since we selected the number of LSTM networks arbitrar-
ily, we tested using a varying number of LSTM networks,
from 1 to 9 as shown in Figure 6. The optimal number
of LSTMs for the synthetic dataset was 6, although it can
be seen that the number of LSTMs makes only a small
difference to the end result.
Fig. 6.
x-axis is the number of LSTM networks and y-axis is the lowest
error obtained from the model on the same data. The red (or lower curve)
represents the results obtained from training data and the blue (or upper)
represents the results obtained from the validation data.
We tested the network on 100 pairs of signals, each of
length of 1000. Similar to the training paradigm, the pairs of
sub-signals were extracted and fed to the network to retrieve
their synchrony metric. The overall mean error between the
predicted and actual values was 0.5%.
For the real-life data, the same paradigm was employed.
All signals were one-minute or 1800 frames long. Similar
to the process employed for the synthetic data, we used an
overlapping window of size 30 and fed the sub-signals to a
similar LSTM architecture. In this case, we used 10 LSTM
networks and the inputs consisted of 3 sets of 3 channels
each. During training, the sub-signals were labeled with the
ground-truth label (previously assigned by human annotators
to the entire group of three, as a measure of their perceived
level of interaction - between 1 and 5).
To train, we used 5-fold cross validation across the groups
i.e. 24 groups were used for training and the remaining 8
for testing, over 5 folds. As a type of control baseline, to
ensure we are accurately measuring interactional synchrony
and not some other underlying phenomenon, for each group
in the test set, we selected one of the three original members
and combined their data with that of two individuals from
two other randomly selected groups to create a new group
(referred to as random in Table since we should be unable
to predict better than random). We then performed the pre-
dictions on these permutations and compared the predicted
values to the ground-truth labels of the group. After training
the regressor, we obtained results within a mean of 2.96%
error when performing 5-fold validation with a 30th order
Markov assumption as compared to 26.1% on the random
permutations. The full set of results on the real-life dataset
are shown in Table .
The R2 value is the most telling metric in this work,
where a value of 1.0 indicates that the model fits the data
well and the differences between the ground-truth values and
the model's predicted values are small and unbiased. An R2
Data
Random
5-Fold validation
5
R2
0.00717
0.979
Mean of Absolute
Percent Error
Standard Deviation
Percent Error
0.261
0.0296
0.203
0.0296
TABLE I
RESULTS AFTER RUNNING 5 FOLD VALIDATION ON DATASET AND ON
CONTROL BASELINE
value of 0.0 indicates the contrary. For this work, on the
real-life data set, after five folds of validation, the resulting
R2 was 0.979 while the value for the random permutation
was 0.00717.
V. CONCLUSION
We can observe that our model is highly accurate. Fur-
thermore, based on the analysis and results reported, we can
be confident the proposed architecture is looking to measure
synchrony. Unfortunately, as with many techniques based on
neural networking, it is difficult to completely understand
the inner workings of this model and fully interpret what
the architecture is inferring from the data. Thus, we can
only conjecture about
the means to which it derives its
conclusions. Notwithstanding, this type of architecture can be
used for efficient classification of group dynamics. Potential
applications using transfer learning and applying this to
sequences could be investigated.
REFERENCES
[1] T. Baltrusaitis, P. Robinson, and L. P. Morency. Constrained local
neural fields for robust facial landmark detection in the wild. In 2013
IEEE International Conference on Computer Vision Workshops, pages
354–361, Dec 2013.
[2] M. Brand, N. Oliver, and A. Pentland. Coupled hidden markov models
for complex action recognition. Proceedings of IEEE Computer
Society Conference on Computer Vision and Pattern Recognition.
[3] T. L. Chartrand and J. A. Bargh.
The chameleon effect: The
perception-behavior link and social interaction. Journal of Personality
and Social Psychology, 76(6):893910, 1999.
[4] W.-S. Chu, J. Zeng, F. De la Torre, J. F. Cohn, and D. Messinger. Un-
supervised synchrony discovery in human interaction. In International
Conference on Computer Vision, ICCV. CVF/IEEE, 2015.
[5] E. Delaherche, M. Chetouani, A. Mahdhaoui, C. Saint-Georges,
S. Viaux, and D. Cohen.
Interpersonal synchrony: A survey of
evaluation methods across disciplines. IEEE Transactions on Affective
Computing, 3(3):349–365, July 2012.
[6] P. Ekman and E. L. Rosenberg. What the face revealsbasic and
applied studies of spontaneous expression using the facial action
coding system (facs). 2005.
[7] J. M. Girard, W.-S. Chu, L. A. Jeni, J. F. Cohn, and F. De la
Torre. Sayette group formation task (gft) spontaneous facial expression
database. In 2017 11th IEEE International Conference and Workshops
on Automatic Face and Gesture Recognition (FG), 2017.
[8] D. D. Gremler and K. P. Gwinner. Customer-Employee Rapport in
Service Relationships. Journal of Service Research, 3(1):82–104, Aug.
2000.
[9] Z. Hammal, T. E. Bailie, J. F. Cohn, D. T. George, J. Saraghi,
J. N.Chiquero,
Temporal coordination of head
In IEEE
motion in couples with history of interpersonal violence.
International Conference on Automatic Face and Gesture Recognition,
FG, 2013.
, and S. Lucey.
[10] H. Hung and D. Gatica-Perez. Estimating cohesion in small groups
using audio-visual nonverbal behavior. IEEE Transactions on Multi-
media, 12(6):563575, 2010.
[11] T. Jamali and G. R. Jafari. Method for generating two coupled gaussian
stochastic processes, 2016.
6
[12] J. B. Leitner,
. Ayduk, C. M. Boykin, and R. Mendoza-Denton.
Reducing negative affect and increasing rapport improve interracial
mentorship outcomes. PloS One, 13(4):e0194123, 2018.
[13] R. Li, J. Curhan, and M. E. Hoque. Predicting video-conferencing
conversation outcomes based on modeling facial expression synchro-
In IEEE International Conference on Automatic Face and
nization.
Gesture Recognition, FG, 2015.
[14] I. Rezek, P. Sykacek, and S. J. Roberts. Learning interaction dynamics
IEE Proceedings - Science,
with coupled hidden markov models.
Measurement and Technology, 147(6):345–350, Nov 2000.
[15] M. A. Sayette, K. G. Creswell, J. D. Dimoff, C. E. Fairbairn, J. F.
Cohn, B. W. Heckman, T. R. Kirchner, J. M. Levine, , and R. L.
Moreland. Alcohol and group formation: A multimodal investigation
of the effects of alcohol on emotion and social bonding. Psychological
Science, 23(8):869–878, 2012.
[16] T. Wachi, K. Watanabe, K. Yokota, Y. Otsuka, and M. E. Lamb.
[Prisoners reasons for confessions and interviewing styles]. Shinrigaku
Kenkyu: The Japanese Journal of Psychology, 87(6):611–621, Feb.
2017.
[17] X. Yu, S. Zhang, Y. Yu, N. E. Dunbar, M. L. Jensen, J. K. Burgoon,
and D. N. Metaxas. Automated analysis of interactional synchrony
In IEEE
using robust facial tracking and expression recognition.
International Conference on Automatic Face and Gesture Recognition,
FG, 2013.
|
1310.8038 | 2 | 1310 | 2013-11-15T01:33:21 | Community Structures Are Definable in Networks: A Structural Theory of Networks | [
"cs.SI",
"physics.soc-ph"
] | We found that neither randomness in the ER model nor the preferential attachment in the PA model is the mechanism of community structures of networks, that community structures are universal in real networks, that community structures are definable in networks, that communities are interpretable in networks, and that homophyly is the mechanism of community structures and a structural theory of networks. We proposed the notions of entropy- and conductance-community structures. It was shown that the two definitions of the entropy- and conductance-community structures and the notion of modularity proposed by physicists are all equivalent in defining community structures of networks, that neither randomness in the ER model nor preferential attachment in the PA model is the mechanism of community structures of networks, and that the existence of community structures is a universal phenomenon in real networks. This poses a fundamental question: What are the mechanisms of community structures of real networks? To answer this question, we proposed a homophyly model of networks. It was shown that networks of our model satisfy a series of new topological, probabilistic and combinatorial principles, including a fundamental principle, a community structure principle, a degree priority principle, a widths principle, an inclusion and infection principle, a king node principle and a predicting principle etc. The new principles provide a firm foundation for a structural theory of networks. Our homophyly model demonstrates that homophyly is the underlying mechanism of community structures of networks, that nodes of the same community share common features, that power law and small world property are never obstacles of the existence of community structures in networks, that community structures are {\it definable} in networks, and that (natural) communities are {\it interpretable}. | cs.SI | cs |
Community Structures Are Definable in Networks: A Structural
Theory of Networks ∗
Angsheng Li1, Yicheng Pan1,3, Jiankou Li1,2
1State Key Laboratory of Computer Science
Institute of Software, Chinese Academy of Sciences
2University of Chinese Academy of Sciences, P. R. China
3State Key Laboratory of Information Security
Institute of Information Engineering, Chinese Academy of Sciences, P. R. China
Community detecting is one of the main approaches to understanding network struc-
tures. However it has been a longstanding challenge to give a definition for community
structures of networks. We found that neither randomness in the ER model nor the
preferential attachment in the PA model is the mechanism of community structures of
networks, that community structures are universal in real networks, that community
structures are definable in networks, that communities are interpretable in networks,
and that homophyly is the mechanism of community structures and a structural the-
ory of networks. We proposed the notions of entropy- and conductance-community
structures. It was shown that the two definitions of the entropy- and conductance-
community structures and the notion of modularity proposed by physicists are all
equivalent in defining community structures of networks, that neither randomness
in the ER model nor preferential attachment in the PA model is the mechanism of
community structures of networks, that there is an empirical criterion for deciding
the existence and quality of community structures in networks, and that the existence
∗State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, P. O. Box 8718, Beijing,
100190, P. R. China. Email: {angsheng, yicheng, lijk}@ios.ac.cn. Correspondence: {angsheng, yicheng}@ios.ac.cn.
Angsheng Li is partially supported by the Hundred-Talent Program of the Chinese Academy of Sciences. All authors are
supported by the Grand Project "Network Algorithms and Digital Information" of the Institute of software, Chinese Academy
of Sciences, and NSFC grant No. 61161130530.
1
of community structures is a universal phenomenon in real networks. This poses a
fundamental question: What are the mechanisms of community structures of real net-
works? To answer this question, we proposed a homophyly model of networks. It was
shown that networks of our model satisfy a series of new topological, probabilistic and
combinatorial principles, including a fundamental principle, a community structure
principle, a degree priority principle, a widths principle, an inclusion and infection
principle, a king node principle and a predicting principle etc. The new principles
provide a firm foundation for a structural theory of networks. Our homophyly model
demonstrates that homophyly is the underlying mechanism of community structures of
networks, that nodes of the same community share common features, that power law
and small world property are never obstacles of the existence of community structures
in networks, that community structures are definable in networks, and that (natural)
communities are interpretable. Our theory provides a foundation for analyzing the
properties and roles of community structures in robustness, security, stability, evolu-
tionary games, predicting and controlling of networks.
1 Background
Defining community structures in networks is a fundamental challenge in modern network theory. Our
notions of the entropy- and conductance-community structures are information theoretical and mathemat-
ical definitions respectively. We found that our definitions of entropy-, conductance- and the modularity-
community structures (18) are equivalent in defining community structures of networks, that randomness
and preferential attachment are not mechanisms of community structures of networks, and that commu-
nity structures are universal in real networks. This shows that community structure is a phenomenon
definable in networks. The discoveries here provide a foundation for a new theory of community (or
local) structures of networks.
2
Generally speaking, the missing of a structural theory of networks hinders us from rigorous analysis
of networks and networking data. In fact, the current state of the art shows that the current tools for
analyzing networks and networking data are mainly the probabilistic or statistical methods, which of
course neglect the structures of data.
However, structures are essential. In nature and society, especially in the current highly connected
world, we observe that mechanisms determine the structures, and that structures determine the properties,
which could be a new hypothesis of real network data. In particular, a grand challenge in network science
is apparently the missing of a structural theory of networks. Community structures determine the local
properties of networks that may have global implications.
Network has become a universal topology in science, industry, nature and society. Most real networks
satisfy a power law degree distribution (3), (2), and a small world phenomenon (17), (23), (13).
Community detecting or clustering is a powerful tool for understanding the structures of networks,
which has already been extensively studied (5), (8), (21), (9), (19). Many definitions of communities
have been introduced, and various methods for detecting communities have been developed in the liter-
ature, see (12) for a recent survey. However, the problem is still very hard, not yet satisfactorily solved.
The approach of community finding takes for granted that networks have community structures. The
fundamental questions are thus: Are communities objects naturally formed in a network or simply out-
puts of a graphic algorithm? Can we really take for granted that networks have community structures?
Are community structures of networks robust? What are the natural mechanisms which generate the
community structure of a network, if any? What can we do with the communities? How can we test the
quality of various community finding algorithms?
Our experiments here showed that community structures are definable in networks, that randomness
and preferential attachment are not mechanisms of community structures of networks, that there is an
empirical criterion for deciding the existence and quality of community structures of networks, and that
the existence of community structures is a universal phenomenon of real world networks. This pre-
3
dicts that community structures have their own mechanisms other than the well-known ones of classical
models of networks.
It is easy to recognize that the key to answer all the questions listed above is to understand the
mechanisms of community structures of networks.
We proposed a new model of networks, the homophyly model below, by introducing the new mech-
anism of homophyly in the classical preferential attachment model. Our model constructs networks
dynamically by using the natural mechanisms of preferential attachment and homophyly.
Our homophyly model explores that homophyly is the mechanism of community structures in net-
works, that community structures are provably definable in networks, and that communities are inter-
pretable in networks. It was shown that the homophyly networks satisfy simultaneously a series of new
topological, probabilistic and combinatorial principles, including a fundamental principle, a community
structure principle, a degree priority principle, a widths principle, an inclusion and infection principle,
a king node principle and a predicting principle etc. The new principles we found here provide a foun-
dation for analyzing the properties and roles of community structures in new issues of networks such as
robustness, security, stability of networks, evolutionary game and predicting in networks, and controlling
of networks. Our results here provide a firm first step for us to develop a structural theory of networks,
which would be essential to many important new issues of networks and networking data.
2 Definitions of Community Structures of Networks
The first definition of community structures is the notion of modularity. Newman and Girvan (18) defined
the notion of modularity to quantitatively measure the quality of community structure of a network. It
is built based on the assumptions that random graphs are not expected to have community structure and
that a network has a community structure, if it is far from random graphs.
Let G = (V, E) be a graph with n nodes and m edges and P be a partition of nodes in V . The
modularity of G by P is defined by
4
σP (G) =
(Aij − Pij)δ(Ci, Cj),
1
2mXi,j
where the sum runs over all pairs of vertices, A is the adjacency matrix, Pij is the expected number of
edges between nodes i and j in a null graph, i.e., a random version of G. δ(Cj , Cj) = 1 if Ci = Cj, and
0 otherwise, Ck is an element of the partition P.
A standard null model imposes that the expected degree after averaging over all possible configura-
tions matches the actual degree of the original graph (11). Such a null model is essentially equivalent to
the configuration model (7), in which each node i is associated with di half-edges, where di is the degree
of node i in G, and all the half-edges are joined randomly. It is easy to obtain that Pij = didj/2m and
the modularity of G by P can then be rewritten as
σP (G) =
L
Xl=1" kl
m −(cid:18) Vl
2m(cid:19)2# ,
(1)
where L is the number of modules in partition P, kl is the number of edges whose both ends are in
module l, and Vl is the sum of the degrees of the nodes in l, also called the volume of l. Note that the
first term of each summation represents the fraction of edges of G inside the module and the second term
represents the expected fraction of edges that would be in the null model.
We define the modularity of G as
σ(G) = max
P {σP (G)}.
σ(G) is a real number in [0, 1]. The larger σ(G) is, the better community structure G has. We define
the modularity community structure ratio (M-community structure ratio) of G to be the modularity of
G.
The second definition is based on random walks. The intuition is that random walks from a node in a
quality community are not easy to go out of the community. We define the notion of entropy community
5
structure ratio of a network. We consider the entropy of a network and of a network given by a partition
of nodes of the network.
Let G = (V, E) be a graph with n nodes and m edges, and P be a partition of V . We use LU (G) to
denote the minimum average number of bits to represent a single step of random walk (in the stationary
distribution) with a uniform code in G, and LP (G) to denote the minimum average number of bits to
represent that with an aforementioned "module-node" code.
By information theoretical principle,
LU (G) = −
di
2m · log2
di
2m
,
n
Xi=1
where di is the degree of node i.
LP (G) = −
L
nj
Xj=1
Xi=1
d(j)
i
2m · log2
d(j)
i
Vj −
(2)
(3)
mg
m
Vj
2m · log2
L
Xj=1
Vj
2m
,
where L is the number of modules in partition P, nj is the number of nodes in module j, d(j)
degree of node i in module j, Vj is the volume of module j, and mg is the number of edges crossing two
is the
i
different modules.
We define the entropy community structure ratio of G by P by
τ P (G) = 1 −
LP (G)
LU (G)
.
We define the entropy community structure ratio of G (E-community structure ratio of G) by
τ (G) = max
P {τ P (G)}.
We notice that similar idea has been used in community detecting, for instance, Rosvall and Bergstrom
(22) proposed an algorithm to detect communities by compressing a description of the information flow
by using the Huffman code to encode prefix-freely each module and each node. Our definition here is
purely an information theoretical notion.
6
Both definitions of the modularity and entropy community structure ratio depend on partitions of
G. In these definitions, the existence of a community structure of a graph means that there is a "good
partition" for the graph. However the intuitive relationship between "good partitions" and community
structures is not clear, and more seriously, both the two definitions are not convenient for us to compare
the community finding algorithms, which usually do not give partitions of networks. In fact, a community
finding algorithm may find overlapping communities, and may neglect part of the nodes in the community
findings. In addition, both modularity and the entropy community structure ratio can be regarded as
global definitions of community structures of networks.
We will introduce a mathematical definition based on conductance, which is applicable to over-
lapping communities, and to partial solutions of searching etc. We define the conductance community
structure ratio of a network. To describe our definition, we recall the notion of conductance.
Given a graph G = (V, E), and a set S ⊂ V , the conductance of S in G is defined by
ΦG(S) =
E(S, ¯S)
min{vol(S), vol( ¯S)}
,
where ¯S is the complement of S in G, E(S, ¯S) is the set of all edges with one endpoint in S and the
other in ¯S, vol(X) is the volume of X.
Clearly, a community of a network must satisfy certain basic conditions, for instance: the induced
subgraph must be connected, and the size of the community is not too small, and not too large. For this,
we define:
Definition 2.1 (Possible community) Given a graph G = (V, E), let n = V , and S ⊂ V . We say that
S is a possible community of G, if:
(1) The induced subgraph GS of S in G is connected,
(2) S ≥ log n, i.e., the size of S is not too small, and
7
(3) S ≤ √n, that is, the size of S is not too large.
Definition 2.2 (Conductance community structure ratio of communities) Let G = (V, E) be a graph,
and n = V . Suppose that X = {X1, X2,··· , Xl} is a set of possible communities of G (overlapping
is permitted). Then,
(1) Let X = ∪jXj.
(2) For each x ∈ X, suppose that Xj1, Xj2,··· , Xjr are all the possible communities Xj ∈ X that
contain x, then define
aX (x) =
r
Xi
(1 − Φ(Xji))/r.
(3) Define the conductance community structure ratio of G by X by
θX (G) =
aX (x).
1
n · Xx∈X
By using θX (G), we define the conductance community structure ratio of a network.
Definition 2.3 (Defining θ(G)) Let G = (V, E) be a network. We define the conductance community
structure ratio of G by
θ(G) = max
X {θX (G)}.
The conductance community structure ratio (C-community structure ratio, for short) can be inter-
preted as a mathematical definition of community structures of networks.
It is a local definition of
community structures of networks.
Suppose that G = (V, E) is an expander with the following properties: for any nontrivial set S ⊂ V ,
the conductance Φ(S) > α for some large constant α. Then by definition, θ(G) < 1 − α. Therefore
8
θ(G) cannot be large for graph G with expanding property. In particular, for a nontrivial network G
constructed from the PA model, with probability 1 − o(1), θ(G) < 1 − α for some large constant α.
More importantly, the conductance community structure ratio can be defined for algorithms.
Definition 2.4 (Defining θA(G)) Let G = (V, E) be a network. Let A be a community detecting algo-
rithm. Suppose that X is the set of all possible communities of G found by algorithm A. Then define:
θA(G) = θX (G).
By using Definition 2.4, we can define a community finding problem as follows.
Definition 2.5 (Community finding problem) To design an algorithm, A say, such that for any network
G, θA(G) is maximized.
This gives rise to the algorithmic problem of searching.
3 Community Structures Are Robust
Now we have three definitions of community structure ratios of networks. Are there any relationships
among the three definitions for the quality of community structures of networks, i.e., the M-, E-, and
C-community structure ratios? Do the three definitions give the same answer to the question whether or
not a network has a community structure? We conjecture that the answer is yes. For this, we propose the
following:
Community structure hypothesis: Given a network G, the following properties are equivalent,
1) G has an M-community structure,
2) G has an E-community structure, and
3) G has a C-community structure.
9
c-ratios
e-ratios
m-ratios
1.0
0.8
0.6
0.4
0.2
s
o
i
t
a
R
e
r
u
t
c
u
r
t
S
y
t
i
n
u
m
m
o
C
0.0
0.000
0.001
0.002
p
0.003
0.004
0.005
Figure 1: This figure gives the E-, M- and C-community structure ratios (denoted by e-, m- and c-ratios
respectively) of networks, for n = 10, 000, and for p up to 0.005 of the ER model.
We verify the community structure hypothesis by computing the M-, E-, and C-community structure
ratios for networks of classical models. The first model is the ER model (10). In this model, we construct
graph as follows: Given n nodes 1, 2,··· , n, and a number p, for any pair i, j of nodes i and j, we create
an edge (i, j) with probability p. The second is the PA model (3). In this model, we construct a network
by steps as follows: At step 0, choose an initial graph G0. At step t > 0, we create a new node, v say,
and create d edges from v to nodes in Gt−1, chosen with probability proportional to the degrees of nodes
in Gt−1, where Gt−1 is the graph constructed at the end of step t − 1, and d is a natural number.
We depict the curves of the M-, E-, and C-community structure ratios of networks of the ER model
and the PA model in Figures 1 and 2 respectively.
From Figures 1 and 2, we observe that the following results hold:
(1) The curves of the M-, E-, and C-community structure ratios of networks generated from the ER
model are similar.
(2) The curves of the M-, E-, and C-community structure ratios of networks generated from the PA
model are similar.
(3) Nontrivial networks of the ER and PA models fail to have a community structure.
10
1.0
0.8
0.6
0.4
0.2
s
o
i
t
a
R
e
r
u
t
c
u
r
t
S
y
t
i
n
u
m
m
o
C
0.0
0
(G)
(G)
(G)
10
20
d
30
40
50
Figure 2: This figure gives the E-, M- and C-community structure ratios (denoted by e-, m- and c-ratios
respectively) of networks, for n = 10, 000, and for d ≤ 50 of the PA model.
(4) For a network constructed from either the ER or the PA model, if the average number of edges
d of the network is bounded by a small constant, 5 say, then the network has some community
structure.
(1) and (2) show that the community structure hypothesis holds for all networks generated from the
classic ER and PA models. We notice that every network essentially uses the mechanisms of both the
ER and the PA models. Our results here imply that the hypothesis may hold for all networks. (3) and (4)
show that neither randomness in the ER model nor preferential attachment in the PA model alone is the
mechanism of community structures of networks.
4 Community Structures Are Universal in Real Networks
By observing the experiments in Figures 1 and 2, we have that for a network G of either the ER model
or the PA model, the following three properties (1), (2) and (3) either hold simultaneously or fail to hold
simultaneously:
(1) the E-community structure ratio of G, τ (G), is greater than 0,
(2) the M-community structure ratio of G, σ(G), is greater than 0.3, and
11
(3) the C-community structure ratio of G, θ(G), is greater than 0.3.
This result suggests an empirical criterion for deciding whether or not a network has a community
structure. Let G be a network, then
1. We say that G has a community structure if the E-, M-, and C-community structure ratios of G are
greater than 0, 0.3 and 0.3 respectively.
2. The values σ(G), τ (G) and θ(G) represent the quality of community structure of G, the larger
they are, the better community structure G has.
By using the empirical criterion of community structure of networks, we are able to decide whether
or not a given network has a community structure.
We implemented the experiments of the M-, E- and C-community structure ratios for 22 real net-
works, which are given in Table 1. From the table, we have that if one of the M-, E- and C-community
structure ratios is high, then the other two ratios are high too, and that for each of the networks, the E-,
M- and C-community structure ratios are greater than 0, 0.3 and 0.3 respectively.
The experiments in Table 1 show that the community structure hypothesis holds for (each of the)
real networks, which further validates the community structure hypothesis, and that the existence of
community structure is a universal phenomenon for (almost all) real networks.
By observing the experiments in Figures 1 and 2, and Table 1, we have that the community structure
of a network is independent of which of the three definitions of community structures, i.e., the E-, M-
and C-community structures, is used. This shows that community structures are robust in networks, and
that the existence of community structures in real networks is a universal phenomenon, independent of
both definitions of community structures and algorithms for finding the communities.
By observing all the curves in Figures 1 and 2, and all experiments in Table 1 again, our conclusions
are further validated. That is:
12
network
cit hepph
cit hepth
col astroph
col condmat
col grqc
col hepph
col hepth
email enron
email euall
p2p4
p2p5
p2p6
p2p8
p2p9
p2p24
p2p25
p2p30
p2p31
roadnet ca
roadnet pa
roadnet tx
τ (G) σ(G)
0.56
0.22
0.53
0.2
0.24
0.51
0.64
0.37
0.79
0.44
0.26
0.58
0.69
0.39
0.5
0.21
0.73
0.39
0.11
0.38
0.4
0.11
0.39
0.12
0.15
0.46
0.46
0.15
0.47
0.21
0.49
0.23
0.24
0.5
0.5
0.25
0.99
0.67
0.99
0.66
0.67
0.99
θ(G)
0.37
0.36
0.49
0.76
0.89
0.7
0.83
0.63
0.76
0.36
0.36
0.38
0.46
0.42
0.48
0.5
0.53
0.52
0.98
0.98
0.98
Table 1: The entropy, modularity and conductance community structure ratios of real networks, written
by τ (G), σ(G) and θ(G) respectively.
13
(1) Community structures are robust and hence definable in networks.
(2) Community structures are universal in real networks.
(3) Neither randomness nor preferential attachment is the mechanism of community structures of net-
works.
(1) implies that community structures can be theoretically analyzed in networks, and that community
structures are objective existence in networks, instead of simply outputs of algorithms. This suggests a
fundamental issue to investigate the role of community structures of networks. (2) and (3) suggest some
fundamental questions such as: what are the mechanisms of community structures of real networks?
What roles do the community structures play in real networks?
5 Homophyly Networks and Theorems
Recall that community structures are definable in networks and universal in real networks. Real networks
are from a wide range of disciplines of both social and physical sciences. This hints that community
structures of real networks may be the result of natural mechanisms of evolutions of networking systems
in nature and society. Therefore mechanisms of community structures of real networks must be natural
mechanisms in nature and society.
In both nature and society, whenever an individual is born, it will be different from all the existing
individuals, it may have its own characteristics from the very beginning of its birth. An individual with
different characteristics may develop links to existing individuals by different mechanisms, for instance,
preferential attachment or homophyly.
We propose our homophyly model based on the above intuition. It constructs a network dynamically
by steps as follows.
Definition 5.1 (Homophyly model) Let d be a natural number, and a be a homophyly exponent. The
homophyly model constructs networks by steps.
14
(1) Let G2 be an initial graph with two nodes connected by d multi-edges. Each node is associated
with a distinct color and called seed.
For i + 1 > d, let Gi be the graph constructed at the end of step i. Let pi = 1
loga i .
(2) Create a new node v.
(3) With probability pi, v chooses a new color, in which case, we say that v is a seed node, and create
d edges (v, uj ) for j = 1, 2,··· , d such that each uj is chosen with probability proportional to the
degrees of nodes in Gi.
(4) Otherwise, v chooses an old color, in which case:
(a) v chooses randomly and uniformly an old color as its own color, and
(b) create d edges (v, uj) for j = 1, 2,··· , d such that each uj is chosen with probability pro-
portional to the degrees of nodes among all the nodes sharing the same color with v.
The homophyly model constructs networks dynamically with both homophyly and preferential at-
tachment as its mechanisms. It better reflects the evolution of networking systems in nature and society.
We call the networks constructed from the homophyly model homophyly networks.
We will show that homophyly networks satisfy a series of new principles, including the well known
small world and power law properties. At first, it is easy to see that the homophyly networks have the
small diameter property, which basically follows from the classic PA model. Secondly, the networks
follow a power law, for which we see Figure 3 for the intuition. At last, they have a nice community
structure, for which we depict the entropy-, conductance-community structure ratios, and the modularity-
(18) of some homophyly networks in Figure 4. From Figure 4, we know that the entropy-, modularity-
and conductance-community structure ratios of the homophyly networks are greater than 0.5, 0.9 and 0.9
respectively. Therefore the homophyly networks have a community structure by our criterion in Section
4.
15
104
103
102
101
s
e
d
o
n
_
f
o
_
r
e
b
m
u
n
100
100
101
102
degree
103
Figure 3: Power law distribution of a homophyly network: n = 10, 000, a = 1.2 and d = 5.
We notice that the homophyly model is dynamic with homophyly and preferential attachment as its
mechanisms. The initial graph G2 could be any finite colored graph, which does not change the statistic
characteristics of the model. We use H(n, a, d) to denote the set of networks constructed from the
homophyly model with average number of edges d and homophyly exponent a. We call a set of nodes of
the same color, κ say, a homochromatic set, written by Sκ. We say that a homochromatic set is created
at time step t, if the seed node of the set is created at time step t.
Here we verify that homophyly networks satisfy a number of new topological, probabilistic and com-
binatorial principles, including the fundamental principle, the community structure principle, the degree
priority principle, the widths principle, the inclusion and infection principle, the king node principle and
the predicting principle below.
At first, we have a fundamental theorem.
Theorem 5.1 (Homophyly theorem) Let a > 1 be the homophyly exponent, and d ≥ 4 be a natural
number. Let G = (V, E) be a network constructed by H(n, a, d).
Then with probability 1 − o(1), the following properties hold:
(1) (Basic properties):
16
1.0
0.9
0.8
0.7
0.6
s
o
i
t
a
R
e
r
u
t
c
u
r
t
S
y
t
i
n
u
m
m
o
C
(G)
(G)
(G)
0.5
0
5
10
d
15
20
Figure 4: The E-, M- and C-community structure ratios (denoted by e-, m- and c-ratios respectively) of
a homophyly network for n = 10, 000 and a = 1.2.
(i) (Number of seed nodes is large) The number of seed nodes is bounded in the interval [
n
2 loga n ,
2n
loga n ].
(ii) (Communities whose vertices are interpretable by common features are small) Each ho-
mochromatic set has a size bounded by O(loga+1 n).
(2) For degree distributions, we have:
(i) (Internal centrality) The degrees of the induced subgraph of a homochromatic set follow a
power law.
(ii) The degrees of nodes of a homochromatic set follow a power law.
(iii) (Power law) Degrees of nodes in V follow a power law.
(iv) (Holographic law) The power exponents in (i) - (iii) above are all the same.
(3) For node-to-node distances, we have:
(i) (Local communication law) The induced subgraph of a homochromatic set has a diameter
bounded by O(log log n).
(ii) (Small world phenomenon) The average node to node distance of G is bounded by O(log2 n).
17
(1)(i) gives an estimation on the number of communities. (1)(ii) shows that the induced subgraph
of a homochromatic set is a community in which all the nodes share common features, the same color
here, and that a community interpretable by common features is small. (2)(i)-(2)(iv) show that power
law is holographic in networks of the homophyly model, and that a community has an internal centrality
in the sense that it has a small set dominating the community. This predicts that the holographic property
may hold for many real networks, and that natural communities of a real network may have the internal
centrality. (3) shows that G have the small world property, that communications within a community
have length bounded by O(log log n), and that the local influence of a node is within O(log log n) steps
in the network. The later property can be used to define some locally collective notions of networks.
These observations lead to new issues of networks which will be further discussed in Section 12.
Secondly, we have the following:
Theorem 5.2 (Community structure theorem) For a > 1 and d ≥ 4, let G be a network constructed
from the homophyly model. Then with probability 1 − o(1), the following properties hold:
(1) (Small community phenomenon) There are 1 − o(1) fraction of nodes of G each of which belongs
to a homochromatic set, W say, such that the size of W is bounded by O(loga+1 n), and that the
conductance of W , Φ(W ), is bounded by O(cid:16) 1
W β(cid:17) for β = a−1
4(a+1) .
(2) (Conductance community structure theorem) The conductance community structure ratio of G is
at least 1 − o(1), that is, θ(G) = 1 − o(1).
(3) (Modularity community structure theorem ) The modularity of G is 1 − o(1), that is, σ(G) =
1 − o(1).
(4) (Entropy community structure theorem) The entropy community structure ratio of G is 1 − o(1),
that is, τ (G) = 1 − o(1).
18
(1) means that a set of nodes X forms a natural community if the nodes in the set share the same
color, that the conductance of a community X is bounded by a number proportional to X−β for some
(2) - (4) show that the definitions
constant β, and that communities of a network are interpretable.
of modularity-, entropy- and conductance- community structure are equivalent in defining community
structures in networks, and that community structures are provably definable in networks. The essence
of this theorem is that community structures are definable in networks, and that communities of a net-
work are interpretable, giving rise to a mathematical understanding of both community structures and
communities.
The fundamental and community structure principles explore some basic laws governing both the
local and global structures of a network. However, to understand the roles of community structures in
networks, we need to know the properties which hold for all the communities of a network. We will see
that homophyly networks do satisfy a number of such principles.
Our third principle consists of a number of properties of degrees of the networks. Given a node
v ∈ V , we define the length of degrees of v to be the number of colors associated with all the neighbors
of v, written by l(v). For j ≤ l(v), we define the j-th degree of v to be the j-th largest number of edges
of the form (v, u)'s such that the u's here share the same color, denoted by dj(v). Define the degree of
v, d(v), to be the number of edges incident to node v.
In a sharp contrast to classic graph theory, for a network constructed from our homophyly model, G
say, and a vertex v of G, v has a priority of degrees. This new feature must be universal in real networks
in the following sense: A community is an interpretable object in a network such that nodes of the same
community share common features. In this case, a vertex v may have its own community and may link
to some neighbor communities by some priority ordering. In our model, a node v more likes to contact
with nodes sharing the same color (or feature) with it, and has no much preferences in contacting with
nodes in its neighbor communities.
For the degree priority, we have:
19
Theorem 5.3 (Degree priority theorem) Let G = (V, E) be a homophyly network. Then with probability
1 − o(1), the degree priority of nodes in V satisfies the following properties:
(1) (First degree property) The first degree of v, d1(v) is the number of edges from v to nodes of the
same color as v.
(2) (Second degree property) The second degree of v is bounded by a constant, i.e., d2(v) ≤ O(1)
(3) (The length of degrees)
(a) The length of degrees of v is bounded by O(log n).
(b) Let N be the number of seed nodes in G. For r = N
logc N for some constant c. Let x be a
node created after time step r. Then the length of degrees of x is bounded by O(log log n).
(4) If v is a seed node, then the first degree of v, d1(v) is at least Ω(log
a+1
4 n).
Theorem 5.3 shows that the highest priority of a node is to link nodes of its own community, that the
links of a node to nodes outside of its own community are evenly distributed among a few communities,
that for almost all nodes x, x links to nodes of at most O(log log n) many communities, and that for
almost all seed nodes x, x has at least Ω(log
a+1
4 n) many edges linking to nodes of its own community.
These properties intuitively capture the patterns of links among different communities. Clearly, both
lower and upper bounds of the length of degrees, of first and second degrees of nodes are essential to the
roles of community structures of networks. For homophyly networks, we have Theorem 5.3. In some
applications, we may need some lower bounds of the length of degrees of seeds or hubs. Anyway, the
notion of degree priority provides new insight on understanding the properties and roles of community
structures of networks.
Our fourth principle determines the ways of connections from a community to outside of the com-
munity. Let X be a homochromatic set of G. Define the width of X in G to be the number of nodes x's
such that x ∈ X and l(x) > 1. We use wG(X) to denote the width of X in G.
20
Then we have:
Theorem 5.4 ( Widths Principle): Let G = (V, E) be a homophyly network. Then with probability
1 − o(1), the following properties hold:
(1) For a randomly chosen X, the width of X in G is wG(X) = O(log n).
Let N be the number of seed nodes in G. For l = N 1−θ and r = N
logc N for some constants θ and
c. We say that a community is created at time step t, if the seed node of the community is created
at time step t.
(2) Let X be a community created before time step l. Then the width of X in G is at least Ω(log n).
(3) Let Y be a community created before time step r. Then the width of Y in G is at least Ω(log log n)
(4) Let Z be a community created after time step r. Then the width of Z in G is at most O(log log n).
The width of a community X determines the patterns of links from nodes in the community to
nodes outside of the community. By (4), we have that almost all communities have widths bounded by
O(log log n). This property, together with the holographic law in the fundamental principle show that
almost surely, a community has both an internal and an external centrality. This helps us to analyze the
communications among different communities.
Our fifth principle is an inclusion and infection among the nodes of a homophyly network. Given
a node x of some community X. We define the width of x in G, denoted by wG(x), is the number of
communities Y 's such that X 6= Y and such that there is a non-seed node y ∈ Y with which there is an
edge between x and y. Then we have:
Theorem 5.5 ( Inclusion and infection principle): Let G = (V, E) be a homophyly network. Then the
following properties hold:
21
(1) (Inclusion property) For a non-seed node x in G, the width of x in G is wG(x) = 0.
(2) (Widths of seed nodes) For every seed node x in G, the width of x is bounded by O(1).
Intuitively speaking, non-seed nodes of a network are vulnerable against attacks. In the cascading
failure model of attacks, it is possible that a few number of attacks may generate a global failure of the
network. For this, one of the reasons is that the huge number of vulnerable nodes form a giant connected
component of the network, in which the attack of a few vulnerable nodes may infect the giant connected
component of the vulnerable nodes. (1) ensures that this is not going to happen in homophyly networks.
We interpret seed nodes as strong against attacks. Let x be a seed node. If wG(x) > 1, then it is possible
for x to infect two vulnerable nodes, y1 and y2 say, of two different communities Y1 and Y2 respectively.
In this case, it is easy for y1 and y2 to infect the seed nodes of Y1 and Y2 respectively. By this way, the
infections of communities intrigued by the seed node x may grow exponentially in a tree of communities.
(2) ensures that for each seed node x of G, wG(x) = O(1), which is probably larger than 1. By this
reason, we know that homophyly networks are insecure against attacks in the cascading failure models.
This suggests that to make a network G secure, we have to make sure that for each hub, x say, the width
of x in G is at most 1. In fact, by using this principle, we have proposed a protocol of provable security
of networks (15).
Our sixth principle is the remarkable role of seed nodes in the corresponding communities and in the
whole network. We have:
Theorem 5.6 ( King node principle): Let G = (V, E) be a homophyly network. Then with probability
1 − o(1), for a community X and its seed node x0, the expectation of the degree of x0 is at least twice of
that of the second largest degree node x ∈ X.
This principle ensures that there is a significant fraction of communities, each of which contains a
king node whose degree is at least twice of that of the second largest degree node within the community.
This is a phenomenon similar to that in a community of honey bees.
It implies that in evolutionary
22
prisoner's dilemma games in a network, the strategies of nodes within a community could follow that of
the king node, similarly to the behaviors of a community of honey bees in nature. By using this idea, we
are able to develop a theory to solve the prisoner's dilemma in power law networks (14).
The six principles above explore the mathematical properties of the homophyly networks. They show
that the community structures and properties of the communities do play essential roles in fundamental
issues and applications of networks.
Our model demonstrates that dynamic and scale-free networks may have a community structure for
which homophyly and preferential attachment are the underlying mechanisms. This explains the reason
why most real networks have community structures and simultaneously follow a power law and have a
small world property.
6 Fundamental Theorem
In this section, we prove Theorem 5.1.
We use H(n, a, d) to denote the set of all networks of n nodes constructed by the homophyly model
with homophyly exponent a, and average number of edges d.
Given a network G = (V, E) of the homophyly model, then every node v ∈ V is associated with a
color. The vertices V is partitioned naturally by the homochromatic sets of V . For an edge e = (u, v),
we call e a local edge, if the two endpoints u, v share the same color, and global edge, otherwise.
A homochromatic set, X say, of V is expected to be a natural community of G. Then every commu-
nity contains a seed node, which is the first node of the community.
Proof 1 (Proof of Theorem 5.1) At first, we state a Chernoff bound which will be used frequently in our
proofs.
Lemma 6.1 (Chernoff bound, (6)) Let X1, . . . , Xn be independent random variables with Pr[Xi = 1] =
pi and Pr[Xi = 0] = 1 − pi. Denote the sum by X =
Xi with expectation E(X) =
n
Pi=1
pi. Then we
n
Pi=1
23
have
Pr[X ≤ E(X) − λ] ≤ exp(cid:18)−
λ2
2E(X)(cid:19) ,
Pr[X ≥ E(X) + λ] ≤ exp(cid:18)−
λ2
2(E(X) + λ/3)(cid:19) .
Let G be a homophyly network. We use Gt to denote the graph obtained at the end of time step t of
the construction of G, and Ct to denote the set of seed nodes of Gt.
Let T1 = loga+1 n.
For (1)(i). It suffices to show that the size of Ct is bounded as desired.
Lemma 6.2 (Number of seeds lemma) With probability 1 − o(1), for all t ≥ T1,
t
2 loga t ≤ Ct ≤ 2t
loga t.
By the construction of G, the expectation of Ct is
Xi=3
E[Ct] = 2 +
t
1
loga i
.
By indefinite integral
1
loga x −
Z (
a
loga+1 x
)dx =
x
loga x
+ C,
we know that if t is large enough, then
t
Xi=3
1
loga i ≤ 1 +Z t
2
1
loga x
dx
(
1
loga x −
a
loga+1 x
)dx
6
5
4t
≤ Z t
≤
2
,
3 loga t
where 6
5 and 4
3 are chosen arbitrarily among the numbers larger than 1. Similarly,
t
Xi=3
2
1
loga i ≥ Z t
≥ Z t
≥
2
1
loga x
dx
1
(
loga x −
3t
.
4 loga t
24
a
loga+1 x
)dx
By the Chernoff bound, with probability 1 − exp(−Ω(
t
loga t )) = 1 − o(n−1), we have
t
2 loga t ≤
Ct ≤ 2t
loga t . By the union bound, such an inequality holds for all t ≥ T1 with probability 1 − o(1).
(1)(i) follows from Lemma 6.2 immediately.
Now we define an event E:
Ct is bounded in the intervalh
By Lemma 6.2, E almost surely holds for all t ≥ T1.
loga ti.
2 loga t ,
t
2t
For (1)(ii). We prove the following:
Lemma 6.3 (Size of community lemma) For every T ≥ T1, with probability 1 − o(1), every homochro-
matic set in GT has size bounded by O(loga+1 T ).
It suffices to show that with probability 1 − o(T −1), the homochromatic set of the first color κ has
size O(loga+1 T ).
We define an indicator random variable Yt for the event that the new node created at time step t
chooses color κ. We define independent Bernoulli trails {Zt} satisfying
Pr[Zt = 1] =(cid:18)1 −
1
loga T(cid:19) 2 loga t
t
.
So conditioned on the event E (which happens with extremely high probability), Y := PT
stochastically dominated by Z :=PT
t=1 Zt, which has an expectation
t=1 Yt is
By the Chernoff bound,
E[Z] ≤
2 loga t
t
T
Xt=1
≤ 2 loga+1 T.
Pr[Z > 4 loga+1 T ] ≤ T −1.
Therefore, with probability 1 − T −1, the size of Xκ, the community of color κ, is Y ≤ 4 loga+1 T .
The lemma follows.
25
(1)(ii) follows from Lemma 6.3 by choosing T = n.
Before proving (2) of Theorem 5.1, we establish both a lower and an upper bound of sizes of commu-
nities.
Set T2 = (1 − δ1)n, where δ1 = 10
By using a similar analysis to that in the proof of Lemma 6.3, we have:
loga−1 n
.
Lemma 6.4 (Lower and upper bounds of sizes of communities) With probability 1 − o(1), both (1) and
(2) below hold:
(1) For a homochromatic set created at a time step ≤ T2, it has size at least log n;
(2) For a homochromatic set created at a time step > T2, it has size at most 30 log n.
Then we turn to the proof of the power law degree distributions in G, i.e., (2) of Theorem 5.1.
We prove the following two items together, which proves (2)(i) and (2)(ii) of Theorem 5.1, respectively.
(A) For each homochromatic set X, the degree distribution of induced subgraph GX follows a power
law, and
(B) For each homochromatic set X, the degrees of nodes in X follow a power law.
(2)(iii) of Theorem 5.1 follows immediately from (B) by observing that the join of several power law
distributions with the same power exponent is also a power law distribution.
(2)(iv) follows from the proofs of (i) - (iii).
The idea of the proofs of (A) and (B) is to verify that the contribution of degrees of a community
from global edges is negligible, compared with those from its local edges. This is intuitively true, since
the construction of a community basically follows the classic preferential attachment scheme, and the
number of global edges created by seed nodes is negligible. We will realize this idea gradually in the
proofs below.
26
Let X denote a homochromatic set of a fixed color, κ say. Let T0 be the time step at which X is
created. Suppose that the size of X goes to infinity as n → ∞. In fact, by Lemma 6.4, this holds for
all the homochromatic sets created before time T2. For positive integers s and k, define As,k to be the
number of nodes of degree k in X when X reaches s, Bs,k to be the number of nodes of degree k in the
induced subgraph of X when X reaches s, and gs,k to be the number of global edges associated with the
nodes in X of degree k in the induced subgraph of X when X reaches s. Obviously, As,k = Bs,k +gs,k,
A1,d = 1, A1,k = 0 for all k > d, and B1,k = 0 for all k. Then we establish the recurrence formula for
the expectation of both As,k and Bs,k.
Define T (s) (or T , for simplicity) to be the time step at which the size of X becomes to be s, and
s1 to be the number of global edges connecting to X in the case that X = s (note that probably at
several consecutive time steps, X keeps s). We consider the time interval (T (s − 1), T (s)). Since
T (s) − T (s − 1) = Θ(CT) = Θ(T / loga T ), the number of times that a global edge is created and
linked to a node in X of degree k at some time step in the interval (T (s − 1), T (s)) is expected to be
Θ(
). Denote Θ(log2a T ) by s2.
T
1
loga T · dk·As,k
For s > 1 and k > d, we have
loga T ) = Θ( k·As,k
log2a T
2dT
·
E(As,k) = As−1,k(cid:18)1 −
kd
2d(s − 1) + s1 −
k
s2(cid:19) + As−1,k−1 ·(cid:18) (k − 1)d
2d(s − 1) + s1
+
s2 (cid:19) + O(cid:18) 1
s2(cid:19) ,
k − 1
where the error terms caused by the case that more than one edge joins to a single node are absorbed in
the O(1/s2) term. Taking expectations on both sides, we have
E(As,k) = E(As−1,k)(cid:18)1 −(cid:18)
+E(As−1,k−1)(cid:18)
2(s − 1) + s1/d −
2(s − 1) + s1/d
+
1
1
1
s2(cid:19) k(cid:19)
s2(cid:19) .
s2(cid:19) (k − 1) + O(cid:18) 1
1
When k = d,
E(As,d) = E(As−1,d)(cid:18)1 −(cid:18)
1
2(s − 1) + s1/d −
1
s2(cid:19) d(cid:19) + 1 + O(cid:18) 1
s2(cid:19) .
27
(4)
(5)
Similarly, for s > 1 and k > d,
E(Bs,k) = Bs−1,k −
d · (kBs−1,k + gs−1,k)
2d(s − 1) + s1
+
d · ((k − 1)Bs−1,k−1 + gs−1,k−1)
2d(s − 1) + s1
+ O(
1
s2 ).
Taking expectations on both sides, we have
E(Bs,k) = E(Bs−1,k)(cid:18)1 −
kd
2d(s − 1) + s1(cid:19) + E(Bs−1,k−1) ·
(k − 1)d
2d(s − 1) + s1
+
When k = d,
E(gs−1,k−1 − gs−1,k)
2d(s − 1) + s1
+ O(
1
s2 ).
E(Bs,d) = Bs−1,d −
= Bs−1,d(cid:18)1 −
+ 1 + O(
d · (dBs−1,d + gs−1,d)
2d(s − 1) + s1
2(s − 1) + s1/d(cid:19) +(cid:18)1 −
d
1
s2 )
2d(s − 1) + s1(cid:19) ,
gs−1,d
(6)
(7)
and
E(Bs,d) = E(Bs−1,d)(cid:18)1 −
d
2(s − 1) + s1/d(cid:19) +(cid:18)1 −
E(gs−1,d)
2d(s − 1) + s1(cid:19) .
To solve these recurrences, we introduce the following lemma that is used in the canonical proof of
the preferential attachment model.
Lemma 6.5 ( (7), Lemma 3.1) Suppose that a sequence {as} satisfies the recurrence relation
as+1 = (1 −
bs
s + s1
)as + cs for s ≥ s0,
where the sequences {bs},{cs} satisfy lims→∞ bs = b > 0 and lims→∞ cs = c respectively. Then the
limit of as
s exists and
lim
s→∞
as
s
=
c
1 + b
.
For the recurrence of E(As,k), we have to deal with s1 and s2. Note that s2 = Θ(log2a T ) = ω(s).
For s1, we give an upper bound for the expected volume of X at time T , denoted by VT , as follows.
E(VT ) =
T
1
Xi=2(cid:20)(cid:18)1 −
= O T
Xi=2
loga i(cid:19) ·
2d
Ci
Ci! = O T
Xi=2
2d
28
1
+
loga i ·
4d loga i
i
dVi−1
2di (cid:21)
! = O(loga+1 T ).
1
O(cid:16)
mochromatic sets have size at most O(loga+1 T ). So it is easy to observe that s1
In fact, by using an analysis of martingale, we are able to show that, almost surely, almost all ho-
2dT / loga T
loga−1 T(cid:17) goes to zero as n, and in turn s, approach to infinity. For the recurrence of E(Bs,k), we
approach to 0. Define gs =Pi gs,i
s ) → 0 as
show that as s goes to infinity, both E(gs−1,k−1−gs−1,k)
to be the total number of global edges associated to X when X reaches s. We show that E( gs
s → ∞.
t = O(cid:16) 1
and E(gs−1,d)
2d(s−1)+s1
loga T · VT
2d(s−1)+s1
T (cid:17) =
Note that X is created at time T0.
E(gs) = O
T (s)
Xi=T0
1
loga i ·
T (s)
dVi
= O
2di
Xi=T0
log i
2i
= O(log2 T (s) − log2 T0).
We consider the size of X at some time step t > T0.
E(X) =
t
Xi=T0(cid:18)1 −
= Ω(cid:18)Z t
T0
t
1
loga i
= Ω
Xi=T0
2i
loga i(cid:19) 1
Ci
dx(cid:19) = Ω(loga+1 t − loga+1 T0).
2x
loga x
Thus at time T (s), by the Chernoff bound, with probability 1 − o(1), s = Ω(loga+1 T (s) − loga+1 T0).
Therefore, E(gs) = o(s), that is, E( gs
s ) → 0 as s → ∞.
Then we turn to solve the recurrences of E(As,k) and E(Bs,k). Now the terms s1/d and 1
s2
in
equalities (4) and (5) are comparatively negligible, and so do the terms E(gs−1,k−1−gs−1,k)
2d(s−1)+s1
and E(gs−1,d)
2d(s−1)+s1
in equalities (6) and (7). By Lemma 6.5, E(As,k)
s
and E(Bs,k)
s
must have the same limit as t goes to infinity.
Thus we will only give the proof of the power law distribution for E(As,k), which also holds for E(Bs,k).
Denote by Sk = limt→∞
E(As,k)
s
for k ≥ d. In the case of k = d, we apply Lemma 6.5 with bs = d/2,
cs = 1 + O(1/s), s1 = −1, and get
Sd = lim
s→∞
E(As,d)
t
=
1
1 + d
2
=
2
2 + d
.
For k > d, assume that we already have Sk−1 = limt→∞
E(As,k−1)
t
. Applying Lemma 6.5 again with
29
bs = k/2, cs = E(As−1,k−1)
s−1
· k−1
2 , s1 = −1, we get
Sk = lim
t→∞
E(As,k)
s
=
Thus recurrently, we have
Sk−1 · k−1
2
1 + k
2
= Sk−1 ·
k − 1
k + 2
.
Sk = Sd ·
(d + 2)!(k − 1)!
(d − 1)!(k + 2)!
=
2d(d + 1)
k(k + 1)(k + 2)
.
(8)
This implies
and thus
E(As,k) − Sk · s = o(s),
E(As,k) = (1 + o(1))k−3s.
Since s = ω(1) goes to infinity as n → ∞, E(As,k) ∝ k−3. For the same reason, E(Bs,k) ∝ k−3. This
proves (A) and (B), and also completes the proof of (2)(i) and (2)(ii).
For (2)(iii), a key observation is that the union of several power law distributions is also a power law
distribution if the power exponents are equal. We will give the same explicit expression of the expectation
of the number of degree k nodes by combining those for the homochromatic sets, leading to a similar
power law distribution.
To prove the power law degree distribution of the whole graph, we take the union of distributions of
all homochromatic sets. We will show that with overwhelming probability, almost all nodes belong to
some large homochromatic sets so that the role of small homochromatic sets is unimportant.
Suppose that Gn has m homochromatic sets of size at least log n. For i = 1, . . . , m, let Mi be the
size of the i-th homochromatic set and N (i)
s,k denote the number of nodes of degree k when the i-th set has
size s. For each i, we have
Hence,
E(N (i)
Mi,k)
Mi
lim
n→∞
= Sk.
lim
n→∞
Mi,k)
i=1 N (i)
i=1 Mi
E(Pm
Pm
30
= Sk.
Let M0 denote the size of the union of all other homochromatic sets of size less than log n, and N (0)
s,k
denote the number of nodes of degree k in this union when it has size s. By Lemma 6.4, with probability
1 − o(1), all these sets are created after time T2, and thus M0 ≤ n − T2 = 10n
loga−1 n
= o(n).
Define Nt,k to be the number of nodes of degree k in Gt, that is, the graph obtained after time step t.
Then we have
For M0, we have that
and
lim
n→∞
E(Nn,k)
n
= lim
n→∞
Mi,k)
i=0 N (i)
i=0 Mi
E(Pm
Pm
.
lim
n→∞
M0
i=1 Mi
Pm
= lim
n→∞
M0
n − M0
= 0
E(N (0)
M0,k)
n
lim
n→∞
≤ lim
n→∞
M0
n
= 0
hold with probability 1 − o(1). So
lim
n→∞
E(Nn,k)
n
= lim
n→∞
This implies
and thus,
Mi,k)
i=1 N (i)
i=1 Mi
E(Pm
Pm
= Sk.
E(Nn,k) − Sk · n = o(n),
E(Nn,k) = (1 + o(1))k−3n,
and E(Nn,k) ∝ k−3. (2)(iii) follows.
(2)(iv) is clear from the proofs of (2)(i) - (2)(iii).
This completes the proof of Theorem 5.1(2).
Then we turn to the proof of the third part of Theorem 5.1.
For (3)(i), we will use the well-known result on the diameter of a graph from the PA model to bound
the diameter of each homochromatic set. Bollob´as and Riordan (4) have shown that a randomly con-
structed graph of size n from the PA model has a diameter O(log n) with probability 1 − O(
1
log2 n
). By
31
Lemma 6.3, we know that the sizes of all homochromatic sets are bounded by O(loga+1 n). Thus the
induced subgraph of a homochromatic set has diameter O(log log n). (3)(i) follows.
For (3)(ii), to consider the average node to node distance of the whole graph G, we first clarify the
hierarchical structure of G as follows. The first level of G is obtained by shrinking the nodes of the same
color in G to a single node while maintaining the global edges. Denote the first-level graph by G′. The
second level of G is the graph obtained from G by simply deleting all the global edges from G, which
consists of the isolated homochromatic sets.
We define a path Pu,v connecting two nodes u, v as follows. If u and v share the same color, then
Pu,v is the shortest path between u and v in the corresponding homochromatic set. Otherwise, choose
the shortest path from u to the seed node su in the same homochromatic set and pick among the d global
edges born with su the one which connects to the earliest created node, say u′. These two parts compose
a path Pu,u′ from u to u′. Do the same to v and also find a path Pv,v′. Recursively, we define the path
Pu′,v′, and Pu,v consists of Pu,u′, Pu′,v′ and Pv,v′.
Note that Pu,v consists of paths from the two levels of G alternately, that is, Pu,v consists of blocks
of local edges and global edges alternately. Next, we consider the paths in the two levels and show that
the average node to node path Pu,v has length at most O(log2 n) with high probability.
To estimate the number of edges in Pu,v from G′, i.e., the first-level graph of G, we recall a known
conclusion on random recursive trees. A random recursive tree is constructed by stages. At each stage,
a new vertex is created and linked to an earlier node uniformly and randomly. In this case, we call it a
uniform recursive tree (16). We use a result of Pittel in (20), saying that the height of a uniform recursive
tree of size n is O(log n) with high probability.
Lemma 6.6 (Recursive tree lemma) ( (20)) With probability 1 − o(1), the height of a uniform recursive
tree of size n is asymptotic to e log n, where e is the natural logarithm.
Consider G′ as a union of d recursive trees. Note that the earlier created homochromatic sets in G
32
have larger expected volumes than the later created ones. So with higher probability than the uniform
recursive tree, the height of a recursive tree in G′ is asymptotic to e log Cn, where Cn is the number of
colors in G and is also the number of nodes in G′. This means that with probability 1− o(1), the number
of global edges in Pu,v is at most 2e log Cn = O(log n).
To estimate the diameters of the homochromatic sets in the second-level graph of G, we adjust the
parameters in the proof of the diameter of the PA model in (4) to get a weaker bound on diameters, but a
tighter bound on probability. In so doing, we have the following lemma.
Lemma 6.7 (Diameter of PA networks) For any constant a′ > 2, there is a constant K such that with
probability 1 − 1
Kn1/(a′+1).
na′+1 , a randomly constructed graph G from the PA model P(n, d) has a diameter
The proof for this is a standard argument as that in the proof of the small diameter property of
networks of the PA model.
Choose a′ in Lemma 6.7 to be the homophyly exponent a, and then we have a corresponding K from
Lemma 6.7. Given a homochromatic set S, we say that S is bad, if the diameter of S is larger than
KS1/(a+1). We define an indicator XS of the event that S is bad. Since log n ≤ S = O(loga+1 n),
by Lemma 6.7, for a randomly chosen S,
Pr[XS = 1] ≤
1
loga+1 n
.
By Lemma 6.2, the expected number of bad sets is at most
2n
loga n ·
1
loga+1 n
=
2n
log2a+1 n
. By the Chernoff
bound, with probability 1 − O(n−2), the number of bad sets is at most
of nodes belonging to some bad set is O(cid:16) n
its diameter is at most KS1/(a+1) = O(log n).
loga n(cid:17). On the other hand, for any large set S that is not bad,
3n
log2a+1 n
. Thus the total number
To estimate the average node-to-node distance of G, we consider the length of Pu,v for uniformly
and randomly chosen u and v. If neither u nor v is in a bad homochromatic set, then the length of Pu,v
33
is O(log n). Otherwise, its length is O(loga+1 n· log n) = O(loga+2 n). Thus, the average node to node
distance in G is bounded by
n2
loga n · loga+2 n + n2 · log n
n2
O(
) = O(log2 n).
(3)(ii) follows.
This completes the proof of Theorem 5.1.
7 Community Structure Principle
In this section, we prove Theorem 5.2.
We will show that the homochromatic sets appearing not too early and too late are good communities
with high probability. Then the theorem follows from the fact that the total size of the remaining part of
nodes takes up only o(1) fraction of nodes in G.
Set T3 =
n
loga+2 n
, T4 =(cid:16)1 −
1
log(a−1)/2 n(cid:17) n.
Proof 2 (Prof of Theorem 5.2)
For (1). We focus on the homochromatic sets created in time interval [T3, T4]. Given a homochro-
matic set S, we use tS to denote the time at which S is created. Suppose that S is a homochromatic set
with tS ∈ [T3, T4], and s is the seed node of S. For t ≥ tS, define S[t] to be the snapshot of S at time
step t, and ∂(S)[t] to be the set of edges from S[t] to S[t], the complement of S[t]. In our proof, we first
make an estimation on the total degrees of nodes in S[t] at any given time t > tS, and then show that the
global edges connecting to S is not too many.
For each t ≥ tS, we use D(S)[t] to denote the total degree of nodes in S[t] at the end of time step t.
We have the following lemma.
Lemma 7.1 (Degree of communities lemma) For any homochromatic set S created at time tS ≥ T3,
D(S)[n] = O(loga+1 n) holds with probability 1 − o(1).
34
We only have to show that for any t ≥ T3, if S is a homochromatic set created at time step t, then
Dn(S)[n] = O(loga+1 n) holds with probability 1− o(n−1). We assume the worst case that S is created
at time step tS = T3. The recurrence on D(S)[t] can be written as
E[D(S)[t] D(S)[t − 1]] = D(S)[t − 1] +
loga t(cid:19) ·
We suppose again the event E that for all t ≥ T1 = loga+1 n,
+(cid:18)1 −
1
1
· d
D(S)[t − 1]
2d(t − 1)
.
loga t ·
2d
Ct−1
2 loga t ≤ Ct ≤ 2t
t
loga t, which almost
surely happens by Lemma 6.2. It holds also for t ≥ T3. On this condition,
1
E[D(S)[t] D(S)[t − 1],E] ≤ D(S)[t − 1](cid:20)1 +
2(t − 1) loga t(cid:21) +
4d loga t
t
.
(9)
To deal with this recurrence, we use the submartingale concentration inequality (see (7), Chapter 2,
for information on martingales) to show that D(S)[t] is small with high probability.
Since
10d loga+1(t + 1) − 10d(cid:18)1 +
1
2(t − 1) loga t(cid:19) · loga+1 t
10d log t
2(t − 1)
≥ 10d loga t(cid:18)log
≥
t + 1 −
10d loga t
t + 1
t (cid:19) −
10d loga t
2(t − 1)
4d loga t
t
,
≥
applying it to Inequality (9), we have
E[D(S)[t] D(S)[t − 1],E] − 10d loga+1(t + 1)
≤ (cid:18)1 +
For t ≥ T3, define θt = Πt
1
2(t − 1) loga t(cid:19) · (D(S)[t − 1] − 10d loga+1 t).
i=T3+1(cid:16)1 +
1
2(i−1) loga i(cid:17) and X[t] = D(S)[t]−10d loga+1(t+1)
θt
. Then
E[X[t] X[t − 1],E] ≤ X[t − 1].
35
Note that
X[t] − E[X[t] X[t − 1],E] =
D(S)[t] − E[D(S)[t] D(S)[t − 1], E]
θt
≤ 2d.
Since
we have
D(S)[t] − D(S)[t − 1] ≤ 2d,
Var[X[t] X[t − 1],E] = E[(X[t] − E(X[t]X[t − 1],E))2]
E[(D(S)[t] − E(D(S)[t] D(S)[t − 1],E))2]
E[(D(S)[t] − D(S)[t − 1])2D(S)[t − 1],E]
E[D(S)[t] − D(S)[t − 1] D(S)[t − 1],E]
t (cid:20) 4d loga t
=
≤
≤
≤
=
≤
≤
1
θ2
t
1
θ2
t
2d
θ2
t
2d
θ2
t
8d2 loga t
tθ2
t
8d2 loga t
tθ2
t
10d2 loga t
tθ2
t
+
+
d
+
2(t − 1) loga t(cid:21)
D(S)[t − 1]
(t − 1)θt loga t ·
10d2 loga+1 t
t loga t
(t − 1)θ2
dX[t − 1]
+
(t − 1)θt loga t
+
.
D(S)[t − 1]
θt
dX[t − 1]
(t − 1)θt loga t
Note that θt can be bounded as
θt ∼ ePt
i=T3+1
1
2(i−1) loga i ∈ [(
t
T3
)
1
2 loga n , (
1
2 loga T3 ].
t
T3
)
Then
t
Xi=T3+1
and
10d2 loga i
iθ2
i
≤ 10d2 loga nZ t
T3
1
x ·(cid:18) T3
x (cid:19)
1
loga n
dx ≤ 10d2 loga n · log n = 10d2 loga+1 n,
t
Xi=T3+1
1
(i − 1)θi loga i ≤
2
loga T3 Z t
T3
36
1
2 log n
T
3
x · x
1
2 log n
dx ≤
2 log n
loga T3
.
Here we can safely assume that X[t] is non-negative, which means that D(S)[t] ≥ 10 loga+1(t + 1),
because otherwise, the conclusion follows immediately. Let λ = 20 loga+1 n. By the submartingale
inequality ( (7), Theorem 2.40),
Pr[X[t] = ω(loga+1 n)] ≤ Pr[X[t] ≥ X[T3] + λ]
λ2
≤ exp(−
2(10d2 loga+1 n + (2 log n/ loga T3)λ + dλ/3)
) + O(n−2) = O(n−2).
This implies that D(S)[n] = O(loga+1 n) holds with probability 1 − O(n−2).
Suppose that T3 ≤ tS < T4. We consider the edges from seed nodes created after time step tS
to nodes in S. By a similar proof to that in Lemma 6.4 (1), we are able to show that, with probability
a+1
a+1
2 n), and so a volume Ω(log
1− o(1), S = S[n] has a size Ω(log
by F, that for any t ≥ TS, D(S)[t] = O(loga+1 n), which holds with probability 1 − o(1) by Lemma
7.1. For each t ≥ TS, we define a random variable Xt to be the number of global edges that connect to
S at time t. We have
2 n). We suppose the event, denoted
E[XtF] = d ·
1
loga t ·
D(S)[t − 1]
2d(t − 1) ≤
log1+ǫ n
2(t − 1)
,
for arbitrarily small positive ǫ. Then
n
E[
Xt=tS
XtF] ≤ log1+ǫ n
n
Xt=tS
1
2(t − 1) ≤ a(log1+ǫ n)(log log n).
By the Chernoff bound,
n
Pr[
Xt=tS
Xt ≥ 2a(log1+ǫ n)(log log n)] ≤ n−2.
That is, with probability at least 1 − n−2, the total number of global edges joining S is upper bounded
by 2a(log1+ǫ n)(log log n).
Let 0 < ǫ < a−1
4 . Then, with probability 1 − o(1), for each such S (satisfying tS ∈ [T3, T4]), the
conductance of S is
Φ(S) = O(cid:18) 2a(log1+ǫ n)(log log n) + log n
log(a+1)/2 n
37
(cid:19) ≤ O(cid:16)log− a−1
4 n(cid:17) ≤ O(cid:16)S− a−1
4(a+1)(cid:17) .
On the other hand, the total number of nodes belonging to the homochromatic sets which appear
n
loga+2 n
n
+
log(a−1)/2 n
= o(n) for any constant
before time T3 or after time T4 is at most O(loga+1 n) ·
a > 1. Therefore, 1 − o(1) fraction of nodes of G belongs to a subset W of nodes, which has a size
bounded by O(loga+1 n) and a conductance bounded by O(cid:16)W− a−1
4(a+1)(cid:17). (1) follows.
For (2). We only have to show that in the case of a specific X in G, θX (G) = 1 − o(1).
We define X by colors such that each homochromatic set created before time T4 is a module in X .
Note that each module is connected, and by Lemma 6.3 and 6.4, with probability 1 − o(1), its size is
between log n and √n. So each module is a possible community.
If a node x is in a homochromatic set S with tS ∈ [T3, T4], aX (x) = 1−Φ(S) = 1−O(cid:16)log− a−1
Otherwise, we assume the worst case that aX (x) = 0. Since the number of such nodes is at most o(n),
4 n(cid:17).
we have
(2) follows.
θX (G) ≥
n − o(n)
n
h1 − O(cid:16)log− a−1
4 n(cid:17)i = 1 − o(1).
For (3). We define the partition P as follows. Each homochromatic set S with tS ∈ [T3, T4] is a
module in P, and the union of the rest homochromatic sets, that is those created before T3 or after T4,
forms a module in P.
Note that
σP (G) =
L
Xl=1" kl
m −(cid:18) Vl
2m(cid:19)2# =
1
m
L
Xl=1
kl −
L
2m(cid:19)2
Xl=1(cid:18) Vl
,
(10)
where PL
l=1 kl is at least the number of local edges in G. Since the number of global edges is exactly
d · Cn, which by Lemma 6.2 is at most 2dn/ loga+1 n with probability 1 − o(1), the number of local
edges is m − (2dn/ loga+1 n). Since m = dn, we have
1
m
L
Xl=1
kl ≥ 1 − (2/ loga+1 n).
Next we bound Vl for each module l. First we consider the homochromatic sets appearing in time
38
interval [T3, T4]. By Lemma 7.1, with probability 1 − o(1), the volume of every such l is bounded by
O(loga+1 n). So the contribution of these modules to the termPL
after T4. Since T4 = (cid:16)1 −
log(a−1)/2 n(cid:17) n, the total volume of the homochromatic sets appearing after
Then we consider the module which is the union of the homochromatic sets appearing before T3 or
2m(cid:17)2
l=1(cid:16) Vl
in Equation (10) is o(1).
1
. For those appearing before T3, since T3 =
n
loga+2 n
, the total volume of them
T4 is at most
2dn
log(a−1)/2 n
cannot exceed
2dn
loga+2 n
O(loga+1 n) = O(n/ log n) plus the number of all global edges. Since the latter
is at most 2dn/ loga+1 n with probability 1− o(1), the volume of this part is at most O(n/ log n). So the
contribution of this module to the termPL
Combining these two parts, the termPL
For (4). We define a partition P as follows: Each homochromatic set in G is a module in P. We will
calculate LU (G) and LP(G), respectively. We will use the power law degree distribution of G, and also
in Equation (10) is o(1). Thus σP (G) = 1− o(1).
2m(cid:17)2
l=1(cid:16) Vl
2m(cid:17)2
l=1(cid:16) Vl
in Equation (10) is also o(1).
(3) follows.
of each module.
By Theorem 5.1, (2)(iii) and (2)(ii), the degrees of nodes in G follows a power law distribution with
power exponent β = 3, and this holds in each homochromatic set, that is, in each module in P. Let
where dmax is the maximum degree of nodes in G. So the number of nodes of degree i in G is (roughly)
A =
k−3,
dmax
Xk=d
n · i−3/A.
Note that
dmax
A =
Xk=d
k−3 ≤Z ∞
d−1
1
x3 dx =
1
2(d − 1)2 .
So the number of nodes of degree i in G is at least 2(d−1)2n
. Therefore,
i3
39
LU (G) ≥ −
2(d − 1)2n
i3
dmax
2m · log2
Xi=d (cid:18) i
(d − 1)2n log2 e
m
(d − 1)2n log2 e
m
(d − 1)2n log2 e
2m2
(d − 1)2n log2 e
2m2
2m
i
i
dmax
2m(cid:19) ·
1
Xi=d
i2 · log
Z dmax
Z
(cid:20)(cid:18) 2m
d · log
2m
dmax
2m
d
d
log ydy
=
≥
=
=
1
x2 · log
2m
x
dx
2m
d −
2m
d (cid:19) −(cid:18) 2m
dmax · log
2m
dmax −
2m
dmax(cid:19)(cid:21) .
Since dmax goes to infinity as m → ∞, 2m
d ≫ 2m
dmax
for large enough m. Note that m = dn. So we have
LU (G) ≥
2m2
(d − 1)2n
d (cid:19)2
≥ (cid:18) d − 1
2m
d · log
2m
d
·
log n.
Then we give an upper bound for LP(G). For each homochromatic set j, let Lj = −
and LP = −
L
Pj=1
Vj
2m · log2
Vj
2m . By the definition of LP (G),
d(j)
Vj ·log2
i
d(j)
i
Vj
nj
Pi=1
LP (G) =
Vj
2m
Lj +
mg
m
LP.
L
Xj=1
To bound Lj's and LP, we note that, by information theoretical principle, the uniform distribution
indicates the maximum entropy. So for each j, if it has a size sj, which is almost surely O(loga+1 n) by
Theorem 5.1 (1)(ii), then
and by average,
Lj ≤ log2 sj = O(log log n),
Vj
2m
L
Xj=1
Lj = O(log log n).
40
Since by Theorem 5.1 (1)(i), L is almost surely at most 2n/ loga n,
LP ≤ log2 L ≤ log n.
Note that the number of global edges is d· L, which is almost surely at most 2dn/ loga n. Combining
them together, we have
Thus,
mg
m
LP = O(cid:18) 1
loga n(cid:19) .
LP (G) = O(log log n).
The entropy community structure ratio of G by P
τ P (G) = 1 −
LP (G)
LU (G)
= 1 − O(cid:18) log log n
log n (cid:19) = 1 − o(1).
The entropy community structure ratio of G
τ (G) = max
P {τ P (G)} = 1 − o(1).
(4) follows.
This completes the proof of Theorem 5.2.
8 Combinatorial Characteristics Principle
In this section, we prove the combinatorial characteristics principles of homophyly networks, including
Theorems 5.3, 5.4, 5.5, and 5.6.
8.1 Degree Priority Principle
Proof 3 (Proof of Theorem 5.3) Let T3 =
n
loga+2 n
, T4 =(cid:16)1 −
We just need to consider the nodes in the homochromatic sets that appear in time interval [T3, T4].
1
log(a−1)/2 n(cid:17) n.
We will show that they satisfy the properties (1)-(4) with probability 1 − o(1).
41
For (1) and (2), since for each node v, with probability O(1/t2), there are at least two edges as-
sociated with a newly created seed node connecting to v, the second degree of v is at most one with
probability 1 − o(1). So the first degree of v is the number of neighbors of the same color as v. Both (1)
and (2) follow.
For (3), note that for a node v of degree dv at time t, the probability that there is a new seed connect-
ing to v is at most
1
loga t · dv
2dt · d = dv
2t loga t = O( 1
t ).
Thus the length of degrees of v is expected to be O(log n), and so with probability 1 − o(1), it is at
most O(log n).
For a node x created after time step r, the length of degrees of x is expected to be bounded by
O(log log n), so that with probability 1 − o(1), it is at most O(log log n).
For (4), note that a homochromatic set is constructed by preferential attachment scheme, in which
the degree of the first node is lower bounded by square root of the number of nodes. Since the size of the
homochromatic set is Ω(log(a+1)/2), the degree of the seed node contributed by the nodes of the same
color, that is the first degree, is lower bounded by Ω(log(a+1)/4). Theorem 5.3 is proved.
We notice that for homophyly networks, we have only the upper bound of lengths of degrees of
nodes. In applications, both upper and lower bounds of lengths of degrees of nodes may play essential
roles.
8.2 Widths Principle
Proof 4 (Proof of Theorem 5.4) Let N be the number of seed nodes in G. By Theorem 5.1, N =
Ω( n
loga n ).
Suppose that t1 < t2 < ··· < tN are the time steps at which the seed nodes x1, x2,··· , xN are
created. For each j, let Xj be the community of xj.
By the construction of G, we have that for a fixed j, for every t with tj < t < tj+1, the node
created at time step t contributes to the volume of a randomly and uniformly chosen community Xi
42
among X1, X2,··· , Xj. Therefore in the interval (tj, tj+1), the volumes of X1, X2 ··· , Xj increased
uniformly and randomly. At time step tj+1, the new seed node xj+1 is created. By the construction of
G, for each i ∈ {1, 2,··· , j}, the contribution of both widths and volume of Xi is proportional to the
volume of Xi immediately before time step tj+1. By neglecting the contribution of volumes by global
edges, we have that the expected increment of widths of Xi during time step tj+1 is Ω( 1
j ).
By using the above analysis, we prove our theorem.
For (1), for X = Xi for some i ≤ l, then wG(X) is at least Ω(
Pj=l
(2) follows similarly. For (3), for an X = Xi for some i > r, we have that the width of X is at most
N
1
j ) = Ω(log N ) = Ω(log n).
1
j ) = O(log log N ) = O(log log n). By the choice of r, (4) follows from (3). Theorem 5.4 follows.
O(
N
Pj=r
8.3 Inclusion and Infection Principle
Proof 5 (Proof of Theorem 5.5) For (1). Let x be a non-seed node created at time step s. Then at step
s, x links only to nodes of the same color. By the construction, for any t > s, if a non-seed node y is
created at step t, then y has edge with x only if y shares the same color with x. (1) holds.
For (2). Let x be a seed node created at time step s. Then there are at most d non-seed nodes which
link to x during step s. By the construction, for any t > s, if a non-seed node y is created at step t, then
there is no edge between x and y that can be created in step t. Therefore wG(x) = O(1). (2) holds.
Theorem 5.5 holds.
8.4 King Node Principle
Proof 6 (Proof of Theorem 5.6) Suppose that x0, x1,··· , xN are all nodes of X, created at time steps
t0 < t1 < ··· < tN respectively. We use d(i)[t] to denote the degree of xi at the end of time step t. By
the construction of G, we have that
d(0)[t0] = d, d(0)[t1] ≥ 2d,
43
for all i > 0.
d(i)[ti] = d
By the construction of G, at every time step t + 1 with ti < t + 1 ≤ ti+1, there is a fixed number
αt ≥ 1 such that for every j ≤ i, the expectation of the degree of xj is amplified by αt. Therefore E[d(0)]
is at least twice of E[d(i)] for all i ∈ {1, 2,··· , N}. The theorem holds.
We remark that Theorem 5.6 gives us only some statistical properties of the remarkable role of
the seed nodes. Rigorous proofs of the roles of the king nodes need concentration results of the king
amplifier, defined by θ(x0) =
max{d(x) x∈X, x6=x0} , where X is a community, x0 is the seed node of X,
d(x0)
for which new methods are needed.
9 Predicting Principle in Networks
Theorems 5.1, 5.2, 5.3, 5.4, 5.5 and 5.6 show that there is a structural theory for the homophyly networks.
Equally important, our homophyly model explores that there is a semantical interpretation for each of
the natural communities, that is, nodes of the same community share common features. We will show
that this property provides a principle for predicting in networks.
To verify that communities of a network are interpretable, we introduce a community finding algo-
rithm.
9.1 A Community Finding Algorithm
We design our algorithm by modifying the personalized PageRank vector. For this, we first review some
key ingredients of the PageRank vector and the related partitioning algorithm which will be useful for
us. Given a graph G, an initial vector s on the vertex set and a teleportation parameter κ, the PageRank
vector prκ(s) is defined recursively as
prκ(s) = κs + (1 − κ)prκ(s)W,
44
(11)
where W = I+D−1A
2
is the lazy random walk on G and I, D, A denote the identity matrix, the diagonal
degree matrix of G and the adjacency matrix of G, respectively. It is easy to see that equation (11) has
a unique solution. When s equals the indicator vector χv of vertex v, we say that the prκ(χv) is the
personalized PageRank vector with starting vertex v and teleportation parameter κ. For an arbitrarily
small constant ǫ, there is an efficient ǫ-approximation algorithm ApproximatePR(v, κ, ǫ) to compute
prκ(χv), which outputs a vector p = prκ(χv − r) (1).
Theorem 5.1 (1) shows that an interpretable community has size bounded by O(lnγ n), and Theorem
5.2 (1) shows that the conductance of an interpretable community X is bounded by O( 1
X β ) for some
constant β. We will design our algorithm by using these conditions as the stopping conditions in a
personalized pagerank searching. We use A to denote the algorithm, which proceeds as follows:
Algorithm A
Given a node v and two constants α, β, we describe the algorithm to find a community, if any, as
follows: 1) Choose small constants κ and ǫ, and obtain an ǫ-approximation vector p of the personalized
PageRank vector starting from v with teleportation parameter κ by invoking ApproximateP R(v, κ, ǫ).
2) Do a sweep operation over the vector p such that:
pv1
deg(v1) ≥
pv2
deg(v2) ≥ ··· ≥
pvs
deg(vs)
,
(12)
where s = supp(p) is the size of the support set of p. 3) In increasing order, for each i = 1,··· , s,
calculate the conductance of the vertex set Si = {v1,··· , vi} and output the first set, Si, satisfying
simultaneously the following two conditions:
Φ(Si) ≤ α/iβ ,
Φ(Si) < Φ(Si+1).
(13)
(14)
Therefore, our algorithm A is the approximation algorithm in (1) with a new terminating condition
predicted by Theorem 5.2 (1).
45
9.2 Finding Missing Keywords of Papers from Citation Networks
We study Arxiv HEP-TH (high energy physics theory). It is a citation graph from the e-print arXiv which
covers all the citations within a dataset of 27, 770 papers with 352, 807 edges. If paper i cites paper j,
then the graph contains a directed edge from i to j. Each of the papers in the network contains a title,
abstract, publication journal, and publication date of the paper. There are 1214 papers among the total
27400 papers for which keywords were listed by their authors. We call a paper annotated, if the keywords
of the paper have been listed by its authors, and un-annotated, otherwise. Our goal is to use the annotated
papers to predict and confirm keywords for the un-annotated papers in the network.
Our homophyly model implies that a community has a short list of keywords which very well repre-
sent the features of the community.
Let C be a community found by our algorithm A in Subsection 9.1. For some small constant i, we
use the most popular i keywords appeared in the annotated papers in C to represent the common features
of C, written CF(C). Then we predict that each keyword in CF(C) is a keyword of an un-annotated
paper in C.
For a keyword K ∈ CF(C), and a paper P ∈ C, we say that K is confirmed to be a keyword of P ,
if K appears in either the title or the abstract of paper P .
For each community, C say, suppose that K1, K2,··· , Kl are all known keywords among anno-
tated papers in the community C. We use the known keywords K1, K2,··· , Kl to predict and confirm
keywords for un-annotated papers in C. We proceed as follows:
1. Let i ≤ l be a number.
2. Suppose that K1, K2,··· , Ki are the most popular i keywords among all the known keywords of
annotated papers in C.
3. Given a un-annotated paper P in C, for each j ≤ i, if Kj appears in either the title or the abstract
of paper P , then we say that Kj is a predicted and confirmed keyword of paper P .
46
30000
25000
20000
15000
10000
5000
d
e
m
r
i
f
n
o
c
e
r
a
s
d
r
o
w
y
e
k
e
s
o
h
w
s
r
e
p
a
p
f
o
r
e
b
m
u
n
0
0
10
20
30
number of keywords
40
50
Figure 5: Keywords prediction. The curve represents the numbers of papers whose keywords are pre-
dicted and confirmed by using the most popular k keywords as the common keywords of all the commu-
nities, for k ≤ 50. The curve increases quickly and becomes flatten after k > 10. This means that each
community has a few (10) remarkable common keywords, a result predicted by the homophyly networks.
In Figure 5, we depict the curve of numbers of papers whose keywords are predicted and confirmed
for i up to 50, where i is the number with which the most popular i keywords are used to predict the
keywords of the community, for all the communities.
The results in Figure 5 show that a community of the citation network can be interpreted by the
most popular 10 keywords and that the interpretations of communities can be used in predictions and
confirmations of functions of nodes in the network. This experiment shows that for each community,
nodes of the same community do share common features, that is, the short list of common keywords, and
that the common features of each of the communities can be used in predicting and confirming functions
in networks. Our homophyly model predicts that this property may be universal for many real networks.
This provides a principle for predicting and confirming functions in networks.
9.3 Homophyly Law of Networks
In Table 2, we describe the full prediction and confirmation of keywords of papers in the network. In
the table, the first row shows that if we define the keywords of a community to be the most popular
5 keywords of annotated papers in the community, then the prediction algorithm above finds exactly 1
47
keyword for 5286 papers, 2 keywords for 2979 papers, 3 keywords for 1639 papers, 4 keywords for 768
papers, 5 keywords for 345 papers, 6 keywords for 166 papers, 7 keywords for 65 papers, 8 keywords for
21 papers, 9 keywords for 7 papers, and even 10 keywords for 2 papers. In total, there are 11279 papers
to each of them there is at least one keyword is predicted and confirmed. The second row shows the
number of papers for which r keywords are predicted and confirmed for all r ∈ [1, 10], in the case that
we define the keywords of a community to be the most popular 10 known keywords of annotated papers
in the community. In this case, there are 13795 papers in total each of which has at least one keyword
is predicted and confirmed. Table 2 shows that most communities have a short list of representative
keywords, this is 10 or even 5. This is exactly the result predicted by our homophyly model.
i\r
5
10
15
20
25
30
35
40
45
50
all
1
5286
4701
4360
3953
3666
3344
3199
3081
2987
2869
2336
2
2979
3605
3627
3467
3301
3169
3116
3044
2992
2915
2587
3
1639
2429
2671
2853
2909
2934
2952
2922
2850
2770
2560
4
768
1407
1798
1999
2116
2223
2238
2255
2321
2340
2348
5
345
790
1074
1310
1498
1648
1681
1734
1741
1844
1883
6
166
434
606
798
912
1053
1152
1218
1253
1291
1528
7
65
236
340
462
575
692
728
752
836
880
1150
8
21
102
178
268
342
410
460
500
517
579
849
9
7
48
95
144
201
253
272
323
364
413
568
10
2
23
37
67
81
129
145
158
181
214
373
total
11279
13795
14829
15397
15721
16015
16151
16239
16333
16453
16842
Table 2: Keywords prediction
Let G = (V, E) be a network. Suppose that each node v ∈ V has some colors. For a node v ∈ V ,
we use D(v) to denote the number of colors associated with v. We define the dimension of G by
dim(G) = max
v∈V {D(v)}.
Suppose as usual that in a citation network, G say, each paper has up to 5 keywords. Then G has
dimension 5. By Figure 5 and Table 2, we observe the following property: Given a network G, if G
48
has dimension D, then, each community, C say, of G can be interpreted by O(D) many common colors
of the community C. This experiment, together with our homophyly model, predicts that the following
predicting principle may hold for many real networks.
Predicting principle: Let G be a network of dimension D. Then for a (typical or natural) community
C of network G, there is a list of functions of length O(D) which represent the common features of
nodes in C, so that C is interpreted by a list of common features as short as O(dim(G)).
This principle provides not only the mechanism for network predicting, but also a quantitative crite-
rion for predicting functions in networks.
10 C-Community Structure Ratio of Real Networks
In Definition 2.4, we defined the conductance community structure ratio of a network given by an al-
gorithm, A say. This suggests the algorithmic problem to find the algorithm which finds the maximal
conductance community structure ratios of networks.
In Section 4, we used three algorithms C, E and M based on conductance, entropy and modularity
definitions of community structures respectively, where C is the algorithm A in Subsection 9.1. Here
we use these algorithms again to compute the conductance community structure ratios of the networks
given by the three algorithms. In Table 3, we report the conductance community structure ratios of the
algorithms C, E and M on 22 real networks.
Table 3 shows that for most real networks, algorithm C finds the largest conductance community
structure ratio, and that for some real networks, algorithm E finds the largest conductance community
structure ratio. A common property of all the real networks is that the conductance community structure
ratios of all real networks are large. In fact, there are 6 networks whose conductance community struc-
ture ratios are greater than 0.9, there are 9 networks whose conductance community structure ratios are
between 0.8 and 0.9, there is one network whose conductance community structure ratio is between 0.7
and 0.8, and there is one network whose conductance community structure ratio is at least 0.59. These
49
Networks\Algorithms
football
cit-hepph
cit-hepth
col-astroph
col-condmat
col-grqc
col-hepph
col-hepth
p2p24
p2p25
p2p30
p2p31
p2p4
p2p5
p2p6
p2p8
p2p9
email-enron
email-euall
road-ca
road-pa
road-tx
θC(G)
0.97
0.7
0.59
0.72
0.84
0.96
0.77
0.89
0.83
0.85
0.84
0.82
0.87
0.91
0.92
0.94
0.92
0.73
0.77
0.98
0.98
0.99
θE(G)
0.76
0.83
0.54
0.56
0.55
0.72
0.8
0.67
0.46
0.56
0.58
0.52
0.6
0.71
0.56
0.81
0.80
0.55
0.85
0.92
0.97
0.94
θM(G)
0.74
0.19
0.31
0.25
0.77
0.82
0.24
0.7
0.51
0.54
0.5
0.54
0.38
0.4
0.37
0.47
0.46
0.48
0.25
0.996
0.99
0.99
Table 3: conductance community structure ratios of community detecting algorithms based on minimal
conductance, information flow and modularity on some real networks, written by C, E and M respec-
tively.
50
30000
25000
20000
15000
10000
5000
d
e
m
r
i
f
n
o
c
e
r
a
s
d
r
o
w
y
e
k
e
s
o
h
w
s
r
e
p
a
p
f
o
r
e
b
m
u
n
0
0
10
prediction
prediction
prediction
40
50
20
30
keywords number in community
Figure 6: Keywords Prediction. The three curves correspond to the results of prediction and confirmation
of the three algorithms C, E and M, marked by θ-, τ -, and σ-predictions respectively in the figure. This
figure shows that θC(G) is the largest among the three algorithms, and at the same time, the prediction
and confirmation of keywords based on the communities found by algorithm C are the best among that
of the three algorithms.
results show that each of the real networks has a remarkable community structure. However it is hard
to have a single algorithm which finds the maximal conductance community structure ratios θ's for all
networks.
11 Test of Community Finding Algorithms
Given a network, G say, and a community finding algorithm A, we have a conductance community
structure ratio θA(G).
Theoretically speaking, for two algorithms A and B, if θA(G) > θB(G), then A is better than B for
G. However, we don't know: what does this mean in real networks analyses and real world applications?
We use the three algorithms C, E, and M in Section 10 again. We implement the keywords prediction
and confirmation on the same citation network based on three community finding algorithms C, E, and
M respectively. We found that the conductance community structure ratios of the network G given by
C, E, and M are 0.59, 0.54 and 0.31 respectively (referred to Table 3). We depict the curves of keywords
predictions and confirmations of the three algorithms on the citation network in Figure 6.
51
From Figure 6, we observe that algorithm C has the largest conductance community structure ratio
and the best performance of keywords prediction and confirmation. This means that larger conductance
community structure ratio implies a better interpretation of communities and a better performance in pre-
dicting and confirming functions in networks. Therefore maximizing conductance community structure
ratios of networks does have implications in real world network analyses and applications.
12 Conclusions and New Directions
We proposed a new model of networks, the homophyly model, based on which we built a structural
theory of networks. Our theory is a mathematical understanding of networks. However, the homophyly
model is motivated by observing the connecting behaviors in nature and society, therefore the high level
open issue is to explore the social, biological and physical understandings of the homophyly model.
The fundamental results of our theory are: community structures are definable, and communities
are interpretable in networks. The two results point out the syntax and semantic aspects of networks
respectively. We believe that our research provides a firm foundation for a structural theory of networks.
However, to fully develop such a theory, there are a number of new issues left open. We discuss a few of
the most important ones here.
The first is a non-linear or high dimensional network theory. Given a network, G say, in which each
node has some colors, for each node v, we use D(v) to denote the number of colors associated with
it. In this case, we define the dimension of G to be the maximal of D(v)'s among all nodes v, that is,
dim(G) = max
v∈V {D(v)}. By this definition, our homophyly networks all have dimension 1, so that they
are linear networks. Therefore our theory is a linear network theory. Clearly, it is interesting to develop
a non-linear or high dimensional network theory, which is expected to be harder, since there would be
more combinatorics involved in the theory.
The second is a global theory of networks. We regard communities as local structures of networks.
This means that our theory is a local theory of networks, predicting a global theory of networks simulta-
52
neously.
The third is to develop new theory and applications based on the principles of the community struc-
tures discovered in the present paper. For this, we introduce a few of them:
(1) To understand the nature and to develop applications of the holographic law predicted here in
large-scale real network data
Our theory predicts that for a large-scale real network, G say, the power exponent of the power
law of G is the same as that of a natural or typical community GX of G for some set X of size
polynomial in log n, where GX is the induced subgraph of X in G. This would be an interesting
new phenomenon of real world big data. New applications of the result are of course possible. For
instance, in network searching, we may find a community X of size as large as a few hundreds,
which is still large for real recommendation. By the holographic law, there is a small set, X0 ⊂ X
which almost dominates X, in which case, X0 could be as small as 10 to 20 nodes. In so doing,
we could simply recommend X0, which would keep the most useful information of X.
(2) To understand the roles of external centrality of communities of a network
Our widths principle predicts that for a natural community X of a network G such that the size of
X is polynomial in log n, where n is the number of nodes in G, there is a set X0 ⊂ X such that
X0 is as small as O(log log n) and such that X0 almost dominates the external links from X to
outside of X. This property is useful in both theory and applications. For instance, in a citation
network G, we may find a community of G, X say, in which case, X could be interpreted as the
papers on some topic, and the external centrality set X0 of X could be interpreted as the papers
having influence on research of other topics. By extracting the keywords of papers in X0, we may
already know much of the relationships between the topic of X and the topics relevant to that of
X.
(3) To understand the roles of the local communication law in network communications
53
Our fundamental theorem says that the diameters of natural communities are bounded by O(log log n).
This means that in a communication network, the most frequent communications are local ones
which are exponentially shorter than that of a global communication, and that global communica-
tions are much less frequent. This provides an insight to analyze the complexity of communica-
tions in networks.
(4) To investigate new notions of networks that are locally collective by using our local theory of
networks
We understand that communities of a network are local structures of the network, and that there
are important notions of networks which are locally collective. Our theory provides an insight to
study the locally collective notions by the community structure of networks. Here we discuss one
of the most important such notions, the happy node problem below. In a homophyly network, G
say, each node v is associated with a color. We could define happiness as follows: we say that
a node v is happy in G, if all the neighbors of v share the same color as v. With this definition,
we know that most nodes are happy in G. On the other hand, the diameter of a community in G
is O(log log n). This means that for a node v, whether or not v is happy in G, is independent of
nodes Ω(log log n) far away from v. These observations provide an insight to build happiness of
individuals as a locally collective notion of networks, which calls for further investigation.
(5) To develop a security theory of networks based on the structural theory of networks
The first achievement of this is the security model and provable security of networks in (15), in
which a number of open problems were posed.
(6) To develop a theory of evolutionary games in networks based on the structural theory of networks
This is possible by our work in (14). The goal of this theory would solve some long standing
challenges in social science and economics. The later mission is of course a grand challenge.
54
(7) Approximation and hardness of approximation of the conductance community structure ratio of
networks
Our definition of the conductance community structure ratio provides a way to test the quality of
community finding algorithms. In real networks, each of the algorithms based on personalized
pagerank, compression of information flow and modularity has reasonably good performance in
finding the conductance community structure ratios. However, it is an open question to prove some
theoretical results for approximation and hardness of approximation of the problem.
(8) To prove theoretically that the community structure hypothesis holds for networks of other classical
models such as the ER and PA models.
We have shown experimentally that the hypothesis holds for networks of both the ER and PA
models. It would be interesting to have theoretical proofs of the results. Generally, it is interesting
to prove the hypothesis for networks of all reasonable models.
References and Notes
1. R. Andersen, F. Chung, and K. Lang. Local graph partitioning using pagerank vectors. 47th Annual
IEEE Symposium on Foundations of Computer Science, 2006. FOCS'06., pages 475 -- 486, 2006.
2. A. L. Barab´asi. Scale-free networks: A decade and beyond. Science, 325(24):412 -- 413, July 2009.
3. A. L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286:509 -- 512,
1999.
4. B. Bollob´as and O. Riordan. The diameter of a scale-free random graph. Combinatorica,
24(1):5C34, 2004.
5. P. Chen and S. Redner. Community structure of the physical review citation network. Journal of
Informetrics, 4(3):278 -- 290, 2010.
55
6. H. Chernoff. A note on an inequality involving the normal distribution. The Annals of Probability,
9:533 -- 535, 1981.
7. F. Chung and L. Lu. Complex graphs and networks. American Mathematical Society, 2006. (book).
8. A. Clauset. Finding local community structure in networks. Physical Review E, 72(2):026132, 2005.
9. A. Clauset, M.E.J. Newman, and C. Moore. Finding community structure in very large networks.
Physical Review E, 70(6):066111, 2004.
10. P. Erdos and A. R´enyi. On the evolution of random graphsrandom graphs, i. Magyar Tud. Akad.
Mat. Kutat´o Int. K´ozl., 5:17 -- 61, 1960.
11. S. Fortunato. Community detection in graphs. CoRR abs, 0906(0612), Jan 2009.
12. S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75 -- 174, 2010.
13. J. Kleinberg. Navigation in a small world. Nature, 406:845, 2000.
14. A. Li, Y. Pan, and X. Yong. A honey bee principle solves the prisoner's dilemma in a power law
world. To appear, 2013.
15. A. Li, Y. Pan, and W. Zhang. Provable security of networks. To appear, 2013.
16. T. Luczak. Sparse random graphs with a given degree sequence. Theory of Probability and Mathe-
matical Statistics, 51:1 -- 27, 1995.
17. S. Milgram. The small world problem. Psychology Today, 2(1):60 -- 67, 1967.
18. M. Newman and M. Girvan. Physical Review E, 69(2):026113, 2004.
19. M.E.J. Newman. Detecting community structure in networks. The European Physical Journal B-
Condensed Matter and Complex Systems, 38(2):321 -- 330, 2004.
56
20. B. Pittel. Note on the heights of random recursive trees and random m-ary search trees. Random
Structures and Algorithms, 5:337 -- 347, 1994.
21. F. Radicchi, C. Castellano, F. Cecconi, V. Loreto, and D. Parisi. Defining and identifying communi-
ties in networks. Proceedings of the National Academy of Sciences, 101(9):2658, 2004.
22. M. Rosvall and C.T. Bergstrom. Maps of random walks on complex networks reveal community
structure. Proceedings of the National Academy of Sciences, 105(4):1118, 2008.
23. D. J. Watts and S. H. Strogatz. Collective dynamics of small world networks? Nature, 393:440 -- 442,
1998.
57
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
s
o
i
t
a
R
e
r
u
t
c
u
r
t
S
y
t
i
n
u
m
m
o
C
(G)
(G)
(G)
0.0
0.000
0.001
0.002
p
0.003
0.004
0.005
30000
25000
20000
15000
10000
5000
d
e
m
r
i
f
n
o
c
e
r
a
s
d
r
o
w
y
e
k
e
s
o
h
w
s
r
e
p
a
p
f
o
r
e
b
m
u
n
0
0
10
prediction
prediction
prediction
40
50
20
30
keywords number in community
|
1610.01961 | 2 | 1610 | 2016-10-17T17:00:51 | Fast Hierarchy Construction for Dense Subgraphs | [
"cs.SI"
] | Discovering dense subgraphs and understanding the relations among them is a fundamental problem in graph mining. We want to not only identify dense subgraphs, but also build a hierarchy among them (e.g., larger but sparser subgraphs formed by two smaller dense subgraphs). Peeling algorithms (k-core, k-truss, and nucleus decomposition) have been effective to locate many dense subgraphs. However, constructing a hierarchical representation of density structure, even correctly computing the connected k-cores and k-trusses, have been mostly overlooked. Keeping track of connected components during peeling requires an additional traversal operation, which is as expensive as the peeling process. In this paper, we start with a thorough survey and point to nuances in problem formulations that lead to significant differences in runtimes. We then propose efficient and generic algorithms to construct the hierarchy of dense subgraphs for k-core, k-truss, or any nucleus decomposition. Our algorithms leverage the disjoint-set forest data structure to efficiently construct the hierarchy during traversal. Furthermore, we introduce a new idea to avoid traversal. We construct the subgraphs while visiting neighborhoods in the peeling process, and build the relations to previously constructed subgraphs. We also consider an existing idea to find the k-core hierarchy and adapt for our objectives efficiently. Experiments on different types of large scale real-world networks show significant speedups over naive algorithms and existing alternatives. Our algorithms also outperform the hypothetical limits of any possible traversal-based solution. | cs.SI | cs | Fast Hierarchy Construction for Dense Subgraphs
6
1
0
2
t
c
O
7
1
]
I
S
.
s
c
[
2
v
1
6
9
1
0
.
0
1
6
1
:
v
i
X
r
a
Ahmet Erdem Sarıyuce
Sandia National Laboratories
Livermore, CA, USA
[email protected]
ABSTRACT
Discovering dense subgraphs and understanding the rela-
tions among them is a fundamental problem in graph min-
ing. We want to not only identify dense subgraphs, but
also build a hierarchy among them (e.g., larger but sparser
subgraphs formed by two smaller dense subgraphs). Peel-
ing algorithms (k-core, k-truss, and nucleus decomposition)
have been effective to locate many dense subgraphs. How-
ever, constructing a hierarchical representation of density
structure, even correctly computing the connected k-cores
and k-trusses, have been mostly overlooked. Keeping track
of connected components during peeling requires an addi-
tional traversal operation, which is as expensive as the peel-
ing process. In this paper, we start with a thorough survey
and point to nuances in problem formulations that lead to
significant differences in runtimes. We then propose efficient
and generic algorithms to construct the hierarchy of dense
subgraphs for k-core, k-truss, or any nucleus decomposition.
Our algorithms leverage the disjoint-set forest data structure
to efficiently construct the hierarchy during traversal. Fur-
thermore, we introduce a new idea to avoid traversal. We
construct the subgraphs while visiting neighborhoods in the
peeling process, and build the relations to previously con-
structed subgraphs. We also consider an existing idea to find
the k-core hierarchy and adapt for our objectives efficiently.
Experiments on different types of large scale real-world net-
works show significant speedups over naive algorithms and
existing alternatives. Our algorithms also outperform the
hypothetical limits of any possible traversal-based solution.
INTRODUCTION
1.
Graphs are used to model relationships in many applications
such as sociology, the WWW, cybersecurity, bioinformat-
ics, and infrastructure. Although the real-world graphs are
sparse (E << V 2), vertex neighborhoods are dense [23].
Clustering coefficients [50], and transitivity [49] of real-world
networks are also high and suggest the micro-scale dense
structures. Literature is abundant with the benefits of dense
subgraph discovery for various applications [30, 22]. Exam-
ples include finding communities in web [29, 13], and social
networks [26], detecting spam groups in web [20], discover-
ing migration patterns in stock market [14], improving soft-
licensed under
This work is
the Creative Commons Attribution-
NonCommercial-NoDerivatives 4.0 International License. To view a copy
of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/. For
any use beyond those covered by this license, obtain permission by emailing
[email protected].
Proceedings of the VLDB Endowment, Vol. 10, No. 3
Copyright 2016 VLDB Endowment 2150-8097/16/11.
Ali Pinar
Sandia National Laboratories
Livermore, CA, USA
[email protected]
ware understanding by analyzing static structure of large-
scale software systems [55], analyzing gene co-expression
networks [54], finding DNA motifs [16], quantifying the sig-
nificance of proteins [53] and discovering molecular com-
plexes [4] in protein interaction networks, identifying real-
time stories in microblogging websites [3], and improving
the throughput of social-networking sites [21].
k-core [43, 34], k-truss [39, 10, 56, 47, 44, 57, 26], and
their generic variant for larger cliques, nucleus decomposi-
tion [42], are deterministic algorithms which are effective
and efficient solutions to find dense subgraphs and creat-
ing hierarchical relations among them. They also known as
peeling algorithms due to their iterative nature to reach the
densest parts of the graph. Hierarchy has been shown to be
a central organizing principle of complex networks, which
is useful to relate communities of a graph and can offer in-
sight into many network phenomena [9]. Peeling algorithms
do not aim to find a single optimum dense subgraph, but
rather gives many dense subgraphs with varying sizes and
densities, and hierarchy among them, if supported by a
post-processing traversal step [34, 42].
1.1 Problem, Misconception and Challenges
We focus on undirected, unattributed graphs. Hierarchy of
dense subgraphs is represented as the tree structure where
each node is a subgraph, each edge shows a containment
relation, and the root node is the entire graph. The aim is
to efficiently find the hierarchy by using peeling algorithms.
Misconception in the literature: Recent studies on
peeling algorithms has interestingly overlooked the connec-
tivity condition of k-cores and k-trusses. In the original def-
inition of k-core, Seidman states that k-core is the maximal
and connected subgraph where any vertex has at least degree
k [43]. However, almost all the recent papers on k-core algo-
rithms [8, 18, 19, 6, 36, 32, 28, 52, 51, 32] did not mention
that k-core is a connected subgraph although they cite Seid-
man's seminal work [43]. On the k-truss side, the idea is in-
troduced independently by Saito et al. [39] (as k-dense), Co-
hen [10] (as k-truss), Zhang and Parthasarathy [56] (as trian-
gle k-core), and Verma and Butenko [47] (as k-community).
They all define k-truss as a subgraph where any edge is in-
volved in at least k triangles. Regarding the connectivity,
Cohen [10], and Verma and Butenko [47] defined the k-truss
as a single component subgraph, while others [39, 56] ig-
nored the connectivity.
In practice, overlooking the con-
nectedness limits the contributions of most previous work
regarding the performance and semantic aspects. More de-
tails are given in Section 3.
Finding k-cores requires traversal on the graph after the
peeling process, where maximum k-core values of vertices
are found. It is same for k-truss and nucleus decompositions
Table 1: Speedups with our best algorithms for each
decomposition. Starred columns (*) show lower bounds,
when the other algorithm did not finish in 2 days or
did a partial work. Best k-truss and (3,4) algorithms
are significantly faster than alternatives, and also more
efficient than the hypothetically best possible algorithm
(Hypo) that does traversal to find the hierarchy.
k-core
Naive Hypo Naive TCP*[26] Hypo Naive*
(3, 4) nucleus
k-truss
25.50x 1.10x 12.58x
Stanford3
twitter-hb 27.89x 1.33x 16.24x
58.02x 1.68x 90.50x
uk-2005
3.41x 1.48x 1321.89x
38.96x
3.27x 1.78x
11.07x 1.24x
1.98x
where the traversal is done on higher order structures. Con-
structing the hierarchy is only possible after that. However,
it is not easy to track nested structure of subgraphs dur-
ing a single traversal over entire graph. Traversing k-cores
is cheap by a simple breadth-first search (BFS) in O(E)
time. When it comes to k-truss and higher order peeling
algorithms, however, traversal becomes much costly due to
the larger clique connectivity constraints.
1.2 Contributions
Motivated by the challenging cost of traversals and hierarchy
construction, we focus on efficient algorithms to find the k-
cores, k-trusses or any nuclei in general. Our contributions
are as follows:
• Thorough literature review: We provide a detailed
review of literature on peeling algorithms to point the
misconception about k-core and k-truss definitions. We
highlight the implications of these misunderstandings on
the proposed solutions. We also stress the lack of under-
standing on the hierarchy construction and show that it
is as expensive as the peeling process.
• Hierarchy construction by disjoint-set forest: We
propose to use disjoint-set forest data structure (DF) to
track the disconnected substructures that appear in the
same node of the hierarchy tree. Disjoint-set forest is in-
corporated into the hierarchy tree by selectively process-
ing the subgraphs in a particular order. We show that our
algorithm is generic, i.e., works for any peeling algorithm.
• Avoiding traversal: We introduce a new idea to build
the hierarchy without traversal.
In the peeling process,
we construct the subgraphs while visiting neighborhoods
and bookkeep the relations to previously constructed sub-
graphs. Applying a lightweight post-processing operation
to those tracked relations gives us all the hierarchy, and
it works for any peeling algorithm.
• Experimental evaluation: All the algorithms we pro-
posed are implemented for k-core, k-truss and (3, 4)-nucleus
decompositions, in which peeling is done on triangles and
the four-clique involvements. Furthermore, we bring out
an idea from Matula and Beck's work [34], and adapt
and implement it for our needs to solve the k-core hierar-
chy problem more efficiently. Table 1 gives a summary of
the speedups we get for each decomposition. Our k-core
hierarchy algorithm adaptation outperforms naive base-
line by 58 times on uk-2005 graph. The best k-truss and
(3, 4) algorithms are significantly faster than alternatives.
They also beat the hypothetically best possible algorithm
(Hypo) that does traversal to find hierarchy. It is a strik-
ing result to show the benefit of our traversal avoiding
idea.
Table 2: Summary of notations
Symbol Description
Kr
r-clique; complete graph of r vertices
ωs(u)
Ks-degree of u; number of s-cliques containing u
ωr,s(H) min{ωs(u) : u ∈ H}; min Ks-degree of a Kr in H
H u
λs(u)
λr,s(H) min{λs(u) : u ∈ H}; min λs of a Kr in graph H
Tr,s
2. PRELIMINARIES
max k-(r, s) nucleus associated with the Kr u
ωr,s(H u); max k-(r, s) number of the Kr u
sub-(r, s) nucleus; maximal union of Krs of same λs
This section presents building blocks for our work.
2.1 Nucleus decomposition
Let G be an undirected and simple graph. We start by
quoting the Definitions 1 and 2 from [42]. We use Kr to
denote an r-clique.
Definition 1. Let r < s be positive integers and S be a
set of Kss in G.
• Kr(S) is the set of Krs contained in some C ∈ S.
• The number of C ∈ S containing u ∈ Kr(S) is the
Ks-degree of u.
• Two Krs u, u(cid:48) are Ks-connected if there exists a se-
quence u = u1, u2, . . . , uk = u(cid:48) in Kr(S) such that for
each i, some Ks C ∈ S contains ui ∪ ui+1.
These definitions are generalizations of the standard ver-
Indeed, setting r = 1 and
tex degree and connectedness.
s = 2 (so S is a set of edges) yields exactly that. The main
definition is as follows.
Definition 2. Let k, r, and s be positive integers such
that r < s. A k-(r, s) nucleus is a maximal union S of Kss
such that:
• The Ks-degree of any u ∈ Kr(S) is at least k.
• Any u, u(cid:48) ∈ Kr(S) are Ks-connected.
Figure 1: 2-(2,3) and 2-(2,4) nuclei on left and right.
Figure 1 gives an example for 2-(2,3) and 2-(2,4) nucleus.
For r = 1, s = 2, a k-(1,2) nucleus is a maximal (induced)
connected subgraph with minimum vertex degree k. This is
exactly k-core [43]. Setting r = 2, s = 3 gives maximal sub-
graphs where every edge participates in at least k triangles,
and edges are triangle-connected. This is almost the same
definition of k-dense [39], k-truss [10], triangle-cores [56] and
k-community [47]. The difference is on the connectivity con-
dition; [10, 47] defines k-truss and k-community as a con-
nected component, whereas [39, 56] do not mention connect-
edness, implicitly allowing disconnected subgraphs. The k-
truss community defined by Huang et al. [26] is the same
as the k-(2,3) nucleus: both require any pair of edges to be
triangle-connected. More details can be found in Section 3.
In the rest of the paper, we will be generic and present all
our findings for the k-(r, s) nucleus decomposition, which
subsumes k-core and k-truss definitions.
For an r-clique Kr u, ωs(u) denotes the Ks-degree of u.
For a subgraph H ⊆ G, ωr,s(H) is defined as the minimum
Ks-degree of a Kr in H, i.e., ωr,s(H) = min{ωs(u) : u ∈ H}.
Definition 3. The maximum k-(r,s) nucleus associ-
ated with a Kr u, denoted by H u, is the k-(r, s) nucleus that
contains u and has the largest k = ωr,s(H u) (i.e., (cid:64) H s.t. u ∈
H ∧ H is an l-(r, s) nucleus ∧ l > k).
The maximum k-(r, s) number of the r-clique u, denoted
by λs(u), is defined as λs(u) = ωr,s(H u).
Throughout the paper, λs(u) implies that u is a Kr. We also
abuse the notation as λ(u) when r and s are obvious. The
maximum k-(1, 2) nucleus is same as the maximum k-core,
defined in [41]. For a vertex, v, λ2(v) is also equal to the
maximum k-core number of v [41], or core number of v [8,
36]. Likewise, for an edge e, λ3(e) is previously defined as
the trussness of an edge in [26].
Building the (r, s) nucleus decomposition of a graph G is
finding the λs of all Krs in G and building the k-(r, s) nuclei
for all k. The following corollary shows that given the λs of
all Krs, all (r, s) nuclei of G can be found.
Corollary 1. Given λs(v) for all Kr v ∈ G and assum-
ing λs(u) = k for a Kr u, the maximum k-(r, s) nucleus of
u, denoted by H u, consists of u as well as any Kr v that has
λs(v) ≥ k and is reachable from u via a path P of Kss such
that ∀C∈P , λr,s(C) ≥ k, where λr,s(C) = min{λs(u) : u ⊂
C (u is a Kr)}.
Corollary 1 is easy to see for the k-core case, when r =
1, s = 2. All the traversed vertices are in H u due to maxi-
mality property of k-cores, and all the vertices in H u are tra-
versed due to the connectivity condition, both mentioned in
Definition 2. For the maximum k-(2, 3) nucleus, we can also
see the equality by Definition 2. For all edges e, λ3(e) ≥ k
satisfies the first condition, and the path of triangles, which
does not contain any edge whose λ3 is less than k, implies
the second condition of Definition 2.
Corollary 2. H u can be found by traversing G starting
at the Kr u and including each Kr v to H u if
• λs(v) ≥ k
• ∃ a Ks C s.t. v ⊂ C ∧ λr,s(C) ≥ k.
Repeating this traversal for all Krs u ∈ G gives all the k-
(r, s) nuclei of G.
Traversal is trivial for k-(1, 2) nucleus (k-core):
include
every vertex with greater or equal λ2. For r = 2, s = 3,
maximum k-(2, 3) nucleus is found by doing traversal on
edges. Assuming the λ3 value of the initial edge is k, the next
edge in the traversal should have the λ3 value ≥ k; should be
in the same triangle; and all the edges of this triangle should
have λ3s greater-than or equal to k. Similar for r = 3, s = 4;
traversal is done on triangles, and neighborhood condition
is on the containment of triangles in four-cliques.
In summary, (r, s) nucleus decomposition problem has two
phases: (1) peeling process which finds the λs values of Krs,
(2) traversal on the graph to find all the k-(r, s) nuclei. For
r = 1, s = 2 case, the algorithm for finding λ2 of vertices
is based on the following property, as stated in [34]: to find
the vertices with the λ2 of k, all vertices of degree less than
k and their adjacent edges are recursively deleted. For first
phase, we provide the generic peeling algorithm in Alg. 1,
which has been introduced in our earlier work [42], and for
the second phase, we give the generic traversal algorithm in
Alg. 2, which is basically the implementation of Corollary 2.
The final algorithm, outlined in Alg. 3 combines the two.
Lastly, we define sub-(r, s) nucleus and strong Ks -connected
ness to find the Krs with same λs values. We will use them
to efficiently locate all the k-(r, s) nuclei of given graph.
Mark u as processed
11 return array λs(·) and maxλ
Algorithm 2: Traversal(G, r, s, λ(·), maxλ)
1 for each k ∈ [1, maxλ] do
visited[v] = false, ∀ Kr v ∈ G
for each Kr u ∈ G do
if λs(u) = k and not visited[u] then
Q ← empty queue, Q.push(u)
S ← empty set, S.add(u)
visited[u] ← true
while not Q.empty() do
9
10
2
3
4
5
6
7
8
9
10
Algorithm 1: Set-λ(G, r, s)
1 Enumerate all Krs in G(V, E)
2 For every Kr u, set ωs(u) as the number of Kss containing u
3 Mark every Kr as unprocessed
4 for each unprocessed Kr u with minimum ωs(u) do
5
6
7
8
λs(u) = ωs(u), maxλ = λs(u)
Find set S of Kss containing u
for each C ∈ S do
if any Kr v ⊂ C is processed then continue for
each Kr v ⊂ C, v (cid:54)= u do
if ωs(v) > ωs(u) then ωs(v) = ωs(v) − 1
u ← Q.pop()
for each Kr v s.t.
(u ∪ v ⊂ C) ∧ (C is a Ks) ∧ (λr,s(C) ≥ k) do
11
12
13
14
if not visited[v] then
Q.push(v), S.add(v)
visited[v] ← true
report S
// output the k-(r, s) nucleus
Algorithm 3: NucleusDecomposition(G, r, s)
1 λs(·), maxλ ← Set-λ(G, r, s)// Finding λs of Krs
2 Traversal(G, r, s, λ(·), maxλ)// Finding all (r, s) nuclei
Definition 4. Two Krs u, u(cid:48) with λs(u) = λs(u(cid:48)) are
strongly Ks-connected if there exists a sequence u = u1, u2
, . . . , uk = u(cid:48) such that:
• ∀i, λs(ui) = λs(u)
• ∀i,∃ C s.t.
-- C is a Ks
-- (ui ∪ ui+1) ⊂ C
-- λr,s(C) = λs(u).
Definition 5. sub-(r,s) nucleus, denoted by Tr,s, is a
maximal union of Krs s.t. ∀ Kr pair u, v ⊂ S,
• λs(u) = λs(v)
• u and v are strongly Ks-connected
The sub-(1, 2) nucleus is defined as the subcore in [41, 40].
All the notations are given in Table 2.
2.2 Disjoint sets problem
Disjoint-set data structure, also known as union-find, keeps
disjoint dynamic sets, and maintains upon the operations
that modifies the sets [11]. Each set has a representative.
There are two main operations: Union (x, y) merges the
dynamic sets with ids x and y, and creates a new set, or
just merge one of the sets into the other. Find (x) returns
the representative of the set which contains x.
Disjoint-set forest is introduced with two powerful heuris-
tics [45]. In the disjoint-set forest, each set is a tree, each
Algorithm 4: Disjoint-Set Forest
Link(x, y):
if x.rank > y.rank then y.parent ← x else
x.parent ← y
if x.rank = y.rank then y.rank ← y.rank + 1
// x and y are nodes in the tree
Find(x):
S ← empty set
while x.parent is not null do x ← x.parent, S.add(x) for
each u ∈ S do u.parent ← x return x
Union(x, y): Link(Find(x), Find(y))
node in the tree is an element of the set, and the root of
each tree is the identifier of that set. To keep the trees
flat, two heuristics are used that complement each other.
First is union-by-rank, which merges the shorter tree under
the longer one. Second heuristic is path-compression that
makes each node on the find path point directly to the root.
Time complexity with union-by-rank and path-compression
heuristics is O((m+n)log∗n), where log∗n is the inverse Ack-
ermann function which is almost linear [45]. Pseudocode for
Find and Union operations are given in Alg. 4.
3. LITERATURE AND MISCONCEPTIONS
In this section, we present a detailed review of related work
on peeling algorithms. We point some misconceptions about
the definitions and the consequences. Our focus is on peeling
algorithms and their output, so we limit our scope to k-
core and k-truss decompositions and their generalizations.
Detailed literature review of dense subgraph discovery can
be found in [22, 30].
3.1 k-core decomposition
The very first definition of a k-core related concept is given
by Erdos and Hajnal [15] in 1966. They defined the degen-
eracy as the largest maximum core number of a vertex in
the graph. Matula introduced the min-max theorem [35] for
the same thing, highlighting the relationship between de-
gree orderings of the graph and the minimum degree of any
subgraph, and its applications to graph coloring problem.
Degeneracy number has been rediscovered numerous times
in the context of graph orientations and is alternately called
the coloring number [33], and linkage [17].
First definition of the k-core subgraph is given by Seid-
man [43] for social networks analysis, and also by Matula
and Beck [34], as k-linkage, for clustering and graph color-
ing applications, in the same year of 1983. Seidman [43]
introduced the core collapse sequence, also known as degen-
eracy ordering of vertices, as an important graph feature.
He states that k-cores are good seedbeds that can be used
to find further dense substructures. Though, there is no
algorithm in [43] on how to find the k-cores. Matula and
Beck [34], on the other hand, gives algorithms for finding
λ2 values of vertices, and also finding all the k-cores of a
graph (and their hierarchy) by using these λ2 values, be-
cause there can be multiple k-cores for same k value. Both
papers defined the k-core subgraph as follows:
"A connected and maximal subgraph H is k-core
(k-linkage) if every vertex in H has at least de-
gree k." [43, 34]
The connectedness is an important detail in this definition
because it requires a post-processing traversal operation on
vertices to locate all the k-cores of the graph. Figure 2 shows
this. There are two 3-cores in the graph, and there is no way
to distinguish them at the end of the peeling process by just
looking at the λ values of vertices.
Figure 2: Multiple 3-cores
Batagelj and Zaversnik introduced an efficient implemen-
tation that uses bucket data structure to find the λ values
of vertices [5]. They defined the k-core as a not necessar-
ily connected subgraph, in contrast to previous work they
cited [43, 34]. With this assumption, they claimed that their
implementation finds all the k-cores of the graph.
Finding the relationships between k-cores of a graph has
gained a lot of interest. Nested structure of k-cores reveals
a hierarchy, and it has been shown to be useful for visu-
alization [1] and understanding the underlying structure of
complex networks arising in many domains. Carmi et al. [7]
and Alvarez-Hamelin et al. [2] investigated the k-core hi-
erarchy of internet topology at autonomous systems (AS)
level. Healy et al. [25] compared the k-core hierarchies of
real-world graphs in different domains and some generative
models.
Given the practical benefit and efficiency of k-core decom-
position, there has been a lot of recent work to adapt k-core
algorithms for different data types or setups. Out of memory
computation is an important topic for many graph analytic
problems that deal with massive graphs not fitting in mem-
ory. Cheng et al. [8] introduced the first external-memory
algorithm. Wen et al. [51] and Khaouid et al. [28] provided
further improvements in this direction. Regarding the dif-
ferent type of graphs, Giatsidis et al. adapted the k-core de-
composition for weighted [19] and directed [18] graphs. To
handle the dynamic nature of real-world data, Sariyuce et
al. [41] introduced the first streaming algorithms to main-
tain k-core decomposition of graphs upon edge insertions
and removals. They recently improved these algorithms fur-
ther by leveraging the information beyond 2-hop [40]. Li et
al. [32] also proposed incremental algorithms for the same
problem. More recently, Wu et al. [52] approached dynamic
data from a different angle, and adapted k-cores for tem-
poral graphs where possibly multiple interactions between
entities occur at different times. Motivated by the incom-
plete and uncertain nature of the real network data, O'Brien
and Sullivan [36] proposed new methods to locally estimate
core numbers (λ values) of vertices when entire graph is not
known, and Bonchi et al. [6] showed how to efficiently do
the k-core decomposition on uncertain graphs, which has
existence probabilities on the edges.
One common oversight in all those recent work (except
[41, 42]) is that they ignore the connectivity of k-cores.
This oversight does not change their results, but limit their
contributions: they adapt/improve the peeling part of k-
core decomposition, which finds the λs of vertices, not the
entire k-core decomposition which also needs traversal to
locate all the (connected) k-cores. Considering the exter-
nal memory k-core decomposition algorithms [8, 28, 51],
existing works only focused on how to compute the λ val-
ues of vertices. However, the additional traversal operation
in external memory is not taken into consideration which
is at least as expensive as finding λ values. Finding the
(connected) k-cores and constructing the hierarchy among
2-core3-core3-coreFigure 3: k-dense [39] (triangle k-core [56]), k-truss [10]
(k-community [47]) and k-truss community [26] (k-(2, 3)
nucleus [42]) on the same graph for k=2. Each subgraph
given by the corresponding algorithm is shown in dashed.
Again there was no reference to the connectedness, implying
multiple components can be observed in a triangle k-core.
In the same year, Verma and Butenko [47] introduced the
following:
"k-community is a connected subgraph if every
edge is involved in at least k triangles."
The subtle difference between those papers is the con-
nectedness issue. k-dense [39] and triangle k-core [56] defi-
nitions allow the subgraph to be disconnected whereas the
k-truss [10] and k-community [47] are defined to be con-
nected. All of these works only provided algorithms to find
the λ3 values of edges. k-dense and triangle k-cores can
be found this way since they can be disconnected. How-
ever, finding the k-truss and k-community subgraphs re-
quires a post-processing traversal operation, which increases
the cost. As a stronger alternative to the k-truss, Huang et
al. [26] introduced the k-truss community. The only differ-
ence is that each edge pair in a k-truss community is directly
or transitively triangle-connected, where two edges should
reside in the same triangle to be triangle-connected. The
generic k-(r, s) nucleus, proposed by Sariyuce et al. [42], for
r = 2, s = 3 gives the exact same definition. This brings a
stronger condition on the connectivity structure, and shown
to result in denser subgraphs than the classical k-truss def-
inition [26]. However, it has an extra overhead of post-
processing traversal operation that requires to visit trian-
gles, which is more expensive than the traditional traversal.
Authors devised TCP index, a tree structure at each vertex,
to remedy this issue [26]. Figure 3 highlights the difference
between those definitions on a simple example.
k-truss decomposition serves as a better alternative to the
k-core. For most applications that k-core is useful for, k-
truss decomposition performs better. Gregori et al. [24] in-
vestigated the structure of internet AS-level topologies by
looking at the k-dense subgraphs, similar to Carmi et al. [7]
and Alvarez-Hamelin et al. [2] who used k-core for same
purpose. Orsini et al. [37] also investigated the evolution
of k-dense subgraphs in AS-level topologies.
It has been
also used to understand the global organization of clusters
in complex networks [44]. Colomer-de-Simon et al. used
the hierarchy of k-dense subgraphs to visualize real-world
networks, as Healy et al. [25] used the k-cores for the same
objective.
Proven strength of k-truss decomposition drew further in-
terest for adapting to different data types and setups, sim-
ilar to the k-core literature. Wang and Cheng introduced
external memory algorithms [48] and more improvements
are provided by Zhao and Tung [57] for visualization pur-
poses. More recently, Huang et al. [27] introduced proba-
bilistic truss decomposition for uncertain graphs.
Similar to the k-core case, overlooking the connectivity
constraints limits the contributions in the k-truss literature
as well. For example, external memory k-truss decomposi-
tion [48] would be more expensive and require more intricate
algorithms if it is done to find connected subgraphs by do-
ing the traversal in external memory model. We believe
that our algorithms for efficiently finding the k-trusses and
constructing the hierarchy will be helpful to deal with this
issue.
3.3 Generalizations
them efficiently in the external memory computation model
is not a trivial problem and will limit the performance of
proposed algorithms for finding k-core subgraphs and con-
structing the hierarchy. Similar argument can be considered
for weighted [19], probabilistic [6], and temporal [52] k-core
decompositions, all of which have some kind of threshold-
based adaptations on weights, probabilities and timestamps,
respectively. On the other hand, connectedness definition
is semantically unclear for some existing works like the di-
rected graph core decomposition [18]. It is only defined that
in- and out-degrees of vertices can be considered to find
two λ values, but traversal semantic is not defined for find-
ing subgraphs or constructing the hierarchy. One can think
about building the hierarchy by considering the edges from
lower level k-cores to higher level ones, or the opposite. To
remedy those misconceptions, we focus on the efficient com-
putation of traversal part for k-core decomposition and its
higher-order variants.
3.2 k-truss decomposition
k-truss decomposition is inspired by the k-core and can be
thought as the same peeling problem in a higher level that
deals with triangles.
It is independently introduced, with
subtle differences, by several researchers. Chronologically,
the idea is first proposed by Saito et al. [39], to the best of
our knowledge, in 2006:
"k-dense is a subgraph S if each adjacent vertex
pair in S has more than or equal to (k-2) com-
mon adjacent vertices in S."
In other words, each edge in S should be involved in at least
k-2 triangles. Nothing is mentioned about the connectedness
of the vertices and edges, which implies that a k-dense sub-
graph might have multiple components. Saito et al. argue
that k-dense is a good compromise between easy to com-
pute k-cores and high quality k-cliques, and it is useful to
detect communities in social networks. In 2008, Jonathan
Cohen introduced the k-truss as a better model for cohesive
subgraphs in social networks [10], which became the most
popular naming in the literature:
"k-truss is a one-component subgraph such that
each edge is reinforced by at least k-2 pairs of
edges making a triangle with that edge."
In 2012, Zhang and Parthasarathy [56] proposed a new defini-
ton for visualization purposes:
"triangle k-core is a subgraph that each edge is
contained within at least k triangles in the sub-
graph."
k-densetriangle k-corek-trussk-communityk-truss communityk-(2,3) nucleusGiven the similarity between k-core and k-truss decompo-
sitions, people have been interested in unified schemes to
generalize the peeling process for a broader set of graph
substructures.
Saito et al. pointed a possible direction of generalization
in their pioneering work [39], where they defined k-dense
subgraphs. Their proposal is as follows:
"Subgraph S is a h-level k-dense community
if the vertices in every h-clique of S is adjacent
to at least h-k common vertices." [39]
In other words, h-level k-dense community is the set of h-
cliques where each h-clique is contained in at least h − k
number of (h + 1)-cliques. Note that, there is no connectiv-
ity constraint in the definition. h-level k-dense community
subsumes the disconnected k-core, which contains multiple
k-cores, for h = 1. For h = 2, it is their k-dense defini-
tion [39]. They claimed that h-level k-dense communities
for h > 2 are more or less same with h = 2 and incurs
higher computation cost. So they did not dive into more
algorithmic details and stick with h = 2.
Sariyuce et al. [42] introduced a broader definition to unify
the existing proposals, which can be found by a generic peel-
ing algorithm. As explained in Section 2.1, their definition
subsumes k-core and k-truss community [26] concepts. It is
also more generic than h-level k-dense community of [39],
since (1) it allows to look for involvement of cliques whose
size can differ by more than one, (2) enforces a stronger con-
nectivity constraint to get denser subgraphs. h-level k-dense
community can be expressed as the k-(r, r+1) nucleus which
does not have any connectivity constraint (k is actually h−k
and it does not matter). Well-defined theoretical notion of
k-(r, s) nucleus enables to provide a unified algorithm to find
all the nuclei in graph, as explained in Section 2.1.
O(RTr(G) +(cid:80)
Sariyuce et al. [42] also analyzed the time and space com-
plexity of (r, s)-nucleus decomposition. For the first phase,
they report that finding λ values of nuclei (Alg. 1) requires
v ωr(v)d(v)s−r) time with O(Kr(G)) space,
where RTr(G) is Kr enumeration time, and second part is
searching each Ks that a Kr is involved in (ωr(v) is the num-
ber of Krs containing vertex v, d(v) is the degree of v, and
Kr(G) is the number of Krs in G). For the second phase,
traversal on the entire graph needs to access each Kr and
examine all the Kss it is involved. Its time complexity is the
v ωr(v)d(v)s−r)
same as the second part of first phase: O((cid:80)
which also gives the total time complexity.
4. ALGORITHMS
In this part, we first highlight the challenging aspects of
the traversal phase, then introduce two algorithms for faster
computation of (r, s)-nucleus decomposition to meet those
challenges.
4.1 Challenges of traversal
As mentioned in the previous section, time complexity of the
v ωr(v)d(v)s−r).
However, designing an algorithm that constructs the hierar-
chy with this complexity is challenging. In [42], it is stated
that finding the nuclei in the reverse order of λ is better since
it enables to discover previously found components, thus
avoiding repetition. No further details are given, though.
This actually corresponds to finding all Tr,s (sub-(r, s) nu-
clei of Definition 5), connected Krs with the same λ value,
traversal algorithm for (r, s) nuclei is O((cid:80)
and incorporating the relations among them. But, keeping
track of all the Tr,s in a structured way is hard. Figure 4
shows a case for k-core (r = 1, s = 2). Traversal algorithm
needs to understand the relation between T1,2s of equal λ
that are not directly connected. For instance, Tr,s A and E
are in the same 2-core, but the traditional BFS will find 3
other Tr,s (F, D, G) between those two. During the traver-
sal operation, there is a need to detect each k-(r, s) nucleus,
determine containment relations and construct the hierar-
chy. One solution that can be thought is to construct the
- expectedly smaller - supergraph which takes all the Tr,s
as vertices and their connections as edges. Then, repeti-
tive traversals can be performed on this supergraph to find
each k-(r, s) nucleus and the hierarchy. However, it is not
guaranteed to get a significantly smaller supergraph which
can be leveraged for repetitive traversal. The Tr,s structure
of real-world networks, which are investigated in Section 5,
also verify this concern. It is clear that there is a need for
a lightweight algorithm/data structure that can be used on-
the-fly, so that all the k-(r, s) nuclei can be discovered with
the hierarchy during the traversal algorithm.
The other challenge with the traversal algorithm is the
high computational cost for r ≥ 2 cases. Consider the (2, 3)
case. We need to traverse on edges, and determine the ad-
jacencies of edges by looking at their common triangles. At
each step, it requires to find the common neighbors of the
vertices on extremities (of the edge), check whether each
adjacent edge is previously visited, and push to queue if
not. As explained at the end of Section 3.3, complexity be-
comes O(3 ∗ (cid:52)). Cost is getting much higher if we look
for (3, 4) nuclei, which is shown to give denser subgraphs
with more detailed hierarchy. Ideally we are looking to com-
pletely avoid the costly traversal operation.
4.2 Disjoint-set forest idea
We propose to use disjoint-set forest data structure (DF)
to track the disjoint Tr,s (of equal λ), and construct the
hierarchy where Tr,s with smaller λ is on the upper side, and
greater λ is on the lower side. DF has been used to track
connected components of a graph and fits perfectly to our
problem where we need to find the connected components
at multiple levels.
DF-Traversal algorithm, outlined in Alg. 5, is used to
replace the naive Traversal (Alg. 2) in NucleusDecom-
position (Alg. 3). Basically it finds all the Tr,s in the de-
creasing order of λ. We construct the hierarchy-skeleton tree
by using Tr,ss. Each node in the hierarchy-skeleton is a Tr,s.
We define subnucleus struct to represent a Tr,s. It consists
of λ, rank, parent and root fields. λ field is the λ(v) for
v ∈ Tr,s, rank is the height of the node in the hierarchy-
Figure 4: Example of T1,2s for λ = 2 and λ = 3. Hierarchy
tree is shown on the right with participating T1,2s. λs are
shown in red. Traversal algorithm needs to infer that,
for instance, components A and E are in the same 2-core.
3333333322222DFG332FGABCDEFGBADCEskeleton, parent is a pointer to the parent node and root is
a pointer to the root node of the hierarchy-skeleton. De-
fault values for parent and root are null, and rank is 0.
Figure 5 shows an example hierarchy-skeleton obtained by
Alg. 5. Thin edges show the disjoint-set forests consisting
of Tr,ss of equal λ value. The hierarchy of all (r, s) nuclei,
the output we are interested, can be obtained by using the
hierarchy-skeleton easily: we just take the child-parent links
for which the λ values are different.
In the DF-Traversal algorithm, we keep all the subnuclei
in hrc list (line 1) which also represents the hierarchy-skeleton.
Krs in a Tr,s are stored by inverse-indices; comp keeps
subnucleus index of each Kr in hrc (line 2). We also use
visited to keep track of traversed Krs (line 3). Main idea
is to find each Tr,s in decreasing order of λ (in lines 4-7).
We construct the hierarchy-skeleton in a bottom-up manner
this way and it lets us to use DF to find the representative
Tr,s, i.e., the greatest ancestor, at any time. At each iter-
ation we find an un-visited Kr with the λ value in order
(line 6) and find its Tr,s by SubNucleus algorithm (line 7),
which also updates the hierarchy-skeleton.
SubNucleus (Alg. 6) starts by creating a subnucleus,
Algorithm 5: DF-Traversal(G, r, s, λ(·), maxλ)
1 hrc ← list of subnuclei in a tree structure
2 comp(.) ∀ Kr ∈ G
3 visited[v] = false
4 for each k ∈ [maxλ, 1] do
for each Kr u ∈ G do
// subnucleus id for each Kr
// lazy init
5
6
7
if λ(u) = k and not visited[u] then
SubNucleus (u, G, r, s, λ(·), visited, comp, hrc)
8 root ← subnucleus, with λ = 0
9 for each s ∈ hrc do
if s.parent is null then s.parent ← root
10
11 hrc.add(root) and Report All the Nuclei by hrc,comp
Algorithm 6: SubNucleus(u, G, r, s, λ(·), visited, comp, hrc)
1 sn ← subnucleus, with λ = λ(u), hrc.add(sn)
2 comp(u) ← sn, k ← λ(u)
3 marked[v] = false
4 merge ← list of subnuclei, merge.add(sn)
5 Q ← empty queue, Q.push(u)
6 visited[u] ← true
7 while not Q.empty() do
8
9
u ← Q.pop(), comp(u) ← sn
for each Kr v s.t.
(u ∪ v ⊂ C) ∧ (C is a Ks) ∧ (λr,s(C) = k) do
// lazy init
10
11
12
13
14
15
16
17
18
19
20
21
22
if λ(v) = k then
if not visited[v] then
Q.push(v), visited[v] ← true
comp(v) ← sn
else
s ← comp(v) // λ(v) > k
if not marked[s] then
marked[s] = true
s ← Find-r(s)
if not marked[s] ∧ s (cid:54)= sn then
if hrc(s).λ > k then
hrc(s).parent ← hrc(s).root ← sn
else merge.add(s)
hrc(s).λ = k marked[s] = true
//
23 for each m, n ∈ merge do
24
Union-r(m, n)
Figure 5: A graph shown with Tr,s regions on the left
and the corresponding hierarchy-skeleton on the right.
λ values of Tr,ss are the white numbers. Thin edges are
disjoint-set forests.
with λ of the Kr of interest. We will store the discovered
Krs in this subnucleus (by inverse indices). We put this
subnucleus into hrc (line 1) and assign its comp id (line 2).
We use marked (line 3) to mark the adjacent subnuclei en-
countered during traversal so that unnecessary computation
is avoided in lines 16-22. We do traversal (lines 7-22) by us-
ing a queue. At each step of the traversal, we process the
next Kr in the queue. First, we assign its comp id as the
new subnucleus (line 8) and then visit the adjacent Krs
residing in same Kss, in which min λ of Kr is equal to λ(v)
(line 9). This is exactly the condition for Tr,s, given in Defi-
nition 5. For each adjacent Kr, its λ is either equal (line 10)
or greater (line 14) by definition of Tr,s. If it is equal and
not visited before, we visit it, put into queue (line 12) and
also store in the current subnucleus (line 13). Otherwise,
we find an adjacent subnucleus s with greater λ (line 15),
that is already in hierarchy-skeleton, and can update the
hierarchy-skeleton (lines 18-22) unless we had encountered
s before (line 16).
Location of the subnucleus s in the hierarchy-skeleton
is important.
If it is parentless, we can just make it a
child of the current subnucleus we build. If not, it means
subnucleus s is a part of a larger structure and we should
relate our current subnucleus to the representative of this
large structure, which is the greatest ancestor of s that
is guaranteed to have greater or equal λ (by line 9). So,
hierarchy-skeleton update starts by finding the greatest an-
cestor of the s in line 18. Find-r procedure is defined in
Its difference from Find of Alg. 4 is that we use
Alg. 7.
root field, not parent. root of a node implies its greatest
ancestor in the hierarchy-skeleton, i.e., either it is the great-
est ancestor or a few steps of root iterations would find the
greatest ancestor. parent of a node, on the other hand,
represents the links in hierarchy-skeleton, and not modified
in Find-r. After finding the root and making sure that it
is not processed before (line 19), we can merge the current
subnucleus to the hierarchy-skeleton. If the root has greater
λ, we make it a child of our current subnucleus (line 21),
by assigning both root and parent fields. Otherwise, we
defer merging to the end (line 22), where we merge all
subnuclei with equal λ by Union-r operations (lines 23-
24), defined in Alg. 7. Union-r is slightly different than
Union of Alg. 4 in that it uses Find-r instead of Find and
sets the root field of child node to the parent (in Link-r).
Figure 5 displays the resulting hierarchy-skeleton for the
Tr,s regions shown on the left. We process Tr,s in alpha-
betical order, which also conforms with decreasing order of
λ. Consider the Tr,s O, which is found and processed last.
O finds the adjacent Tr,ss I, J and K, during lines 9-22 of
Alg. 6. All have greater λ values, so we focus on lines 14-
22. Greatest ancestor of I is G, and we make G child of O
6545655DACELFMJHBIOKNG44455555LMONCFJGKDEHIAB(line 21) since its λ is greater. Greatest ancestors of J and
K are L and N, respectively, and they have equal λ values.
So, we merge L and N with O in lines 23-24. Say we merge
O and N first and O becomes parent of N since its rank is
higher. Then, we merge O and L. Their ranks are equal and
we arbitrarily choose L as the parent.
DF-Traversal does not change, i.e., O((cid:80)
After traversing all the Tr,s, we create a root subnucleus to
represent entire graph and make it parent to all the par-
entless nodes (lines 8-11 in Alg. 5). Time complexity of
v ωr(v)d(v)s−r).
Additional space is required by the auxiliary data structures
in DF-Traversal. hrc needs 4 · Tr,s (for four fields), and
comp and visited requires Kr space each.
In addition,
SubNucleus might require at most 2·Tr,s for marked and
merge, and at most Kr for Q, but reaching those upper
bounds in practice is quite unlikely. Overall, additional
space requirement of DF-Traversal at any instant is be-
tween 4 · Tr,s + 2 · Kr and 6 · Tr,s + 3 · Kr. An upper
bound for Tr,s can be given as Kr, when each Kr is as-
sumed to a subnucleus, but this case is also quite unlikely
as we show in Section 5.
4.3 Avoiding traversal
All the Tr,s can be detected without doing a traversal. A Kr
is said to be processed, if its λ is assigned. During the peeling
process, neighborhood of each Kr is examined, see lines 6-7
of Alg. 1, but processed neighbors are ignored (line 8). We
leverage those ignored neighbors to construct the Tr,s. We
Algorithm 7: New Disjoint-Set Forest
Link-r(x, y):
if x.rank > y.rank then y.parent ← x, y.root ← x else
// x and y are nodes in the tree
x.parent ← y, x.root ← y
if x.rank = y.rank then y.rank ← y.rank + 1
Find-r(x):
S ← empty set
while x.root is not null do x ← x.root, S.add(x) for
each u ∈ S do u.root ← x return x
Union-r(x, y): Link-r(Find-r(x), Find-r(y))
Algorithm 8: FastNucleusDecomposition(G, r, s)
1 Enumerate all Krs, mark them unprocessed, find their ωs
2 hrc ← list of subnuclei in a tree structure
3 comp(v) = −1 ∀ Kr v ∈ G // subnucleus id for each Kr
4 ADJ ← list of adjacent subnucleus pairs
5 for each unprocessed Kr u with minimum ωs(u) do
6
7
8
9
10
11
12
λ(u) = ωs(u), hrc.maxλ = λ(u)
sn ← subnucleus with λ = λ(u)
Find set S of Kss containing u
for each C ∈ S do
if ωs(v) > ωs(u) then ωs(v) = ωs(v) − 1
if all Kr v ⊂ C is unprocessed then
for each Kr v ⊂ C, v (cid:54)= u do
introduce FastNucleusDecomposition algorithm (Alg. 8)
to detect Tr,s early in the peeling process so that costly
traversal operation is not needed anymore.
At each iteration of the peeling process, a Kr with the
minimum ω is selected and ω of its unprocessed neighbors
are decremented. No information about the surrounding
processed Krs is used.
If we check the processed neigh-
bors, we can infer some connectivity information and use it
towards constructing all the Tr,s as well as the hierarchy-
skeleton. For example, assume we are doing k-core decom-
position and a vertex u with degree d is selected. We as-
sign λ(u) = d and check the unprocessed neighbors of u to
decrement their degree, if greater than d. We can also ex-
amine the processed neighbors. λ of any processed neighbor
is guaranteed to be less than or equal to d, by definition.
Say v is a neighbor with λ(v) = d. Then, we can say that
u and v are in the same Tr,s. Say w is another neighbor
with λ(w) < d. Then, we can infer that maximum d-(1, 2)
nucleus of w contains u, and Tr,s of u is an ancestor of Tr,s
of w in the hierarchy-skeleton. Leveraging these pairwise
relations enables us to find all the Tr,s and construct the
hierarchy-skeleton.
An important thing to note is that, it is not always possi-
ble to detect the Tr,s of a Kr by only looking at the processed
neighbors. Consider k-core decomposition on a star graph,
for which all vertices has λ = 1. Center vertex is processed
in the last two steps of peeling, so it is not possible to infer
two connected vertices with equal λ until that time. We find
non-maximal Tr,ss (denoted as T ∗
r,s) and combine them by
using the disjoint-set forest algorithm. The difference from
the DF-Traversal algorithm is that our hierarchy-skeleton
will have more nodes because of non-maximal Tr,s.
Colored lines 13-20 in Alg. 8 implements our ideas. For
each Ks we encountered (line 9), processed neighbors are
explored starting from line 13. Note that, there is no need
to check every adjacent and processed Kr in the same Ks,
since the relations among them are already checked in pre-
vious steps.
It is enough to find and process the Kr w
with minimum λ, as in line 15. If w has an equal λ value
(line 16), we need to either put our Kr of interest to the
subnucleus of w (line 17) or merge to the subnucleus of w
by Union-r operation (line 17). In FastNucleusDecom-
position algorithm, we only build disjoint-set forests during
the peeling process (until line 20). If λ(w) happens to have
a smaller value (line 18), we put the pair of subnuclei to a
list (ADJ), which will be used to build the hierarchy-skeleton
after the peeling. We do not process the relations between
Algorithm 9: BuildHierarchy(ADJ, hrc)
1 binned ADJ ← hrc.maxλ # of empty lists
2 for each (s, t) ∈ ADJ do
// to bin ADJ
// hrc(s).λ > hrc(t).λ
13
14
15
16
17
18
19
else
D ← set of processed Krs ⊂ C
w ← v ∈ D with the smallest λ
if λ(w) = λ(u) then
if comp (u) = −1 then comp(u) = comp(w)
else Union-r (comp(u), comp(w))
else ADJ.add(comp(u), comp(w)) // λ(w) < λ(u)
if comp (u) = −1 then comp(u) ← sn, hrc.add(sn)
Update all (−1, ·) ∈ ADJ with (comp(u), ·)
20 BuildHierarchy (ADJ, hrc)
21 create subnucleus root with λ = 0, tie to all existing roots
22 hrc.add(root) and Report All the Nuclei by hrc,comp
// postprocessing
binned ADJ[hrc(t).λ].add(s, t)
4 for each list l ∈ binned ADJ in [hrc.maxλ ... 1] order do
3
5
6
7
8
9
10
11
12
13
merge ← empty list of subnucleus pairs
for each (s, t) ∈ l do
s ← Find-r(s), t ← Find-r(t)
if s (cid:54)= t then
if hrc(s).λ > hrc(t).λ then
hrc(s).parent = hrc(s).root = t
else merge.add(s, t)
for each (s, t) ∈ merge do
Union-r (s, t)
Table 3: Statistics for the real-world graphs. Largest graph in the dataset has more than 37M edges. (cid:52) is the number
of triangles, K4 is the number of four-cliques. Ratios of s-cliques to r-cliques are shown in columns 6,7,8, for s ≤ 4
r,s),
and s− r = 1. Columns 9 to 14 show sub-(r, s) nuclei numbers (Tr,s) and non-maximal sub-(r, s) nuclei numbers (T ∗
artifact of Alg. 8, for the (r, s) values we interested. Last two columns are the number of connections from T ∗
r,ss with
higher λ values to the ones with lower λ values.
E
V
K4
2,3) c↓(T ∗
T ∗
3,4
T3,4
T1,2
V
(cid:52)
8.0 M
2M
1.1M 1.2M 2.1M 2.7M 1.4M
1.7M 11.1M 28.8M 148.8M 6.54 2.59 5.17
8.6K 9.3K 106.3K 137.7K 206.0K 261.1K
1.4 M
22.9K 852.4K 5.3M 26.6M 37.22 6.30 4.96
2.7K 2.8K 27.3K 34.6K 77.6K 105.7K 509.1 K
6.4K 251.2K 2.3M 13.7M 39.24 9.44 5.77
1.2 M
11.6K 568.3K 5.8M 37.1M 49.05 10.27 6.37
4.7K 4.9K 56.8K 72.5K 185.2K 255.1K
36.4K 1.6M 11.2M 70.7M 43.74 7.03 6.33 13.5K 14.9K 210.0K 266K 395.5K 498.9K
2.6 M
3,4)
8.2 M
skitter(SK)
1.9 M
Berkeley13(BE)
1.3 M
MIT(MIT)
2.9 M
Stanford3(ST)
Texas84(TX)
3.7 M
twitter-hb(TW) 456.6K 12.5M 83.0M 429.7M 27.39 6.63 5.18 341.4K 350K 2.9M 3.3M 5.6M 7.3M 27.2 M 59.5 M
916.4K 4.3M 13.4M 39.9M 4.71 3.10 2.98 408.7K 508.3K 386.9K 568.4K 251.4K 382.8K 982.8 K 814.7 K
Google(GO)
1.5K 1.7K
129.6K 11.7M 837.9M 52.2B 90.60 71.35 62.36
uk-2005(UK)
0
wiki-0611(WK)
3.1M 37.0M 88.8M 162.9M 11.76 2.40 1.83
2.4M 2.5M 7.9M 9.7M 6.7M 9.3M 45.1 M 45.0 M
c↓(T ∗
T ∗
2,3
T ∗
1,2
T2,3
K4
837
837
836
836
0
E
(cid:52)
(cid:52)
E
subnuclei of different λ right away for two reasons: (1)
subnucleus of the Kr of interest might not be assigned yet
(comp(u) is -1), (2) order of processing subnuclei relations
is crucial to build the hierarchy-skeleton correctly and effi-
ciently. Regarding (1), we take care of the Krs not belonging
to a subnucleus in lines 19 and 19. For (2), we have the
BuildHierarchy function (line 20), defined in Alg. 9.
In BuildHierarchy, we create maxλ number of bins to
distribute the subnuclei pairs based on the smaller λ of
the subnucleus pair. The reason is same with our reverse
order discovery of subnuclei in DF-Traversal (Alg. 5):
we construct the hierarchy-skeleton in a bottom-up manner
and it enables us to use disjoint-set forest algorithm to lo-
cate the k-(r, s) nuclei that we need process. Distribution
is done in lines 2-3. Then, we just process the binned list
(binned ADJ) in reverse order of λ values (line 4). We do the
same operations to build the hierarchy-skeleton: lines 7-11
of BuildHierarchy and lines 18-22 of SubNucleus algo-
rithm (Alg. 6) are almost same. Once we finish each list in
binned ADJ, we union the accumulated subnuclei of equal
λ values (lines 12-13), as we did in lines 23-24 of SubNu-
cleus algorithm. Finally, in FastNucleusDecomposition
we create a subnucleus to represent entire graph, make it
parent to all parentless subnuclei, and report the hierar-
chy.
r,s) is(cid:0)s
(cid:1)Ks, when each Kr is assumed to
Avoiding traversal does not change the time complexity of
overall algorithm, since the peeling part was already taking
more time. Auxiliary data structures in FastNucleusDe-
composition requires additional space, though. hrc needs
4 · T ∗
r,s in which subnuclei are not necessarily maximal,
and comp needs Kr. ADJ structure corresponds to the con-
nections from T ∗
r,ss with higher λ values to the ones with
lower λ values, which we denote as c↓(T ∗
r,s). The upper
bound for c↓(T ∗
be a T ∗
r,s and their λ values are adversary (see the end of
Section 3.3 for details). However, it is quite unlikely as we
show in Section 5. binned ADJ in BuildHierarchy is just
an ordered version of ADJ, and needs the same amount of
space; c↓(T ∗
r,s). Lastly, merge in BuildHierarchy might
r,s) at most, but it is quite unlikely.
require another c↓(T ∗
Overall, additional space requirement of FastNucleusDe-
composition at any instant is 4 · T ∗
r,s) + Kr
and additional c↓(T ∗
r,s) might be needed. Section 5 gives
more details on T ∗
r,s structure of real-world networks and
their impact to the memory cost.
r,s + 2 · c↓(T ∗
r
5. EXPERIMENTS
We evaluated our algorithms on different types of real-world
networks, obtained from SNAP [31], Network Repository [38]
and UF Sparse Matrix Collection [12]. Our dataset includes
an internet topology network (skitter), facebook friendship
networks of some universities (Berkeley13, MIT, Stanford3,
Texas84) [46], follower network of Twitter users tweeted
about Higgs boson-like particle discovery (twitter-hb), web
networks (Google, uk-2005) and network of wikipedia pages
(wiki-0611). We ignore the directions for directed graphs.
Important statistics of the networks are given in Table 3.
Ks/Kr ratio gives an estimate for the k-(r, s) nucleus de-
composition runtime, as explained at the end of Section 3.3,
and we put them in columns 6-8 to show the challenging
and diverse characteristics of the networks in our dataset.
Note that most of the networks have relatively high edge
density in the realm of real-world networks and it makes
the computation more expensive. We also included graphs
with various Ks/Kr ratios to diversify our dataset. Last
eight columns are shown to explain the runtime and memory
costs of our algorithms. All the algorithms are implemented
in C++ and compiled using gcc 5.2.0 at -O2 optimization
level. All experiments are done on a Linux operating system
running on a machine with Intel Xeon Haswell E5-2698 2.30
GHz processor with 128 GB of RAM.
Nucleus decomposition has been shown to give denser sub-
graphs and more detailed hierarchies for s − r=1 cases, for
fixed s [42]. We implemented and tested our algorithms
for s − r=1 cases where s ≤ 4: giving us (1, 2), (2, 3) and
(3, 4) nucleus decompositions. (1, 2)-nucleus decomposition
is same as the k-core decomposition [43] and (2, 3) corre-
sponds to k-truss community finding [26] (stronger defini-
tion of k-truss decomposition [10]). We consider the k-(r, s)
nucleus as a set of Krs. In our algorithms, we find the k-
(r, s) nuclei for all k values and determine the hierarchy tree
among those nuclei. We report the total time of peeling and
traversal (or post-processing) that takes the graph as input
and gives all the nuclei with an hierarchy.
5.1
Peeling phase of the k-core decomposition, which finds λ
values of vertices, is well studied, and most efficient imple-
mentation is used in our work. As mentioned before, traver-
sal part, however, is mostly overlooked and there is no true
algorithm to serve as a baseline.
k-core decomposition (or (1, 2) nuclei)
In their pioneering work, Matula and Beck [34] introduced
a high-level algorithm, named LCPS (Level Component Pri-
Table 4: k-core decomposition results. Hypo is the hy-
pothetical limit for the best possible traversal based al-
gorithm. Naive is Alg. 3, DFT is the one using Alg. 5,
FND is the Alg. 8 and LCPS is our adaptation from [34].
Right-most column is the runtimes of fastest algorithm
and rest are its speedups over other algorithms.
speedups with respect to
time (s)
(1,2)-nuclei Hypo Naive DFT FND LCPS
1.94
skitter
0.05
Berkeley13
0.01
MIT
0.03
Stanford3
0.11
Texas84
1.18
twitter-hb
3.83
Google
0.17
uk-2005
7.79
wiki-0611
avg
best
5.94x 2.79x 1.33x
0.41x
0.82x 19.74x 1.68x 2.77x
0.82x 17.51x 1.74x 2.80x
0.78x 25.50x 1.76x 2.19x
0.78x 23.01x 1.61x 2.57x
0.80x 27.89x 1.94x 2.60x
0.15x
3.45x 0.40x 0.27x
0.86x 58.02x 2.61x 3.32x
0.52x 10.09x 1.96x 1.41x
0.66x 21.24x 1.83x 2.14x
ority Search), to detect k-cores and the hierarchy among
them. LCPS algorithm traverses the vertices based on λ val-
ues in a selective order and outputs them with interspersed
brackets. The vertices enclosed by paired brackets at depth
k + 1 are the vertices of a k-core in G. The traversal can be
started from any vertex, and neighbors are discovered and
put in a priority queue along with their λ values. At each
step, vertex with the maximum λ is chosen from the queue,
and processed. Closed/open brackets are interspersed ac-
cording to the λ values of consecutively processed vertices.
Authors argue that time complexity of LCPS is O(E), but
an implementation may not always be possible owing to the
difficulty of maintaining an appropriate priority queue [34].
We adapt and implement the LCPS algorithm for our
objectives. We alleviate the problem of maintaining an ap-
propriate priority queue by using the bucket data structure,
known by the bucket sort [11]. During the traversal, we
place the discovered vertices in the bucket according to their
λ values, and find the one with the maximum λ value in O(1)
time. We also adapted the placing brackets part to have the
tree hierarchy, where each node is a T1,2. If the λ value of
vertex of interest is equal to the one in the previous step,
we stay in the same node. If it is greater, we go down in the
tree by creating a chain of new nodes, otherwise we climb up
in the tree. Number of these new nodes (or steps to climb)
is the difference between λs of current and previous vertex.
As a result, we create a tree hierarchy with as many levels
as the max λ in the graph.
Table 4 gives the total k-core decomposition runtimes for
experimented algorithms; the fastest one shown on the right-
most column and its speedups over other algorithms given
on the corresponding columns. Naive is the base nucleus
decomposition algorithm, given in Alg. 3, and uses the naive
traversal to find all k-cores. DFT is the algorithm that uses
DF-Traversal (Alg. 5) and FND is the FastNucleusDe-
composition algorithm (Alg. 8). LCPS denotes the run-
time of our LCPS adaptation. Note that we are not aware
of any other adaptation/implementation of the LCPS algo-
rithm in [34]. We also have a hypothetical runtime, shown
as Hypo, which is the peeling time plus a BFS traversal
on the entire graph. Hypo is a limit for the most efficient
traversal (plus regular peeling) that can be done on a given
graph. Although it does not compute the hierarchy and find
k-cores, it shows the best that can be done with a traversal-
based nucleus decomposition algorithm. Peeling phases of
Hypo, Naive, DFT, and LCPS are same.
Results show that our LCPS adaptation outperforms other
alternatives. Detailed timings suggest that traversal time is
almost same with peeling, satisfying the linear complexity
in the number of edges. On average, LCPS is 21.24x faster
than Naive algorithm. Speedups over DFT and FND are
1.83x and 2.14x. Our LCPS adaptation also runs in only
66% time of the theoretical limit of Hypo, where the over-
head is due to the bucket data structure.
(2, 3) nuclei
5.2
Table 5 gives the runtime comparison for entire (2, 3) nu-
cleus decomposition, where rightmost column is the fastest
algorithm and other columns are its speedups over other
algorithms. To start with, we state that our peeling imple-
mentation for (2, 3) nucleus decomposition is quite efficient;
for instance [48] computes λ values of skitter graph in 281
secs where we can do it in 74 secs. We also tested wiki-Talk
graph just to compare with [26], and we get 41/13 = 3.15
times faster results despite our less powerful CPU. Apart
from Naive, DFT and FND algorithms, we give Hypo as
the bound for the best possible traversal-based nucleus de-
composition algorithm that traverses graph over edges and
triangles. In addition, we implemented the TCP index con-
struction algorithm introduced by Huang et al. [26]. In that
work, authors devise TCP index on vertices which enable
fast traversal to answer max-(2, 3) nucleus queries on ver-
tices. TCP index is a tree structure at each vertex, which is
actually the maximum spanning forest of each ego-network.
TCP index is constructed after the peeling process to be
ready for incoming queries. Note that our implementation
of TCP index construction is also quite efficient that is 1.8x
faster than [26] for the dataset in their work. In Table 5, we
show the time only for peeling plus TCP index construction.
Entire graph still needs to be traversed using TCP to find
all the (2, 3) nuclei and the hierarchy among them. Peeling
phases of Hypo, Naive, TCP and DFT are same.
Before checking the fastest, we look at the DFT algo-
rithm, which is the second best. It is 2.4x and 122.4x faster
than TCP and Naive algorithms, respectively. Note that,
TCP time is even before the traversal. In 40% of the time
that TCP spends for being ready to answer queries, DFT
is able to give all the answers, i.e, (2, 3) nuclei and the hi-
erarchy. This shows the benefit of using disjoint-set forests
to detect the nuclei and construct the hierarchy. One of our
initial objectives was to meet the computational complexity
of traversal phase by true design and implementation. DFT
does that by keeping the traversal time close to the peeling
time; traversal takes only 23% more time than peeling on av-
erage. Figure 6 shows the comparison, where we normalize
runtimes with respect to total DFT. Also, DFT performs
only 34% slower than the hypothetical bound (Hypo).
The fastest algorithm is FND. It is 215x faster than Naive
on average and gives 1729 speedup on Google. It outper-
forms TCP by 4.3x on average and up to 11x (on uk-2005).
FND also works 1.76x faster than DFT and Figure 6 shows
the detailed comparison. For DFT, peeling is Alg. 1 and
postprocessing is the traversal time (Alg. 5). For FND,
postprocessing is the BuildHierarchy algorithm (Alg. 9)
and peeling is the rest in Alg. 8. FND is able to keep the
total time comparable to the peeling of DFT; it is only 29%
slower! This is exactly the benefit of avoiding traversal by
early discovery of non-maximal T2,3. On uk-2005 graph,
benefit of avoiding traversal is most apparent; DFT per-
forms worst compared to FND. Because there are only 837
Table 5: (2,3) and (3,4) nucleus decomposition results. Right-most column for each is the runtimes of the fastest
algorithm and rest are its speedup over other algorithms. Starred numbers (*) show lower bounds, when the algorithm
did not finish in 2 days. Hypo is the hypothetical limit for the best possible traversal based algorithm. For (2,3), it
is done on edges and triangle connections, and for (3,4) it is on triangles and four-clique connections. Naive is Alg. 3
and TCP* is the indexing algorithm proposed by [26] and does not even include (2, 3) nuclei finding. DFT is the one
using Alg. 5 and FND is the Alg. 8.
(2,3)-nuclei
(3,4)-nuclei
speedups with respect to
time (s)
Hypo Naive TCP*[26] DFT FND Hypo
skitter
Berkeley13
MIT
Stanford3
Texas84
twitter-hb
Google
uk-2005
wiki-0611
avg
45.62x
1.54x
10.76x
1.13x
11.68x
1.10x
12.58x
1.10x
14.41x
1.10x
1.33x
16.24x
1.31x 1729.93x
90.50x
1.68x
1.53x
7.06x
1.31x 215.4x
3.69x 2.04x
3.41x 1.40x
3.45x 1.33x
3.41x 1.36x
3.35x 1.37x
3.27x 1.49x
3.90x 1.59x
11.07x 3.64x
3.37x 1.63x
4.32x 1.76x
T2,3s which means no work is done by disjoint-set forest and
all the time is spent on traversal (see Figure 6). As men-
tioned in Section 4, extended peeling in FND finds non-
maximal T2,3, and the count might be much larger than the
number of T2,3s. However, it is not the case. Last 6 columns
of Table 3 show that there is no significant difference; on av-
erage non-maximal T2,3s are 24% more than T2,3s.
DFT and FND algorithms require additional memory, as
mentioned at the end of Section 4.2. The upper bound of
additional space for DFT is 6 · T2,3 + 3 · E, and takes at
most ∼650MB for any graph in our dataset, where int is
used to store each number (four bytes). Although the upper
bound of T2,3 is E, we observed that it is only 13.1%
of E on average, which can be calculated from Table 3.
Regarding the FND, upper bound is given as 4 · T ∗
2,3 + 3 ·
c↓(T ∗
2,3)+E (see Section 4.3) and it takes at most ∼1.4GB
for the experimented graphs (two ints for each connection
in c↓(T ∗
2,3)). We observed that uk-2005 graph have so many
edges with no triangles that results in isolated T ∗
2,3s (and
3,4) = 0. For the rest, we see
3,4s), so c↓(T ∗
T ∗
that c↓(T ∗
average.
2,3) is only 8.7% of the upper bound ((cid:0)3
(cid:1)(cid:52)), on
2,3) = c↓(T ∗
Lastly, we check FND vs. Hypo. FND is faster on all in-
stances, and 1.31x on average, meaning that it outperforms
any possible traversal-based algorithm for (2, 3) nucleus
decomposition. This is so important to show the strength of
2
Figure 6: (2,3) [top] and (3,4) [bottom] nucleus decom-
position comparison for DFT (the one using Alg. 5 for
traversal) and FND (shown in Alg.8). Two main results:
(1) Traversal part of DFT is close to the peeling part,
(2) FND is able to keep the total runtime comparable to
the peeling part of DFT
time (s)
FND
speedups with respect to
DFT
Naive
163.91∗x
1.78x
1.42x 1812.47∗x
1.45x 3848.02∗x
1.48x 1321.89∗x
679.06∗x
1.49x
38.96∗x
1.78x
1.35x 1083.02∗x
1.98∗x
1.24x
23.00∗x
1.82x
1.96x
1054.2
91.3
1.52x
95.3
7.3
1.53x
44.9
2.8
1.58x
130.7
7.8
1.57x
254.5
16.8
1.81x
4434.9
255.5
1.43x
159.6
13.0
1.98∗x 87329.6
562.5
7513.5
584.9
1.91x
best 1.53x > 996.92x > 1.70 x
best
(3, 4) nuclei
(1) detecting the non-maximal T2,3 early to avoid traversal,
(2) using disjoint-set forest data structure to handle on-the-
fly computation.
5.3
Table 5 and Figure 6 gives the comparison of all algorithms
on (3, 4)-nucleus decomposition, which has been shown to
give subgraphs with highest density and most detailed hi-
erarchy [42]. Results are similar to the (2, 3) case: FND is
the best and speedups are sharper. Naive algorithm could
not be completed in 2 days for any graph. DFT also could
not finish its computation on uk-2005 graph in that time.
Regarding the memory requirement, we see that DFT and
FND take at most ∼10GB and ∼3.5GB for the graphs in
our dataset. Also, T3,4 and c↓(T ∗
3,4) are far from the upper
bounds, only of 3.9% and 2.5% on average. Overall, FND
outperforms all others. Figure 6 shows that total time of
FND is only 21% more than the peeling time of DFT and
only 2% slower on wiki-0611. Most significantly, FND is
1.53x faster than hypothetical limit (Hypo) of any possible
traversal-based (3, 4) nucleus decomposition algorithm.
6. CONCLUSION
In this work, we focused on computing the hierarchy of dense
subgraphs given by peeling algorithms. We first provided a
detailed review of previous work and pointed misconceptions
about k-core and k-truss decompositions. We proposed two
generic algorithms to compute any nucleus decomposition.
Our idea to leverage disjoint-set forest data structure for
hierarchy computation works well in practice. We further
improved the performance by detecting the subgraphs dur-
ing peeling process to avoid traversal. We also adapted and
implemented an existing idea for k-core decomposition hi-
erarchy, and showed its benefit. Overall, our algorithms
significantly outperformed the existing alternatives.
There are two open questions that might be worth to look
at. First is about the analysis. Nested structures given by
the resulting hierarchy only show the k-(r, s) nuclei. Instead
looking at the Tr,ss, which are many more than the k-(r, s)
nuclei, might reveal more insight about networks. This actu-
ally corresponds to the hierarchy-skeleton structure that our
algorithms produce. Second is regarding the performance.
We believe that adapting the existing parallel peeling algo-
rithms for the hierarchy computation can be helpful.
0 20 40 60 80 100% wrt total DFT 0 20 40 60 80 100DFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFND% wrt total DFTpeelingpostprocWKUKGOTWTXSTMITBESK7. ACKNOWLEDGMENTS
This work was funded by the Applied Mathematics Pro-
gram at the U.S. Department of Energy and Sandia's Labo-
ratory Directed Research & Development (LDRD) program.
Sandia National Laboratories is a multi-program laboratory
managed and operated by Sandia Corporation, a wholly
owned subsidiary of Lockheed Martin Corporation, for the
U.S. Department of Energy's National Nuclear Security Ad-
ministration under contract DE-AC04-94AL85000.
8. REFERENCES
[1] J. I. Alvarez-Hamelin, A. Barrat, and A. Vespignani. Large
scale networks fingerprinting and visualization using the k-core
decomposition. In NIPS, pages 41 -- 50, 2006.
[2] J. I. Alvarez-Hamelin, L. Dall'Asta, A. Barrat, and
A. Vespignani. K-core decomposition of Internet graphs:
hierarchies, self-similarity and measurement biases. Networks
and Heterogeneous Media, 3(2):371 -- 293, 2008.
[3] A. Angel, N. Sarkas, N. Koudas, and D. Srivastava. Dense
subgraph maintenance under streaming edge weight updates for
real-time story identification. PVLDB, 5(6):574 -- 585, Feb. 2012.
[4] G. D. Bader and C. W. Hogue. An automated method for
finding molecular complexes in large protein interaction
networks. BMC Bioinformatics, 4(1):1 -- 27, 2003.
[5] V. Batagelj and M. Zaversnik. An o(m) algorithm for cores
decomposition of networks. Technical Report cs/0310049,
Arxiv, 2003.
[6] F. Bonchi, F. Gullo, A. Kaltenbrunner, and Y. Volkovich. Core
decomposition of uncertain graphs. In KDD, pages 1316 -- 1325,
2014.
[7] S. Carmi, S. Havlin, S. Kirkpatrick, Y. Shavitt, and E. Shir. A
model of internet topology using k-shell decomposition. PNAS,
104(27):11150 -- 11154, 2007.
[8] J. Cheng, Y. Ke, S. Chu, and M. T. Ozsu. Efficient core
decomposition in massive networks. In ICDE, pages 51 -- 62,
2011.
[9] A. Clauset, C. Moore, and M. E. J. Newman. Hierarchical
structure and the prediction of missing links in networks.
Nature, 453:98 -- 101, 2008.
[10] J. Cohen. Trusses: Cohesive subgraphs for social network
analysis. National Security Agency Technical Report, 2008.
[11] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson.
Introduction to Algorithms. McGraw-Hill, 2001.
[12] T. A. Davis and Y. Hu. The university of florida sparse matrix
collection. ACM Trans. Math. Softw., 38(1):1:1 -- 1:25, 2011.
[13] Y. Dourisboure, F. Geraci, and M. Pellegrini. Extraction and
classification of dense communities in the web. In WWW, pages
461 -- 470, 2007.
[14] X. Du, R. Jin, L. Ding, V. E. Lee, and J. H. T. Jr. Migration
motif: a spatial - temporal pattern mining approach for
financial markets. In KDD, pages 1135 -- 1144, 2009.
[15] P. Erdos and A. Hajnal. On chromatic number of graphs and
set-systems. Acta Mathematica Hungarica, 17:61 -- 99, 1966.
[16] E. Fratkin, B. T. Naughton, D. L. Brutlag, and S. Batzoglou.
Motifcut: regulatory motifs finding with maximum density
subgraphs. In ISMB, pages 156 -- 157, 2006.
[17] E. C. Freuder. A sufficient condition for backtrack-free search.
J. ACM, 29(1):24 -- 32, Jan. 1982.
[18] C. Giatsidis, D. M. Thilikos, and M. Vazirgiannis. Evaluating
cooperation in communities with the k-core structure. In
ASONAM, pages 87 -- 93, 2011.
[19] C. Giatsidis, D. M. Thilikos, and M. Vazirgiannis. D-cores:
measuring collaboration of directed graphs based on
degeneracy. Knowl. Inf. Syst., 35(2):311 -- 343, 2013.
[20] D. Gibson, R. Kumar, and A. Tomkins. Discovering large dense
subgraphs in massive graphs. In VLDB, pages 721 -- 732, 2005.
[21] A. Gionis, F. Junqueira, V. Leroy, M. Serafini, and I. Weber.
Piggybacking on social networks. PVLDB, 6(6):409 -- 420, 2013.
[22] A. Gionis and C. E. Tsourakakis. Dense subgraph discovery:
Tutorial. In KDD, pages 2313 -- 2314, 2015.
[23] D. F. Gleich and C. Seshadhri. Vertex neighborhoods, low
conductance cuts, and good seeds for local community
methods. In KDD, pages 597 -- 605, 2012.
[24] E. Gregori, L. Lenzini, and C. Orsini. k-dense communities in
the internet as-level topology. In COMSNETS, pages 1 -- 10,
2011.
[25] J. Healy, J. Janssen, E. Milios, and W. Aiello. Characterization
of Graphs Using Degree Cores, pages 137 -- 148. Springer Berlin
Heidelberg, 2008.
[26] X. Huang, H. Cheng, L. Qin, W. Tian, and J. X. Yu. Querying
k-truss community in large and dynamic graphs. In SIGMOD,
pages 1311 -- 1322, 2014.
[27] X. Huang, W. Lu, and L. V. Lakshmanan. Truss decomposition
of probabilistic graphs: Semantics and algorithms. In
SIGMOD, pages 77 -- 90, 2016.
[28] W. Khaouid, M. Barsky, S. Venkatesh, and A. Thomo. K-core
decomposition of large networks on a single PC. PVLDB,
9(1):13 -- 23, 2015.
[29] R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins.
Trawling the web for emerging cyber-communities. In WWW,
pages 1481 -- 1493, 1999.
[30] V. E. Lee, N. Ruan, R. Jin, and C. Aggarwal. A survey of
algorithms for dense subgraph discovery. In Managing and
Mining Graph Data, volume 40. 2010.
[31] J. Leskovec and A. Krevl. SNAP Datasets, June 2014.
[32] R. Li, J. X. Yu, and R. Mao. Efficient core maintenance in
large dynamic graphs. IEEE TKDE, 26(10):2453 -- 2465, 2014.
[33] D. Lick and A. White. k-degenerate graphs. Canadian Journal
of Mathematics, 22:1082 -- 1096, 1970.
[34] D. Matula and L. Beck. Smallest-last ordering and clustering
and graph coloring algorithms. JACM, 30(3):417 -- 427, 1983.
[35] D. W. Matula. A min-max theorem for graphs with application
to graph coloring. SIAM Review, 10(4):481 -- 482, 1968.
[36] M. P. O'Brien and B. D. Sullivan. Locally estimating core
numbers. In ICDM, pages 460 -- 469, 2014.
[37] C. Orsini, E. Gregori, L. Lenzini, and D. Krioukov. Evolution
of the internet k-dense structure. IEEE/ACM Trans. Netw.,
22(6):1769 -- 1780, 2014.
[38] R. Rossi and N. Ahmed. The network data repository with
interactive graph analysis and visualization. In AAAI, pages
4292 -- 4293, 2015.
[39] K. Saito and T. Yamada. Extracting communities from
complex networks by the k-dense method. In ICDMW, 2006.
[40] A. E. Sarıyuce, B. Gedik, G. Jacques-Silva, K.-L. Wu, and
U. V. C¸ atalyurek. Incremental k-core decomposition:
algorithms and evaluation. VLDB Journal, pages 1 -- 23, 2016.
[41] A. E. Sarıyuce, B. Gedik, G. Jacques-Silva, K.-L. Wu, and
U. V. C¸ atalyurek. Streaming algorithms for k-core
decomposition. Proc. VLDB Endow., 6(6):433 -- 444, Apr. 2013.
[42] A. E. Sarıyuce, C. Seshadhri, A. Pınar, and U. V. C¸ atalyurek.
Finding the hierarchy of dense subgraphs using nucleus
decompositions. In WWW, pages 927 -- 937, 2015.
[43] S. B. Seidman. Network structure and minimum degree. Social
Networks, 5(3):269 -- 287, 1983.
[44] P. Simon, M. Serrano, M. Beiro, J. Alvarez-Hamelin, and
M. Boguna. Deciphering the global organization of clustering in
real complex networks. Scientific Reports, 3(2517), 2013.
[45] R. E. Tarjan. Efficiency of a good but not linear set union
algorithm. JACM, 22(2):215 -- 225, Apr. 1975.
[46] A. L. Traud, P. J. Mucha, and M. A. Porter. Social structure of
facebook networks. Physica A: Statistical Mechanics and its
Applications, 391(16):4165 -- 4180, 2012.
[47] A. Verma and S. Butenko. Network clustering via clique
relaxations: A community based approach. In DIMACS Graph
Part. and Clustering, pages 129 -- 140, 2012.
[48] J. Wang and J. Cheng. Truss decomposition in massive
networks. PVLDB, 5(9):812 -- 823, 2012.
[49] S. Wasserman and K. Faust. Social Network Analysis:
Methods and Applications. Cambridge Univ Press, 1994.
[50] D. Watts and S. Strogatz. Collective dynamics of 'small-world'
networks. Nature, 393:440 -- 442, 1998.
[51] D. Wen, L. Qin, Y. Zhang, X. Lin, and J. Yu. I/o efficient core
graph decomposition at web scale. In ICDE, pages 133 -- 144,
2016.
[52] H. Wu, J. Cheng, Y. Lu, Y. Ke, Y. Huang, D. Yan, and H. Wu.
Core decomposition in large temporal graphs. In Big Data,
IEEE International Conf. on, pages 649 -- 658, 2015.
[53] S. Wuchty and E. Almaas. Peeling the yeast protein network.
PROTEOMICS, 5(2):444 -- 449, 2005.
[54] B. Zhang and S. Horvath. A general framework for weighted
gene co-expression network analysis. Statistical Applications in
Genetics and Molecular Biology, 4(1):Article 17+, 2005.
[55] H. Zhang, H. Zhao, W. Cai, J. Liu, and W. Zhou. Using the
k-core decomposition to analyze the static structure of
large-scale software systems. J. of Supercomputing,
53(2):352 -- 369, 2009.
[56] Y. Zhang and S. Parthasarathy. Extracting analyzing and
visualizing triangle k-core motifs within networks. In ICDE,
pages 1049 -- 1060, 2012.
[57] F. Zhao and A. Tung. Large scale cohesive subgraphs disc. for
social network visual analysis. In PVLDB, pages 85 -- 96, 2013.
|
1602.01103 | 2 | 1602 | 2016-02-06T20:13:55 | Winning Arguments: Interaction Dynamics and Persuasion Strategies in Good-faith Online Discussions | [
"cs.SI",
"cs.CL",
"physics.soc-ph"
] | Changing someone's opinion is arguably one of the most important challenges of social interaction. The underlying process proves difficult to study: it is hard to know how someone's opinions are formed and whether and how someone's views shift. Fortunately, ChangeMyView, an active community on Reddit, provides a platform where users present their own opinions and reasoning, invite others to contest them, and acknowledge when the ensuing discussions change their original views. In this work, we study these interactions to understand the mechanisms behind persuasion.
We find that persuasive arguments are characterized by interesting patterns of interaction dynamics, such as participant entry-order and degree of back-and-forth exchange. Furthermore, by comparing similar counterarguments to the same opinion, we show that language factors play an essential role. In particular, the interplay between the language of the opinion holder and that of the counterargument provides highly predictive cues of persuasiveness. Finally, since even in this favorable setting people may not be persuaded, we investigate the problem of determining whether someone's opinion is susceptible to being changed at all. For this more difficult task, we show that stylistic choices in how the opinion is expressed carry predictive power. | cs.SI | cs | Winning Arguments: Interaction Dynamics and Persuasion
Strategies in Good-faith Online Discussions
Chenhao Tan
Vlad Niculae
Cristian Danescu-Niculescu-Mizil
Cornell University
{chenhaovladcristianllee}@cs.cornell.edu
Lillian Lee
6
1
0
2
b
e
F
6
]
I
S
.
s
c
[
2
v
3
0
1
1
0
.
2
0
6
1
:
v
i
X
r
a
ABSTRACT
Changing someone’s opinion is arguably one of the most important
challenges of social interaction. The underlying process proves
difficult to study: it is hard to know how someone’s opinions are
formed and whether and how someone’s views shift. Fortunately,
ChangeMyView, an active community on Reddit, provides a plat-
form where users present their own opinions and reasoning, invite
others to contest them, and acknowledge when the ensuing discus-
sions change their original views.
In this work, we study these
interactions to understand the mechanisms behind persuasion.
We find that persuasive arguments are characterized by interest-
ing patterns of interaction dynamics, such as participant entry-order
and degree of back-and-forth exchange. Furthermore, by compar-
ing similar counterarguments to the same opinion, we show that
language factors play an essential role. In particular, the interplay
between the language of the opinion holder and that of the coun-
terargument provides highly predictive cues of persuasiveness. Fi-
nally, since even in this favorable setting people may not be per-
suaded, we investigate the problem of determining whether some-
one’s opinion is susceptible to being changed at all. For this more
difficult task, we show that stylistic choices in how the opinion is
expressed carry predictive power.
1.
INTRODUCTION
Changing a person’s opinion is a common goal in many settings,
ranging from political or marketing campaigns to friendly or pro-
fessional conversations. The importance of this topic has long been
acknowledged, leading to a tremendous amount of research effort
[9, 15, 17, 42, 46, 47]. Thanks to the increasing number of social
interactions online, interpersonal persuasion has become observ-
able at a massive scale [19]. This allows the study of interactive
persuasion in practice, without elicitation, thus bypassing some
limitations of laboratory experiments and leading to new research
questions regarding dynamics in real discussions. At the same time,
the lack of the degree of experimental control offered by lab trials
raises new methodological challenges that we address in this work.
It is well-recognized that multiple factors are at play in persua-
sion. Beyond (i) the characteristics of the arguments themselves,
Copyright is held by the International World Wide Web Conference Com-
mittee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the
author’s site if the Material is used in electronic media.
WWW 2016, April 11–15, 2016, Montréal, Québec, Canada.
ACM 978-1-4503-4143-1/16/04.
http://dx.doi.org/10.1145/2872427.2883081.
such as intensity, valence and framing [1, 2, 4, 6, 23], and (ii) so-
cial aspects, such as social proof and authority [7, 10, 33], there is
also (iii) the relationship between the opinion holder and her belief,
such as her certainty in it and its importance to her [44, 45, 54, 59].
Thus, an ideal setting for the study of persuasion would allow ac-
cess to the reasoning behind people’s views in addition to the full
interactions. Furthermore, the outcome of persuasion efforts (e.g.,
which efforts succeed) should be easy to extract.1
One forum satisfying these desiderata is the active Reddit sub-
community /r/ChangeMyView (henceforth CMV).2 In contrast
to general platforms such as Twitter and Facebook, CMV requires
posters to state the reasoning behind their beliefs and to reward
successful arguments with explicit confirmation. Moreover, dis-
cussion quality is monitored by moderators, and posters commit
to an openness to changing their minds. The resulting conversa-
tions are of reasonably high quality, as demonstrated by Figure 1,
showing the top portion of a discussion tree (an original post and
all the replies to it) about legalizing the “tontine”.3 In the figure,
Reply B.1 branches off to an extended back-and-forth between the
blue original poster (OP) and the orange user; as it turns out, nei-
ther ends up yielding, although both remain polite. Reply A.1, on
the other hand, is successful, as the OP acknowledges at A.2. The
example suggests that content and phrasing play an important role
(A.1 does well on both counts), but also that interaction factors may
also correlate with persuasion success. Examples include time of
entry relative to others and amount of engagement: the discussion
at B.1 started earlier than that at A.1 and went on for longer.
Outline and highlight reel. This work provides three different per-
spectives on the mechanics of persuasion. First, we explore how
interaction dynamics are associated with a successful change of
someone’s opinion (§3). We find (example above to the contrary)
that a challenger that enters the fray before another tends to have
a higher likelihood of changing the OP’s opinion; this holds even
for first-time CMV challengers, and so is not a trivial consequence
of more experienced disputants contriving to strike first. Although
engaging the OP in some back-and-forth is correlated with higher
chances of success, we do not see much OP conversion in extended
conversations. As for opinion conversion rates, we find that the
more participants there are in the effort to persuade the OP, the
larger the likelihood of the OP changing her view; but, interest-
ingly, the relationship is sublinear.
1 One might think that the outcome is trivially “no one ever changes
their mind”, since people can be amazingly resistant to evidence
contravening their beliefs [8, 32, 36]. But take heart, change does
occur, as we shall show.
2https://reddit.com/r/changemyview
3 It is not necessary for the reader to be familiar with tontines, but a
brief summary is: a pool of money is maintained where the annual
payouts are divided evenly among all participants still living.
Figure 1: A fragment of a “typical” /r/ChangeMyView discussion tree—typical in the sense that the full discussion tree has an av-
erage number of replies (54), although we abbreviate or omit many of them for compactness and readability. Colors indicate distinct
users. Of the 17 replies shown (in our terminology, every node except the original post is a reply), the OP explicitly acknowledged only
one as having changed their view:
(The full discussion
tree is available at https://www.reddit.com/r/changemyview/comments/3mzc6u/cmv_the_tontine_should_be_
legalized_and_made_a/.)
the starred reply A.1. The explicit signal is the “∆” character in reply A.2.
Besides interaction dynamics, language is a powerful tool that is
in the full control of the challengers. In §4 we explore this perspec-
tive by tackling the task of predicting which of two similar coun-
terarguments will succeed in changing the same view. By com-
paring similar arguments we focus on the role of stylistic choices
in the presentation of an argument (identifying reasoning strate-
gies is a separate problem we do not address). We experiment with
style features based solely on the counterargument, as well as with
features reflecting the interplay between the counterargument and
the way in which the view is expressed. Style features and inter-
play features both prove useful and outperform a strong baseline
that uses bag-of-words. In particular, interplay features alone have
strong predictive power, achieving an improvement of almost 5%
in accuracy over the baseline method (65.1% vs 59.6%) in a com-
pletely fresh heldout dataset. Our results also show that it is useful
to include links as evidence—an interesting contrast to studies of
the backfire effect: “When your deepest convictions are challenged
by contradictory evidence, your beliefs get stronger” [8, 32, 36].
However, it hurts to be too intense in the counterargument. The
feature with the most predictive power of successful persuasion is
the dissimilarity with the original post in word usage, while exist-
ing theories mostly study matching in terms of attitude functions or
subject self-discrepancy [43, 56].
In the majority of cases, however, opinions are not changed, even
though it takes courage and self-motivation for the original poster
to post on CMV and invite other people to change her opinion. Can
we tell whether the OP is unlikely to be persuaded from the way she
presents her reasoning? In §5, we turn to this challenging task. In
our pilot study, humans found this task quite difficult in a paired set-
ting and performed no better than random guessing. While we can
outperform the random baseline in a realistic imbalanced setting,
the AUC score is only 0.54. Our feature analysis is consistent with
existing theories on self-affirmation [11, 12] and shows that mal-
leable beliefs are expressed using more self-confidence and more
organization, in a less intense way.
While we believe that the observations we make are useful for
understanding persuasion, we do not claim that any of them have
causal explanations.
In §6, we discuss other observations that may open up future di-
rections, including attempts to capture higher-level linguistic prop-
erties (e.g., semantics and argument structure); §7 summarizes ad-
ditional related work and §8 concludes.
2. DATASET
We draw our data from the /r/ChangeMyView subreddit (CMV),
which has over 211,000 subscribers to date. It is self-described4 as
“dedicated to the civil discourse [sic] of opinions”. CMV is well-
suited to our purposes because of its setup and mechanics, the high
quality of its arguments, and the size and activity of its user base.
We elaborate below.
The mechanics of the site are as follows. Users that “accept that
they may be wrong or want help changing their view” submit orig-
inal posts, and readers are invited to argue for the other side. The
original posters (OPs) explicitly recognize arguments that succeed
in changing their view by replying with the delta (∆) character
(an example is node A.2 in Figure 1) and including “an explana-
tion as to why and how” their view changed. A Reddit bot called
the DeltaBot confirms deltas (an example is A.3 in Figure 1) and
maintains a leaderboard of per-user ∆ counts.5 The experimental
4Quotations here are from the CMV wiki.
5Although non-OPs can also issue deltas, in this work, we only
count deltas given by a user in their OP role. A consequence is that
we only consider discussion trees where the OP’s Reddit account
(OP) Title: I believe that you should be allowed to drive at whatever speed you wish as long as you aren’t driving recklessly or under extenuating
circumstances CMV.
I think that if you feel comfortable driving 80 mph or 40 mph you should be allowed to do so, as long as you aren’t in a school or work zone, etc. because
there are a lot more risks in those areas. I think when you’re comfortable driving you will be a better driver, and if you aren’t worrying about the speed
limit or cops you are going to be more comfortable. However, I think that you should only be allowed to drive at whatever speed you wish as long as you
aren’t driving recklessly. If you’re weaving in and out of traffic at 90, you probably shouldn’t be allowed to go 90, but if you just stay in the fast lane and
pass the occasional person I don’t think there is a problem. CMV.
(C1) Some issues with this:
↓
1. Who’s to say what is reckless driving? Where do you draw the line?
Speed is the standard that ensures we know what is considered to be
reckless. The idea of driving any speed you want creates a totally
subjective law.
2. How do you judge whether to pass other drives and such? There are a
lot of spatial awareness issues with the roads being so unpredictable.
3. How do you expect insurance and courts to work out who’s at fault for
an accident?
A: “Yeah this guy was going 100 mph!”
B: “But I wasn’t driving recklessly - you were!”
It’s simply not realistic and creates some serious legal issues.
↓
(C2) They’re many issues I have with this idea but I’ll start with the most
pressing one. Think of the amount of drivers you pass by every day. Imagine
all of them going at whatever speed they choose. How would this work? You
cannot have a driver going 35 and a driver who wants to go 65 in the same
lane.
Now lets take this onto the highway and you can see how horrific this could
get quickly. They’re too many drivers out on the road for everyone to choose
there own speed.
Speed limits protect us all because it gives us a reasonable expectation in
whatever area we’re driving in. Have you ever been on the highway being
a driver going 40mph? If you’re doing the speed limit (65) you catch up to
them so fast you barely have time to react before an accident occurs. You
aren’t expecting this low speed when everyone is going at similar speeds to
yours.
Drivers need to know the speed expectations so they can drive and react
accordingly. If everyone goes at whatever speed they want it will only cause
many many accidents.
Figure 2: An original post and a pair of root replies C1 and C2 contesting it, where C1 and C2 have relatively high vocabulary overlap with
each other, but only one changed the OP’s opinion. (§4 reveals which one.)
advantages of this setup include:
(1) Multiple users make different attempts at changing the same
person’s mind on the same issue based on the same rationale, thus
controlling for a number of variables but providing variation along
other important aspects. Figure 2, for example, presents in full two
counter-arguments, C1 and C2. They both respond to the same
claims, but differ in style, structure, tone, and other respects.
(2) The deltas serve as explicit persuasion labels that are (2a) pro-
vided by the actual participants and (2b) at the fine-grained level of
individual arguments, as opposed to mere indications that the OP’s
view was changed.
(3) The OP has, in principle, expressed an openness to other points
of view, so that we might hope to extract a sufficient number of
view-changing examples.
These advantages are not jointly exhibited by other debate sites,
such as CreateDebate.com, ForandAgainst.com, or Debate.org.
The high quality of argumentation makes CMV a model site for
seeing whether opinion shifts can at least occur under favorable
conditions. Moderators enforce CMV rules, making sure that OPs
explain why they hold their beliefs and do so at reasonable length
(500 characters or more), and that OPs engage in conversation with
challengers in a timely fashion. Other rules apply to those who
contest the original post. There are rules intended to prevent “low
effort” posts, such as “Posts that are only a single link with no
substantial argumentation”, but “Length/conciseness isn’t the de-
termining [criterion]. Adequate on-topic information is.”6 Figure 2
had not been deleted—i.e., the original post is not attributed to the
ambiguous name “[deleted]”— at the time of crawl.
6It is worth noting that, as in many online communities, not all
these rules were in place at the site’s creation.
It is a separate
and interesting research question to understand what effects these
rules have and why they were put in place. The currently en-
forced set of rules is available at https://www.reddit.com/
r/changemyview/wiki/rules.
Table 1: Dataset statistics. The disjoint training and test date ranges
are 2013/01/01–2015/05/07 and 2015/05/08–2015/09/01.
# discussion trees
18,363
2,263
# nodes
1,114,533
145,733
# OPs
12,351
1,823
# uniq. participants
69,965
16,923
Training
Heldout
shows an example where indeed, the OP described their point in
reasonable detail, and the responders raised sensible objections.
The high amount of activity on CMV means that we can extract a
large amount of data. We process all discussion trees created at any
time from January 2013, when the subreddit was created, to Au-
gust 2015, saving roughly the final 4 months (May–August 2015)
for held-out evaluation. Some size statistics are given in Table 1.
Monthly trends are depicted in Figure 3:7 after the initial startup,
activity levels stabilize to a healthy, stable growth in average num-
ber of replies and challengers, as, gratifyingly, do OP conversion
rates, computed as the fraction of discussion trees wherein the OP
awarded a ∆ (Figure 3d). For posts where the OP gave at least one
delta, the OP gave 1.5 deltas on average. This dataset is available at
https://chenhaot.com/pages/changemyview.html.
3.
INTERACTION DYNAMICS
Changing someone’s opinion is a complex process, often involv-
ing repeated interactions between the participants. In this section
we investigate the relation between the underlying dynamics and
the chances of “success”, where “success” can be seen from the
perspective of the challenger (did she succeed in changing the OP’s
opinion?), as well as from that of the set of challengers (did anyone
change the OP’s view?).
7We omit the first month as the DeltaBot may not have been set up.
(a) Number of posts per month.
(b) Average no. replies per post.
(a) Delta ratio vs. entry order.
(b) Delta ratio vs. degree of back-
and-forth exchanges.
Figure 4: Figure 4a shows the ratio of a person eventually winning
a delta in a post with at least 10 challengers depending on the order
of her/his entry. Early entry is more likely to win a delta. Figure 4b
presents the probability of winning a delta given the number of
comments by a challenger in a back-and-forth path with OP. With
6 or more replies in a back-and-forth path, no challengers managed
to win a delta among our 129 data points (with 5 replies, the success
ratio is 1 out of 3K). In both figures, error bars represent standard
errors (sometimes 0).
attract attempts by 10 unique challengers, the first two challengers
are 3 times more likely to succeed as the 10th (Figure 4a).
One potential explanation for this finding is that dedicated expert
users are more likely to be more active on the site and thus see posts
first. To account for this, we redo the analysis only for users that
are participating for the first time on CMV. We observe that even
after controlling for user experience, an earlier entry time is still
more favorable. We omit the figure for space reasons.
Back-and-forth. After entering a discussion, the challenger can ei-
ther spend more effort and engage with the OP in a back-and-forth
type of interaction or call it quits. Figure 4b shows the relation
between the likelihood of receiving a ∆ and degree of back-and-
forth, defined as the number of replies the root challenger made in
a path involving only her and the OP.9 We observe a non-monotonic
relation between back-and-forth engagement and likelihood of suc-
cess: perhaps while some engagement signals the interest of the OP,
too much engagement can indicate futile insistence; in fact, after 5
rounds of back-and-forth the challenger has virtually no chance of
receiving a ∆.
3.2 OP’s conversion
From the perspective of an original post, conversion can happen
when any of the challengers participating in the discussion suc-
ceeds in changing the OP’s view. We now turn to exploring how
an OP’s conversion relates to the volume and type of activity her
original post attracts.
Number of participants. It is reasonable to expect that an OP’s
conversion is tied to the number of challengers [7, 10]. For in-
stance, the OP might be persuaded by observing the sheer number
of people arguing against her original opinion. Moreover, a large
number of challengers will translate into a more diverse set of ar-
guments, and thus higher likelihood that the OP will encounter the
ones that best fit her situation. Indeed, Figure 5a shows that the
likelihood of conversion does increase with the number of unique
9If a subtree won a ∆, we only consider the winning path; other-
wise, other conversations would be mistakenly labeled unsuccess-
ful. For instance, the path A.1, A.2, A.4, A.5 in Figure 1 is not
considered.
(c) Average no. challengers per post.
(d) Average delta percentage.
Figure 3: Monthly activity over all full months represented in the
training set. The delta percentage is the fraction of discussion trees
in which the OP awarded a delta.
In order to discuss the relation between interaction dynamics and
success, we now introduce corresponding terminology using the
example illustrated in Figure 1:
• An original statement of views (original post) together with
all the replies form a discussion tree.
• A direct reply to an original post is called a root reply (A.1
and B.1 in Figure 1). The author of a root reply is a root
challenger.
• A subtree includes a root reply and all its children (B.1–B.12
form one of the two subtrees in Figure 1).
• A path constitutes all nodes from root reply to a leaf node.
Figure 1 contains four paths: P1: A.1, P2: A.1, A.2, A.4,
A.5, P3: B.1–B.11 and P4: B.1, B.12. Note that when a ∆
is awarded, the DeltaBot automatic reply (A.3) and the OP’s
post that triggers it (A.2) are not considered part of the path.
In order to focus on discussions with non-trivial activity, in this
section we only consider discussion trees with at least 10 replies
from challengers and at least one reply from the OP.
3.1 Challenger’s success
A challenger is successful if she manages to change the view
of the OP and receive a ∆. We now examine how the interaction
patterns in a discussion tree relate to a challenger’s success.
Entry time. How does the time when a challenger enters a dis-
cussion relate to her chances of success? A late entry might give
the challenger time to read attempts by other challengers and bet-
ter formulate their arguments, while an early entry might give her
the first-mover advantage.8 Even for original posts that eventually
8Note that although reply display order is affected by upvotes, en-
try time is an important factor when the OP follows the post closely.
201302201306201310201402201406201410201502201504020040060080010001200#posts201302201306201310201402201406201410201502201504304050607080average#replies201302201306201310201402201406201410201502201504101520253035average#challengers20130220130620131020140220140620141020150220150420%30%40%deltapercentage0246810challengerrankintime1%2%3%4%5%deltapercentage123456+#repliesinaback-and-forthpath0%1%2%3%4%5%6%deltapercentagechallenger’s opening argument in a rooted path-unit, and full path,
which considers the text in all replies within a rooted path-unit.
In response to the same original post, there are many possible
ways to change someone’s view. We aim to find linguistic factors
that can help one formulate her/his argument, rather than to analyze
reasoning strategies.10 Hence, for each rooted path-unit that wins
a ∆, we find the rooted path-unit in the same discussion tree that
did not win a ∆ but was the most “similar” in topic. We measure
similarity between rooted path-units based on Jaccard similarity in
the root replies after removing stopwords (as defined by Mallet’s
dictionary [31]).
Jaccard(A, B) =
A ∩ B
A ∪ B ,
where A, B are the sets of words in the first reply of each of the two
rooted path-units. This leads to a balanced binary prediction task:
which of the two lexically similar rooted path-units is the successful
one? With this setup, we attempt to roughly de-emphasize what is
being said, in favor of how it is expressed.
We further avoid trivial cases, such as replies that are not argu-
ments but clarifying questions, by removing cases where the root
reply has fewer than 50 words. In order to make sure that there are
enough counterarguments that the OP saw, motivated by the results
in §3.2, we also require that there are at least 10 challengers in the
discussion tree and at least 3 unsuccessful rooted path-units before
the last reply that the OP made in the discussion tree.
In an ideal world, we would control for both length [13] and
topic [25, 52], but we don’t have the luxury of having enough data
to do so.
In our pilot experiments, annotators find that Jaccard-
controlled pairs are easier to compare than length-matched pairs, as
the lexical control is likely to produce arguments that make similar
claims. Since length can be predictive (for instance, C2 won a
∆ in Figure 2), this raises the concern of false positive findings.
Hence we develop a post-mortem “dissection” task (labelled root
truncated) in which we only consider the root reply and truncate
the longer one within a pair so that both root replies have the same
number of words. This forcefully removes all length effects.
Disclaimer: Features that lose predictive power in the root trun-
cated setting (or “reverse direction”11) are not necessarily false
positives (or non-significant), as truncation can remove significant
fractions of the text and lead to different distributions in the re-
sultant dataset. Our point, though, is: if features retain predictive
power even in the root truncated settings, they must be indicative
beyond length.
We extract pairs from the training and heldout periods respec-
tively as training data (3,456 pairs) and heldout testing data (807
pairs). Given that our focus is on language, we only use text-based
features in this section.12 In preprocessing, we remove explicit ed-
its that users made after posting or commenting, and convert quo-
tations and URLs into special tokens.
4.2 Features
In order to capture characteristics of successful arguments, we
explore two classes of textual features: (§4.2.1) features that de-
scribe the interplay between a particular challenger’s replies and the
original post, and (§4.2.2) features that are solely based on his/her
10That is an intriguing problem for future work that requires a
knowledge base and sophisticated semantic understanding of lan-
guage.
11E.g., more of feature f is significantly better for root reply, but
less f is significantly better in root truncated.
12An entry order baseline only achieves 54.3% training accuracy.
(a) Delta percentage vs. number of
unique challengers.
Single-challenger
subtree
(b)
vs.
multiple-challenger subtree
controlled by the number of replies.
Figure 5: Probability that a submitted view will be changed, given
(a) the total number of unique challengers binned using log2, and
(b) the number of replies in a subtree.
challengers. Notably, we observe a saturation in how much value
each new challenger adds beyond a certain point.
Sheer number of challengers or diversity of counterarguments?
To distinguish between the two possible explanations proposed in
the previous paragraph, we control for the diversity of counterargu-
ments by focusing only on subtrees, in which challengers generally
focus on the same argument. To make a fair comparison, we fur-
ther control the number of total replies in the subtree. In light of
Figure 4b, we only consider subtrees with between 2 and 4 replies.
Figure 5b shows that single-challenger subtrees consistently out-
perform multiple-challenger subtrees in terms of conversion rate.
This observation suggests that the sheer number of challengers is
not necessarily associated with higher chances of conversion. The
fact that multiple-challenger subtrees are less effective might sug-
gest that when talking about the same counterargument, challengers
might not be adding value to it, or they might even disagree (e.g.,
B.12 vs. B.2 in Figure 1); alternatively, root replies that attract mul-
tiple challengers might be less effective to begin with.
4. LANGUAGE INDICATORS
OF PERSUASIVE ARGUMENTS
The interaction dynamics studied in the previous section are to a
large extent outside the challenger’s influence. The language used
in arguing, however, is under one’s complete control; linguistic cor-
relates of successful persuasion can therefore prove of practical
value to aspiring persuaders. In order to understand what factors
of language are effective, we set up paired prediction tasks to ex-
plore the effectiveness of textual discussion features, in the context
of CMV.
4.1 Problem setup
In order to study an individual’s success in persuasion, we con-
sider the collection of arguments from the same person in the same
line of argument. We focus on arguments from root challengers
since the root reply is what initiates a line of argument and deter-
mines whether the OP will choose to engage. We define all replies
in a path by the root challenger as a rooted path-unit, e.g., reply
A.1 and B.1 in Figure 1.
As shown in §3, situations where there is more than one reply
in a rooted path-unit correspond to a higher chance that the OP
will be persuaded. So, while the challenger’s opening argument
should be important, statements made later in the rooted path-unit
could be more important. To distinguish these two cases, we con-
sider two related prediction tasks: root reply, which only uses the
183264128256#challengers5%10%15%20%25%30%35%40%45%50%deltapercentageavg#challengersavgdelta%234#replies3%4%5%6%7%8%deltapercentagesinglemultipleTable 2: Significance tests on interplay features. Features are sorted
by average p-value in the two tasks. In all feature testing tables, the
number of arrows indicates the level of p-value, while the direction
shows the relative relationship between positive instances and neg-
ative instances, ↑↑↑↑: p < 0.0001, ↑↑↑: p < 0.001, ↑↑: p < 0.01,
↑: p < 0.05. T in the root reply column indicates that the feature
is also significant in the root truncated condition, while T R means
that it is significant in root truncated but the direction is reversed.
Feature name
reply frac. in all
reply frac. in content
OP frac. in stopwords
#common in stopwords
reply frac. in stopwords
OP frac. in all
#common in all
Jaccard in content
Jaccard in stopwords
#common in content
OP frac. in content
Jaccard in all
root reply
↓↓↓↓ (T )
↓↓↓↓ (T )
↑↑↑↑ (T R)
↑↑↑↑ (T R)
↓↓↓↓
↑↑↑↑ (T R)
↑↑↑↑ (T R)
↓↓↓↓ (T )
↑↑↑↑ (T R)
↑↑↑↑ (T R)
↑
(T R)
↓
(T )
full path
↓↓↓↓
↓↓↓↓
↑↑↑↑
↑↑↑↑
↓↓↓↓
↑↑↑↑
↑↑↑↑
↓↓↓↓
↑↑↑↑
↑↑↑↑
↑↑↑↑
Interplay with the original post: Table 2
replies. We present those features that are statistically significant in
the training data under the paired t-test with Bonferroni correction
for multiple comparisons.
4.2.1
The context established by the OP’s statement of her view can
provide valuable information in judging the relative quality of a
challenger’s arguments. We capture the interplay between argu-
ments and original posts through similarity metrics based on word
overlap.13 We consider four variants based on the number of unique
words in common between the argument (A) and the original post
(O):
• number of common words: A ∩ O,
• reply fraction:
• OP fraction:
• Jaccard:
O
A∩O
A∪O .
,
A∩O
A
A∩O
,
Table 3: Argument-only features that pass a Bonferroni-corrected
significance test. Features are sorted within each group by average
p-value over the two tasks. Due to our simple truncation based on
words, some features, such as those based on complete sentences,
cannot be extracted in root truncated; these are indicated by a dash.
We remind the reader of the root truncated disclaimer from §4.
Feature name
#words
Word category–based features
#definite articles
#indefinite articles
#positive words
#2nd person pronoun
#links
#negative words
#hedges
#1st person pronouns
#1st person plural pronoun
#.com links
frac. links
frac. .com links
#examples
frac. definite articles
#question marks
#PDF links
#.edu links
frac. positive words
frac. question marks
#quotations
Word score–based features
arousal
valence
Entire argument features
word entropy
#sentences
type-token ratio
#paragraphs
Flesch-Kincaid grade levels
Markdown formatting
#italics
bullet list
#bolds
numbered words
frac. italics
root reply
↑↑↑↑
full path
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑ (T R)
↑↑↑↑
↑↑↑↑ (T )
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑ (T )
↑↑↑↑ (T )
↑↑↑↑ (T )
↑
↑
(T )
↑ —
↑
↓
—
↓
↓
(T )
↑↑↑↑
↑↑↑↑ —
↓↓↓↓ (T R)
↑↑↑↑ —
—
↑↑↑↑ —
↑↑↑↑ —
↑↑ —
↑
↑ —
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑
↑↑↑↑
↑↑↑
↑
↓
↑↑↑↑
↓↓↓
↑↑↑↑
↑↑↑↑
↓↓↓↓
↑↑↑↑
↓↓↓
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑↑↑↑
↑
While stopwords may be related to how challengers coordinate
their style with the OP [14, 35], content words can be a good signal
of new information or new perspectives. Thus, inspired by previous
results distinguishing these vocabulary types in studying the effect
of phrasing [52], for each of the four variants above we try three
different word sets: stopwords, content words and all words.
The features based on interplay are all significant to a certain
degree. Similar patterns occur in root reply and full path: in num-
ber of common words and OP fraction, persuasive arguments have
larger values because they tend to be longer, as will be shown in
§4.2.2; in reply fraction and Jaccard, which are normalized by re-
ply length, persuasive arguments are more dissimilar from the orig-
inal post in content words but more similar in stopwords. Keeping
in mind that the pairs we compare are chosen to be similar to each
other, our analysis indicates that, under this constraint, persuasive
arguments use a more different wording from the original post in
content, while at the same time matching them more on stopwords.
13We also tried tf-idf, topical, and word embedding–based similarity
in cross validation on training data. We defer discussion of poten-
tially useful features to §6.
If we instead use truncation to (artificially) control for reply length,
persuasive arguments present lower similarity in all metrics, sug-
gesting that effects might differ over local parts of the texts. How-
ever, it is consistent that successful arguments are less similar to
the original post in content words.
4.2.2 Argument-only features: Table 3
We now describe cues that can be extracted solely from the replies.
These features attempt to capture linguistic style and its connec-
tions to persuasion success.
Number of words. A straightforward but powerful feature is the
number of words. In both root reply and full path, a larger number
of words is strongly correlated with success. This is not surpris-
ing: longer replies can be more explicit [37, 38] and convey more
information. But naïvely making a communication longer does not
automatically make it more convincing (indeed, sometimes, more
succinct phrasing carries more punch); our more advanced features
attempt to capture the subtler aspects of length.
(a) Arousal in root replies.
(b) Concreteness in root replies.
(c) Dominance in root replies.
(d) Valence in root replies.
(e) Arousal in original posts.
(f) Concreteness in original posts.
(g) Dominance in original posts.
(h) Valence in original posts.
Figure 6: Style features in different quarters. The first row shows how arousal, concreteness, dominance and valence change in different
quarters of the root reply, while the second row shows the same features in the original posts. The descending concreteness trend suggests
that opinions tend to be expressed in a particular-to-general way; replies notably differ by having both the opening and the closing be abstract,
with a concrete middle. These differences are indicative of the functions that the two forms of utterances serve: a CMV rule is that original
posts should not be “like a persuasive essay”. Error bars represent standard errors.
Word category–based features. As suggested by existing psy-
chology theories and our intuitions, the frequency of certain types
of words may be associated with persuasion success. We consider
a wide range of categories (see §9 for details), where for each,
we measure the raw number of word occurrences and the length-
normalized version.
Word score–based features. Beyond word categories, we employ
four scalar word-level attributes [5, 57]:
• Arousal captures the intensity of an emotion, and ranges from
“calm” words (librarian, dull) to words that excite, like ter-
rorism and erection.
• Concreteness reflects the degree to which a word denotes
something perceptible, as opposed to abstract words which
can denote ideas and concepts, e.g., hamburger vs. justice.
• Dominance measures the degree of control expressed by a
word. Low-dominance words can suggest vulnerability and
weakness (dementia, earthquake) while high-dominance words
evoke power and success (completion, smile).
• Valence is a measure of how pleasant the word’s denotation
is. Low-valence words include leukemia and murder, while
sunshine and lovable are high-valence.
We scale the four measures above to lie in [0, 1].14 We extend these
measures to texts by averaging over the ratings of all content words.
Table 3 shows that it is consistently good to use calmer language.
Aligned with our findings in terms of sentiment words (§9), per-
suasive arguments are slightly less happy. However, no significant
differences were found for concreteness and dominance.
14While the resources cover most common words, out-of-
vocabulary misses can occur often in user-generated content. We
found that all four values can be extrapolated with high accuracy to
out-of-vocabulary words by regressing on dependency-based word
embeddings [29] (median absolute error of about 0.1). Generaliz-
ing lexical attributes using word embeddings was previously used
for applications such as figurative language detection [55].
Characteristics of the entire argument. We measure the number
of paragraphs and the number of sentences: persuasive arguments
have significantly more of both. To capture the lexical diversity in
an argument, we consider the type-token ratio and word entropy.
Persuasive arguments are more diverse in root reply and full path,
but the type-token ratio is surprisingly higher in root truncated: be-
cause of correlations with length and argument structure, lexical di-
versity is hard to interpret for texts of different lengths. Finally, we
compute Flesch-Kincaid grade level [26] to represent readability.
Although there is no significant difference in root reply, persuasive
arguments are more complex in full path.
Formatting. Last but not least, discussions on the Internet employ
certain writing conventions enabled by the user interface. Since
Reddit comments use Markdown15 for formatting, we can recover
the usage of bold, italic, bullet lists, numbered lists and links for-
matting.16 While these features are not applicable in face-to-face
arguments, more and more communication takes place online, mak-
ing them highly relevant. Using absolute number, most of them are
significant except numbered lists. When it comes to normalized
counts, though, only italicizing exhibits significance.
4.2.3 They hold no quarter, they ask no quarter
Understanding how a line of argument might evolve is another
interesting research problem. We investigate by quartering each
argument and measuring certain feature values in each quarter, al-
lowing for finer-grained insight into argument structure.
Word score–based features in quarters. (Figure 6) With the ex-
ception of arousal, effective arguments and ineffective arguments
present similar patterns: the middle is more concrete and less dom-
inant than the beginning and end, while valence rises slightly over
the course of an argument. We also see interesting differences in
psycholinguistic patterns between original posts and replies. (We
15 https://daringfireball.net/projects/markdown/
16We also consider numbered words (first, second, third, etc.) as the
textual version of numbered lists.
1st2nd3rd4th0.3960.3970.3980.3990.4000.4010.402arousaleffectivenoteffective1st2nd3rd4th0.4850.4900.4950.5000.505concretenesseffectivenoteffective1st2nd3rd4th0.55400.55450.55500.55550.55600.55650.55700.55750.55800.5585dominanceeffectivenoteffective1st2nd3rd4th0.5500.5510.5520.5530.5540.5550.556valenceeffectivenoteffective1st2nd3rd4th0.3980.3990.4000.4010.4020.4030.404arousalmalleableresistant1st2nd3rd4th0.4850.4900.4950.5000.5050.5100.515concretenessmalleableresistant1st2nd3rd4th0.5400.5450.5500.555dominancemalleableresistant1st2nd3rd4th0.5300.5350.5400.5450.5500.555valencemalleableresistantFigure 7: Similarity between each quar-
ter of an argument and the entire original
post.
Figure 8: Prediction results. The cyan fraction in the left figure shows the performance in root
truncated, and the purple bar shows the performance in root reply. The magenta line shows
the performance of #words in root reply, while the gray line shows the performance of #words
in root truncated, which is the same as random guessing. The figure on the right gives the
performance in full path (the magenta line gives the performance of #words). The number of
stars indicate the significance level compared to the #words baseline according to McNemar’s
test. (*: p < 0.05, **: p < 0.01, ***: p < 0.001.)
defer detailed discussion to §5.) In terms of arousal, however, suc-
cessful arguments begin by using calmer words.
Interplay with the original post.
(Figure 7) To capture partial
overlap and possible divergence from the OP’s view, we divide
both the original post and the rooted path-unit into quarters, and
measure similarity metrics between all subdivisions (including the
full unit).17 Since the reply fraction in content words is the most
significant interplay feature, in Figure 7 we only show the frac-
tion of common content words in different quarters of replies vs.
the original post. Both effective and ineffective arguments start off
more similar with the original post; effective arguments remain less
similar overall.
4.3 Prediction results
We train logistic regression models with (cid:96)1 regularization on the
training set and choose parameters using five cross-validation folds,
ensuring that all pairs of arguments that share the same OP are in
the same fold.18 All features are standardized to unit variance, and
missing values are imputed using the training fold sample mean.
We evaluate using pairwise accuracy in the heldout dataset, where
we restricted ourselves to a single experimental run (after holding
our collective breath) to further reduce the risk of overfitting. The
results are, in fact, in line with what we describe in the training-data
analysis here.
Feature sets. As shown in §4.2, the number of words is very pre-
dictive, providing a strong baseline to compare against. Bag-of-
words features (BOW) usually provide a strong benchmark for text
classification tasks. We restrict the size of the vocabulary by re-
moving rare words that occurred no more than 5 times in train-
ing and (cid:96)2-normalize term frequency vectors. Since part-of-speech
tags may also capture properties of the argument, we also use nor-
malized term frequency vectors by treating part-of-speech tags as
words (POS). Features in §4.2.1 are referred to as interplay; fea-
tures in §4.2.2 constitute the feature set style. Finally, we use a
17In prediction, we also take the maximum and minimum of these
quarter-wise measures as an order-independent way to summarize
fragment similarity.
18We also tried (cid:96)2 regularization, random forests and gradient
boosting classifiers and found no improvement beyond the cross-
validation standard error.
combination of style and interplay, as well as a combination that
includes all the above features (all). Note that style and interplay
are dense and very low-dimensional compared to BOW.
Interplay with the OP plays an essential role. (Figure 8) #words
is indeed a very strong baseline that achieves an accuracy of 60%
in root reply and 66% in full path. As a sanity check, in root trun-
cated, it indeed gets only 50%. In comparison, BOW achieves sim-
ilar performance as #words, while POS gives even worse perfor-
mance. However, interplay features lead to a 5% absolute improve-
ment over the #words baseline in root reply and full path, and a 14%
absolute improvement in root truncated. In fact, the performance of
interplay is already close to using the combination of interplay and
style and using all features. In root truncated, although the perfor-
mance of style features drops significantly, interplay achieves very
similar performance as in root reply, demonstrating the robustness
of the interplay features.
5.
“RESISTANCE” TO PERSUASION
Although it is a good-faith step for a person to post on CMV,
some beliefs in the dataset are still “resistant” to changes, possi-
bly depending on how strongly the OP holds them and how the
OP acquired and maintained them [45, 54, 59]. Since CMV mem-
bers must state their opinion and reasons for it in their own words,
we can investigate differences between how resistant and malleable
views are expressed. In this section, we seek linguistic and style
patterns characterizing original posts in order to better understand
the mechanisms behind attitude resistance and expression, and to
give potential challengers a sense of which views may be resistant
before they engage.
However, recognizing the “malleable” cases is not an easy task:
in a pilot study, human annotators perform at chance level (50%
on a paired task to distinguish which of two original posts is mal-
leable). In light of our observation that persuasion is unsuccessful
in 70% of the cases from §3, we set up an imbalanced prediction
task. We focus on cases where at least 10 challengers attempt coun-
terarguments, and where the OP replied at least once,19 alleviating
19Although in preprocessing we replaced all explicit edits, we also
remove all posts containing the word “changed”, to avoid includ-
ing post-hoc signals of view change.
1st2nd3rd4th0.410.420.430.440.450.460.470.480.49argumentfractioneffectivenoteffective50%55%60%65%accuracy#wordsBOWPOSinterplaystyleinterplay+styleall******Rootreply50%55%60%65%70%accuracy**FullpathTable 4: Opinion malleability task: statistically significant features
after Bonferroni correction.
Feature name
#1st person pronouns
frac. 1st person pronoun
dominance
frac. 1st person plural pronoun
#paragraphs
#1st person plural pronoun
#bolds
arousal
valence
bullet list
More malleable?
↑↑↑↑
↑↑↑↑
↑↑↑↑
↓↓↓
↑↑
↓↓
↑
↓
↑
↑
the concern that an opinion appears resistant simply because there
was little effort towards changing it. This brings us 10,743 original
posts in the training data and 1,529 original posts in the heldout
data. We then analyze systematic expression patterns that charac-
terize malleable beliefs and that signal open-mindedness.
5.1 Stylistic features for open-mindedness
We employ the same set of features from §4.2.2 to capture the
characteristics of original posts. Among them, only a handful are
significantly predictive of malleability, as shown in Table 4.
Personal pronouns and self-affirmation. First person pronouns
are strong indicators of malleability, but first person plural pro-
nouns correlate with resistance. In psychology, self-affirmation has
been found to indicate open-mindedness and make beliefs more
likely to yield [11, 12]. Our result aligns with these findings: indi-
vidualizing one’s relationship with a belief using first person pro-
nouns affirms the self, while first person plurals can indicate a di-
luted sense of group responsibility for the view. Note that it was
also found in other work that openness is negatively correlated with
first person singular pronouns [39].
Formatting. The use of more paragraphs, bold formatting, and
bulleted lists are all higher when a malleable view is expressed.
Taking more time and presenting the reasons behind an opinion in
a more elaborated form can indicate more engagement.
Word score–based features. Dominance is the most predictive of
malleability: the average amount of control expressed through the
words used is higher when describing a malleable view than a re-
sistant one. The same holds for happiness (captured by valence).
In terms of arousal, malleable opinions are expressed significantly
more serenely, ending on a particularly calm note in the final quar-
ter, while stubborn opinions are expressed with relatively more ex-
citement.
5.2 Prediction performance
We use weighted logistic regression and choose the amount and
type of regularization ((cid:96)1 or (cid:96)2) by grid search over 5 cross-validation
folds. Since this is an imbalanced task, we evaluate the prediction
results using the area under the ROC curve (AUC) score. As in
§4, we use the number of words as our baseline.
In addition to
the above features that characterizes language style (style), we use
bag-of-words (BOW), part-of-speech tags (POS) and a full feature
set (all). The holdout performance is shown in Figure 9.
The classifiers trained on bag of words features significantly out-
performs the #words baseline. Among words with largest coef-
ficients, resistant views tend to be expressed using more decisive
words such as anyone, certain, ever, nothing, and wrong, while
help and please are malleable words. The POS classifier signifi-
cantly outperforms random guessing, but not the baseline. Never-
theless, it yields an interesting insight: comparative adjectives and
Figure 9: Opinion malleability prediction performance: AUC
on the heldout dataset. The purple line shows the performance
of #words, while the gray line gives the performance of random
guessing. The BOW and all feature sets perform significantly bet-
ter than the #words baseline, according to one-sided paired permu-
tation tests. BOW, POS, style and all outperform random guess-
ing using bootstrapped tests. (*: p < 0.05, **: p < 0.01, ***:
p < 0.001.)
adverbs are signs of malleability, while superlative adjectives sug-
gest stubbornness. The full feature set (all) also significantly out-
perform the #words baseline. The overall low scores suggest that
this is indeed a challenging task for both humans and machines.
6. FURTHER DISCUSSION
Here we discuss other observations that may open up avenues for
further investigation of the complex process of persuasion.
Experience level. Beyond the interactions within a discussion tree,
CMV is a community where users can accumulate experience and
potentially improve their persuasion ability. Figure 10a shows that
a member’s success rate goes up with the number of attempts made.
This observation can be explained by at least two reasons:
the
success rate of frequent challengers improves over time, and/or
frequent challengers are better at persuasion from the beginning.
To disentangle these two possible reasons, for challengers who at-
tempted to change at least 16 views, we split all the attempts into 4
equal chunks sorted by time. Figure 10b presents how the success
rate changes over a challenger’s life, suggesting that the success
rate of frequent challengers does not increase.20
It is worth not-
ing that this lack of apparent improvement might be explained by a
gradual development of a “taste” for original posts that are harder
to address [30]. Such community dynamics point to interesting re-
search questions for future work.
Attempts to capture high-level linguistic properties. We experi-
mented with a broader set of features in cross validation, which we
still deem interesting but did not discuss in depth for space reasons.
One important class are attempts to capture the semantics of orig-
inal statements and arguments. We experimented with using topic
models [3] to find topics that are the most malleable (topic: food,
eat, eating, thing, meat and topic: read, book, lot, books, women),
and the most resistant (topic: government, state, world, country,
countries and topic: sex, women, fat, person, weight). However,
topic model based features do not seem to bring predictive power
to either of the tasks. For predicting persuasive arguments, we at-
tempted to capture interplay with word embeddings for text similar-
20In terms of the correlation between previous success (lifetime
deltas) and success rate, the result is similar: beyond 4–5 deltas
there is no noticeable increase.
0.480.500.520.540.56AUC#wordsBOWPOSstyleallrandom**Finally, beyond mechanisms behind persuasion, it is a vital re-
search problem to understand how community norms encourage
such a well-behaved platform so that useful rules, moderation prac-
tices, or even automated tools can be deployed in future community
building.
9. APPENDIX
In this section we explain the features based on word categories.
• (In)definite articles (inspired by [13]). These are highly corre-
lated with length, so they are both highly significant in terms of
absolute numbers. However, in terms of word ratios, definite arti-
cles (e.g., “the” instead of “a”) are preferred, which suggests that
specificity is important in persuasive arguments.
• Positive and negative words. We use the positive and negative
lexicons from LIWC [40]. In absolute numbers, successful argu-
ments are more sentiment-laden in both root reply and full path.
When truncating, as well as when taking the frequency ratio, per-
suasive opening arguments use fewer positive words, suggesting
more complex patterns of positive emotion in longer arguments
[23, 58].
• Arguer-relevant personal pronouns. We consider 1st person pro-
nouns (me) 2nd person pronouns (you) and 1st person plural pro-
nouns (us). In both root reply and full path, persuasive arguments
use a significantly larger absolute number of personal pronouns.
• Links. Citing external evidence online is often accomplished
using hyperlinks. Persuasive arguments use consistently more
links, both in absolute and in per-word count. We make spe-
cial categories for interesting classes of links: those to .com and
.edu domains, and those to PDF documents. Maybe due to high
recall, .com links seem to be most powerful. Features based on
links also tend to be significant even in the root truncated condi-
tion.
• Hedging. Hedges indicate uncertainty; an example is “It could be
the case”. Their presence might signal a weaker argument [16],
but alternately, they may make an argument easier to accept by
softening its tone [28]. We curate a set of hedging cues based
on [21, 24]. Hedging is more common in persuasive arguments
under root reply and full path.
• Examples. We consider occurrences of “for example”, “for in-
stance”, and “e.g.”. The absolute number of such example mark-
ers is significantly higher in persuasive arguments.
• Question marks. Questions can be used for clarification or rhetor-
ical purposes. In terms of absolute number, there are more in root
reply and full path. But when it comes to ratio, if anything, it
seems better to avoid using question marks.
• Quotations. One common practice in argumentation is to quote
the other party’s words. However, this does not seem to be a
useful strategy for the root reply.
Acknowledgments. We thank X. Chen, J. Hessel, S. Hu, S. Kundu,
N. Li, M. Raghu, N. Rojas, A. Schofield, T. Shi, and J. Zhang
for participating in our pilot annotation experiments. We thank Y.
Artzi, J. Carpenter, P. Grabowicz, J. Hessel, Y. Hua, J. Park, M.
Rooth, A. Schofield, A. Singh, and the anonymous reviewers for
helpful comments. This work was supported in part by NSF grant
IIS-0910664, a Google Research Grant, a Google Faculty Research
Award and a Facebook Fellowship.
(a) Delta ratio vs. log2 #posts.
(b) No growth over life.
Figure 10: Effect of experience.
ity using both the centroid distance and the word mover’s distance
[27]. Both distances proved predictive by themselves, but were not
able to improve over the features presented in the paper in cross
validation. More generally, better semantic models applicable to
online discussions could open up deeper investigations into effec-
tive persuasion strategies.
Sequential argument structure. Another promising direction is to
examine the structure of arguments via the sequence of discourse
connectors. For instance, we can recover interesting structures such
as “first0–but1–because2” and “now1–then2–instead3”, where the
subscripts indicate which quarter the discourse connector occurred
in. These features did not perform well in our tasks due to low re-
call, or lack of argumentative structure in the data, but they deserve
further exploration.
7. ADDITIONAL RELATED WORK
A few lines of research in natural language processing are re-
lated to our work. Argumentation mining focuses on fine-grained
analysis of arguments and on discovering the relationships, such
as support and premise, between different arguments [34]. Studies
have also worked on understanding persuasive essays [18, 41, 51]
and opinion analysis in terms of agreement and ideology [53, 49,
22, 50, 48]. Another innovative way of using Internet data to study
mass persuasion is through AdWords [20].
8. CONCLUSION
In this work, in order to understand the mechanisms behind per-
suasion, we use a unique dataset from /r/ChangeMyView. In
addition to examining interaction dynamics, we develop a frame-
work for analyzing persuasive arguments and malleable opinions.
We find that not only are interaction patterns connected to the suc-
cess of persuasion, but language is also found to distinguish persua-
sive arguments. Dissimilarity with the wording in which the opin-
ion is expressed turns out to be the most predictive signal among all
features. Although members of CMV are open-minded and willing
to change, we are still able to identify opinions that are resistant
and to characterize them using linguistic patterns.
There are many possible extensions to our approach for repre-
senting arguments. In particular, it would be interesting to model
the framing of different arguments and examine the interplay be-
tween framing of the original post and the replies. For instance, is
benefit-cost analysis the only way to convince a utilitarian?
Furthermore, although this novel dataset opens up potential op-
portunities for future work, other environments, where people are
not as open-minded, can exhibit different kinds of persuasive in-
teractions; it remains an interesting problem how our findings gen-
eralize to different contexts. It is also important to understand the
effects of attitude change on actual behavior [44].
02468log2#postsattempted0.5%1.0%1.5%2.0%2.5%3.0%deltapercentage1st2nd3rd4thquarterinuserlife1.3%1.4%1.5%1.6%deltapercentageReferences
[1] T. Althoff, C. Danescu-Niculescu-Mizil, and D. Jurafsky.
How to ask for a favor: A case study on the success of al-
truistic requests. In Proceedings of ICWSM, 2014.
[2] M. Bailey, D. J. Hopkins, and T. Rogers. Unresponsive and
unpersuaded: The unintended consequences of voter persua-
sion efforts. In Meeting of the Society for Political Methodol-
ogy at the University of Virginia, 2014.
[3] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet Al-
location. J. Mach. Learn. Res., 3:993–1022, 2003.
[4] C. J. Bryan, G. M. Walton, T. Rogers, and C. S. Dweck. Mo-
tivating voter turnout by invoking the self. Proceedings of the
National Academy of Sciences, 108(31):12653–12656, 2011.
[5] M. Brysbaert, A. B. Warriner, and V. Kuperman. Concrete-
ness ratings for 40 thousand generally known English word
lemmas. Behavior Research Methods, 46(3):904–911, 2014.
[6] M. Burgoon, S. B. Jones, and D. Stewart. Toward a message-
centered theory of persuasion: Three empirical investigations
of language intensity. Human Communication Research, 1
(3):240–256, 1975.
[7] S. Chaiken. The heuristic model of persuasion.
influence: The Ontario Symposium, 1987.
In Social
[8] M. J. Chambliss and R. Garner. Do adults change their minds
after reading persuasive text? Written Communication, 13(3):
291–313, 1996.
[9] R. B. Cialdini.
Influence: The Psychology of Persuasion.
HarperCollins, 1993.
[10] R. B. Cialdini, W. Wosinska, D. W. Barrett, J. Butner, and
M. Gornik-Durose. Compliance with a request in two cul-
tures: The differential influence of social proof and com-
mitment/consistency on collectivists and individualists. Per-
sonality and Social Psychology Bulletin, 25(10):1242–1253,
1999.
[11] G. L. Cohen, J. Aronson, and C. M. Steele. When beliefs
yield to evidence: Reducing biased evaluation by affirming
the self. Personality and Social Psychology Bulletin, 26(9):
1151–1164, 2000.
[12] J. Correll, S. J. Spencer, and M. P. Zanna. An affirmed self and
an open mind: Self-affirmation and sensitivity to argument
strength. Journal of Experimental Social Psychology, 40(3):
350–356, 2004.
[13] C. Danescu-Niculescu-Mizil, J. Cheng, J. Kleinberg, and
L. Lee. You had me at hello: How phrasing affects memo-
rability. In Proceedings of ACL, 2012.
[14] C. Danescu-Niculescu-Mizil, L. Lee, B. Pang, and J. Klein-
berg. Echoes of power: Language effects and power differ-
ences in social interaction. In Proceedings of WWW, 2012.
[15] J. P. Dillard and L. Shen. The Persuasion Handbook: Devel-
opments in Theory and Practice. SAGE Publications, 2014.
[16] A. M. Durik, M. A. Britt, R. Reynolds, and J. Storey. The
effects of hedges in persuasive arguments: A nuanced analy-
sis of language. Journal of Language and Social Psychology,
2008.
[17] A. H. Eagly and S. Chaiken. The Psychology of Attitudes.
Harcourt Brace Jovanovich College Publishers, 1993.
[18] N. Farra, S. Somasundaran, and J. Burstein. Scoring persua-
sive essays using opinions and their targets. In Proceedings of
the NAACL Workshop on Innovative Use of NLP for Building
Educational Applications, 2015.
[19] B. J. Fogg. Mass interpersonal persuasion: An early view of
a new phenomenon. In Persuasive Technology, 2008.
[20] M. Guerini, C. Strapparava, and O. Stock. Evaluation metrics
for persuasive NLP with Google AdWords. In Proceedings of
LREC, 2010.
[21] D. A. Hanauer, Y. Liu, Q. Mei, F. J. Manion, U. J. Balis, and
K. Zheng. Hedging their mets: The use of uncertainty terms in
clinical documents and its potential implications when shar-
ing the documents with patients. In Proceedings of the AMIA
Annual Symposium, 2012.
[22] K. S. Hasan and V. Ng. Why are you taking this stance? Iden-
tifying and classifying reasons in ideological debates. In Pro-
ceedings of EMNLP, 2014.
[23] C. R. Hullett. The impact of mood on persuasion: A meta-
analysis. Communication Research, 32(4):423–442, 2005.
[24] K. Hyland. Hedging in Scientific Research Articles.
Benjamins Publishing, 1998.
John
[25] A. Jaech, V. Zayats, H. Fang, M. Ostendorf, and H. Hajishirzi.
Talking to the crowd: What do people react to in online dis-
In Proceedings of EMNLP, pages 2026–2031,
cussions?
2015.
[26] J. P. Kincaid, R. P. Fishburne Jr, R. L. Rogers, and B. S.
Chissom. Derivation of new readability formulas (automated
readability index, fog count and Flesch reading ease formula)
for Navy enlisted personnel. Chief of Naval Technical Train-
ing, Naval Air Station, Research Branch Report 8-75, 1975.
[27] M. J. Kusner, Y. Sun, N. I. Kolkin, and K. Q. Weinberger.
From word embeddings to document distances. In Proceed-
ings of ICML, 2015.
[28] G. Lakoff. Hedges: A study in meaning criteria and the logic
of fuzzy concepts. Journal of Philosophical Logic, 2, 1975.
[29] O. Levy and Y. Goldberg. Dependency-based word embed-
dings. In Proceedings of ACL, 2014.
[30] J. J. McAuley and J. Leskovec. From amateurs to connois-
seurs: Modeling the evolution of user expertise through on-
line reviews. In Proceedings of WWW, 2013.
[31] A. K. McCallum. Mallet: A machine learning for language
toolkit. http://mallet.cs.umass.edu, 2002.
[32] D. McRaney.
//youarenotsosmart.com/2011/06/10/
the-backfire-effect/, 2011.
10-15.
Accessed:
The
backfire
effect.
http:
2015-
[33] T. Mitra and E. Gilbert. The Language that Gets People to
In Pro-
Give: Phrases that Predict Success on Kickstarter.
ceedings of CSCW, 2014.
[51] C. Stab and I. Gurevych. Identifying argumentative discourse
In Proceedings of EMNLP,
structures in persuasive essays.
2014.
[52] C. Tan, L. Lee, and B. Pang. The effect of wording on mes-
sage propagation: Topic- and author-controlled natural exper-
iments on Twitter. In Proceedings of ACL, 2014.
[53] M. Thomas, B. Pang, and L. Lee. Get out the vote: Determin-
ing support or opposition from Congressional floor-debate
transcripts. In Proceedings of EMNLP, 2006.
[54] Z. L. Tormala and R. E. Petty. What doesn’t kill me makes
me stronger: The effects of resisting persuasion on attitude
certainty. Journal of Personality and Social Psychology, 83
(6):1298, 2002.
[55] Y. Tsvetkov, L. Boytsov, A. Gershman, E. Nyberg, and
C. Dyer. Metaphor detection with cross-lingual model trans-
fer. In Proceedings of ACL, 2014.
[56] O. Tykocinski, E. T. Higgins, and S. Chaiken. Message
framing, self-discrepancies, and yielding to persuasive mes-
sages: The motivational significance of psychological situa-
tions. Personality and Social Psychology Bulletin, 20(1):107–
115, 1994.
[57] A. B. Warriner, V. Kuperman, and M. Brysbaert. Norms of
valence, arousal, and dominance for 13,915 English lemmas.
Behavior Research Methods, 45(4):1191–1207, 2013.
[58] D. T. Wegener and R. E. Petty. Effects of mood on persua-
sion processes: Enhancing, reducing, and biasing scrutiny of
attitude-relevant information. In L. L. Martin and A. Tesser,
editors, Striving and Feeling: Interactions Among Goals, Af-
fect, and Self-regulation. Psychology Press, 1996.
[59] J. R. Zuwerink and P. G. Devine. Attitude importance and re-
sistance to persuasion: It’s not just the thought that counts.
Journal of Personality and Social Psychology, 70(5):931,
1996.
[34] R. Mochales and M.-F. Moens. Argumentation mining. Arti-
ficial Intelligence and Law, 19(1):1–22, 2011.
[35] K. G. Niederhoffer and J. W. Pennebaker. Linguistic style
matching in social interaction. Journal of Language and So-
cial Psychology, 21(4):337–360, 2002.
[36] B. Nyhan and J. Reifler. When corrections fail: The persis-
tence of political misperceptions. Political Behavior, 32(2):
303–330, 2010.
[37] D. J. O’Keefe. Standpoint explicitness and persuasive effect:
A meta-analytic review of the effects of varying conclusion
articulation in persuasive messages. Argumentation and Ad-
vocacy, 34(1):1–12, 1997.
[38] D. J. O’Keefe. Justification explicitness and persuasive ef-
fect: A meta-analytic review of the effects of varying support
articulation in persuasive messages. Argumentation and Ad-
vocacy, 35(2):61–75, 1998.
[39] J. W. Pennebaker and L. A. King. Linguistic styles: language
use as an individual difference. J Pers Soc Psychol, 77(6):
1296–1312, 1999.
[40] J. W. Pennebaker, M. E. Francis, and R. J. Booth. Linguistic
inquiry and word count: LIWC 2007. Technical report, 2007.
[41] I. Persing and V. Ng. Modeling argument strength in student
essays. In Proceedings of ACL, 2015.
[42] R. E. Petty and J. T. Cacioppo. Communication and Per-
suasion: Central and Peripheral Routes to Attitude Change.
Springer Science & Business Media, 2012.
[43] R. E. Petty and D. T. Wegener. Matching versus mismatch-
ing attitude functions: Implications for scrutiny of persuasive
messages. Personality and Social Psychology Bulletin, 24(3):
227–240, 1998.
[44] R. E. Petty, D. T. Wegener, and L. R. Fabrigar. Attitudes and
attitude change. Annual Review of Psychology, 48(1):609–
647, 1997.
[45] E. M. Pomerantz, S. Chaiken, and R. S. Tordesillas. Attitude
strength and resistance processes. Journal of Personality and
Social Psychology, 69(3):408, 1995.
[46] S. L. Popkin. The Reasoning Voter: Communication and Per-
suasion in Presidential Campaigns. University of Chicago
Press, Chicago, 1994.
[47] K. K. Reardon. Persuasion in Practice. Sage, 1991.
[48] S. Rosenthal and K. McKeown. I couldn’t agree more: The
role of conversational structure in agreement and disagree-
ment detection in online discussions. In Proceedings of SIG-
dial, 2015.
[49] S. Somasundaran and J. Wiebe. Recognizing stances in ideo-
logical on-line debates. In Proceedings of the NAACL Work-
shop on Computational Approaches to Analysis and Genera-
tion of Emotion in Text, 2010.
[50] D. Sridhar, J. Foulds, B. Huang, L. Getoor, and M. Walker.
Joint models of disagreement and stance in online debate. In
Proceedings of ACL, 2015.
|
1802.03573 | 1 | 1802 | 2018-02-10T12:22:59 | Social Media, News and Political Information during the US Election: Was Polarizing Content Concentrated in Swing States? | [
"cs.SI"
] | US voters shared large volumes of polarizing political news and information in the form of links to content from Russian, WikiLeaks and junk news sources. Was this low quality political information distributed evenly around the country, or concentrated in swing states and particular parts of the country? In this data memo we apply a tested dictionary of sources about political news and information being shared over Twitter over a ten day period around the 2016 Presidential Election. Using self-reported location information, we place a third of users by state and create a simple index for the distribution of polarizing content around the country. We find that (1) nationally, Twitter users got more misinformation, polarizing and conspiratorial content than professionally produced news. (2) Users in some states, however, shared more polarizing political news and information than users in other states. (3) Average levels of misinformation were higher in swing states than in uncontested states, even when weighted for the relative size of the user population in each state. We conclude with some observations about the impact of strategically disseminated polarizing information on public life. | cs.SI | cs | Social Media, News and Political Information during the US Election:
Was Polarizing Content Concentrated in Swing States?
COMPROP DATA MEMO 2017.8 / September 28 2017
Bence Kollanyi
Oxford Internet Institute
Oxford University
Samantha Bradshaw
Oxford Internet Institute
Oxford University
Lisa-Maria Neudert
Oxford Internet Institute
Oxford University
@lmneudert
Computational propaganda flourished during the
2016 US Presidential Election. There were numerous
examples of misinformation distributed online with the
intention of misleading voters or simply earning a profit.
Multiple media reports have investigated how "fake
news" may have propelled Donald J. Trump to victory.3–5
What kinds of political news and information were social
media users in the United States sharing in advance of
voting day? How much of
it was extremist,
sensationalist, conspiratorial, masked commentary, fake,
or some other form of junk news? Was this misleading
information concentrated in the battleground states where
the margins of victory
for candidates had big
consequences for electoral outcomes?
SOCIAL MEDIA AND JUNK NEWS
Junk news, widely distributed over social media
platforms, can in many cases be considered to be a form
of computational propaganda. Social media platforms
have served significant volumes of fake, sensational, and
Philip N. Howard
Oxford Internet Institute
Oxford University
[email protected]
@pnhoward
[email protected]
[email protected]
[email protected]
@bencekollanyi
@sbradshaww
ABSTRACT
US voters shared large volumes of polarizing political news and information in the form of links to content from Russian,
WikiLeaks and junk news sources. Was this low quality political information distributed evenly around the country, or
concentrated in swing states and particular parts of the country? In this data memo we apply a tested dictionary of
sources about political news and information being shared over Twitter over a ten day period around the 2016
Presidential Election. Using self-reported location information, we place a third of users by state and create a simple
index for the distribution of polarizing content around the country. We find that (1) nationally, Twitter users got more
misinformation, polarizing and conspiratorial content than professionally produced news. (2) Users in some states,
however, shared more polarizing political news and information than users in other states. (3) Average levels of
misinformation were higher in swing states than in uncontested states, even when weighted for the relative size of the
user population in each state. We conclude with some observations about the impact of strategically disseminated
polarizing information on public life.
COMPUTATIONAL PROPAGANDA AND THE
2016 US ELECTION
Social media plays an important role in the circulation of
ideas about public policy and politics. Political actors and
governments worldwide are deploying both people and
algorithms to shape public life.1,2 Bots are pieces of
software intended to perform simple, repetitive, and
robotic tasks. They can perform legitimate tasks on social
media like delivering news and information-real news
as well as junk-or undertake malicious activities like
spamming, harassment and hate speech. Whatever their
uses, bots on social media platforms are able to rapidly
deploy messages, replicate themselves, and pass as
human users. They are also a pernicious means of
spreading junk news over social networks of family and
friends.
that
and
other forms of junk news at sensitive moments in public
life, though most platforms reveal little about how much
of this content there is or what its impact on users may
be. The World Economic Forum recently identified the
rapid spread of misinformation online as among the top
10 perils to society.6 Prior research has found that social
media favors sensationalist content, regardless of whether
the content has been fact checked or is from a reliable
source.7 When junk news is backed by automation, either
through dissemination algorithms
the platform
operators cannot fully explain or through political bots
that promote content in a preprogrammed way, political
actors have a powerful set of tools for computational
propaganda.8 Both state and non-state political actors
deliberately manipulate
amplify non-factual
information online.
Fake news websites deliberately publish
misleading, deceptive or incorrect information purporting
to be real news for political, economic or cultural gain.9
These sites often rely on social media to attract web
traffic and drive engagement. Both fake news websites
and political bots are crucial tools in digital propaganda
attacks-they aim to influence conversations, demobilize
opposition and generate false support.
SAMPLING AND METHOD
Our analysis is based on a dataset of 22,117,221 tweets
collected between November 1-11, 2016, that contained
hashtags related to politics and the election in the US.
Our previous analyses have been based on samples of
political conversation, over Twitter that used hashtags
that were relevant to the US election as a whole.
In this analysis, we selected users who provided
some evidence of physical location across the United
States in their profiles. Within our initial sample,
approximately 7,083,691 tweets, 32 percent of the total
1
traffic, were coming from users who volunteered enough
location information in their profile to determine which
state they were in. Many users have not provided enough
details to allow us to identify which state they were
tweeting from, added a location with a spelling mistake,
or just entered a made-up location or a joke. After
cleaning the data, we were able to successfully label 49.1
percent of the tweets from the users who provided any
form of location information within their profile. The rest
of the tweets were coming from profiles with a location
field that refers to a location outside of the US or
contains a location that we were not able to identify. Full
access to user location data would provide better
resolution on the distribution of users across states, but
this response rate is sufficient to help us begin to
understand the relationship between where users are and
what kinds of political content they are being served by
Twitter.
These tweets and associated data were collected
from Twitter's public Streaming API at the time of the
election, not retroactively with the Search API. The
platform's precise sampling method is not known, but the
company itself reports that the data available through the
Streaming API is at most one percent of the overall
global public communication on Twitter at any given
time.10 Tweets were selected based on a list of hashtags
associated with the US election, and tweets were
collected from the API that (1) contained at least one of
the relevant hashtags; (2) contained the hashtag in the
text of a link, such as a news article, shared in that tweet;
(3) were a retweet of a message that contained the
hashtag in the original message; or (4) quoted tweets in
which the hashtag was included but in which the original
text was not included and Twitter used a URL to refer to
the original tweet.
To evaluate different sources being shared over
social media, we determined the source of each of the
URLs in the dataset. Overall, 1,275,430 of the 7,083,691
tweets from users that had provided location information
also contained a URL. Many sources that were easy to
identify were auto-coded, but other kinds of content
obscured by link shorteners or re-shared less were also
catalogued. Effectively
is built on
successful cataloguing of 81% of the 1,275,430 links,
with the remainder being single URLs shared only a few
times or otherwise inaccessible. This typology that has
emerged over our study of elections in five democracies:
• Professional News Outlets.
typology
this
that display
fact-checking and credible
o
Major News Brands. This is political news and information
the qualities of professional
by major outlets
journalism, with
standards of
production. They provide clear information about real authors,
editors, publishers and owners, and the content is clearly produced
by an organization with a reputation for professional journalism.
This content comes from significant, branded news organizations,
including any locally affiliated broadcasters.
o
Minor News Brands. As above, but this content comes from
small news organizations or startups that display evidence of
organization,
that
distinguishes between
fact-checked news and commentary.
Professional publishers that cover other domains of social life, such
and professionalized output
resources,
• Professional Political Content
• Polarizing and Conspiracy Content
Junk News. This content
Government. These links are to the websites of branches of
as sports, fashion, or technology, but occasionally produce high
quality political news.
o
government or public agencies.
o
Experts. This content takes the form of white papers, policy
papers, or scholarship from researchers based at universities, think
tanks or other research organizations.
o
Political Party or Candidate. These links are to official
content produced by a political party or candidate campaign.
o
includes various forms of
propaganda and
ideologically extreme, hyper-partisan, or
conspiratorial political news and information. Much of this content
is deliberately produced false reporting. It seeks to persuade readers
about the moral virtues or failings of organizations, causes or
people and presents commentary as a news product. This content is
produced by organizations that do not employ professional
journalists, and the content uses attention grabbing techniques, lots
of pictures, moving images, excessive capitalization, ad hominem
attacks, emotionally charged words and pictures, unsafe
generalizations and other logical fallacies.
o WikiLeaks. These tweets provide links to unverified claims
or irrelevant documentation on WikiLeaks.org.
o
sources of political news and information.
Russia. This content was produced by known Russian
• Other Political News and Information
o
Citizen, Civic, or Civil Society. Links to content produced
by
independent citizens, civic groups, or civil
society
organizations. Blogs and websites dedicated to citizen journalism,
citizen-generated petitions, personal activism, and other forms of
civic expression that display originality and creation more than
curation or aggregation.
o
Humor and Entertainment. Content that involves political
jokes, sketch comedy, political art or lifestyle- or entertainment-
focused coverage.
o
Religion. Links to political news and information with
distinctly religious themes and faith-based editorializing presented
as political news or information.
o
Other Political Content. Myriad other kinds of political
content, including portals like AOL and Yahoo! that do not
themselves have editorial policies or news content, survey
providers, and political documentary movies.
• Other
o
Social Media Platforms. Links that simply refer to other
social media platforms, such as Facebook or Instagram. If the
content at the ultimate destination could be attributed to another
source, it is.
o
successfully archive after repeated attempts.
o
political content.
Not Available. Links that are no longer available or not
Other Non-Political. Links to sites that actually have no
Our
two-stage
coding process
involved
developing an initial, grounded coding scheme and
running it as a kind of pilot study of a subsample of
Michigan-based users (See Memo 2017.1).11 We then
revised our definitions and recoded the complete dataset
according to the categories defined below.
limitations.
Tweets about the US Presidential Election by individuals
who did not use one of these hashtags would not have
been captured. Tweets from people who used these
hashtags but were tweeting about something else would
be captured in this sample. We infer that volunteered
location
the political
constituency of a human user. While demographic
This methodology has several
is a proxy for
information
2
less about
conversation
over Twitter
factors may explain a user's decision to geotag tweets,
researchers outside Twitter know
the
distribution of self-reported location information.12 There
are some complex techniques for inferring physical
location from tweet content or metadata, but there is
evidence that volunteered information from urban areas
is more trustworthy and it is not clear that the machine
learning techniques yield better data than self-reported
data.13,14 The coding of source types was derived from
the dataset and is not intended to be a comprehensive list
of all types of information providers. Some types of
political news and information are easy to catalogue. The
category of "other content" was used for links to
completely unpolitical pages. The overall percentages of
different information sources are intended as a metric for
the overall information environment surrounding the
2016 Presidential Election and as a way to stimulate
further research and conversation.
FINDINGS AND ANALYSIS
This sample allows us to draw some conclusions about
the character and process of political conversation over
Twitter during the election, particularly as it relates to US
voters and the circulation of different kinds of news and
political information in swing states.
In Data Memos 2016.1-2016.4 we analyze
during US
political
Presidential candidate debates and the 10 days leading up
to the election itself.15–18 Data Memo 2017.1 evaluates
the circulation of junk news by taking a close look at
what kinds of content Twitter users in Michigan were
sharing just before the election.11 In that study, we found
that (1) in Michigan, conversation about politics over
Twitter mirrored the national trends in that Trump-related
hashtags were used more than twice as often as Clinton-
related hashtags. (2) Social media users in Michigan
shared a lot of political content, but the amount of
professionally researched political news and information
was consistently smaller than the amount of extremist,
sensationalist, conspiratorial, masked commentary, fake
news and other forms of junk news. (3) Not only did such
junk news "outperform" real news, but the proportion of
professional news content being shared hit its lowest
point the day before the election. If junk news was so
prevalent in this important swing state, how was it
distributed across the rest of the country?
What Were Citizens Sharing? To investigate
the distribution of political news and information being
shared over social media we took the catalogue of
content found in Michigan and classified the links being
shared in the entire national sample. Table 1 catalogues
the different kinds of URLs being shared in election-
related tweets by users in the US. We removed tweets
with links that were in foreign languages, no longer
available, or inaccessible for some other reason. All in
all, 1,033,742 links were still available online and
successfully labelled.
Table 1 presents the findings of this grounded
catalogue of content. Overall, 20% of the links being
shared with election-related hashtags came
from
to content
professional news organizations. Links
produced by government agencies, political parties and
candidates, or experts, altogether added up to just 10% of
the total. Indeed, only small fractions of the content being
shared originated with the political parties, candidates,
civil society groups, universities or public agencies.
themselves. Second, a worryingly
Two things should be noted across categories.
First, the number of links to professionally produced
content is less than the number of links to polarizing and
conspiratorial junk news. In other words, the number of
links to Russian news stories, unverified or irrelevant
links to WikiLeaks pages, or junk news was greater than
the number of links to professional researched and
published news. Indeed, the proportion of misinformation
was twice that of the content from experts and the
candidates
large
proportion of all the successfully catalogued content
provides links to polarizing content from Russian,
WikiLeaks, and junk news sources. This content uses
divisive and inflammatory rhetoric, and presents faulty
reasoning or misleading information to manipulate the
reader's understanding of public
issues and feed
conspiracy theories. Thus, when links to Russian content
and unverified WikiLeaks stories are added to the volume
of
the successfully
catalogued political content was polarizing, conspiracy
driven, and of an untrustworthy provenance.
junk news, fully 32% of all
Table 1: What Political News and Information Were US Twitter
Users Sharing during the Election?
Type of Source
N
% of
Subset
% of
Total
20
77
23
100
196,697
60,055
256,752
Professional News Content
Major News Brands
Minor News Brands
Subtotal
Professional Political Content
Political Party or Candidate
Experts
Government
10
Subtotal
Polarizing and Conspiracy Content
Junk News
WikiLeaks
Russia
20
Subtotal
Other Political News and Information
Other Political
Citizen, Civic or Civil Society
Political Humor or Entertainment
Religion
Political Merchandise
Subtotal
13
Other
Social Media Platform
Not Available
Other Non-Political
36
Subtotal
100
TOTAL
Source: Authors' calculations from data sampled 1-11/11/16. For the
full list of hashtags used to capture this sample see Memo 2017.1).11
121,323
6,350
2,294
129,967
203,591
48,068
7,683
259,342
97,900
34,935
30,021
2,124
2,067
167,047
195,470
241,688
25,164
462,322
1,269,736
93
5
2
100
79
19
3
100
59
21
18
1
1
100
42
52
5
100
3
Polarizing Content and Swing States. To help
understand the national distribution of polarizing content
from Russian, WikiLeaks, and junk news sources, we
then create a simple index, organized by states. Since
states have different numbers of Twitter users, for each
state we calculated the ratio of a state's tweets about
politics to the entire country's tweets about politics. Then
we added up all the tweets with junk news, links to
unverified WikiLeaks pages, or links to Russian content
(such as RussiaToday or Sputnik). For each state, we
calculated a second ratio-the ratio of each state's junk
content to the entire country's junk content. Putting these
two ratios together gives an index of the proportion of
junk news tweets from the state relative to the number of
all political tweets from the state. The distribution of this
"ratio of ratios" is uneven because half the distribution of
possible values ranges from 0 to 1 (less junk news than
expected given national averages) and the other half
ranges from 1 to +infinity (more junk news than expected
given national averages). However, by taking the natural
log of the ratio of ratios the index will become more
balanced: from –infinity to 0 becomes less junk news
than expected, and 0 to +infinity becomes more junk
news than expected. Mathematically, the 0 point on the
index is the national average.
Ratio
of
Ratios
T
=
state
Links
Links
Polarizing
Polarizing
∑
states
all
PoliticalL
∑
inks
PoliticalL
country
state
inks
Expression A: Indexing Polarizing Political Content from Russian,
WikiLeaks, and Junk News Sources
Table 2 identifies the weighted junk news scores for each
state. States with scores around zero are close the
national average, so they have about the concentration of
junk news expected given
the amount of Twitter
conversation about politics occurring in that state. States
with more negative scores have less junk news than
expected given the amount of Twitter conversation about
politics occurring in that state. Finally, states with more
positive scores have unusual concentrations of junk
news, even considering how much political conversation
was occurring among Twitter users in that state. States
that were considered swing states on November 2, 2017,
according to the non-partisan National Constitution
Center are marked by an (*) asterisk.19
At the bottom of this table the simple but
revealing averages are calculated. This index is weighted
for the relative number of tweets about politics generated
by each state. If a state had about the level of junk news
to be expected for the size of its Twitter user base, the
state earned a score around the national average. If it had
more junk then expected it scored above that, and if it
had less than expected it scored below that. Table 2
reveals
surprisingly
concentrated in swing states even considering the amount
of political conversation occurring in the state. Indeed, 12
that polarizing content was
Table 2: Concentration of Polarizing Political Content from
Russian, WikiLeaks, and Junk News Sources, Indexed by State
Junk News Index
-0.75
-0.54
-0.38
-0.30
-0.26
-0.20
-0.19
-0.18
-0.17
-0.16
-0.15
-0.14
-0.13
-0.13
-0.12
-0.11
-0.09
-0.07
-0.07
-0.06
-0.03
-0.03
-0.02
-0.01
+0.01
+0.01
+0.01
+0.03
+0.05
+0.05
+0.06
+0.07
+0.10
+0.10
+0.11
+0.12
+0.14
+0.14
+0.14
+0.16
+0.18
+0.18
+0.20
+0.22
+0.23
+0.25
+0.26
+0.27
+0.35
+0.45
+0.47
State
North Dakota
Washington D.C.
Iowa*
New York
Wyoming
New Mexico
Nebraska
Rhode Island
Hawaii
Wisconsin*
Minnesota*
Washington
Illinois
Kansas
Connecticut
Utah
Idaho
Mississippi
Alaska
Massachusetts
California
Maine*
Oregon
Louisiana
Colorado*
Ohio*
New Jersey
Maryland
Michigan*
Arkansas
Texas
Georgia*
South Carolina
Vermont
New Hampshire*
Pennsylvania*
Oklahoma
North Carolina*
Virginia*
Florida*
Nevada*
Indiana
Tennessee
Missouri*
Alabama
Arizona*
Kentucky
South Dakota
Delaware
Montana
West Virginia
Averages
Not Contested State Average
National Average
Swing State Average
Source: Authors' calculations from data sampled 1-11/11/16.
Note: (*) Indicates a swing state in November 2016 according to
the National Constitution Center.
of the 16 swing states were above the average among less
competitive states, and 11 of the 16 were above the
national average. States that were not hotly contested
had, on average, lower levels of junk news.
-0.02
+0.00
+0.05
4
Figure 1: States With Above Average Concentrations of Polarizing Political Content from Russian, WikiLeaks, and Junk News Sources
Source: Authors' calculations from data sampled 1-11/11/16.
Note: Shades of green indicate that state users shared less of this content than expected given the size of their Twitter user base. Shades of red
indicate that state users shared more junk content than expected given the size of their Twitter user base.
The
"fake news"
CONCLUSIONS
Many of the swing states getting highly concentrated
doses of polarizing content were also among those with
large numbers of votes in the Electoral College. Figure 1
presents a heat map of the distribution of junk news
around the country.
to
term
operationalize, so our grounded typology reflects the
diversity of organizations behind the content that was
circulated over Twitter by people in the United States in
the ten days before voting day. Social media users in
many states traded links to high quality political news
and information. Junk news, characterized by ideological
extremism, misinformation and the intention to persuade
readers to respect or hate a candidate or policy based on
emotional appeals, was just as, if not more, prevalent
than the amount of information produced by professional
news organizations.
is difficult
on
Project
Computational
involves
ABOUT THE PROJECT
Propaganda
The
(www.politicalbots.org)
and
interdisciplinary, researchers in the investigation of the
impact
scripts-computational
propaganda-on public life. Data Memos are designed to
present quick snapshots of analysis on current events in a
short format. They reflect methodological experience and
considered analysis, but have not been peer-reviewed.
international,
automated
of
Council,
Research
Working Papers present deeper analysis and extended
arguments that have been collegially reviewed and that
engage with public issues. The Project's articles, book
chapters and books are significant manuscripts that have
been through peer review and formally published.
ACKNOWLEDGMENTS AND DISCLOSURES
The authors gratefully acknowledge the support of the
European
"Computational
Propaganda: Investigating the Impact of Algorithms and
Bots on Political Discourse in Europe," Proposal 648311,
2015-2020, Philip N. Howard, Principal Investigator.
Project activities were approved by the University of
Oxford's Research Ethics Committee. The project
gratefully thanks the Ford Foundation for their support.
Any
or
recommendations expressed in this material are those of
the authors and do not necessarily reflect the views of the
University of Oxford or the European Research Council.
REFERENCES
1. Gallacher, J., Kaminska, M., Kollanyi, B., Yasseri, T.
& Howard, P. N. Social Media and News Sources
during the 2017 UK General Election. (2017).
conclusions
opinions,
findings,
2. Forelle, M., Howard, P., Monroy-Hernández, A. &
Savage, S. Political Bots and the Manipulation of
Public Opinion in Venezuela. ArXiv150707109 Phys.
(2015).
and
5
3. Parkinson, H. J. Click and elect: how fake news
helped Donald Trump win a real election. The
Guardian (2016).
4. Read, M. Donald Trump Won Because of Facebook.
New York Magazine (2016).
5. Dewey, C. Facebook Fake-News Writer: 'I Think
Donald Trump is in the White House Because of Me'.
The Washington Post (2016).
6. World Economic Forum. 10. The Rapid Spread of
the Global
Misinformation Online. Outlook on
Agenda 2014 (2014).
7. Vicario, M. D. et al. The Spreading of Misinformation
Online. Proc. Natl. Acad. Sci. 113, 554–559 (2016).
8. Kümpel, A. S., Karnowski, V. & Keyling, T. News
Sharing in Social Media: A Review of Current
Research on News Sharing Users, Content, and
Networks. Soc. Media Soc. 1, 2056305115610141
(2015).
9. Howard, P. N. Digitizing
the social contract:
Producing American political culture in the age of
new media. Commun. Rev. 6, 213–245 (2003).
10. Morstatter, F., Pfeffer, J., Liu, H. & Carley, K. M. Is
the Sample Good Enough? Comparing Data from
Twitter's Streaming API with Twitter's Firehose.
ArXiv13065204 Phys. (2013).
11. Howard, P. N., Bolsover, G., Kollanyi, B., Bradshaw,
S. & Neudert, L.-M. Junk News and Bots during the
U.S. Election: What Were Michigan Voters Sharing
Over Twitter? (2017).
12. Sloan, L. & Morgan, J. Who Tweets with Their
Location? Understanding the Relationship between
Demographic Characteristics and
the Use of
Geoservices and Geotagging on Twitter. PLOS ONE
10, e0142209 (2015).
13. Ajao, O., Hong, J. & Liu, W. A survey of location
inference techniques on Twitter. J. Inf. Sci. 41, 855–
864 (2015).
14. Huang, B. & Carley, K. M. On Predicting
Geolocation of Tweets using Convolutional Neural
Networks. ArXiv170405146 Cs (2017).
15. Kollanyi, B., Howard, P. N. & Woolley, S. C. Bots
and Automation over Twitter during the First U.S.
Presidential Debate. 4 (Project on Computational
Propaganda, 2016).
16. Kollanyi, B., Howard, P. N. & Woolley, S. C. Bots
and Automation over Twitter during the Second U.S.
Presidential Debate. 4 (Project on Computational
Propaganda, 2016).
17. Kollanyi, B., Howard, P. N. & Woolley, S. C. Bots
and Automation over Twitter during the Third U.S.
Presidential Debate. 4 (Project on Computational
Propaganda, 2016).
18. Howard, P., Kollanyi, B. & Woolley, S. Bots and
Automation over Twitter during the U.S. Election.
Oxf. UK Proj. Comput. Propag. (2016).
19. NCC Staff. A recent voting history of the 15
Battleground states - National Constitution Center.
National Constitution Center – constitutioncenter.org
Available
at:
https://constitutioncenter.org/blog/voting-history-of-
the-15-battleground-states.
September 2017)
(Accessed:
22nd
6
|
1706.02324 | 1 | 1706 | 2017-06-07T18:17:38 | Efficient method for estimating the number of communities in a network | [
"cs.SI",
"physics.soc-ph"
] | While there exist a wide range of effective methods for community detection in networks, most of them require one to know in advance how many communities one is looking for. Here we present a method for estimating the number of communities in a network using a combination of Bayesian inference with a novel prior and an efficient Monte Carlo sampling scheme. We test the method extensively on both real and computer-generated networks, showing that it performs accurately and consistently, even in cases where groups are widely varying in size or structure. | cs.SI | cs | Efficient method for estimating the number of communities in a network
Maria A. Riolo,1 George T. Cantwell,2 Gesine Reinert,3 and M. E. J. Newman1, 2
1Center for the Study of Complex Systems, University of Michigan, Ann Arbor, Michigan, USA
2Department of Physics, University of Michigan, Ann Arbor, Michigan, USA
3Department of Statistics, University of Oxford, 24–29 St. Giles, Oxford, UK
While there exist a wide range of effective methods for community detection in networks, most
of them require one to know in advance how many communities one is looking for. Here we present
a method for estimating the number of communities in a network using a combination of Bayesian
inference with a novel prior and an efficient Monte Carlo sampling scheme. We test the method
extensively on both real and computer-generated networks, showing that it performs accurately and
consistently, even in cases where groups are widely varying in size or structure.
7
1
0
2
n
u
J
7
]
I
S
.
s
c
[
1
v
4
2
3
2
0
.
6
0
7
1
:
v
i
X
r
a
I.
INTRODUCTION
Many networks of interest in the sciences display com-
munity structure, meaning that their nodes divide nat-
urally into clusters, modules, or groups, such that there
are many network connections within groups but few be-
tween groups [1–3]. The decomposition of networks into
their constituent communities is one of the primary tools
used for interpreting the structure of large networked sys-
tems, allowing us to break data sets apart into manage-
able pieces and hence make sense of systems that can
otherwise defy analysis.
Community detection-the process of identifying good
community divisions of a given network-has been the
subject of a vigorous research effort in the last 15 years or
so, and many different approaches have been proposed.
A fundamental shortcoming of most of them, however,
is that they require us to know in advance how many
communities a network contains. We don't usually know
this number a priori, meaning we need some way to es-
timate it from the data. Recently, a number of authors,
including ourselves, have proposed methods for making
such estimates using Bayesian inference applied to fits
of network models to observed network data [4–12]. In
these approaches, one defines a generative random-graph
model of a network with community structure, then fits
it to the data to obtain a Bayesian posterior probabil-
ity distribution over possible divisions of the network
into groups, along with the associated number of groups,
which we denote k. Then one averages over this distri-
bution in some way to produce an estimate of the rela-
tive probability of different values of k for the network in
question.
In this paper, which builds on our previous work
in [10], we do a number of things. First, we give a
detailed derivation of a practical method for computing
the number of groups or communities in real-world net-
work data. Many of the previous approaches have de-
veloped useful formal ideas, but not practical algorithms
for real data, because they are based on unrealistic net-
work models-most often the so-called stochastic block
model, which is known to be a poor model for calcula-
tions of this kind [13]. In this paper we employ a more so-
phisticated model, the degree-corrected stochastic block
model, which gives substantially superior results.
Second, we look carefully at the prior probability dis-
tribution over divisions of a network into groups, and
particularly at generative processes for priors with non-
empty groups. As in many Bayesian approaches, the
choice of prior turns out to be crucial to performing use-
ful inference, and in particular we point out that various
types of uniform (maximum-entropy) priors, including
ones used in previous work, give poor results and should
be avoided. We propose a new prior based on a queueing-
type process that appears to give excellent results in our
tests.
Third, we describe an efficient Monte Carlo algorithm
that exploits specific features of our proposed prior to
perform rapid calculations on large networks.
Finally, we give the results of extensive tests of our
method on both real and synthetic benchmark networks,
which indicate that the method is able to consistently re-
cover known values for the number of communities under
real-world conditions.
II. DEGREE-CORRECTED STOCHASTIC
BLOCK MODEL
The method we propose for estimating the number of
communities in a network is based on techniques of statis-
tical inference, in which observed network data are fitted
to a generative model of network structure. The param-
eters of the fit tell us about the aggregate properties of
the data in much the same way that the fit of a straight
line through a set of data points can tell us about their
slope.
The network model we employ in our calculations is
the degree-corrected stochastic block model [13]. The tra-
ditional (non-degree-corrected) stochastic block model,
first proposed in the 1980s [14], is a simple model for
networks with community structure that has been widely
studied in the statistics, sociology, and physics literature.
Recently, however, it has been recognized that this model
has serious shortcomings [13] because the networks it
generates have a Poisson degree distribution within each
community, making them very unlike most empirically
observed networks, which typically have highly right-
skewed degree distributions. In practice, this means that
the model is often unable to fit observed network data
well for any choice of parameter values. The degree-
corrected stochastic block model remedies this problem
by introducing additional mechanisms that allow for ar-
bitrary, non-Poisson degree distributions and is found in
practice to give much better fits to real-world network
data.
In the degree-correct stochastic block model n nodes
are divided into some number k of groups, labeled 1 . . . k,
with gi denoting the group to which node i is assigned.
Then edges are placed between nodes with probabilities
that depend on group membership. There are several
variants of the model in use that employ slightly different
strategies for placing edges, but the most common strat-
egy, and the one we use here, is to place between any
node pair i, j a number aij of edges that is Poisson dis-
tributed with mean θiθjωgigj , where {θi} and {ωrs} are
sets of parameters whose values we choose. The numbers
of edges aij form the elements of the adjacency matrix A
of the network, the standard mathematical representa-
tion of network structure. Although these numbers are
Poisson distributed, the expected degrees of the nodes
can follow any distribution-within each group they are
proportional to the values of the parameters θi, which we
are at liberty to choose in any way we please.
The use of a Poisson distribution for the numbers of
edges means that the network generated can in theory
have multiedges, i.e., pairs of nodes connected by more
than one edge, which is not usually realistic-most real-
world networks do not have multiedges. Most networks
of scientific interest, however, are very sparse, meaning
that the values of θiθjωgigj are very small and the proba-
bility of having two edges between the same pair of nodes
is smaller still. Multiedges are, as a result, few enough
in number that they can usually be neglected. One also
normally allows self-edges in the network (edges that con-
nect a node to itself), placing at each node i a Poisson dis-
tributed number of self-edges with mean 1
i ωgigi . Again
this is not realistic but in practice the number of self-
edges is small, so they can be neglected. (By convention,
the number of self-edges at node i is denoted 1
2 aii and
not aii, i.e., aii is twice the number of self-edges. The
factor of 1
is in-
cluded for consistency with this definition-it makes the
expected value of aij equal to θiθjωgigj for all i, j.)
2 in the number of self-edges 1
i ωgigi
2 θ2
2 θ2
The description above does not completely specify the
degree-corrected block model because there remains an
arbitrary normalization of the parameters θi that has yet
to be fixed. We can increase the values of all the θi in
group r by any factor we please and, provided we simul-
taneously decrease ωrs by the same factor, the value of
θiθjωgigj , and hence also the model itself, will not change.
We can fix the values of the parameters by choosing a spe-
cific normalization for the θi. A number of choices are
possible, all of which are ultimately equivalent, but for
our purposes here a convenient choice is to fix the mean
of the θi to be 1 in each group:
1
nr
n
Xi=1
θiδr,gi = 1,
2
(1)
number of nodes in group r.
where δij is the Kronecker delta and nr =Pi δr,gi is the
For the case of given number of group k and group as-
signments g this completes the specification of the model.
With the model specified we can now write down the
probability that any particular network with adjacency
matrix A = {aij} is generated:
P (Aω, θ, g, k) =Yi<j(cid:0)θiθjωgigj(cid:1)aij e−θiθj ωgi gj
2 θ2
×Yi (cid:0) 1
i ωgigi(cid:1)aii/2
e−θ2
i ωgi gi /2
rr e−n2
ωmrr
rωrr /2,
(2)
=Yi
θdi
i Yr<s
ωmrs
rs e−nrnsωrsYr
where we have made use of Eq. (1) in the second equality,
di =Pj aij is the observed degree of node i, and
when r 6= s,
when r = s,
(3)
mrs =(Pij aijδgi,rδgj ,s
2Pij aijδgi,rδgj ,r
1
is the number of edges running between groups r and s.
We have also discarded an overall multiplying constant
in Eq. (2), which has no effect on our results.
The parameters θ and ω are irrelevant to the questions
we are interested in and can be integrated out. To do this
we need to fix the prior probabilities on the parameters θ
and ω. We assume the priors to be independent (condi-
tioned on g, k), so that P (ω, θg, k) = P (ωk)P (θg, k),
and
P (Ag, k) =ZZ P (Aω, θ, g, k)P (θg, k)P (ωk) dθ dω.
(4)
We employ maximum-entropy (i.e.,
least informative)
priors on both θ and ω. For θ this means a uniform prior
over the regular simplex of values specified by Eq. (1).
For ω the situation is more complex. We note that the
expected number of edges between groups r and s is
Xij
θiθjωgigj δr,giδs,gj = ωrsXi
θiδr,giXj
= ωrsnrns,
θjδs,gj
(5)
where we have made use of (1) again. But the total
number of places one can place an edge between groups
r and s is nrns, which means that the average probability
of an edge is simply ωrs.
As mentioned above, most of the networks we look at
in practice are very sparse-the average probability of
an edge is much less than one. For this reason a uniform
prior on ωrs is not appropriate. Rather, we need a prior
that favors values of ωrs in the vicinity of the average
probability of an edge in the network as a whole, which is
p = 2m/n2, where m is the total number of edges in the
network. Here, as previously [10], we use a maximum-
entropy prior conditioned on fixing the expected value
of ωrs to be equal to p, which yields the exponential
distribution P (ω) = (1/p)e−ω/p.
With these choices of priors on θ and ω, the integrals
in Eq. (4) can be completed and we get
P (Ag, k) =Yr
×Yr<s
nκr
r
(nr − 1)!
(nr + κr − 1)!
mrs!
(pnrns + 1)mrs+1 Yr
where
diδr,gi
κr =Xi
mrr!
r + 1)mrr+1
( 1
2 pn2
,
(6)
(7)
is the sum of the degrees of the nodes in group r, and we
have again discarded an overall multiplying constant.
III. PRIOR ON GROUP ASSIGNMENTS
Our goal is to use this model as the basis for a Bayesian
model selection procedure to estimate the correct value
of k for a given network. To do this, we need to specify
a prior on the group assignments, meaning a joint prob-
ability distribution P (g, k) on the group labels and the
number of groups. This then allows us to write
P (g, kA) =
P (g, k)P (Ag, k)
P (A)
,
(8)
where P (Ag, k) is given by Eq. (6). Given this distri-
bution, we can either sum over k to get the posterior
distribution on g, which allows us to do community de-
tection, or sum over g to get the posterior distribution
on k, which allows us to choose a value for k. It is the lat-
ter computation that is our primary focus in this paper.
In practice, we cannot perform the sum over g exactly,
but we can approximate it using Markov chain Monte
Carlo.
As is often the case with Bayesian methods, the tricky
part of the calculation (or one of the tricky parts) is
choosing the prior P (g, k).
It turns out that in the
present case this choice can have a substantial impact
on the results, making the difference between a method
that works well in most cases and a method that does
not. Moreover, some obvious choices of prior, including
ones in common use elsewhere in the literature, result in
methods that work poorly, so it is not a matter of simply
grabbing a well-understood prior off the shelf.
A. Dirichlet prior
3
Suppose for the moment that the number of groups k is
known and let us then ask what the prior P (gk) on group
assignments should be. (This is not a very realistic as-
sumption, since our whole purpose here is to estimate k,
but the exercise is nonetheless instructive as we will see.)
Our first guess at P (gk) might be to choose a flat prob-
ability distribution: all assignments g are equally likely,
or equivalently every node is equally likely to be in each
of the k groups. This approach is used, for example,
in [15], but, as pointed out by Peixoto [12], it is unlikely
to give good results. If nodes are distributed with equal
probability among the groups then when n is large (as it
usually is) the sizes of the groups will be sharply peaked
around n/k. Any state with group sizes significantly dif-
ferent from n/k will occur rarely. This is strongly at odds
with the observed situation in real-world networks, where
we commonly encounter heterogeneous group sizes.
An alternative approach, therefore, and the one that
is most commonly adopted in the literature, is to assume
a uniform distribution not over assignments g but over
the sizes of the groups nr. That is, all possible sets of
sizes are equally likely, subject only to the constraint that
The standard way to achieve this is to specify the ex-
pected fraction γr ∈ [0, 1] of the network occupied by
they sum to the size of the whole network: Pr nr = n.
each group r, such that Pr γr = 1, then assign nodes to
groups independently at random, with probability γr of
being assigned to group r. If the γr are themselves drawn
from a uniform distribution, this makes the distribution
of the sizes of the groups uniform. (It is obvious that this
makes the expected sizes of the groups uniform, since the
expected sizes are proportional to γr, but it is not entirely
obvious that the sizes themselves are also uniform. How-
ever, the results given in Section III B provide a proof
that they are.)
The probability of generating a particular group as-
signment g using this process is
P (gγ, k) =
γgi =
n
Yi=1
γnr
r .
k
Yr=1
(9)
Since Pr γr = 1, the points defined by the values γr
fall on a regular (k − 1)-dimensional simplex, which has
volume 1/(k − 1)!. So a uniform distribution over val-
ues of γ has probability density P (γk) = (k − 1)! and
integrating (9) over the simplex then gives [8–10]
P (gk) =Z P (gγ, k)P (γk) dγ =
(k − 1)!
(n + k − 1)!
(10)
The uniform distribution over values of γ is a special
case of the so-called Dirichlet prior, a general prior on
a simplex that includes this choice but also includes a
spectrum of non-uniform choices as well.
nr!
k
Yr=1
B. Non-parametric prior
The derivation in the previous section is a standard
one, but in a sense it is needlessly complicated. If our
goal is simply to choose group sizes such that all choices
are equally likely then assign nodes to those groups at
random, why not just do so directly, without introducing
other parameters? There are (cid:0)n+k−1
k groups such that their sizes sum to n. Let us choose
uniformly among these, then the number of ways of plac-
ing the nodes in the groups is given by the multinomial
k−1 (cid:1) possible choices of
coefficient n!/Qr nr!, so the probability of any given as-
signment g of nodes to groups is
P (gk) =
1
(cid:0)n+k−1
k−1 (cid:1) n!/Qr nr!
=
(k − 1)!
(n + k − 1)!
nr!
k
Yr=1
(11)
which recovers Eq. (10) without the need for the param-
eters γr.
(A corollary of this result is that the Dirichlet process
of Section III A does indeed generate a uniform distri-
bution over possible group sizes, as claimed, since the
distributions (10) and (11) are identical.)
C. Non-empty groups
A possible objection to these methods for generating
assignments g (widely used though they are) is that they
allow groups to be empty. It is unclear what the meaning
is of an empty group.
If someone were to hand you a
network with two clear groups in it, then tell you that
really there are three groups but one of them is empty,
you might justifiably say that this is not a meaningful
statement.
One advantage of the non-parametric formulation of
Section III B is that generalizes easily to the case where
groups are required to be non-empty. One need simply
replace the binomial coefficient for the number of ways
of generating the group sizes with the corresponding co-
efficient for non-empty groups, which is (cid:0)n−1
k−1(cid:1). Then
1
P (gk) =
.
(12)
(cid:0)n−1
k−1(cid:1) n!/Qr nr!
D. Choice of the number of groups
We turn now to the choice of prior P (k) on the number
of groups itself. Again one's first guess at a prior might
be a flat distribution with all choices equally likely. For
non-empty groups as in Section III C, the possible choices
for number of groups range from 1 to n, so a flat prior
would have P (k) = 1/n in this range and zero for all other
values of k. This choice has been made in some previ-
ous work [9], but we find it to give poor results, placing
too much weight on high values of k and significantly
4
overestimating the number of groups in well-understood
test cases. In practice one must use a strongly decreasing
prior on k to achieve consistent results. Previous authors
have given qualitative arguments in favor of a prior going
as 1/k! [8] or even steeper [16].
In this paper we take a somewhat different approach
and do away with an explicit prior on k, instead employ-
ing a generative process for group assignments g that
automatically incorporates the choice of the number of
groups in a simple way. The process we use, a queueing-
type mechanism which is a variant on the "restaurant"
processes of traditional probability theory, is as follows.
Take the n nodes in random order and place the first one
in group 1. Then for each subsequent node either (a)
with probability 1 − q place it in the same group as the
previous node or (b) with probability q make it the first
node in the next group. Note that this process never gen-
erates an empty group. All groups contain at least one
node.
The number of possible orders of the nodes in this pro-
cess is n!, with each one occurring with equal probabil-
ity 1/n!. If the process generates k groups in total then
there must be k − 1 new groups started and, since every
node except the first has equal chance q of starting a new
group, the probability of generating k groups with sizes
n1 . . . nk is
(1−q)n1−1q(1−q)n2−1q . . . q(1−q)nk−1 = qk−1(1−q)n−k,
(13)
where we have made use of the fact thatPr nr = n. Fur-
thermore, there areQr nr! ways of rearranging the nodes
within each group that give rise to the same assignment g.
Hence the probability of generating any given assignment
under our proposed process is
P (g, k) =
1
n!
qk−1(1 − q)n−k
nr!
(14)
k
Yr=1
Given that P (g, k) = P (k)P (gk) and comparing with
Eq. (12), we see that this process is equivalent to the
process of Section III C if one chooses a prior P (k) on
the number of groups thus:
P (k) =
P (g, k)
P (gk)
=(cid:18)n − 1
k − 1(cid:19)qk−1(1 − q)n−k,
(15)
with 1 ≤ k ≤ n.
In other words, the number of new
groups k − 1 created in the generating process has a bino-
mial distribution (as one can easily derive by considering
the process directly).
For our purposes it will be convenient to parametrize
the probability q by q = µ/(n − 1), so that µ is the ex-
pected number of new groups started during the assign-
ment process, which is one less than the total number of
groups. Then
P (g, k) =
(1 − q)n
µk
qn!
(n − µ − 1)k
nr!
(16)
k
Yr=1
The leading factor of (1 − q)n/qn! is independent of both
g and k and will cancel out of subsequent calculations.
5
E. Choice of parameter value
Our prior on g, k now has just one parameter µ, whose
value we have yet to choose. One way to proceed is to
take the Bayesian approach a step further and place a
prior on the prior-a so-called hyperprior, meaning a
probability distribution on µ. In principle one could go
even further and place a hyperhyperprior on the hyper-
prior too, and so forth ad infinitum. This process usually
yields diminishing returns, however, and one normally
stops at some point, simply fixing a value for the param-
eters. In the present case, we choose to halt the process
at the level of the parameter µ.
In our tests we have
found that a value µ = 1 works well, so that, neglecting
constants
• Type 2: Moving a single node to a newly created
group, thereby increasing the value of k by one.
A sufficient condition for a correct Monte Carlo algo-
rithm is that the algorithm satisfy the requirements of
ergodicity and detailed balance [17]. The requirement of
ergodicity says that every state of the system must be
accessible from every other by a finite sequence of Monte
Carlo steps. It is trivial to show that this condition can
be satisfied by steps of the kind described above that
move individual nodes from one group to another.
More demanding is the requirement of detailed bal-
ance, which in the present situation says that the rate
R(g, k → g ′, k′) to go from a state (g, k) to another
state (g ′, k′) and the rate R(g ′, k′ → g, k) to go back
again must satisfy
P (g, k) = (n − 2)−k
nr!
k
Yr=1
(17)
R(g, k → g ′, k′)
R(g ′, k′ → g, k)
=
P (g ′, k′A)
P (g, kA)
=
P (g ′, k′)
P (g, k)
×
P (Ag ′, k′)
P (Ag, k)
,
where we have used Eq. (8). From Eq. (17) we have
(19)
although other values around 1 give basically the same
results, so the method does not seem sensitive to the
precise choice we make. No doubt a hyperprior centered
roughly around 1, such as a suitably sized normal distri-
bution, would also give similar results, but we don't see
any advantage to taking this approach.
It is interesting to note that when q = µ/(n − 1) with
µ = 1, and taking the limit of large n, the prior on k,
Eq. (15), becomes
P (k) =
e−1
(k − 1)!
.
(18)
In other words, this choice is essentially equivalent to the
1/k! prior proposed previously on heuristic grounds [8].
IV. MONTE CARLO ALGORITHM
Given the prior, Eq. (17), on g, k, we can now write
down the complete posterior distribution (8) on the same
quantities. Then by summing over all values of g we can
find the probability distribution P (kA) and hence de-
duce the most likely value of k. Unfortunately the sum
it has kn terms, which is a very
over g is hard to do:
large number in most cases, making exhaustive numeri-
cal evaluation impossible, and no simple scheme presents
itself for performing the sum analytically. Instead there-
fore we estimate the distribution over k by Markov chain
Monte Carlo sampling.
The Monte Carlo scheme we propose employs steps of
two types:
• Type 1: Moving a single node from group to
group. This type of move includes processes that
decrease the number of groups (if the node moved
is the last of its group) and processes that keep the
number of groups constant (if the node moved is
not the last of its group).
P (g ′, k′)
P (g, k)
= (n − 2)k−k′Qk′
Qk
r=1 n′
r!
r=1 nr!
,
(20)
where n′
ment g ′.
r are the sizes of the groups for group assign-
We use a traditional accept/reject Monte Carlo scheme
in which we repeatedly propose a potential move then ei-
ther accept or reject that move with probabilities chosen
to satisfy the detailed balance condition. Thus the rate
R(g, k → g ′, k′) divides into the product of the proba-
bility π of proposing the move in question and the prob-
ability α of accepting it: R(g, k → g ′, k′) = π(g, k →
g ′, k′) α(g, k → g ′, k′). Then
R(g, k → g ′, k′)
R(g ′, k′ → g, k)
=
π(g, k → g ′, k′)
π(g ′, k′ → g, k)
×
α(g, k → g ′, k′)
α(g ′, k′ → g, k)
.
(21)
The algorithm we propose is as follows:
1.
(a) On each step of the algorithm, with probabil-
ity 1 − 1/(n − 1) we propose a move of type 1.
Specifically, if k = 1 we do nothing (because
there are no possible moves that move a node
from one group to another). Otherwise, when
k > 1, we choose a pair of distinct group la-
bels r, s uniformly at random from the set of
all such pairs in the range 1 . . . k, then choose a
single node uniformly at random from group r
and move it to group s.
(b) If, in the process, we remove the last remain-
ing node from group r,
leaving that group
empty, we relabel the non-empty groups so
that their labels run from 1 . . . k−1, and we de-
crease k by one. In practice, the most efficient
way to do the relabeling is just to change the
current group k to have label r (unless r = k,
in which case no relabeling is necessary).
2.
(a) Otherwise, with probability 1/(n − 1) we pro-
pose a move of type 2. Specifically, we choose
a pair of distinct group labels r, s uniformly
at random from the set of all such pairs in the
range 1 . . . k+1, relabel group r as group k+1,
and create a new empty group r (unless r =
k + 1, in which case we simply create a new
empty group k + 1 and no relabeling is nec-
essary). Then we choose a node uniformly at
random from group s and move it to the newly
created group r.
(b) If, in the process, we remove the last remain-
ing node from group s,
leaving that group
empty, we change group k + 1 to have label s.
Otherwise we increase k by 1. (Note that k
can never become greater than n during this
process, since doing so would always involve
removing the last node from group s, which
precludes increasing k any further.)
3. Once we have proposed our move from state (g, k)
to state (g ′, k′), we accept it with acceptance prob-
ability
α(g, k → g ′, k′) = min(cid:18)1,
P (Ag ′, k′)
P (Ag, k) (cid:19).
(22)
If the move is accepted, g ′, k′ becomes the new state
of the system. Otherwise the system remains in the
old state g, k. Note, crucially, that the probabilities
appearing on the right-hand side of (22) are of the
form P (Ag, k), and not P (g, kA) as you might ex-
pect if you are familiar with standard (Metropolis–
Hastings) Monte Carlo methods.
4. Repeat from step 1.
To see that that this algorithm does indeed satisfy the
condition of detailed balance, Eq. (19), consider first a
move of type 1 that moves a node from group r to group s,
where nr > 1 so that the node moved is not the last node
in group r and the value of k does not change. Thus
k′ = k and Eq. (20) simplifies to
P (g ′, k′)
P (g, k)
=
n′
t!
nt!
=
n′
s
nr
,
k
Yt=1
(23)
with the terms for all groups other than r and s can-
celing. Moves of type 1 are performed with probability
1 − 1/(n − 1), there are k(k − 1) possible choices of dis-
tinct groups r, s, and nr nodes to choose from in group r,
so the total probability of proposing a specific move of a
specific node is
6
Similarly, the probability of proposing the reverse move,
in which the same node is moved from group s to
group r, is
π(g ′, k′ → g, k) =
n − 2
(n − 1)k(k − 1)n′
s
.
(25)
And the ratio of the two is
π(g, k → g ′, k′)
π(g ′, k′ → g, k)
=
=
n − 2
(n − 1)k(k − 1)nr
n′
s
nr
,
×
(n − 1)k(k − 1)n′
s
n − 2
(26)
which is precisely equal to Eq. (23).
We can also demonstrate an equivalent result for moves
that change the value of k. Consider a move of type 1
that removes the last node from group r and moves it to
group s, thereby reducing the number of groups by 1, so
that k′ = k − 1. For such a move, Eq. (20) becomes
P (g ′, k′)
P (g, k)
= (n − 2)n′
s.
(27)
The probability of proposing such a move is again given
by Eq. (24), except that in this case nr = 1, so the ex-
pression simplifies to
π(g, k → g ′, k′) =
n − 2
(n − 1)k(k − 1)
.
(28)
The reverse of such a move is a move of type 2, in which
a node in group s becomes the founding member of new
group r. Moves of type 2 are performed with probabil-
ity 1/(n−1), there are (k′ +1)k′ = k(k−1) ways of choos-
ing the labels r, s, and n′
s ways of choosing the node to
be moved. Thus the total probability of proposing such
a move is
π(g ′, k′ → g, k) =
1
(n − 1)k(k − 1)n′
s
.
(29)
Taking the ratio of (28) and (29), we get
π(g, k → g ′, k′)
π(g ′, k′ → g, k)
=
n − 2
(n − 1)k(k − 1)
× (n − 1)k(k − 1)n′
s
= (n − 2)n′
s,
(30)
which is equal to (27).
Finally, there is one further class of moves that have
to be considered separately, namely moves of type 2 that
remove the last node from group s and make it the initial
node in a new group r. By contrast with other moves
of type 2, these moves do not change the value of k.
Moreover they don't change the product Qr nr! either,
so Eq. (20) is simply
P (g ′, k′)
P (g, k)
= 1.
(31)
π(g, k → g ′, k′) =(cid:18)1 −
1
n − 1(cid:19) ×
n − 2
1
k(k − 1)
×
1
nr
=
(n − 1)k(k − 1)nr
.
(24)
At the same time, the probability of proposing such a
move is the same in both directions, equal to 1/[(n −
1)k(k + 1)], and hence the ratio of the forward and back-
ward proposal probabilities is 1, which is equal to (31).
Thus for all moves of all types we have
π(g, k → g ′, k′)
π(g ′, k′ → g, k)
=
P (g ′, k′)
P (g, k)
.
(32)
Equating Eqs. (19) and (21) and making use of (32), we
then find that the detailed balance condition becomes
α(g, k → g ′, k′)
α(g ′, k′ → g, k)
=
P (Ag ′, k′)
P (Ag, k)
.
(33)
If we can choose the acceptance ratios to satisfy this re-
lation, then Eq. (19) will be obeyed. But the choice in
Eq. (22) trivially satisfies (33), hence detailed balance is
obeyed and the proposed algorithm will sample correctly
from the distribution P (g, kA).
A.
Implementation
Implementation is a relatively straightforward trans-
lation of the algorithm described above into computer
code. We maintain not only a record of the group assign-
ment gi of each node but also a separate, unordered list
of the members of each group, which allows us to choose
a random member of a group rapidly, and to efficiently
relabel all members of a group when required. We cal-
culate the logarithm of the ratio P (Ag ′, k′)/P (Ag, k),
rather than the ratio itself, to avoid numerical problems
with powers and factorials (which can become large) and
only take the exponential at the end to determine the
acceptance ratio, Eq. (22). We also employ a look-up
table of log-factorials to speed their calculation, and a
running record of the nr and mrs, updated after every
accepted move, so as to avoid recalculating these values
repeatedly.
As a practical matter, the relabeling process for moves
of type 2 can be slow if group r contains many nodes,
so in our implementation we always give new groups la-
bel k + 1, which frees us from having to relabel any nodes
other than the one node that is placed in the newly cre-
ated group. Technically, this means that our Monte Carlo
algorithm does not sample labelings g with the true prob-
ability of Eq. (17): group k will typically be the newest
group and therefore smaller on average than the others.
However, the algorithm does still sample divisions of the
network into groups and values of k with the correct prob-
ability, and these are the only physical quantities we care
about. The group labels themselves have no meaning-
they exist only as a mathematical convenience for the
purposes of notation. The only meaningful quantities are
the value of k and the division into groups, and these are
correctly generated. (And if one were concerned to sam-
ple labelings g correctly, one could do so easily by taking
the labelings generated by the algorithm and randomly
permuting the labels.)
7
The initial assignment of nodes to groups is drawn
at random from the prior distribution defined in Sec-
tion III D. In order to avoid any bias in the results, in-
stead of just setting µ = 1 we use a value of µ that is itself
chosen randomly. In the example calculations presented
in Section V, the value of µ for the initial assignment is
chosen uniformly in the interval from 0 to 100, meaning in
practice the initial number of groups lies approximately
uniformly in this range. (In the actual Monte Carlo cal-
culation, however, we always use µ = 1, as described in
Section III E.)
Our code is implemented in C, and performs about a
million Monte Carlo steps per second on a typical desktop
computer (circa 2017), which puts the analysis of large
networks, up to hundreds of thousands of nodes or more,
within reach. Our code is available for download on the
web-see Ref. [18].
B. Relation to previous approaches
In a previous paper [10] we proposed a slightly different
algorithm for determining the number of communities,
based on the same principles used here but different in
detail. We expect the present algorithm to be more effi-
cient than the earlier one, primarily because of the way it
incorporates the prior on group assignments P (g, k) into
the proposal probability π rather than the acceptance
probability α. However, we also believe the derivation
given here is more appropriate than that given in the pre-
vious paper, particularly in its focus on the prior P (g, k)
on group assignments.
The argument given in the previous paper differs from
that given here in two ways. First, in the previous paper
we advocated using a flat prior P (k) on the number of
groups, whereas in this paper we argue for a decreasing
prior going as 1/k!. On the other hand, the probabil-
ity P (gk) given in the previous paper omits a factor of
k!, equal to the number of ways the labels on a given par-
tition of the network can be permuted without changing
the partition. These two factors of k! cancel, leaving
the equations essentially unchanged. Thus the formulas
and algorithm given in the previous paper are essentially
equivalent to those given here, but the motivation differs,
with the arguments given here being, in our opinion, the
correct ones.
V. EXAMPLE APPLICATIONS
In this section we apply our method to a wide range of
networks and find it to give good results in most cases.
To evaluate performance under controlled conditions,
we test the method on several large sets of computer-
generated networks, created using both the stochastic
block model and the widely used LFR benchmark. To
test the method under real-world conditions we have also
applied it to a range of observed networks, including a
number of staples of the community detection canon, as
well as a large example network with over 300 000 nodes.
A. Computer-generated networks
In order to explore the performance of our method sys-
tematically we have tested it on a range of computer-
generate ("synthetic") networks. These are networks
with known community structure planted within them,
generated using random graph models. Using synthetic
networks allows us to vary the number of planted com-
munities and quantify the extent to which our algorithm
is able to correctly recover that number.
In our first set of tests, we use networks generated us-
ing the standard (non-degree-corrected) stochastic block
model [13, 14]. Figures 1a and 1b show results for two
different sets of networks. Each panel shows the number
of communities k inferred by our method plotted against
the known number planted in the network as the latter
is varied (blue circles in the plots). In Fig. 1a the size of
the network is held fixed as the number of communities
in increased, while in Fig. 1b the size of the communities
is held fixed, so that the size of the network increases
with the number of communities. As the figures show,
in both cases the algorithm infers the correct number of
communities with high accuracy for values of k up to
about 20.
For higher values it has a tendency to underestimate
the number of communities. These calculations, however,
are for runs of the Monte Carlo algorithm that start with
a random assignment of nodes to groups, as described
in Section IV A. Also shown in the figures are the re-
sults of runs on the same networks in which the Monte
Carlo algorithm was started with group assignments cor-
responding exactly to the planted ground-truth commu-
nity division (red triangles). As the figures show, for
this choice of initialization the algorithm finds the cor-
rect number of communities for the entire range of values
of k explored. These results suggest that the underesti-
mation of k arises not because the correct group assign-
ment fails to maximize the posterior probability P (kA),
but rather because the Monte Carlo algorithm has not
run for long enough to find the maximum. That is, the
method is theoretically sound but the numerical calcu-
lation becomes too demanding as k becomes large. Pos-
sibly this problem could be solved with a more efficient
Monte Carlo sampling scheme, although it seems likely
that some similar issue will eventually arise no matter
what sampling scheme is used. The fundamental prob-
lem is that the number of possible group assignments kn
increases very rapidly with k, so it becomes unfeasible
to explore the space of assignments effectively when k is
very large. On the other hand, since, as Figs. 1a and 1b
show, the method only underestimates the value of k and
does not overestimate, the algorithm gives a lower bound
on the number of communities in the network, which
may well have some utility even when the exact value
8
of k is not found. Note that the fact that the algorithm
underestimates k does not appear to be a result of the
initial conditions. As described in Section IV A, the algo-
rithm starts with an initial number of groups anywhere
up to 100, so the initial conditions are at least as likely to
overestimate k as underestimate. It seems likely, there-
fore, that the underestimates we see in the final results
are a consequence of the Monte Carlo sampling method
and not of the initial conditions.
The examples in Fig. 1a and 1b assume so-called as-
sortative network structure, meaning that there are more
in-group edges than between-group edges in the network.
Our method, however, should in principle be just as good
at finding the number of communities in disassortative
cases, where there are more between-group edges, or in
mixed assortative/disassortative cases. Figure 1c shows
results from tests on networks of mixed type, generated
again using a stochastic block model but now taking a
diagonally dominant matrix of edge probabilities and per-
muting the rows and columns to move some of the large
matrix entries off the diagonal. As the figure shows, the
algorithm does indeed perform well in this case, indeed it
appears to perform better than in the purely assortative
case of Figs. 1a and 1b. A possible explanation is that
in the purely assortative case one can (erroneously) join
together groups and produce another assortative network
with strong community structure, but in a disassortative
or mixed case joining groups is not guaranteed to produce
another network with strong structure.
The parameter values used in each of these examples
mean that the networks generated have quite prominent
community structure-the number of communities varies
from network to network but all have strong structure
that should be relatively straightforward to detect.
It
is interesting to ask how the method fares if we make
the structure weaker. Figure 2 shows the results of a
set of tests on networks with varying difference between
the number of in-group and between-group connections.
The horizontal axis is normalized to place the so-called
detectability threshold at ±1. This is the point at which
communities become formally undetectable in the net-
work because the structure is too weak [20–22]. As the
figure shows, our method gets the value of k correct vir-
tually all of the time outside of the undetectable region
(marked by the vertical dashed lines in the figure), except
again for assortative networks with very large numbers of
communities (such as the right-hand portion of the curve
for k = 32).
Widely used though it is, one could argue that the
stochastic block model is not a very realistic model. The
networks it generates have Poisson degree distributions
within each community, for instance, and in the cases
studied here we have also limited ourselves to commu-
nities of uniform size. An alternative model that avoids
these limitations is the LFR benchmark model of Lan-
cichinetti, Fortunato, and Radicchi [19]. This model is
essentially a special case of the degree-corrected stochas-
tic block model of Section II, with both the degrees and
k
d
e
t
a
m
i
t
s
E
k
d
e
t
a
m
i
t
s
E
4 0
3 0
2 0
1 0
1
1
4 0
3 0
2 0
1 0
1
1
1 0
2 0
3 0
4 0
Tr ue k
1 0
2 0
3 0
4 0
Tr ue k
9
k
d
e
t
a
m
i
t
s
E
k
d
e
t
a
m
i
t
s
E
4 0
3 0
2 0
1 0
1
1
4 0
3 0
2 0
1 0
1
1
1 0
2 0
3 0
4 0
Tr ue k
1 0
2 0
3 0
4 0
Tr ue k
FIG. 1: Tests of the method on synthetic networks. In each panel, circles represent results derived from Monte Carlo runs
with random initial assignment of nodes to group ("random initial conditions"), while triangles represent runs started with
the known correct assignments ("ground truth initial conditions"). (a) Networks generated using the stochastic block model
with n = 1000 nodes, mean degree 30, and equally sized groups with 90% of connections with groups and 10% between groups.
(b) Networks generated using the stochastic block model with groups of fixed size 250 nodes (so that network size varies with the
number of groups k), and each node having an average of 16 in-group connections and 8 out-group connections. (c) Networks
generated using the same stochastic block model as in (a) but with the rows and columns of the matrix of edge probabilities
permuted to produce a mixed assortative/disassortative structure. (d) Networks generated using the LFR benchmark model
of [19], which is parametrized by it maximum and minimum group sizes. In these tests we used minimum groups sizes between
10 and 80 nodes, and maximum group size equal to five times the minimum. Ten Monte Carlo runs were performed for each
network of 2000 steps per node each, with the distribution over k being calculated from the final 1000 only.
the sizes of the communities drawn from power-law dis-
tributions, giving the networks similar features to those
seen in many real-world examples.
Figure 1d shows the results of tests of our method on
LFR networks generated with the same model parame-
ters as those used by Lancichinetti and Fortunato [23]
in a widely cited study. The results are similar to those
for the stochastic block model: the method performs well
for smaller values of the number of groups k but tends
to underestimate as the value of k gets larger. If, how-
ever, the Monte Carlo algorithm starts with an initial
group assignment equal to the planted structure, then it
reliably finds the correct number of groups for all values
of k, again suggesting that the problem is in the time
available for equilibration and sampling, rather than any
fundamental issue with the approach. If one were able to
sample from the entire distribution P (g, kA) in reason-
able time, one should find the correct number of groups.
1.0
0.8
0.6
0.4
0.2
t
c
e
r
r
o
c
n
o
i
t
c
a
r
F
0.0
-6
2 g r oups
4 g r oups
8 g r oups
16 g r oups
32 g r oups
-4
-2
2
N or m alize d m ixing
0
4
6
FIG. 2: Fraction of runs on which the algorithm correctly
estimates the number of groups k in tests on networks gen-
erated using the stochastic block model, as a function of the
normalized mixing parameter (cin − cout)/√c. Networks have
n = 1000 nodes, average degree c = 30 and k = 2, 4, 8,
16, 32, with mixing varying from perfect assortativity (right-
hand size of the plot) to perfect disassortativity (left-hand
side). The dashed gray lines at ±1 denote the theoretical
detectability thresholds. Fifty Monte Carlo runs were per-
formed for each network of 2000 steps per node each, with
the distribution over k calculate from the final 1000 only.
B. Real-world networks
As a complement to the synthetic tests of the previ-
ous section, as have also tested our method on a range of
real-world networks. There exist a number of well stud-
ied example networks in the literature that have widely
agreed upon ground-truth community divisions, based in
part on knowledge of the specific systems the networks
describe and in part on consensus derived from repeated
analyses with many different community detection algo-
rithms. Figure 3 shows results for four such networks.
The first column in Fig. 3 shows results for tests on the
"karate club" network of Zachary [24], perhaps the best
known and most widely used benchmark of community
detection. This small social network is universally agreed
to contain two clear communities, and when applied to
the network our method firmly favors k = 2. The top
panel in the figure shows a histogram of the values of k
sampled by the Monte Carlo algorithm on this network,
and the probability shows a clear peak for two commu-
nities.
It could be argued, however, that looking directly at
the values of k generated by the Monte Carlo algorithm
has the potential to be misleading in some cases. Imag-
ine, for instance, that a network breaks apart into two
large groups that occupy most of the network, plus a
third group with only a very few nodes in it. In this sit-
uation one might be justified in saying that the network
10
really only contains two groups, not three. One can cap-
ture this kind of situation by defining an effective number
of groups
keff = eS,
S = −
nr
n
log
nr
n
.
k
Xr=1
(34)
Here S is the entropy of the group assignment, which has
a maximum value of log k when the groups are equally
sized, so that keff = eS = k in this case. On the other
hand, if there are a few small groups in the network and
the remainder are large and equally sized then the mea-
sure will ignore the small groups to a great extent and
keff will be roughly equal to the number of large groups
only.
The second panel in column 1 of Fig. 3 shows results for
this alternative measure of group number, as calculated
using our Monte Carlo algorithm on the karate club net-
work. It is straightforward to show that keff ≤ k strictly,
so by necessity the distribution in the second panel is to
the left of that in the top panel. There are three clear
peaks visible in the distribution of keff, corresponding
to states with one, two, and three groups, so it seems
reasonable to assume that these are "real" divisions of
the network. The peak for keff = 1 is the highest, but
the area under the peak for keff = 2 is greater, so two
groups, which is the widely accepted number, still seems
to be preferred overall.
The third panel in column 1 shows the group assign-
ment g with the maximum likelihood sampled by the
Monte Carlo algorithm, which in this case corresponds
closely to the accepted community structure of the karate
club network. The fourth panel shows an alternative vi-
sualization of the community structure, a plot of the adja-
cency matrix of the network where the rows and columns
have been ordered so as to put the two groups in contigu-
ous blocks. As we can see, this places most edges within
blocks and only a few between blocks, as we would expect
for a network with strong community structure. Finally,
in the bottom panel of the column, we show a visual-
ization of the group structure itself, a "meta-network"
in which the nodes represent the groups and edges rep-
resent connections between groups. In this simple case
the meta-network does not offer much insight, since it
consists of just two meta-nodes and a single edge, but
in more complicated situations with larger numbers of
groups-including some of the others in Fig. 3-it can
be a useful tool.
The remaining three columns of Fig. 3 show corre-
sponding analyses for three further networks: the Amer-
ican college football network studied in [1], the net-
work of fictional character interactions in the novel Les
Mis´erables by Victor Hugo [25], and a disassortative ex-
ample, the network of word adjacencies of adjectives and
nouns in the novel David Copperfield by Charles Dick-
ens [26]. In each case the algorithm finds the accepted
number of communities-six, eleven, and two, respec-
tively. The distributions of keff largely agree with those
Karate club
American football
Les Mis´erables
Word adjacency
11
y
c
n
e
u
q
e
r
F
0.6
0.5
0.4
0.3
0.2
0.1
0.0
y
c
n
e
u
q
e
r
F
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
1 2 3 4 5 6 7
N um b e r of g r oup s
9
10 11 12 13
N um b e r of g r oup s
3
4
5
6
7
8
N um b e r of g r oup s
y
t
i
s
n
e
d
y
t
i
l
i
b
a
b
o
r
P
2.0
1.5
1.0
0.5
0.0
y
t
i
s
n
e
d
y
t
i
l
i
b
a
b
o
r
P
1.0
0.5
0.0
1
2
3
4
5
6
N um b e r of g r oup s
y
c
n
e
u
q
e
r
F
0.6
0.5
0.4
0.3
0.2
0.1
0.0
y
t
i
s
n
e
d
y
t
i
l
i
b
a
b
o
r
P
3.0
2.5
2.0
1.5
1.0
0.5
0.0
1 2 3 4 5 6 7
9
10 11 12 13
3
4
5
6
7
8
1
2
3
4
5
6
E ffe c tive k
E ffe c tive k
E ffe c tive k
E ffe c tive k
1 0
9
8
7
6
5
4
3
2
1
0
5
4
3
2
1
0
1
0
0
1
0 1 2 3 4 5 6 7 8 9 1 0
0
1 2
3
4
5
0
1
y
c
n
e
u
q
e
r
F
0.4
0.3
0.2
0.1
0.0
y
t
i
s
n
e
d
y
t
i
l
i
b
a
b
o
r
P
1.0
0.5
0.0
1
0
FIG. 3: Results for four real-world networks. Each column shows results for one network, as indicated. From top to bottom
the results shown are the posterior probability distribution of the number of groups, the distribution of the effective number of
groups calculated using the entropy measure of Eq. (34), the maximum likelihood community structure, the adjacency matrix,
and the "meta-network" representation of the communities and their pattern of connectivity.
10¡3
10¡4
10¡5
10¡6
10¡7
y
t
i
s
n
e
D
FIG. 4: A plot of the matrix ωgi gj of connection parameters
for a large network of copurchased products on Amazon.com.
In this network nodes represents products and edges join pairs
of products frequently purchased by the same buyer. In this
calculation we performed ten runs of 10 000 Monte Carlo steps
per node each and we display results from the run with the
highest average likelihood during the last 1000. The calcu-
lation found 81 groups in total. Color is on a log scale for
clarity.
for k, though for the Les Mis´erables and college football
networks they favor five and ten groups respectively, one
less than the peak in the distribution of k in each case,
perhaps suggesting that these networks have one group
that is small enough to be neglected.
These examples are all relatively small networks, up
to around a hundred nodes in the larger cases, but our
method is applicable in principle to much larger net-
works. As an example, Fig. 4 shows results for a network
of e-commerce data, a copurchasing network of items sold
by the online retailer Amazon.com [27]. In this network,
which comes from the Stanford Large Network Dataset
collection, the nodes represent 334 863 products for sale
on the Amazon web site and edges between them in-
dicate products that were frequently purchased by the
same buyer. The figure shows a visualization of the in-
ferred values of the edge probability parameters ωgigj ,
12
again with the columns ordered so as to make the groups
contiguous. As we can see, there appears to be strong
assortative structure in the network, with the algorithm
finding 81 groups in this case.
VI. CONCLUSIONS
In this paper we have described a method for deter-
mining the number of communities in a network with
community structure. The method relies on a combina-
tion of Bayesian inference applied to the degree-corrected
stochastic block model and a novel Monte Carlo algo-
rithm. Much of the method's success turns on the ap-
propriate choice of prior probability for the number of
groups and we describe a variation on the "restaurant"
processes of traditional model selection that appears to
work well. We have illustrated the performance of the
method with applications to a wide range of networks,
including a diverse set of synthetic test networks and a
number of real-world examples, one with over 300 000
nodes.
The primary limitation of the method as described is
that the Monte Carlo algorithm appears not to equili-
brate fully when the number of groups becomes large. A
possible objective for future work, therefore, would be to
find a method or algorithm that could sample the pos-
terior distribution over group assignments faster, which
would allow us to better apply the method to networks
with large numbers of groups.
Acknowledgments
The authors thank Tiago Peixoto and Jia-Rong Xie for
helpful conversations. This work was funded in part by
the US National Science Foundation under grants DMS–
1107796 and DMS–1407207 (MEJN), the UK Engineer-
ing and Physical Sciences Research Council under grant
EP/K032402/1 (GR), the James S. McDonnell Foun-
dation (MAR), the Simons Foundation (MEJN), and
the Advanced Studies Centre at Keble College, Oxford
(MEJN and GR).
[1] M. Girvan and M. E. J. Newman, Community structure
in social and biological networks. Proc. Natl. Acad. Sci.
USA 99, 7821–7826 (2002).
[2] S. Fortunato, Community detection in graphs. Phys. Rep.
486, 75–174 (2010).
[3] S. Fortunato and D. Hric, Community detection in net-
works: A user guide. Phys. Rep. 659, 1–44 (2016).
[4] M. S. Handcock, A. E. Raftery, and J. M. Tantrum,
Model-based clustering for social networks. J. R. Statist.
Soc. A 170, 301–354 (2007).
[5] J. J. Daudin, F. Picard, and S. Robin, A mixture model
for random graphs. Statistical Computing 18, 173–183
(2008).
[6] P. Latouche, E. Birmel´e, and C. Ambroise, Bayesian
methods for graph clustering. In Advances in Data Anal-
ysis, Data Handling, and Business Intelligence, pp. 229–
239, Springer, Berlin (2009).
[7] P. Latouche, E. Birmel´e, and C. Ambroise, Variational
Bayesian inference and complexity control for stochastic
block models. Statistical Modelling 12, 93–115 (2012).
[8] A. F. McDaid, T. B. Murphy, N. Friel, and N. Hurley, Im-
proved Bayesian inference for the stochastic block model
with application to large networks. Computational Statis-
tics and Data Analysis 60, 12–31 (2013).
[9] E. Come and P. Latouche, Model selection and clustering
in stochastic block models based on the exact integrated
complete data likelihood. Statistical Modelling 15, 564–
589 (2015).
[10] M. E. J. Newman and G. Reinert, Estimating the num-
ber of communities in a network. Phys. Rev. Lett. 117,
078301 (2016).
[11] X. Yan, Bayesian model selection of stochastic block
models. In Proceedings of the 2016 IEEE/ACM Interna-
tional Conference on Advances in Social Networks Anal-
ysis and Mining, pp. 323–328, Institute of Electrical and
Electronics Engineers, New York (2016).
[12] T. P. Peixoto, Nonparametric Bayesian inference of the
microcanonical stochastic block model. Phys. Rev. E 95,
012317 (2017).
[13] B. Karrer and M. E. J. Newman, Stochastic blockmodels
and community structure in networks. Phys. Rev. E 83,
016107 (2011).
[14] P. W. Holland, K. B. Laskey, and S. Leinhardt, Stochas-
tic blockmodels: Some first steps. Social Networks 5,
109–137 (1983).
[15] R. Guimer`a and M. Sales-Pardo, Missing and spurious
interactions and the reconstruction of complex networks.
Proc. Natl. Acad. Sci. USA 106, 22073–22078 (2009).
[16] T. P. Peixoto, Hierarchical block structures and high-
resolution model selection in large networks. Phys.
Rev. X 4, 011047 (2014).
[17] M. E. J. Newman and G. T. Barkema, Monte Carlo
Methods in Statistical Physics. Oxford University Press,
Oxford (1999).
13
[18] Computer code for the algorithm described in this paper
is available for download from the world wide web at
www.umich.edu/~mejn/communities.
[19] A. Lancichinetti, S. Fortunato, and F. Radicchi, Bench-
mark graphs for testing community detection algorithms.
Phys. Rev. E 78, 046110 (2008).
[20] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, In-
ference and phase transitions in the detection of modules
in sparse networks. Phys. Rev. Lett. 107, 065701 (2011).
[21] L. Massouli´e, Community detection thresholds and the
weak Ramanujan property. In Proceedings of the 46th
Annual ACM Symposium on the Theory of Computing,
pp. 694–703, Association of Computing Machinery, New
York (2014).
[22] E. Mossel, J. Neeman, and A. Sly, Reconstruction and es-
timation in the planted partition model. Probability The-
ory and Related Fields 162, 431–461 (2015).
[23] A. Lancichinetti and S. Fortunato, Community detection
algorithms: A comparative analysis. Phys. Rev. E 80,
056117 (2009).
[24] W. W. Zachary, An information flow model for conflict
and fission in small groups. Journal of Anthropological
Research 33, 452–473 (1977).
[25] D. E. Knuth, The Stanford GraphBase: A Platform
for Combinatorial Computing. Addison-Wesley, Reading,
MA (1993).
[26] M. E. J. Newman, Finding community structure in net-
works using the eigenvectors of matrices. Phys. Rev. E
74, 036104 (2006).
[27] J. Yang and J. Leskovec, Defining and evaluating network
communities based on ground-truth. Knowledge and In-
formation Systems 42, 181–213 (2015).
|
1507.08462 | 1 | 1507 | 2015-07-30T11:36:54 | Defensive Resource Allocation in Social Networks | [
"cs.SI",
"cs.GT"
] | In this work, we are interested on the analysis of competing marketing campaigns between an incumbent who dominates the market and a challenger who wants to enter the market. We are interested in (a) the simultaneous decision of how many resources to allocate to their potential customers to advertise their products for both marketing campaigns, and (b) the optimal allocation on the situation in which the incumbent knows the entrance of the challenger and thus can predict its response. Applying results from game theory, we characterize these optimal strategic resource allocations for the voter model of social networks. | cs.SI | cs |
Defensive Resource Allocation in Social Networks
Antonia Maria Masucci ∗1 and Alonso Silva †2
1INRIA Paris-Rocquencourt, Domaine de Voluceau B.P. 105, 78153 Le Chesnay, France
2Alcatel-Lucent Bell Labs France, Centre de Villarceaux, Route de Villejust, 91620
Nozay, France
Abstract
In this work, we are interested on the analysis
of competing marketing campaigns between an in-
cumbent who dominates the market and a chal-
lenger who wants to enter the market. We are in-
terested in (a) the simultaneous decision of how
many resources to allocate to their potential cus-
tomers to advertise their products for both mar-
keting campaigns, and (b) the optimal allocation
on the situation in which the incumbent knows the
entrance of the challenger and thus can predict its
response. Applying results from game theory, we
characterize these optimal strategic resource allo-
cations for the voter model of social networks.
1
Introduction
In contrast to mass marketing, which promotes a
product indiscriminately to all potential customers,
direct marketing promotes a product only to cus-
tomers likely to be profitable. Focusing on the lat-
ter, Domingos and Richardson [1, 2] incorporated
the influence of peers on the decision making pro-
cess of potential customers deciding between dif-
ferent products or services promoted by competing
marketing campaigns. This aggregated value of a
customer has been called the network value of a
customer.
If we consider that each customer makes a buy-
ing decision independently of every other customer,
we should only consider his intrinsic value (i.e., the
expected profit from sales to him). However, if we
∗Email: [email protected]
†Email: [email protected] To whom corre-
spondence should be addressed.
consider the often strong influence of her friends,
acquaintances, etc., then we should incorporate this
peer influence to his value for the marketing cam-
paigns.
In the present work, our focus is different from
previous works where their interest is to which po-
tential customers to market, while in our work is on
how many resources to allocate to market to poten-
tial customers. Moreover, we are interested on the
scenario when two competing marketing campaigns
need to decide how many resources to allocate to
potential customers to advertise their products ei-
ther simultaneously or where the incumbent can
foresee the arrival of the challenger and commit to
a strategy. The process and dynamics by which
influence is spread is given by the voter model.
1.1 Related Works
The (meta) problem of influence maximization was
first defined by Domingos and Richardson [1, 2],
where they studied a probabilistic setting of this
problem and provided heuristics to compute a
spread maximizing set. Based on the results of
Nemhauser et al. [3], Kempe et al. [4, 5] and Mossel
and Roch [6] proved that for very natural activa-
tion functions, the function of the expected num-
ber of active nodes at termination is a submodular
function and thus can be approximated through a
greedy approach with a (1−1/e−ε)-approximation
algorithm for the spread maximization set problem.
A slightly different model but with similar flavor,
the voter model, was introduced by Clifford and
Sudbury [7] and Holley and Liggett [8].
In that
model of social network, Even-Dar and Shapira [9]
found an exact solution to the spread maximization
1
set problem when all the nodes have the same cost.
Competitive influence in social networks has
been studied in other scenarios. Bharathi et al. [10]
proposed a generalization of the independent cas-
cade model [11] and gave a (1 − 1/e) approxima-
tion algorithm for computing the best response to
an already known opponent's strategy. Sanjeev and
Kearns [12] studied the case of two players simulta-
neously choosing some nodes to initially seed while
considering two independent functions for the con-
sumers denoted switching function and selection
function. Borodin et al. [13] showed that for a
broad family of competitive influence models it is
NP-hard to achieve an approximation that is bet-
ter than the square root of the optimal solution.
Chasparis and Shamma [14] found optimal adver-
tising policies using dynamic programming on some
particular models of social networks.
Within the general context of competitive con-
tests, there is an extensive literature (see e.g. [15,
16, 17, 18]), however their focus is mainly on the
case when the contest success function is given
by the marketing campaign that put the maxi-
mum resources.
In that case, Powell [19] stud-
ied the sequential, non-zero sum game who has a
pure strategy subgame perfect equilibrium where
the defender always plays the same pure strategy
in any equilibrium, and the attacker's equilibrium
response is generically unique and entails no mix-
ing. Friedman [20] studied the Nash equilibrium
when the valuations for both marketing campaigns
are the same.
2 Model
Consider two firms: an incumbent (or defender) D
and a challenger (or attacker) A. Consider the set
N = {1, 2, . . . , n} of potential customers. The chal-
lenger decides to launch a viral marketing campaign
at time t0 = 0 (we will also refer to the viral mar-
keting campaign as an attack). The budget for the
challenger is given by BA ≥ 0. The incumbent D
decides to allocate a budget BD ≥ 0 at time t0 to
prevent its customers to switch. The players of the
game are the competing marketing campaigns and
the nodes correspond to the potential customers.
The
strategy for player
∈
{D, A}, consists on an allocation vector xi =
(xi,1, xi,2 . . . , xi,n) where xi,j represents the budget
i, where
i
allocated by player i to customer j (e.g., through
promotions or offers). Therefore, the set of strate-
gies is given by the (n − 1)-dimensional simplex
∆i = {(xi,1, . . . , xi,n) :
n
xi,j ≥ 0,∀ 1 ≤ j ≤ n and
xi,j = Bi}.
Xj=1
We consider each potential customer as a com-
ponent contest. Let pi,j(xi,j , x−i,j ), henceforth the
contest success function (CSF), denote the proba-
bility that player i wins component contest j when
player i allocates xi,j resources and the adversary
player −i allocates x−i,j resources to component
contest j. We assume that the CSF for a player i
is proportional to the share of total advertising ex-
penditure on customer j, i.e.,
xi,j
1
2
xi,j +x−i,j
pi,j(xi,j , x−i,j) =(cid:26)
if xi,j 6= 0 or xi,j 6= 0,
if xi,j = x−i,j = 0.
(1)
Both firms may have different valuations for dif-
ferent customers. The intrinsic value for player i of
customer j is given by wi,j where i ∈ {D, A} and
1 ≤ j ≤ N . The intrinsic payoff function for player
i is given by
π(xi, x−i, wi) =
n
Xj=1
wi,j pi,j(xi,j , x−i,j),
(2)
where wi = (wi,1, wi,2, . . . , wi,n).
We are interested as well on the network value of
a customer. In the next subsection we will compute
this.
2.1 Network value of a customer
Let G = (V, E) be an undirected graph with self-
loops where V is the set of nodes in the graph
which represent the potential customers of the com-
peting marketing campaigns and E is the set of
edges which represent the influence between indi-
viduals. We denote by S the cardinality of the
set S, by the index i to one of the two players
(D or A) and by the index −i to the opponent
of player i. We consider that the graph G has n
V = n. For a node j ∈ V , we de-
nodes, i.e.
note by N (j) the set of neighbors of j in G, i.e.
N (j) = {j′ ∈ V : {j, j′} ∈ E} and by dj the degree
of node j, i.e. dj = N (j).
2
We consider two labeling functions for a node j ∈
V given by its initial preference between different
players, D or A, denoted by functions f 0
A and f 0
D
respectively. We denote by f 0
i (v) = 1 when node
v ∈ V prefers the product promoted by marketing
campaign i. We consider that every customer has
an initial preference between the firms, i.e. f 0
i =
1 − f 0
−i.
We assume that the initial preference for a cus-
tomer j is proportional to the share of total adver-
tising expenditure on customer j, i.e.,
f 0
(3)
i (j) =(cid:26) 1 with probability pi,j(xi, yi)
0 with probability p−i,j(xi, yi)
where the function pi,j(·,·) is given by eq. (1).
The evolution of the system will be described
by the voter model. Starting from any arbitrary
initial preference assignment to the vertices of G,
at each time t ≥ 1, each node picks uniformly at
random one of its neighbors and adopts its opin-
ion. In other words, starting from any assignment
f 0
i : V → {0, 1}, we inductively define
f t+1
i
(j) =( 1 with prob.
0 with prob.
.
(4)
For player i and target time τ , the expected pay-
{j ′∈N (j):f t
N (j)
{j ′∈N (j):f t
N (j)
i (j ′)=1}
i (j ′)=0}
,
off is given by
E
Xj∈V
wi,jf τ
i (j)
.
(5)
We notice that in the voter model, the probabil-
ity that node j adopts the opinion of one its neigh-
bors j′ is precisely 1/N (j). Equivalently, this is
the probability that a random walk of length 1 that
starts at j ends up in j′. Generalizing this obser-
vation by induction on t, we obtain the following
proposition.
of expectation, we have that for player i
E
Xj∈V
wi,jf τ
i (j)
wi,j P[f τ
i (j) = 1].
(6)
= Xj∈V
The probability that a random walk of length t
starting at j ends in j′, is given by the (j, j′)-entry
of the matrix M t. Then
P[f t
i (j) = 1] = Xj ′∈V
= Xj ′∈V
pt
j,j ′ P[f 0
i (j′) = 1]
M t(j, j′)P[f 0
i (j′) = 1],
and therefore,
E
Xj∈V
wi,jf t
i (j)
= Xj∈V Xj ′∈V
We know that P[f 0
Therefore, eq. (7) becomes
(7)
i (j′) = 1] = pi,j ′ (xi,j ′ , x−i,j ′ ).
wi,j M t(j, j′)P[f 0
i (j′) = 1].
Xj∈V Xj ′∈V
wi,jM t(j, j′)pi,j ′ (xi,j ′ , x−i,j ′ ).
(8)
Therefore, the expected payoff for player i is
given by
Fi(xi, x−i, vi) =
vi,j ′
n
Xj ′=1
xi,j ′
xi,j ′ + x−i,j ′
,
(9)
where vi = (vi,1, vi,2, . . . , vi,n).
wi,jM t(j, j′),
(10)
vi,j ′ = Xj∈V
corresponds to the network value of customer j′ at
time t. The previous expression is subject to the
constraint xi ∈ ∆i.
Proposition 1 (Even-Dar and Shapira [9]). Let
pt
j,j ′ denote the probability that a random walk of
length t starting at node j stops at node j′. Then
the probability that after t iterations of the voter
model, node j will adopt the opinion that node j′
had at time t = 0 is precisely pt
j,j ′ .
Let M be the normalized transition matrix of G,
i.e., M (j, j′) = 1/N (j) if j′ ∈ N (j). By linearity
3 Results
From the previous section, we are able to compute
the network value of each customer, therefore we
can restrict ourselves to work with these values.
With the next proposition, we are able to determine
the best response function for player i considering
the network value of each customer at a target time
τ given that the strategy of the opponent −i is x−i.
3
Proposition 4. Assume that vA,ℓ = v ∀1 ≤ ℓ ≤
n. If there exist k, k′ ∈ {1, . . . , n} such that vD,k =
vD,k′ , then xA,k = xA,k′ and xD,k = xD,k′ .
Proof. For j ∈ {1, . . . , n},
∀1 ≤ ℓ ≤ n, from eq. (12) we have
since vA,ℓ = v
xA,j + xD,j = γ√xD,j,
where
γ =
does not depend on j.
(BA + BD)
k=1 √xD,k
Pn
From the difference between eq. (12) and eq. (13),
where
xD,j = κ2vD,jxA,j,
k=1 √xD,k
κ = Pn
k=1 √vD,kxA,k
Pn
does not depend on j.
Replacing eq. (20) on eq. (18),
(18)
(19)
(20)
(21)
Proposition 2 (Friedman [20]). The best response
function for player i, given that player −i strategy
is x−i, is:
x∗i,j = −x−i,j + (Bi + B−i)
. (11)
√vi,jx−i,j
k=1 √vi,kx−i,k
Pn
From the previous proposition, we obtain that
the best response functions for players A and D
are given by
Pn
Pn
.(13)
, (12)
√vA,j xD,j
k=1 √vA,kxD,k
√vD,j xA,j
k=1 √vD,kxA,k
x∗A,j = −xD,j + (BD + BA)
x∗D,j = −xA,j + (BA + BD)
In the next proposition, we assume that the valu-
ations of one of the players are proportional (bigger
(α > 1), smaller (α < 1) or equal (α = 1)) to the
valuations of the adversary player. In that case, we
have the following proposition.
Proposition 3. If vi,j = αv−i,j ∀j ∈ {1, . . . , n},
i ∈ {A, D}, with α > 0, then the Nash equilibrium
of the game is given by
xi,j = Bi
vi,j
Vi
,
(14)
or equivalently,
(1 + κ2vD,j)xA,j = γκ√vD,jxA,j,
(22)
where Vi =Pn
j=1 vi,j.
Proof. The proof for the case α = 1 is given
by Friedman [20]. For that case, from eq. (9),
the objective function for player i is given by
Fi(xi, x−i, v−i). For α > 0, we have that the ob-
jective function,
Fi(xi, x−i, vi)
j=1 vi,j
j=1 v−i,j
=Pn
= αPn
xi,j
xi,j +x−i,j
,
(15)
xi,j
xi,j+x−i,j
.
(16)
= αFi(xi, x−i, vi),
(17)
and thus we conclude from the previous case.
The previous result not only gives explicitly the
Nash equilibrium under some constraints, but it
proves that a scaling factor for every contest does
not change the Nash equilibrium strategies of the
players.
An interesting property, that we will exploit in
the following is that if for one of the players all
the contests have the same valuation, then for ev-
ery two equal valuation contests for the adversary
player, the equilibrium allocation for each player in
the two contests are equal.
4
xA,j =
γ2κ2vD,j
(1 + κ2vD,j)2 .
(23)
If there exist k, k′ ∈ {1, . . . , n} such that vD,k =
vD,k′ ≡ w, then from eq. (23),
xA,k =
γ2κ2w
(1 + κ2w)2 = xA,k′ .
From eq. (20), we also obtain
xD,k = κ2 γ2κ2w2
(1 + κ2w)2 = xD,k′ .
(24)
(25)
In Proposition 3, we proved that a scaling fac-
tor between the valuations of the players does not
change their equilibrium strategies. However, we
will see in the following proposition that this situ-
ation is unusual. Actually, even in the case of two
communities within the social network, where the
valuations for the attacker are the same and the
valuations for the defender are different for each
community, the players have very different strate-
gies than the previously considered.
Proposition 5. Assume n is even, so there ex-
ists m ∈ N \ {0} such that n = 2m. Assume that
vA,ℓ = v ∀1 ≤ ℓ ≤ n, vD,k = αv ∀1 ≤ k ≤ m
and vD,k′ = βv ∀m + 1 ≤ k′ ≤ n, for α, β > 0.
Then the Nash equilibrium is given by
xA,1 = . . . = xA,m = x∗A,
xA,m+1 = . . . = xA,n = (BA/m − x∗A),
xD,1 = . . . = xD,m =
αx∗A
,
αx∗A + β(BD/m − x∗A)
.
β(BD/m − x∗A)
BD
m
BD
m
xD,m+1 = . . . = xD,n =
αx∗A + β(BD/m − x∗A)
where x∗A is unique (its expression is not important
and thus it is given in the Appendix).
Replacing eq. (30) and eq. (31) in eq. (12),
+
BA + BD
m
√αx
√αx + √βy
. (32)
αx
BD
m
αx + βy
x = −
We know that Pn
j=1 xA,j = BA, thus
m(x + y) = BA.
From eq. (32) and eq. (33), we obtain
x =
− BD
m
+ BA+BD
m
αx
(α−β)x+βBA/m
√αx+√β(BA/m−x)
√αx
,
(33)
(34)
(35)
which corresponds to x∗A given in the Appendix.
Proof. From Proposition 4, we have that
4 Stackelberg
leadership
xA,1 = xA,2 = . . . = xA,m ≡ x,
xA,m+1 = xA,m+2 = . . . = xA,n ≡ y.
From eq. (20),
xD,j
vD,jxA,j
= κ2,
(26)
where κ does not depend on j. Therefore for all
k, k′ ∈ {1, . . . , n},
xD,k
vD,kxA,k
=
xD,k′
vD,k′ xA,k′
.
(27)
Let us consider k ∈ {1, . . . , m} and k′ ∈ {m +
1, . . . , n}, then from the previous equation
xD,k =
αx
βy
xD,k′ .
j=1 xD,j = BD, thus
+ 1(cid:19) xD,k′ = BD.
We know that Pn
m(cid:18) αx
βy
(28)
(29)
Then
xD,m+1 = xD,m+2 = . . . = xD,n =
BD
m
βy
αx + βy
,
(30)
and from eq. (28),
xD,1 = xD,2 = . . . = xD,m =
BD
m
αx
αx + βy
.
(31)
model
For the case when there is an incumbent hold-
ing the market and there is a challenger entering
the market, we consider the Stackelberg leader-
ship model. The Stackelberg leadership model is
a strategic game in which the leader firm moves
first and then the follower firm moves afterwards.
To solve the Stackelberg model we need to find the
subgame perfect Nash equilibrium (SPNE) for each
player sequentially. In our case, the defender is the
leader who dominates the market and the attacker
is the follower who wants to enter the market.
From Proposition 2, the subgame perfect Nash
equilibrium for the attacker is given by eq. (12).
Given this information, the leader solves its own
SPNE.
The Lagrangian for the incumbent is given by
L(xD) =
vD,k
n
Xk=1
xD,k
xA,k + xD,k −µ(cid:16)
n
Xℓ=1
xD,ℓ−BD(cid:17),
(36)
where µ is the Lagrange multiplier. Since the de-
fender already knows the optimal allocation of re-
sources for the challenger, it incorporates this in-
formation into its Lagrangian,
xD,k
BA + BD
n
Xℓ=1
√vA,ℓxD,ℓ
n
vD,k
Xk=1
− µ(cid:16)
√vA,kxD,k
Xℓ=1
n
xD,ℓ − BD(cid:17),
L(xD) =
5
vD,k√xD,k
√vA,k
n
Xk=1
Proposition 7. Assume that n is even, so there
exists m ∈ N \ {0} such that n = 2m. Assume that
vA,ℓ = v ∀1 ≤ ℓ ≤ n, vD,k = αv ∀1 ≤ k ≤ m and
vD,k′ = βv ∀m + 1 ≤ k′ ≤ n, for α, β > 0. Then
the Stackelberg equilibrium is given by
xD,k =
xD,k′ =
BD
4m(cid:16)2 ±
4m(cid:16)2 ±
BD
√2(β − α)
pα2 + β2(cid:17) ∀1 ≤ k ≤ m,
√2(α − β)
pα2 + β2(cid:17) ∀m + 1 ≤ k′ ≤ n.
Proof. From eq. (37), for 1 ≤ k ≤ m,
2µ(BA + BD) =
√v
√xD,k
α
√v
√xD,k
√vxD,ℓ +
β
n
Xℓ=m+1
m
√vxD,ℓ+
Xℓ=1
√v
√xD,k α
n
Xℓ=1
(39)
√vxD,ℓ! .
(37)
√vA,ℓxD,ℓ.
Equivalently,
or equivalently,
L(xD) =
1
BA + BD
− µ(cid:16)
n
Xℓ=1
n
√vA,ℓxD,ℓ
Xℓ=1
xD,ℓ − BD(cid:17),
The necessary conditions for optimality are given
by the equations
1
=
∂L(xD)
∂xD,k
BA + BD(cid:16)
BA + BD(cid:16) vD,k
√vA,k
1
n
√vA,k
2√xD,k(cid:17)(cid:16)
Xℓ=1
vD,ℓ√xD,ℓ
√vA,ℓ (cid:17)+
Xℓ=1
√vA,ℓxD,ℓ(cid:17) − µ = 0.
n
1
2√xD,k
Reordering terms,
n
2µ(BA + BD) =
√vA,k
√xD,k(cid:16)
Xℓ=1
vD,ℓ√xD,ℓ
√vA,ℓ (cid:17) +
vD,k
√vA,k
1
√xD,k
n
Xℓ=1
We will use this equation to compute the following
cases.
Proposition 6. If vi,j = αv−i,j ∀j ∈ {1, . . . , n},
i ∈ {A, D}, with α > 0, then the Stackelberg equi-
librium of the game is
xi,j = Bi
vi,j
Vi
,
(38)
where Vi =Pn
k=j vi,j .
Proof. Following the proof of Proposition 4, when
the valuations of the defender are proportional to
the valuations of the attacker, the objective func-
tion for player i is given by Fi(xi, x−i, v−i) =
αFi(xi, x−i, v−i). Therefore, player i has an objec-
tive function equivalent to Fi(xi, x−i, v−i). In that
case, the game is equivalent to a two-player zero-
sum game and thus there is no difference between
the Stackelberg equilibrium and the Nash equilib-
rium given by Proposition 4.
Contrary to the previous proposition, in the sce-
nario considered in Proposition 5, the strategies
of the Stackelberg equilibrium are very different
from the strategies of the Nash equilibrium given
by Proposition 5 and different than the strategies
previously considered.
6
m
√xD,k =
2µ(BA + BD) 2α
v
We have the previous expression for every k ∈
{1, . . . , m}, therefore xD,1 = xD,2 = . . . = xD,m ≡
x.
√xD,ℓ + (α + β)
Xℓ=m+1
Xℓ=1
n
Similarly, from eq. (37), for m + 1 ≤ k′ ≤ n,
√xD,ℓ! .
2µ(BA + BD) =
+
√v
√xD,k′ α
√v
√xD,k′ β
m
n
Xℓ=1
Xℓ=1
√vxD,ℓ + β
√vxD,ℓ!
n
Xℓ=m+1
√vxD,ℓ!
(40)
n
m
Xℓ=1
√xD,ℓ + 2β
Equivalently,
√xD,k =
2µ(BA + BD) (α + β)
v
We have the previous expression for every k ∈
{m+1, . . . , n}, therefore xD,m+1 = xD,m+2 = . . . =
xD,n ≡ y.
From the difference between eq. (40) and eq. (39),
(cid:18) α + β
√y −
√x(cid:19) m√x =(cid:18) α + β
√x −
√y(cid:19) m√y.
Xℓ=m+1
2α
2β
(41)
√xD,ℓ! .
The solutions of the previous equation are given by
x =
BD
4m(cid:16)2 ±
√2(α − β)
pα2 + β2(cid:17).
√2(α − β)
pα2 + β2(cid:17).
Since x + y = BD/m, then
y =
BD
4m(cid:16)2 ∓
(42)
(43)
t
n
e
b
m
u
c
n
I
e
h
t
f
o
s
t
i
f
o
r
P
600000
580000
560000
540000
520000
500000
480000
460000
Stackelberg
Nash
0
0.1
0.2
0.4
0.3
0.6
Difference of Valuations
0.5
0.7
0.8
0.9
From eq. (12), we obtain xA,k for both 1 ≤ k ≤ m
and xA,k′ for m + 1 ≤ k ≤ n.
5 Simulations
In this section, we compare through numerical sim-
ulations the Nash equilibrium and the Stackel-
berg equilibrium for the allocation game described
above.
Consider that the number of potential cus-
tomers n = 100, 000 and that within these poten-
tial customers we have two communities of equal
size m = 50, 000. We consider that the budget al-
located to capture the market by the attacker is
BA = 200, 000, and we consider three different sce-
narios for the budget of the defender:
i) the de-
fender has half the budget of the attacker BD =
BA/2 = 100, 000, ii) the defender and the attacker
have the same budget BD = BA = 200, 000, iii)
the defender has two times the budget of the at-
tacker BD = 2BA = 400, 000.
Assume that the network value of each customer
for the challenger (attacker) is the same vA,ℓ =
v = 10 ∀1 ≤ ℓ ≤ n. However, for the incum-
bent (challenger), each community has a different
network value vD,C1 = v(1 − δ) = 10(1 − δ) for
the customers of the first community and vD,C2 =
v(1 + δ) = 10(1 + δ) for the customers of the second
community, where δ is a given parameter.
The Nash equilibrium (NE) was computed
through Proposition 5 and the Stackelberg equi-
librium (SE) was computed through Proposition 7.
The percentage increase in profits was computed
as 100 ∗ (SE − N E)/N E. The results are given in
Figure 1 and Figure 2.
In Figure 1, we observe that for small difference
of valuations Stackelberg and Nash equilibria give
roughly the same profit. However, when the differ-
ence of valuations increases we have that while the
Figure 1: Profits for the incumbent (defender) vs
the difference of valuations between communities
(δ) for equal budgets.
s
t
i
f
o
r
P
n
i
e
s
a
e
r
c
n
I
t
e
g
a
n
e
c
r
e
P
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
0
BD=BA/2
BD=BA
BD=2BA
0
0.1
0.2
0.4
0.3
0.6
Difference of Valuations
0.5
0.7
0.8
0.9
Figure 2: Percentage increase in profits for the
incumbent (defender) vs the difference of valua-
tions between communities (δ) by committing to
the Stackelberg leadership model versus Nash equi-
librium.
profit obtained by Stackelberg increases, the profit
of the Nash equilibrium after a threshold decreases.
In Figure 2, we notice that for a small difference
of valuations between communities, both models
give roughly the same profits, however when the dif-
ference of valuations between communities grows,
the Stackelberg equilibrium gives much higher prof-
its than the Nash equilibrium.
Another interesting observations is that in the
case when the defender has smaller budget com-
pared with the attacker, the difference in profits
7
from both equilibria is much higher compared with
the scenario when the defender has higher budget.
6 Conclusions
We have studied the case of two marketing cam-
paigns competing to maximize their profit from the
network value of the potential customers. We have
analyzed the following situations: (a) when the de-
cision of how many resources to allocate to mar-
ket to potential customers is made simultaneously,
and (b) when the decision is sequential and the in-
cumbent foreseeing the arrival of the challenger can
commit to a strategy before its arrival.
Acknowledgments
The work of A. Silva was partially done in the con-
text of the ADR "Network Science" of the Joint
Alcatel-Lucent Inria Lab. The work of A. Silva was
partially carried out at LINCS (www.lincs.fr).
References
[1] P. Domingos and M. Richardson, "Mining
the network value of customers," in Proceed-
ings of the 7th ACM SIGKDD International
Conference on Knowledge Discovery and Data
Mining, (New York), pp. 57 -- 66, ACM Press,
Aug. 26 -- 29 2001.
[2] M. Richardson and P. Domingos, "Mining
knowledge-sharing sites for viral marketing,"
in Proceedings of the 8th ACM SIGKDD In-
ternational Conference on Knowledge Discov-
ery and Data Mining, (New York), pp. 61 -- 70,
ACM Press, July 23-26 2002.
SIGKDD International Conference on Knowl-
edge Discovery and Data Mining, (New York),
pp. 137 -- 146, ACM Press, Aug. 24 -- 27 2003.
[5] D. Kempe, J. Kleinberg, and ´E. Tardos, "In-
fluential nodes in a diffusion model for social
networks," in ICALP: Annual International
Colloquium on Automata, Languages and Pro-
gramming, 2005.
[6] Mossel and Roch, "On the submodularity of
influence in social networks," in STOC: ACM
Symposium on Theory of Computing (STOC),
2007.
[7] P. Clifford and A. Sudbury, "A model for
spatial conflict," Biometrika, vol. 60, no. 3,
pp. 581 -- 588, 1973.
[8] R. A. Holley and T. M. Liggett, "Ergodic the-
orems for weakly interacting infinite systems
and the voter model," The Annals of Proba-
bility, vol. 3, no. 4, pp. 643 -- 663, 1975.
[9] E. Even-Dar and A. Shapira, "A note on
maximizing the spread of influence in social
networks," in Proceedings of the 3rd Inter-
national Conference on Internet and Network
Economics (WINE'07), (Berlin, Heidelberg),
pp. 281 -- 286, Springer-Verlag, 2007.
[10] S. Bharathi, D. Kempe, and M. Salek, "Com-
petitive influence maximization in social net-
works," in Internet and Network Economics
(X. Deng and F. Graham, eds.), vol. 4858 of
Lecture Notes in Computer Science, pp. 306 --
311, Springer Berlin Heidelberg, 2007.
[11] J. Goldenberg, B. Libai, and E. Muller, "Talk
of the network: A complex systems look at the
underlying process of word-of-mouth," Mar-
keting Letters, vol. 12, no. 3, pp. 211 -- 223,
2001.
[3] G. Nemhauser, L. Wolsey, and M. Fisher,
"An analysis of approximations for maximiz-
ing submodular set functions I," Mathemati-
cal Programming, vol. 14, no. 1, pp. 265 -- 294,
1978.
[12] S. Goyal and M. Kearns, "Competitive conta-
gion in networks," in Proceedings of the 44th
Symposium on Theory of Computing, STOC
'12, (New York, NY, USA), pp. 759 -- 774,
ACM, 2012.
[4] D. Kempe, J. Kleinberg, and ´E. Tardos, "Max-
imizing the spread of influence through a so-
cial network," in Proceedings of the 9th ACM
[13] A. Borodin, Y. Filmus, and J. Oren, "Thresh-
old models for competitive influence in so-
cial networks," in Proceedings of the 6th In-
8
ternational Conference on Internet and Net-
work Economics, WINE'10, (Berlin, Heidel-
berg), pp. 539 -- 550, Springer-Verlag, 2010.
[14] G. C. Chasparis and J. Shamma, "Control of
preferences in social networks," in Proceedings
of the 49th IEEE Conference on Decision and
Control (CDC), pp. 6651 -- 6656, Dec 2010.
[15] O. Gross and R. Wagner, "A continuous
colonel blotto game," in RAND Corporation
RM-408, 1950.
[16] B. Roberson, "The colonel blotto game.," Eco-
nomic Theory, vol. 29, no. 1, pp. 1 -- 24, 2006.
[17] A. M. Masucci and A. Silva, "Strategic Re-
source Allocation for Competitive Influence in
Social Networks," in Annual Allerton Confer-
ence on Communication, Control, and Com-
puting, (Monticello, Illinois, United States),
Oct. 1 -- 3 2014.
[18] G. Schwartz, P. Loiseau, and S. Sastry, "The
heterogeneous Colonel Blotto Game," in NET-
GCOOP 2014, International Conference on
Network Games, Control and Optimization,
October 29-31, 2014,, (Trento, Italy), 2014.
[19] R. Powell, "Sequential, nonzero-sum blotto:
Allocating defensive resources prior to attack,"
Games and Economic Behavior, vol. 67, no. 2,
pp. 611 -- 615, 2009.
[20] L. Friedman, "Game-theory models in the
allocation of advertising expenditures," Opera-
tions Research, vol. 6, no. 5, pp. 699 -- 709, 1958,
http://pubsonline.informs.org/doi/pdf/10.1287/opre.6.5.699.
9
Appendix
The term x∗A was computed through Matlab Symbolic Toolbox from the equation:
x = −
BD
m
αx
(α − β)x + βBA/m
+
and it is given by
BA + BD
m
√αx
,
√αx +pβ(BA/m − x)
ABDα4 − 8B3
ABDα3β + 72B3
Dα2 + B2
Aα4 + 8B4
AB2
Dαβ3 + 4B4
Dα3β + 8B4
AB2
Dαβ3 − B2
AB2
Dβ4 − 16BAB3
Dα8β2(4B4
AB2
Dα4 − 24B2
Dαβ))/(6m3(α + β)2(α − β)3)
Aα2β2 + 4B4
Dα3β + 146B2
Dα2β2 + 4B4
ABDα2β2 − 8B3
ABDαβ3
Dα3β + 96BAB3
D
Aβ4 + 4B3
AB2
Dα2β2 − 24B2
Dαβ3))/(m6(α2 − β2)4))(1/2))/18 − (α3(2BAβ2 − BAα2 + 3BAαβ
x∗A = (((3(1/2)((B2
+ 4B3
ABDβ4 − B2
α2β2 − 16BAB3
+ 4BDαβ)3)/(27m3(α + β)3(α − β)3) + (α3β(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ)(3B2
− 2BABDα2 + 6BABDαβ + B2
+ (BAα4β2(BA + BD)2)/(2m3(α + β)(α − β)2))(1/3) − (α(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ))/(3m(α2 − β2))
+ (α2(B2
− 3B2
Dαβ3))/(9m2(α2 − β2)2((3(1/2)((B2
Aα4 + 4B4
− B2
AB2
Dα4 − B2
Aα2β2 + 8B4
AB2
− 8B3
ABDα3β + 96BAB3
AB2
Dα3β + 72B3
− (α3(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ)3)/(27m3(α + β)3(α − β)3)
+ (α3β(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ)(B2
3B2
Aβ4 − 2BABDα3β + 12BABDα2β2 − 2BABDαβ3 − 3B2
ABDα4 + 4B3
Dαβ + 6BABDαβ))/(6m3(α + β)2(α − β)3) + (BAα4β2(BA + BD)2)/(2m3(α + β)(α − β)2))(1/3)))/α.
Dα8β2(4B4
Dα2β2 + 146B2
Dαβ3 − 24B2
AB2
Dα3β + 10B2
ABDβ4 + 4B4
Dα2β2
Dαβ3 + 4B4
ABDα2β2))/(m6(α2 − β2)4))(1/2))/18
Aβ4 + 4B3
Dα2β2 − 16BAB3
Dαβ3 − 16BAB3
Dα3β − 8B3
Aβ2 − 2B2
Aα2 + B2
Dα2 − 2BABDα2+
Aαβ − 2B2
Aα2 + B2
Aβ2
Dα3β
ABDαβ3
Aα4 + 2B2
Aα2β2 + B2
Dα2β2 − 24B2
AB2
Dβ4 + 8B4
Aαβ + B2
10
|
1508.05617 | 1 | 1508 | 2015-08-23T15:04:59 | The message does not matter: the influence of the network on information diffusion | [
"cs.SI",
"physics.soc-ph"
] | How an information spreads throughout a social network is a valuable knowledge sought by many groups such as marketing enterprises and political parties. If they can somehow predict the impact of a given message or manipulate it in order to amplify how long it will spread, it would give them a huge advantage over their competitors. Intuitively, it is expected that two factors contribute to make an information becoming viral: how influential the person who spreads is inside its network and the content of the message. The former should have a more important role, since people will not just blindly share any content, or will they? In this work it is found that the degree of a node alone is capable of accurately predicting how many followers of the seed user will spread the information through a simple linear regression. The analysis was performed with five different messages from Twitter network that was shared with different degrees along the users. The results show evidences that no matter the content, the number of affected neighbors is predictable. The role of the content of the messages of a user is likely to influence the network formation and the path the message will follow through the network. | cs.SI | cs | The message does not matter: the influence of the
network on information diffusion
5
1
0
2
g
u
A
3
2
]
I
S
.
s
c
[
1
v
7
1
6
5
0
.
8
0
5
1
:
v
i
X
r
a
Fabr´ıcio Olivetti de Franca, Member, IEEE
Universidade Federal do ABC (UFABC)
Center of Mathematics, Computing and Cognition (CMCC)
R. Santa Ad´elia 166, CEP 09210-170, Santo Andr´e, Brazil
Email: [email protected]
Claudio Luis de Camargo Penteado
Universidade Federal do ABC (UFABC)
Center of Engineering and Social Sciences (CECS)
Denise Hideko Goya
Universidade Federal do ABC (UFABC)
Center of Mathematics, Computing and Cognition (CMCC)
Abstract -- How an information spreads throughout a social
network is a valuable knowledge sought by many groups such as
marketing enterprises and political parties. If they can somehow
predict the impact of a given message or manipulate it in order
to amplify how long it will spread, it would give them a huge
advantage over their competitors. Intuitively, it is expected that
two factors contribute to make an information becoming viral:
how influential the person who spreads is inside its network
and the content of the message. The former should have a
more important role, since people will not just blindly share any
content, or will they? In this work it is found that the degree
of a node alone is capable of accurately predicting how many
followers of the seed user will spread the information through a
simple linear regression. The analysis was performed with five
different messages from Twitter network that was shared with
different degrees along the users. The results show evidences
that no matter the content, the number of affected neighbors is
predictable. The role of the content of the messages of a user
is likely to influence the network formation and the path the
message will follow through the network.
Keywords -- complex networks, information diffusion, diffusion
model.
I.
INTRODUCTION
The influence of a Social Network over an individual
behavior can help us understand how a given information is
spread. The meaning of information in this context is anything
that can be passed from one individual to another, such as,
viral diseases [1], political opinion [2], innovation adoption [3],
news and ideas [4].
in order to prevent
By understanding the mechanisms of information diffusion,
we can act
the spread of contagious
diseases, accelerate the adoption of healthier behavior, and
even disseminate an opinion throughout the network. So, an
accurate model that can predict such behavior is sought by
many researchers from different fields.
A diffusion model [5] for a network tries to find the
probability that a node spreads a given information to a
neighbor node and the probability that a given node absorbs
such information from one of its neighbors. For example, in a
disease diffusion model, the first probability is related to how
infectious a disease is, and the second probability relates to
how strong an individual immune system is.
In most cases, these probabilities are assumed to be the
same for every node throughout the network, thus reducing the
task to estimate only two values per model. This simplification
is necessary for many models since the data acquisition is
unfeasible. With these values, it is possible to estimate the
expected coverage of spread of a given information through a
Monte Carlo method.
But, in reality, each individual has its own probabilities on
a diffusion model. These probabilities depends on its network
position and the content of the message being spread. In a
social context of opinion adoption, a person who has contact
with many other persons is more likely to spread its opinion
through the network, likewise, depending on the opinion being
transmitted, a person may be more or less susceptible to
retransmit it.
With the appearance of Online Social Networks, it became
possible to acquire the data needed for a more thorough
investigation of the diffusion model on social networks. One
of such networks, named Twitter 1, is a network specifically
created to spread opinions and informations [6]. This is a
directed network where each user may have two possible
relationships with another user: follower, when user A listens
to what user B says; and friendship, when user A is listened by
user B. Every user can publish short messages (140 characters),
called tweets, that will show up in its followers pages. The
followers are capable of sharing any tweet by means of a
retweet. A retweet will show a message created by someone
else into the followers pages of the user who retweeted.
The data generated by these interactions is publicly avail-
able through the use of developers API with some limitations.
So, by knowing the social network where the message
is being spread and the content of such message it may be
possible to predict how far the information will reach and how
many individual nodes will adopt such information. In this
work we will propose a simple model to estimate the rate that
1https://www.twitter.com
any Twitter user spreads any given information based solely on
the characteristics of his ego-centric network. Surprisingly, the
number of connections alone is capable of accurately predict
the average number of followers that will share a given user
message.
Following these hypothesis, the simplest rule to decide
from which user a message was retweeted is to create an edge
with the friend who retweeted the message last, thus appearing
at the top of the user webpage interface. This will be named
RULE 1 for further reference.
The remainder of this paper is organized as follows: in
Section II we will explain how to generate the retweet diffusion
network given the API limitations. Section III elaborates the
contagion model proposed and the methods to find the spread-
ing rate. Section IV follows through a series of experiments in
order to determine the best parameters to use for the proposed
model. Finally, Section V concludes this papers with some
insights for future work.
II. RETWEET DIFFUSION NETWORK
The Retweet Diffusion Network (RDN) is a directed net-
work modeled after the dynamics of the sharing mechanism
of a tweet message. In this network, the first node is the seed
user that originally created the message. Subsequent nodes are
created representing the users that shared such message. Each
edge from this network represents that a given user A shared
the message from another user B, not necessarily the seed
user.
In Twitter public API 2, every tweet is associated with a
given user. Whenever someone retweet a message, a new tweet
is created with the same content associated with the user who
retweeted it. This new message will have a flag indicating this
is a retweet (RT) and, additionally, who originally tweeted such
message.
This information alone is insufficient to build the correct
RDN, since every user who retweeted a given message will
be connected with the original user. So, the generation of the
RDN must be estimated through the relationships between the
users who retweeted the original message.
The first step is to collected the set of users who retweeted
the original message, these will be the nodes of the RDN.
After retrieving nodes, it is necessary to retrieve the friends
list of each node in order to verify from whom they retweeted
the message. If a node has only one friend inside the RDN,
an edge connecting these nodes will be created. Otherwise,
it must be decided from who of his friends the message was
retweeted.
In order to estimate the most likely friend from which a
given user retweeted, we must hypothesize how the average
user reads its Twitter messages. Whenever you open the Twitter
website or any of its Smartphone Apps, a list of tweets is
shown sorted by the most recent to the least recent. Sometimes,
in between these tweets, Twitter shows a trending tweet from
the past that might interested the user.
So, the user may have the following behaviors: read a few
tweets starting at the most recent and retweet those that it
found interesting, read a few tweets from the least recent 3,
retweet one of the trending tweets that appear among the most
recents.
2https://dev.twitter.com/
3in this case the user first scroll down the webpage and then slowly scrolls
up to the top, while reading the tweets.
Another possible rule is to create an edge to the user
with most followers, that retweeted the message within a time
frame. This rule makes two suppositions: i) Twitter will give
preference to show tweets from the user's more popular friends
and, ii) Twitter will not show messages older than a certain
amount of time. This rule will be known as RULE 2 from now
on.
Finally, the last rule is to create an edge to the user with the
least number of followers, that retweeted the message within
a time frame. This is the opposite of the previous rule, stating
that Twitter will prefer to show the least popular friend. This
rule will be named RULE 3.
So, two other hypothesis are created to test such cases.
The first hypothesis is that the user will retweet from the user
with the most followers given that it was tweeted within a
given timeframe (RULE 2). Finally, the last hypothesis is that
the user will retweet from its friend with the least followers
within a timeframe (RULE 3).
The algorithm used to build the RDN, given the set of users
who participated together with the list of their friends who
also belong to the RDN and the time of retweet is depicted in
Alg. 1.
Algorithm 1: RDN building algorithm
input : list of nodes nodes, associative array of friends
for each node f riends, associative array of time
of the retweet for each node timeRT , empty
graph G.
output: Retweet Dynamics Network G
RDN(nodes,friends,timeRT,G)
sortedU sers ← Sort(nodes).by(timeRT )
for node ∈ sortedU sers do
if node /∈ G then
f riend ←
Rule(f riends[node], timeRT, timeRT [node])
G.add edge(node, f riend)
RDN (nodes, f riends, timeRT, G)
The algorithm is a simple recursive depth-first search that
starts with an empty graph G and, starting from the first tweet,
apply one of the aforementioned rules to choose which friend
will connected to the current user. The three possible rules are
given in Algs. 2, 3, 4.
The first rule is straightforward and just retrieves the friends
which tweeted last. The other two rules, first filter those friends
who tweeted within a time limit thr and then retrieve the friend
with more and less followers, respectively. In the following
Sections such rules will be tested for different values of thr.
An illustration of a RDN when applying the first rule is
depicted in 1 with its corresponding degree distribution in 2.
The degree relationship of this network assumes a power
law distribution regarding the number of friends that retweeted
Algorithm 2: Rule 1 of retweet dynamics
input : list of possible connections f riends,
associative array of time of the retweet for each
node timeRT , time of tweeting for current
node timeU ser.
output: Chosen friend f riend
f riend ←
M ininum(f riends).by(timeRT − timeU ser)
Algorithm 3: Rule 2 of retweet dynamics
input : list of possible connections f riends,
associative array of time of the retweet for each
node timeRT , time of tweeting for current
node timeU ser.
output: Chosen friend f riend
F iltered ← F ilter(SortedF riends).by(timeRT −
timeU ser ≤ thr)
f riend ← M ax(F iltered).by(N umberOf F riends)
Fig. 1. An example of a RDN using Rule 1.
from a given node. This indicates that the number of potential
retweets each user is capable of generating is predictable by
Algorithm 4: Rule 3 of retweet dynamics
input : list of possible connections f riends,
associative array of time of the retweet for each
node timeRT , time of tweeting for current
node timeU ser.
output: Chosen friend f riend
F iltered ← F ilter(SortedF riends).by(timeRT −
timeU ser ≤ thr)
f riend ← M in(F iltered).by(N umberOf F riends)
103
102
101
s
e
d
o
n
f
o
r
e
b
m
u
n
100
100
101
degree
102
Fig. 2. Degree distribution in log-log scale.
a simple linear regression as we will show in the following
Sections.
III. CONTAGION MODEL
After the construction of the RDN, the next step is trying
to predict how the tweets are shared. In this paper we will
use a simple contagion model known as Susceptible-Infected
(SI) [7]. In our context, this model says that initially every
node, except for the seed node is on a susceptible state, the
seed node is on an infected state, being capable of transmitting
the information to its neighbor.
At every time step, the message will spread from every
infected node to a fraction β of their neighbors:
nRT = βF (i),
(1)
where nRT is the number of retweets the user i will receive
and F (.) is the number of followers a given user has.
In most contagion models the transmission rate is the same
for the entire network, in our case each user will have a
different transmission rate since different users have a different
potential to spread a given message. So, Eq. 1 must be changed
to:
nRT = β(i)F (i),
(2)
The estimation of β(i) may depend on different attributes
from the user, such as: number of followers, number of friends,
number of posts, how long the message has been sent, and the
content of the message itself. Many related work [8], [9], [10],
[11] focused on the content of the message with the objective
of predicting how much a message will spread. But, due to the
power-law distribution nature of the nodes degrees, we will try
create a linear regression model based on the logarithm of the
values of such attributes, except for the textual message:
log β(i) = w1 logF (i)+w2 logF r(i)+w3 logP (i)+w4 logT (i),
(3)
where F (i) is the number of followers of user i, F r(i) is the
number of friends of user i, P (i) is the number of posts made
by user i, T (i) represents how much seconds have passed since
the original tweet was posted and wj is the weigh associated
to each feature.
In the next section we will make different experiments that
will show that just a subset of these parameters are enough to
predict the β rate for any Twitter user with high accuracy.
IV. EXPERIMENTAL METHODS AND RESULTS
This Section will first describe the data acquisition process
and the datasets used for the experiments. After that, a series of
experiments will be performed in order to find the best model
that we can obtain using as few information about the tweet
as possible. Finally, the results will be reported together with
a brief reporting of related work.
A. Data Acquisition
In order to verify our assumptions some data were acquired
from Twitter through its developer API. This API has several
limitations that impedes a thorough experiment. One limitation
is the number of requests per 15 minutes time frame that slows
down the data collection process. In pratice this limitation
makes unfeasible to collect datasets with more than a few
thousands of retweets. Another limitation concerns the age of
the tweet being retrieved, the API allows only to search for
the tweets being posted during the last week, which limits the
dataset collection possibilities.
Because of these limitations, we have collected the infor-
mation regarding the users, their friends, timestamp, number
of friends, number of followers and number posts from 5
different messages involving 4 different users. The collection
was perform from april 20 to april 29 and corresponds to highly
retweeted messages from popular users. Additionally, for one
of the users, we acquired a message with a smaller number of
retweets in order to test the generality of the proposed model.
A brief description of each dataset is given in Table I.
B. Linear Regression
In our model, the value of the retweet rate β will be
estimated by means of a Least Squares Linear Regression
algorithm. The regression was performed using the Scikit-
Learn 0.16 library with Python 3.3.5. In order to assess the
accuracy of the regression, for every experiment, one dataset
was chosen as the training data to be fitted, and the remaining
datasets were used as a test set.
The quality of the obtained solutions was measured by
means of the coefficient of determination (R2),
the Mean
Absolute Error (MAE) and the Mean Squared Error (MSE)
of the output. Notice that the errors were calculated regarding
the exponential of the output and compared with the measured
β for each case.
TABLE II.
RESULTS OBTAINED FOR EACH HYPOTHESIS RULE.
R2
MAE
MSE
R1
R2 15
R2 30
R2 60
R3 15
R3 30
R3 60
0.846579
0.832880
0.580089
0.570107
0.851444
0.854654
0.863555
0.001292
0.001168
0.006751
0.007283
0.001328
0.001305
0.001277
0.000018
0.000008
0.003070
0.003457
0.000016
0.000015
0.000014
TABLE III.
RESULTS OBTAINED FOR EACH TRAINING SET.
R2
MAE
MSE
RT1
RT2
RT3
RT4
RT5
0.894002
0.891166
0.872202
0.801393
0.859011
0.001209
0.001128
0.001362
0.001627
0.001059
0.000016
0.000011
0.000018
0.000017
0.000007
C. Rule of Diffusion
The first test will verify what hypothesis for creating the
RDN gives the most accurate results. For this purpose, a series
of experiments were performed in which we create a regression
model using different rules as described in Section II.
The tested rules were: Rule 1 (R1), Rule 2 with 15 minutes
time frame (R2 15), with 30 minutes time frame (R2 30) and
with 60 minutes time frame (R2 60), and Rule 3 with 15, 30
and 60 minutes time frames (R3 15, R3 30, R3 60).
Table II shows the average result obtained by every rule
by training the model with each dataset and testing with
the remaining data. In this Table we can see that the rule
R2 15 is the most accurate regarding the average error metrics,
but R3 60 obtained a much better value for R2 while still
maintaining low values for MAE and MSE. For this purpose
the R3 60 rule will be used for the next set of experiments.
These results indicate that it is more probable that a user
retweet from its less connected friend during this timeframe.
One possible explanation for these results is that this illustrates
a Retweet-Follow behavior. During the retweeting event, the
user originally did not follow the most popular user from its
current network. But, when the user retweeted the message, it
decided to follow the twitter account that originally tweeted
the message.
D. The Training Set
For the next set of experiments, by fixing the use of the
R3 60 rule to generate the RDN, it will be verified which
dataset renders the best results when used as the training set.
The same set of experiments is performed by varying the
dataset used for training while using the remaining as the test
data.
As depicted in Table III, the RT1 and RT2 datasets obtained
the best values for R2, while RT5 had the best values for the
average error metrics, probably caused by the reduced number
of samples. Based on these results, RT2 will be chosen as the
training set for the remaining experiments.
It might be a surprise that the dataset with larger dataset
obtained one of the a highest coefficient of determination.
Intuitively, smaller datasets is expected to be easier to fit into
TABLE I.
DATASET DESCRIPTION.
Tweet
From "Liam is our batman"
Exactly 1 WEEK 'til @ShawnMendes takes over #VH1Buzz for 5 days! #ShawnOnBUZZ
Using Direct Messages to take public conversations private is now easier than ever. Learn about today's updates:
Are you ready for #XenobladeChroniclesX? Heres a handy #XenobladeChronicles3D checklist to prepare you.
Kit and Krysta take on the "Whisper Challenge" in the latest #NintendoMinute http://Ninten.do/6017fv2Z
Name
RT1
RT2
RT3
RT4
RT5
Seed User
@zaynbaabe
@BigMorningBuzz
@twitter
@NintendoAmerica
@NintendoAmerica
# of RTs.
821
2,704
921
309
32
TABLE IV.
RESULTS OBTAINED FOR EACH FEATURES SUBSET.
R2
MAE
MSE
(time)
(friends)
(followers)
(posts)
(time,friends)
(time,followers)
(time,posts)
(friends,followers)
(friends,posts)
(followers,posts)
(time,friends,followers)
(time,friends,posts)
(time,followers,posts)
(friends,followers,posts)
(time,friends,followers,posts)
-0.274353
0.376648
0.849871
-0.059239
0.377421
0.856084
-0.059073
0.880330
0.382251
0.869515
0.883551
0.381019
0.876833
0.885927
0.891166
0.004399
0.003237
0.000984
0.004003
0.003240
0.000984
0.003999
0.000982
0.003182
0.001275
0.001056
0.003174
0.001164
0.001225
0.001128
0.000134
0.000081
0.000009
0.000104
0.000081
0.000008
0.000104
0.000009
0.000088
0.000014
0.000007
0.000088
0.000012
0.000013
0.000011
a linear regression in comparison with larger datasets, that
contain lots of noise. But, in this case, a smaller number of
samples might mean that we could not acquire the complete
set or that the tweet is still being retweeted along the network,
thus increasing the noise.
E. The best feature set
The final set of experiment will verify which combination
of the features set gives the best results. For this purpose all
combinations of the features message time (time), number of
friends (friends), number of followers (followers) and number
of posts (posts) were tested using the RT2 dataset as the
training data and all of the datasets as the test set.
Table IV does not give us a clear winner on this com-
bination, but we can see that the time and posts features do
not seem to be discriminative regarding our data, while the
followers attribute alone could achieve a very accurate result.
By further inspection, the combination (friends, followers) was
capable of obtaining a minimum error with a high coefficient
of determination.
As such, this will be the chosen attributes for the final
model.
It
is interesting to notice that
the time of the retweet
is not an important factor to predict the retweet rate of a
given user, suggesting that the retweet rate does not attenuate
through time. So, in this model, the tweet will only stop
being retweeted when it reaches users with a small number
of followers.
RT2
RT1
100
10−1
10−2
10−3
10−4
T
R
10−1
10−2
10−3
10−4
10−5
T
R
10−5
100 101 102 103 104 105
10−6
101
102
103
104
105
Friends
RT3
Friends
RT4
100
10−1
T
R
10−2
10−3
10−1
10−2
10−3
10−4
10−5
T
R
10−6
101 102 103 104 105 106
10−4
101
Friends
102
103
104
105
Friends
Fig. 3. Correlation of Number of Friends with the measured β.
RT1
100
10−1
10−2
10−3
10−4
T
R
RT2
10−1
10−2
10−3
10−4
10−5
T
R
10−5
101
102
103
104
105
10−6
101 102 103 104 105 106 107
Followers
RT3
Followers
RT4
100
10−1
T
R
10−2
10−3
10−1
10−2
10−3
10−4
10−5
T
R
The correlation of each feature with the measured β in
log-scale is depicted in Figs. 3, 4, 5, 6.
10−6
101 102 103 104 105 106 107 108
10−4
101 102 103 104 105 106 107
Followers
Followers
From these figures we can confirm that the number of
followers has the most well behaved correlation with the
measured β followed by the number of friends. The number
of posts has some correlation on the larger datasets and the
time of retweet does not seem to have any correlation at all.
Fig. 4. Correlation of Number of Followers with the measured β.
RT1
100
10−1
T
R
10−2
10−3
10−4
10−1
10−2
10−3
10−4
10−5
T
R
RT2
TABLE V.
FINAL RESULTS OBTAINED FOR EACH DATASET.
R2
MAE
MSE
RT1
RT2
RT3
RT4
RT5
0.852532
0.869640
0.919541
0.784082
0.975856
0.000872
0.000844
0.000452
0.002535
0.000208
0.000007
0.000004
0.000001
0.000030
0.000000
10−5
101 102 103 104 105 106
10−6
102
103
104
105
106
10−1
10−2
10−3
10−4
10−5
T
R
Posts
RT3
Posts
RT4
100
10−1
T
R
10−2
10−3
10−6
102
103
104
105
106
10−4
102
103
104
105
106
Posts
Posts
Fig. 5. Correlation of Number of Posts with the measured β.
RT2
β
0.12
0.10
0.08
β
0.06
0.04
0.02
0.00
0.07
0.06
0.05
0.04
0.03
0.02
0.01
0.00
True
Predicted
True
Predicted
RT1
User
RT2
User
RT1
100
10−1
10−2
10−3
10−4
T
R
10−1
10−2
10−3
10−4
10−5
T
R
10−5
100 101 102 103 104 105
10−6
100 101 102 103 104 105 106
10−1
10−2
10−3
10−4
10−5
T
R
Time
RT3
Time
RT4
100
10−1
T
R
10−2
10−3
10−6
100 101 102 103 104 105 106
10−4
100 101 102 103 104 105
Time
Time
Fig. 6. Correlation of Time of Retweet with the measured β.
F. The Diffusion Model
Finally, by fitting the linear regression model with the
selected subset of features, the rule to generate the RDN and
the largest training set, we get the results in Table V. As we can
see the goodness of fit is very high giving us a high confidence
on the predictions. This can be verified by the low values of
MAE and MSE.
Fig. 7. True and predicted β for RT1 and RT2 datasets.
True
Predicted
True
Predicted
β
β
0.05
0.04
0.03
0.02
0.01
0.00
0.14
0.12
0.10
0.08
0.06
0.04
0.02
0.00
RT3
User
RT4
User
Fig. 8. True and predicted β for RT3 and RT4 datasets.
A visual depiction of the model accuracy can also be seen
in Figs. 7 and 8.
As we can see from these plots, the fitted line is very close
to the measured values, but underestimates some of the higher
TABLE VI.
DEPTH AND AVERAGE PATH LENGTH FOR EACH NETWORK.
-- E -- REPRESENTS THE NUMBER OF EDGES.
-- E -- Depth
avg. path length
RT1
RT2
RT3
RT4
RT5
821
2, 704
921
309
32
45
87
40
19
5
18.52
26.23
9.21
3.79
2.26
impact rates.
The fitted line, after converted back from the log-scale,
give us the following equation for β:
β = F ollowers−0.77 × F riends−0.12.
(4)
This equation shows that the number of followers plays an
important role to how much retweets a given user will get on
average. With less impact, but still important, the number of
friends also helps to measure the influence of such user. At
this moment, the reader should have already notice that this
model, although highly accurate, does not take into account
the message being transmitted. So, in the Twitter Network,
the messages are being spread regardless of their contents.
One possible explanation can be found in the user behavior
to choose its friends. A certain user will choose to follow
someone who: is its friend in real life or tweets contents of
interest. So the content of the message might play an important
role on the network formation.
Additionally, even though we can use this model to de-
termine the fraction of the followers that will retweet your
message, we still cannot state which users will most likely do
so. This can be important in order to detect the path that a
tweet will walk through the RDN and to estimate the depth of
such network.
The diameter and the average path length for every tree of
our proposed model is reported in Tab. VI. From this table we
can see that the depth of the information diffusion network is
closely related to the number of retweets it received. In Fig. 9
we have plotted the estimated Pagerank of the seed user on the
RDN and the depth of the obtained network in log-log scale.
This graphic corroborate with our intuition that the pagerank of
the seed user is related to the impact of the message diffusion.
G. Related Work
Although we cannot compare these results directly with
different models, we can verify how successful other models
were through the coefficient of determination.
The most related work was done in [10] where the authors
tracked the diffusion of a message through the mention of
a particular user. The network was built by connecting two
users, A and B, if user A has mentioned B on a similar topic
that B tweeted about. After that, they ran a regression analysis
trying to correlate the number of posts, number of mentions a
user make, number of mentions an user receive, and some
other related information. With these variables, the authors
tried to predict when one user would mention another one, the
number of connections a user will have in their netwrok and
102
101
h
t
p
e
D
100
10−2
10−1
Pagerank
100
Fig. 9. Correlation between pagerank of the seed user and the depth of the
RDN.
the diameter of the generated network. For the diameter and the
time of mention they obtained a coefficient of determination
below 0.1, while for the number of connections, closely related
to our RT rate, obtained an R2 in the range of 0.15 to 0.41.
In [8] they use a Passive-Agressive algorithm to classify
whether a message will be retweeted or not. This algorithm that
tries to learn a linear boundary between two classes. For this
purpose, they used the following variables: number of friends,
number of followers, number of posts, favorites, number of
times the user was listed, whether the user is verified by
Twitter, and if the user's language was English. Additionally,
the added the number of hashtags of the tweet, number of
mentions, trending words, length of tweet, novelty, if the tweet
was a reply and the bag-of-words of the tweet. They measured
the quality of their approach through the F1 score that calcu-
lates the harmonic mean between the correct and incorrect
classification. Their results cannot be compared directly with
our approach, but their numerical results (F1 = 46.6) suggest
that they still have a large margin of incorrect classification,
while our approach is close to the true value (see Figs. 7 and8).
Another related work was performed recently in [11] where
the authors apply linear and non-linear regression models to
predict a user impact score. The user impact was measured
as the logarithm of the number of followers multiplied by
the number of lists and divided by the number of friends.
Then, they tried to predict this impact measure with different
regression models using textual and non-textual attributes. The
maximum obtained coefficient of determination for the non-
linear regression was 0.78, lower then our average results.
Also, closely related, in [12] the authors created a similar
diffusion network by following three different rules: create
and edge between the user who retweeted to the friend that
tweeted last, create an edge between the user who retweeted
REFERENCES
[1] P. S. Dodds and D. J. Watts, "A generalized model of social and
biological contagion," Journal of Theoretical Biology, vol. 232, no. 4,
pp. 587 -- 604, 2005.
[2] B. Pang and L. Lee, "Opinion mining and sentiment analysis," Foun-
dations and trends in information retrieval, vol. 2, no. 1-2, pp. 1 -- 135,
2008.
[3] E. M. Rogers, U. E. Medina, M. A. Rivera, and C. J. Wiley, "Complex
adaptive systems and the diffusion of innovations," The Innovation
Journal: The Public Sector Innovation Journal, vol. 10, no. 3, pp. 1 -- 26,
2005.
[4] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic, "The role of
social networks in information diffusion," in Proceedings of the 21st
international conference on World Wide Web. ACM, 2012, pp. 519 --
528.
[5] T. W. Valente, Network models of the diffusion of innovations. Hampton
Press Cresskill, NJ, 1995, vol. 2, no. 2.
[6] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter, a social
network or a news media?" in Proceedings of the 19th international
conference on World wide web. ACM, 2010, pp. 591 -- 600.
[7] W.-J. Bai, T. Zhou, and B.-H. Wang, "Immunization of susceptible --
infected model on scale-free networks," Physica A: Statistical Mechan-
ics and its Applications, vol. 384, no. 2, pp. 656 -- 662, 2007.
[8] S. Petrovic, M. Osborne, and V. Lavrenko, "Rt to win! predicting
[9]
message propagation in twitter." in ICWSM, 2011.
J. B. Walther and K. P. DAddario, "The impacts of emoticons on
message interpretation in computer-mediated communication," Social
science computer review, vol. 19, no. 3, pp. 324 -- 347, 2001.
J. Yang and S. Counts, "Predicting the speed, scale, and range of
information diffusion in twitter." ICWSM, vol. 10, pp. 355 -- 358, 2010.
[11] V. Lampos, N. Aletras, D. Preot¸iuc-Pietro, and T. Cohn, "Predicting and
characterising user impact on twitter." Association for Computational
Linguistics, 2014.
[10]
[12] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts, "Everyone's
an influencer: quantifying influence on twitter," in Proceedings of the
fourth ACM international conference on Web search and data mining.
ACM, 2011, pp. 65 -- 74.
and the friend that tweeted first, create an edge from the
user who retweeted to every friend that tweeted that message,
distributing the weight evenly. They reported the results just
for the first rule, since they found that there was no significant
difference among them. Then, they fitted their data with a
Regression Tree Model using the same attributes described
here combined with the average, minimum and maximum
local and global influences. Local influence in this paper is
the number of friends that retweeted a message, while global
influence is the number of users of Twitter that retweeted such
message. The measured output in this work was the global
influence. They obtained a R2 of 0.98 regarding the most
influent users and R2 of 0.34 when fitting just the least influent
users.
V. CONCLUSION
In this paper we proposed a diffusion model for the retweet
behavior of the Twitter network. This model is capable of
predicting the rate of the followers of a given user that will
retweet its messages.
At first, a Retweet Diffusion Network was created by
connecting the users with a relationship of who retweeted from
who. Some edges of such network had to be estimated because
of the lack of information provided by the Twitter application
interface. Three proposals of estimation was evaluated and the
most plausible was that a user will retweet a message from his
friend with the smaller number of connections.
After generating such network, the impact of each user
was measured by the fraction of its followers that retweeted
its message. This impact was fitted through a series of different
linear regression models by using the user social network
information such as: number of followers, number of friends,
number of posts and time of the post. Since a power-law fit
was observed regarding the degree distribution of the Diffusion
Network, the regression model was performed on the logarithm
of the parameters value and the desired output value.
Some experiments were performed on 5 different networks
with a varying number of nodes and edges starting from
different seed users. The results showed that the combination
of the number of followers and number of friends is capable of
predicting the expected fraction of followers that will retweet
a message from any given user.
These results indicate that the content of the message has
no influence on the immediate impact. The content must have
a central role during the network formation (who follows who)
and the path the message will take (who from the fraction of
users will spread the message).
The next steps of this research will try to evaluate the
decision process that drives any given user to retweet a
message, hopefully finding a model to predict the path a
message will go through. If successful, it will be possible to
predict the global impact of a tweet message and how to build
a network to influence the desired audience.
ACKNOWLEDGMENT
This research was funded by FAPESP process number
2014/06331-1.
|
1610.08217 | 2 | 1610 | 2017-02-18T15:36:31 | Assessing Percolation Threshold Based on High-Order Non-Backtracking Matrices | [
"cs.SI",
"cond-mat.stat-mech",
"physics.soc-ph"
] | Percolation threshold of a network is the critical value such that when nodes or edges are randomly selected with probability below the value, the network is fragmented but when the probability is above the value, a giant component connecting large portion of the network would emerge. Assessing the percolation threshold of networks has wide applications in network reliability, information spread, epidemic control, etc. The theoretical approach so far to assess the percolation threshold is mainly based on spectral radius of adjacency matrix or non-backtracking matrix, which is limited to dense graphs or locally treelike graphs, and is less effective for sparse networks with non-negligible amount of triangles and loops. In this paper, we study high-order non-backtracking matrices and their application to assessing percolation threshold. We first define high-order non-backtracking matrices and study the properties of their spectral radii. Then we focus on 2nd-order non-backtracking matrix and demonstrate analytically that the reciprocal of its spectral radius gives a tighter lower bound than those of adjacency and standard non-backtracking matrices. We further build a smaller size matrix with the same largest eigenvalue as the 2nd-order non-backtracking matrix to improve computation efficiency. Finally, we use both synthetic networks and 42 real networks to illustrate that the use of 2nd-order non-backtracking matrix does give better lower bound for assessing percolation threshold than adjacency and standard non-backtracking matrices. | cs.SI | cs | Assessing Percolation Threshold Based on High-Order
Non-Backtracking Matrices
Yuan Lin†‡, Wei Chen§, and Zhongzhi Zhang†‡
†School of Computer Science, Fudan University, Shanghai, China
‡Shanghai Key Laboratory of Intelligent Information Processing, Fudan University, Shanghai, China
[email protected], [email protected], [email protected]
§Microsoft Research, Beijing, China
7
1
0
2
b
e
F
8
1
]
I
S
.
s
c
[
2
v
7
1
2
8
0
.
0
1
6
1
:
v
i
X
r
a
ABSTRACT
Percolation threshold of a network is the critical value such
that when nodes or edges are randomly selected with prob-
ability below the value, the network is fragmented but when
the probability is above the value, a giant component con-
necting a large portion of the network would emerge. As-
sessing the percolation threshold of networks has wide appli-
cations in network reliability, information spread, epidemic
control, etc. The theoretical approach so far to assess the
percolation threshold is mainly based on spectral radius of
adjacency matrix or non-backtracking matrix, which is lim-
ited to dense graphs or locally treelike graphs, and is less
effective for sparse networks with non-negligible amount of
triangles and loops.
In this paper, we study high-order
non-backtracking matrices and their application to assess-
ing percolation threshold. We first define high-order non-
backtracking matrices and study the properties of their spec-
tral radii. Then we focus on the 2nd-order non-backtracking
matrix and demonstrate analytically that the reciprocal of
its spectral radius gives a tighter lower bound than those of
adjacency and standard non-backtracking matrices. We fur-
ther build a smaller size matrix with the same largest eigen-
value as the 2nd-order non-backtracking matrix to improve
computation efficiency. Finally, we use both synthetic net-
works and 42 real networks to illustrate that the use of the
2nd-order non-backtracking matrix does give better lower
bound for assessing percolation threshold than adjacency
and standard non-backtracking matrices.
Keywords
percolation theory; percolation threshold; non-backtracking
matrix; high-order non-backtracking matrix;
information
and influence diffusion
1.
INTRODUCTION
Percolation theory is a powerful statistical physics tool to
describe information and viral spreading in social environ-
ment [29, 16, 14], robustness and fragility of infrastructural
or technological networks [5, 11, 8], among other things, and
thus its impact spreads well beyond statistical physics and
reaches computer science, network science and related ar-
eas. Percolation is a random process independently occupy-
ing sites (a.k.a. nodes) or bonds (a.k.a. edges) in a network
with probability p (with probability 1− p the site or bond is
removed). In particular, the bond percolation can be identi-
fied to a special case of independent cascade model [23, 16].
In this paper, our discussion focuses on bond percolation, al-
though similar approach applies to site percolation as well.
As probability p increases from 0 to 1, the network is ex-
pected to experience a phase transition from a large number
of small connected components to the emergence of a gi-
ant connected component, with the size proportional to the
size of the network. The value p at this transition point is
referred to as the percolation threshold.
The percolation threshold can be used to assess the
spreading power of a network from a topological point of
view. For example, in studying epidemics in a social net-
work, a small percolation threshold means that a virus is
easy to spread in the network and infects a large portion of
the network. Thus, many applications rely on the concept
of percolation threshold, such as finding influential nodes in
a social network [21, 18], facilitating or curbing propaga-
tions [7, 6], and determining transmission rates in wireless
networking [10, 1]. Therefore, it is crucial to have an accu-
rate understanding of the percolation threshold in networks.
However, since the exact percolation threshold for a gen-
eral network is analytically difficult to obtain, these appli-
cations rely on some theoretical estimates of the actual per-
colation threshold. A commonly used theoretical estimate
is the reciprocal of the largest eigenvalue λA (same as the
spectral radius) of the network's adjacency matrix A (e.g.
in [28, 3, 7, 6]).
In particular, Bollob´as et al. show that
this estimate is accurate for dense networks [3]. However, in
sparse networks, it could be far off. For example, in a ring
network (Fig. 1a), the real percolation threshold is 1, but
its adjacency matrix has the largest eigenvalue 2, predicting
the percolation threshold is 0.5.
Recently, the reciprocal of the largest eigenvalue of the
network's non-backtracking matrix [15, 12] is introduced as
a better theoretical estimate of the percolation threshold.
We defer its technical definition to Section 2, and give an
intuitive explanation on the issue of the adjacency matrix
that is addressed by the non-backtracking matrix. Let π be
a vector, with πi representing the probability that node i
is in the giant connected component, when every edge has
a probability of p to be occupied. Let A be the adjacency
matrix of the graph, and Ni be the set of neighbors of i.
pπj, which
approximately represents that i could connect to the giant
component through one of its neighbors j (with probabil-
ity pπj). Thus it should be the same as πi, and in matrix
form, we have pAπ = π. This suggests that 1/p should be
at most λA, i.e. 1/λA is a lower bound of the percolation
threshold. However, for every edge (i, j) in the network, the
above approximation considers both that i may rely on j to
The i-th entry of pAπ satisfies [pAπ]i =(cid:80)
j∈Ni
(cid:104)d(cid:105)) [9, 5]. Here, (cid:104)d(cid:105) and (cid:104)d2(cid:105) are separately the first and the
second moments of the degree distribution. This estimation
is less predictive for real networks where degree correlations
appear.
Bollob´as et al. [3] show that the percolation threshold of
dense graph is reciprocal of the largest eigenvalue of the ad-
jacency matrix. However, the conclusion requires restrictive
conditions for the networks. Especially for sparse networks,
this estimation can be only regarded as providing a lower
bound for the true percolation threshold.
[15] and Hamilton et al.
Since a lot of realistic networks are sparse, Karrer et
al.
[12] simultaneously propose
that the reciprocal of the largest eigenvalue of the non-
backtracking matrix is a tighter lower bound for bond and
site percolation threshold, respectively, on sparse networks.
This prediction is based on a message passing technique and
obtained by heuristic equations and approximations on lo-
cally treelike structures. Radicchi [25] further presents a
mapping between the site and bond percolation to math-
ematically verify the predicted bond and site percolation
thresholds are identical in this method. Although the esti-
mation based on the non-backtracking matrix is more pre-
cise than that based on the adjacency matrix, it is still not
close enough to the true percolation threshold on many real
networks [26], since it suffers from the limitation of the tree-
like assumption. Radicchi et al. [27] also derives an alterna-
tive matrix of the non-backtracking matrix based on triangle
elimination to improve the estimate for the site percolation
threshold. However, this alternative matrix would overshoot
on bond percolation. That means this estimate may over-
estimate the percolation threshold, leading it no longer pro-
vides a lower bound for the bond percolation threshold.
2. PRELIMINARIES
We consider a finite connected undirected graph G =
(V,E) with N nodes and E edges, where V = {1, 2,··· , N}
is the set of N nodes and E = {(i, j) i, j ∈ V} is the set of
E edges. The connectivity between nodes in G is described
by an adjacency matrix A, in which the element aij = 1 if
(i, j) ∈ E, and aij = 0 otherwise. We assume that G has
no self-loops, i.e. aii = 0 for all i ∈ V. Henceforth, the ad-
jacency and non-backtracking matrices are all refer to this
graph G, when the context is clear.
The bond percolation model is only controlled by one pa-
rameter, bond occupation probability p. That means, in a
network G, each edge is independently occupied with proba-
bility p. The percolation clusters are sets of nodes connected
only by occupied edges. For p = 0, no edge is occupied so
that there are N isolated clusters of size one. For p = 1, all
edges are occupied and all nodes compose a single cluster of
size N . At intermediate values of p, the network undergoes
two different phases: the non-percolating phase, where all
clusters have microscopic size; the percolating phase, where
a single macroscopic cluster (the giant component), whose
size is comparable to the entire network, is present. The
percolation threshold pc is the value above which the giant
cluster appears; below pc there are only small clusters.
The transition can be monitored through two primary
quantities of interest, the relative sizes of the first and sec-
ond largest clusters with respect to the size of the network,
denoted by S1(p) and S2(p), respectively. In order to evalu-
ate percolation threshold numerically, there are many differ-
ent estimates for pc being proposed, such as the occupation
(a) ring network
(b) triangle ring network
Figure 1: Illustrations of the ring network and the
triangle ring network.
connect to the giant component and j may rely on i, but
the two cases should not jointly occur. Therefore, the esti-
mate by 1/λA inflates the probability that a giant compo-
nent emerges and underestimates the percolation threshold.
The non-backtracking matrix addresses this issue by disal-
lowing such directed circular dependency between a pair of
nodes on an edge.
In non-treelike graphs,
However, non-backtracking matrix only works well in lo-
cally treelike graphs.
it provides
a lower bound, bot not as close as the true percolation
threshold. As suggested by the famous small-world network
study [30], a significant amount of triangles exist in many
real networks. The non-backtracking matrix does not elimi-
nate the circular dependency through triangles or other local
structures, and thus it may still underestimate the percola-
tion threshold. For example, in the triangle ring network
in Fig. 1b, the real percolation threshold is 1, but the the-
oretical estimates by the adjacency and non-backtracking
matrices are 0.3333 and 0.5523, respectively.
In this paper, we extend the idea of the non-backtracking
matrix to define high-order non-backtracking matrices. We
first define the high-order non-backtracking matrices and
study the evolution of their largest eigenvalue with respect
to order (Section 3). Then, we propose that the reciprocal
of the largest eigenvalue of the 2nd-order non-backtracking
matrix can provide a better estimate for the percolation
threshold in an arbitrary network, because it eliminates the
circular dependency from triangles (Section 3). We further
provide an alternative matrix sharing the same largest eigen-
value but with substantially smaller size to improve com-
putation efficiency. Finally, we conduct extensively experi-
ments on both the forest fire model and 42 real networks to
demonstrate the effectiveness of our method (Section 5).
To summarize, our contributions include: (i) proposing
the high-order non-backtracking matrices and studying their
eigenvalue properties; (ii) establishing a more precise theo-
retical estimation for bond percolation threshold and find-
ing a faster approach to evaluate it; and (iii) supporting
our analysis by empirical evaluations on synthetic and real
networks.
1.1 Related Work
For random degree-uncorrelated network models, the per-
colation threshold can be approximated as (cid:104)d(cid:105)/((cid:104)d2(cid:105) −
probability corresponding to the maximal value of S2(p),
the peak position of the empirical variance of S1(p) and the
average size of clusters except the largest one [26]. In this
paper, we determine the best empirical estimate for perco-
lation threshold as the value of p where the second largest
cluster reaches its maximum, namely
pc = arg{max
p
S2(p)}.
(1)
In the following, we will compare it with theoretical ap-
proaches to check their validity.
The first theoretical estimate is based on the adjacency
matrix. Bollob´as et al. [3] show that for percolation on dense
networks, the percolation threshold can be given by
pc =
1
λA
,
where λA is the largest eigenvalue of matrix A, which is also
the spectral radius of A.1 Although this estimate provides a
good prediction for percolation threshold on networks with
high density of connections, it becomes less precise on sparse
networks.
Since a lot of realistic networks are sparse, a new estimate
based on non-backtracking matrix [13, 17] is proposed to
give a better prediction. For any undirected network G, we
can transform it to a directed one through replacing each
undirected edge (i, j) by two directed ones i → j and j → i.
The non-backtracking matrix, denoted by B, is a 2E × 2E
matrix with rows and columns indexed by directed edges
i → j and entries are given by
Bi→j,k→l = δjk(1 − δil),
where δij is the Kronecker Delta Function (δij = 1 if i = j,
and 0 if i (cid:54)= j). In other words, for any two directed edges
i → j, j → k, Bi→j,j→k = 1 if k (cid:54)= i, and thus Bi→j,j→k
records the walk from i to j and continuing to k but not
backtracking to i. Under the locally treelike assumption,
which means that the local neighborhood of a node is close to
a tree without redundant paths, the reciprocal of the largest
eigenvalue of B provides a close lower bound for sparse net-
works [15, 12], namely
pc ≥ 1
λB
, and pc ≈ 1
λB
.
As already mentioned in the introduction, the non-
backtracking matrix relies on the approximation of the lo-
cally treelike structure and it does not eliminate triangle
dependency, and thus it may not give a tight lower bound of
the bond percolation threshold. In the following, we propose
a more powerful tool, high-order non-backtracking matrices,
to better estimate bond percolation threshold.
3. HIGH-ORDER NON-BACKTRACKING
MATRICES
In this section, we first introduce the definition of high-
order non-backtracking matrices, and then investigate their
properties.
1In this paper, every matrix we consider is non-negative,
and thus by the Perron-Frobenius Theorem [20], its largest
eigenvalue is a non-negative real number, in which case it
is the same as its spectral radius, which is defined as the
largest modulus of the (possibly complex) eigenvalues.
In a network G, let i1 → i2 → ··· → ig+1 stand for a
length-g directed path composed by g + 1 different nodes
i1, i2,··· , ig+1, obeying aikik+1 = 1 (1 ≤ k ≤ g). For the
sake of saving space, we use i1i2 ··· ig+1 to stand for length-
g directed path in place of i1 → i2 → ··· → ig+1. Let Pg be
the number of length-g directed paths in G. Then, we define
the g-th-order non-backtracking matrix as follows:
Definition 1. The g-th-order non-backtracking matrix
B(g) is a Pg × Pg matrix with rows and columns indexed
by length-g directed paths. The elements in B(g) are
g+1(cid:89)
k=2
B(g)
i1i2···ig+1,j1j2···jg+1
= ai1j1 (1 − δi1jg+1 )
δikjk−1 .
(2)
123,234
= 1, while B(2)
i1i2···ig+1,i2i3···ig+2
for each length-(g + 1) directed path,
= 1; and all other
In other words,
i1i2 ··· ig+2, we have B(g)
entries of B(g) have value 0. For example,
if 123, 234,
345, and 231 are all length-2 directed paths in a graph,
then B(2)
= 0. We
can regard matrix B(g) as encoding the relations between
length-g directed paths in G. It also describes a kind of non-
backtracking walks with memory, avoiding going back to a
node visited in the recent g steps. It is easy to verify that
the standard non-backtracking matrix is B = B(1), and ad-
jacency matrix A = B(0) (ai1j1 in Eq. (2) is explicitly for
the case of g = 0).
= B(2)
123,345
123,231
Let λ(g)
B be the largest eigenvalue of B(g). By the Perron-
Frobenius Theorem [20], λ(g)
B is real and non-negative, and
it is zero only when the directed graph with the adjacency
matrix equal to B(g) is a directed acyclic graph (DAG). We
now study the properties of λ(g)
B as g changes. A simple cycle
in graph G is a closed path with no repetitions of nodes and
directed edges allowed, except the repetition of the starting
and ending nodes. To maintain a consistent terminology,
henceforth, all cycle means a simple cycle. The result is
given in the following theorem:
Theorem 1. The g-th-order non-backtracking matrix
(i) The largest eigenvalue of B(g) is non-increasing with
B(g) satisfies the following properties:
respect to g, i.e., for every g = 1, 2, 3,··· , λ(g−1)
G. Then λ(g)
(cid:96) in G, then λ((cid:96)−2)
(ii) Let (cid:96) be the length of the longest simple cycle in graph
(iii) For any (cid:96) ≥ 3, if there is no simple cycle with length
B = 0 for all g ≥ (cid:96) − 1.
= λ((cid:96)−1)
≥ λ(g)
B .
B
.
B
B
In order to prove Theorem 1, we first present some related
notations and lemmata. The g-th-order non-backtracking
matrix B(g) of network G can be regarded as the adja-
cency matrix of a directed network G(g) = (V (g),E (g)), where
V (g) = {u u is a length-g directed path}, and E (g) = {u →
v u, v are two length-g directed paths and B(g)
u,v = 1}. Note
that when g = 0, G(0) = G (considering G as a symmetric di-
rected graph). The line graph of G(g) is ¯G(g) = ( ¯V (g), ¯E (g)),
where ¯V (g) = E (g) and ¯E (g) = {α → β α = (u, v) and
β = (v, w) are two different edges u → v and v → w in
E (g).}. Let ¯B(g) denote the adjacency matrix of the line
graph ¯G(g), with elements
¯B(g)
u→v,p→q = δvp,
where u, v, p and q are length-g directed paths with u →
v, p → q ∈ E (g). In other words, we can recast definition of
¯B(g) as
g+2(cid:89)
k=2
¯B(g)
i1i2···ig+2,j1j2···jg+2
=
δikjk−1 .
Lemma 1. G(g) can be obtained by deleting all edges in
all length-(g + 1) cycles in ¯G(g−1).
Proof. For each edge u → v (u = i1i2 ··· ig and v =
i2 ··· igig+1) in G(g−1),
it must correspond to a length-
g directed path i1 ··· igig+1 in G. On the other hand,
each length-g directed path also corresponds to an edge
in G(g−1). Thus, V (g) = E (g−1) = ¯V (g−1) if we identify
i1i2 ··· ig → i2 ··· igig+1 with i1 ··· igig+1,
i.e., the node
set of ¯G(g−1) is identical to the node set of G(g). More-
over, for every edge in G(g), i1i2 ··· ig+1 → i2 ··· ig+1ig+2,
it is also an edge in ¯G(g−1), implying E (g) ⊆ ¯E (g−1). For
an arbitrary edge in ¯E (g−1) \ E (g), it must have a form as
i1i2 ··· ig+1 → i2 ··· ig+1i1, and there must be g other edges
with the same form together composing a length-(g + 1) cy-
cle in ¯G(g−1), namely i1i2 ··· ig+1 → i2 ··· ig+1i1 → ··· →
ig+1i1 ··· ig → i1i2 ··· ig+1. Moreover, for any length-(g + 1)
cycle in ¯G(g−1), it must be of the above form. If not, then it
involves an edge of form i1i2 ··· ig+1 → i2 ··· ig+1ig+2 with
ig+2 (cid:54)= i1, the cycle must be of length at least g + 2, because
we have g + 2 different original nodes i1, . . . , ig+2 in the cy-
cle, and each edge in the cycle only removes one head node
and adds one tail node, and thus it needs at least g + 2 edges
to go through every original node once and comes back to
i1i2 ··· ig+1. Together, we know that by exactly removing
all edges in all length-(g + 1) cycles in ¯G(g−1), we obtain
G(g).
The next lemma is a known result saying that when we
remove edges from a graph, the largest eigenvalue of the
adjacency matrix will not increase.
Lemma 2
(Proposition 3.1.1 of [4]). For the adja-
cency matrix A of a graph G, if A(cid:48) is a matrix obtained
by replacing some of the 1's in A with 0, then we have
(3)
where λA(cid:48) and λA are the largest eigenvalue of A(cid:48) and A,
respectively.
λA(cid:48) ≤ λA,
For convenience, we give an independent proof of Lemma 2
in Appendix ??.
We are now ready to prove Theorem 1.
Proof of Theorem 1.
(i) For a directed graph G and its line graph, Pako´nski
et al. [24] show that their spectra excluding the possible
eigenvalue zero are exactly the same. Therefore, we have
λ(g−1)
B
= ¯λ(g−1)
B
,
B
is the largest eigenvalue of matrix ¯B(g−1).
where ¯λ(g−1)
According to Lemma 1, G(g) have the same node set as
¯G(g−1), and G(g) can be obtained by removing edges in
length-(g + 1) cycles in ¯G(g−1). Thus, applying Lemma 2,
we attain the conclusion that
λ(g−1)
B
= ¯λ(g−1)
B
≥ λ(g)
B .
(ii) We first claim that, G(g) is a DAG for all g ≥ (cid:96) − 1. If
not, there are k (k ≥ g + 2) length-g directed paths in G(g),
i1i2 ··· ig+1, i2i3 ··· ig+2, . . . , iki1 ··· ig, constituting a cycle
in G(g). Then there must be a length-k cycle composed by
i1, i2,··· , ik in G. Since g ≥ (cid:96)−1, we have k ≥ (cid:96)+1, implying
that there is at least one cycle in G with length larger than
(cid:96), which contradicts to the assumption that the length of
the largest cycle in G is (cid:96). Thus, network G(g) is a DAG.
It is easy to verify that the adjacency matrix of a DAG has
the normal form where all block matrices on the diagonal
are one-dimensional matrices with value 0, and thus all its
eigenvalues are 0. Therefore λ(g)
By
Lemma 1, graph G((cid:96)−1) is obtained by removing all length-
(cid:96) cycles in ¯G((cid:96)−2). Similar to the argument in the proof
of Lemma 1, every length-(cid:96) cycle in ¯G((cid:96)−2) has the form
i1i2 ··· i(cid:96) → i2 ··· i(cid:96)i1 → ··· i(cid:96)i1 ··· i(cid:96)−1 → i1i2 ··· i(cid:96). Then
every such cycle corresponds to a length-(cid:96) simple cycle in
the original graph G, i1 → i2 → ··· i(cid:96) → i1. By assumption
G has no length-(cid:96) simple cycles, thus it implies that ¯G((cid:96)−2)
is the same as G((cid:96)−1). Since the line graph shares the same
non-zero eigenvalues as the original graph [24], we know that
λ((cid:96)−1) = λ((cid:96)−2).
B = 0 for all g ≥ (cid:96) − 1.
(iii) Consider the line graph of G((cid:96)−2), ¯G((cid:96)−2).
4. ESTIMATING
PERCOLATION
THRESHOLD BY 2ND-ORDER NON-
BACKTRACKING MATRIX
In this section, we show that the reciprocal of the largest
eigenvalue of the 2nd-order non-backtracking matrix gives a
lower bound on the bond percolation threshold. According
to Theorem 1, it implies that this lower bound is tighter
than the previous proposed analytical lower bounds using
the reciprocal of the adjacency matrix or the standard non-
backtracking matrix. We then show that we can replace
the 2nd-order non-backtracking matrix with a substantially
smaller matrix sharing the same largest eigenvalue to im-
prove computation efficiency.
4.1 Derivation of Lower Bound
Our derivation follows the message passing techniques
proposed in [15, 12], which involves first-order analysis (ig-
noring higher-order terms) and heuristic equations on locally
treelike graphs. Henceforth, we denote percolation threshold
predicted by the adjacency matrix, non-backtracking matrix
and 2nd-order non-backtracking matrix as p(0)
c and p(2)
c ,
respectively.
c , p(1)
Let πi be the probability that node i belongs to the giant
connected component, where the random events are that
each edge in G is independently occupied with probability
p.2 Let θi→j→k be the probability that node i connects to
the giant component following path i → j → k, where i, j, k
are all different nodes. Then, we can construct the following
2Technically, a giant connected component is a component
of size Θ(n), where n is the size of the graph, and thus Θ(n)
is only meaningful when we have a series of graphs with
n goes to infinity. The argument in this section does not
take this techical route, and instead it follows the heuristic
argument approach as in [15, 12].
relation for bond percolation:
πi = 1 − (cid:89)
j→k
j∈Ni,k(cid:54)=i
(1 − θi→j→k),
(4)
Then, the expected size of the giant component can be given
by
N(cid:88)
S1(p) =
πi.
i=1
In a finite-size network, there is a drastic change for S1(p)
at the percolation threshold pc. Next, we focus on predicting
the value of pc.
According to the definition of quantity θi→j→k, we can
construct recursive relations, which is appropriate for locally
treelike structures with triangles:
θi→j→k = 1 − (cid:89)
(cid:96)∈Nk\{i,j}
(1 − p · θj→k→(cid:96)).
(5)
The above heuristic equation intuitively means that, node
i connects to the giant component through at least one of
the paths j → k → (cid:96), and i connects to j with probabil-
ity p while j connects to the giant component through path
j → k → (cid:96) with probability θj→k→(cid:96). The equation is ap-
proximately accurate when the local neighborhood of i is
close to a tree without redundant paths, except that we al-
low triangles such as i → j → k → i, since the equation
requires (cid:96) (cid:54)= i, excluding such triangles. When we ignore p2
and higher order terms in Eq. (5), we obtain
(cid:88)
θi→j→k = p
θj→k→(cid:96),
(cid:96)∈Nk\{i,j}
which can be recast in matrix notation as
θ = pB(2)θ,
where θ is a vector in which elements indexed by length-2
directed paths. When p ≥ pc, percolation happens, and θ
should be a non-negative vector with some strictly positive
entries. (It holds when length of the largest cycle is at least
4.) But if pc < 1/λ(2)
B , it means we could have an eigenvalue
of 1/pc > λ(2)
B . Therefore,
we have
B , violating the definition of λ(2)
pc ≥ p(2)
c =
1
λ(2)
B
.
c ≥ p(1)
Theorem 1 theoretically guarantees p(2)
c ≥ p(0)
c ,
so that p(2)
c provides a tighter lower bound for percolation
threshold than the ones provided by the adjacency and stan-
dard non-backtracking matrices. Moreover, consider the ex-
ample of triangle ring network shown in Figure 1b, it is easy
to obtain λ(2)
B = 1, which is consistent
with the true percolation threshold. Compared with esti-
mates p(0)
exhibits remarkable improvement
in precision.
B = 1 and p(2)
c = 1/λ(2)
c
and p(1)
c , p(2)
c
The reason why p(2)
can be heuristically explained as follows.
c provides better prediction of pc than
p(1)
In the esti-
c
mation based on non-backtracking matrix, it only consid-
ers the probability node i connects to the giant component
through node j, which can be denoted as θi→j.
If there
is a triangle composed by nodes i, j and k in the network,
θi→j grows as θj→k increases. Similarly, θj→k increases with
θk→i, and θk→i increases with θi→j. This creates a triangu-
lar dependency which artificially inflates the values of θi→j,
θj→k, and θk→i, leading to a higher estimate of the probabil-
ity of giant component emergence and a lower estimate on
the percolation threshold. When triangles are abundant, as
evidenced by the small-world research on many real-world
networks [30], using the standard non-backtracking matrix
may still significantly underestimate the percolation thresh-
old. By using the 2nd-order non-backtracking matrix, we
avoid the triangular dependency, so that p(2)
is more precise
than p(1)
c .
c
c
Although p(2)
is a tighter lower bound, the size of B(2) is
usually larger than B, leading to higher computation com-
plexity. In the following we provide a further technique to
tackle this problem.
4.2
Improving Computation Efficiency
In this subsection, we illustrate that we can transfer the
task of computing eigenvalues of B(2) to calculating eigen-
values of a new matrix M , defined as
B(1) −∆B2 D∆ − I B(1) − ∆B1
.
M =
(6)
I
0
0
0
I
0
0
0
I
0
0
0
Here, M is a square matrix of dimension 8E × 8E composed
of 16 2E × 2E blocks, whose size is evidently smaller than
B(2). Matrix ∆B1 and ∆B2 have identical size with B(1)
and their elements are defined as
(cid:40)
(cid:40)
(∆B1)i→j,k→(cid:96) =
and
(∆B2)i→j,k→(cid:96) =
1,
0,
1,
0,
i→j,k→(cid:96) = 1,
ai(cid:96)B(1)
otherwise.
δi(cid:96)aijajkak(cid:96) = 1,
otherwise,
respectively. The matrix D∆ is a 2E × 2E diagonal matrix
and its element (D∆)i→j,i→j equals the number of triangles
containing edge (i, j).
Theorem 2. The set of non-zero eigenvalues of matrix
M defined in Eq. (6) consists of all non-zero eigenvalues
of the 2nd-order non-backtracking matrix B(2) and possibly
eigenvalues −1, (1 +
3i)/2 and (1 − √
√
3i)/2.
Proof. The proof will include two parts. First, we prove
that every non-zero eigenvalue of B(2) corresponds to an
eigenvalue of M . Second, we elaborate that every non-zero
eigenvalue of M equals to one of eigenvalues of B(2), except
possible eigenvalues −1, (1 +
3i)/2 and (1 − √
3i)/2.
√
(i) Let λ be an arbitrary non-zero eigenvalue of B(2) and ψ
be its corresponding eigenvector. According to the definition
of the 2nd-order non-backtracking matrix, we have
λψi→j→k =
B(1)
j→k,k→lψj→k→(cid:96).
(7)
(cid:96)∈Nk\{i,j}
In order to show each non-zero eigenvalue of B(2) is also
an eigenvalue of M , we first introduce two related quantities:
(cid:88)
(cid:88)
xi→j =
B(1)
i→j,j→kψi→j→k
(8)
k∈Nj\{i}
and
(cid:88)
k∈Nj\{i}
yi→j =
Here, Eq. (8) is used. Utilizing Eq. (7) again, the second
term of r.h.s of Eq. (14) can be represented as
B(1)
i→j,j→kB(1)
j→k,k→iψi→j→k.
(9)
1
λ
B(1)
i→j,j→kB(1)
j→k,k→iψj→k→i
Let x and y be vectors with elements xi→j and yi→j, re-
spectively. We claim that x and y satisfies the following two
relations:
x =
1
λ
B(1)x − 1
λ2 ∆B2x +
1
λ3 D∆x − 1
λ3 y
(10)
=
=
and
y =
1
λ
∆B1x − 1
λ2 ∆B2x +
1
λ3 D∆x − 1
λ3 y,
(11)
k∈Nj∩Ni
k∈Nj∩Ni
k∈Nj∩Ni
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
k∈Nj∩Ni
k∈Nj∩Ni
1
λ2
− 1
λ2
1
λ2
− 1
λ3
+
1
λ3
k∈Nj∩Ni
(cid:88)
(cid:96)∈Ni\{k}
(cid:88)
(cid:96)∈Nj\{i}
B(1)
i→j,j→kB(1)
j→k,k→i
B(1)
k→i,i→(cid:96)ψk→i→(cid:96)
B(1)
i→j,j→kB(1)
j→k,k→iB(1)
k→i,i→jψk→i→j
B(1)
i→j,j→kB(1)
j→k,k→ixk→i
B(1)
i→j,j→kB(1)
j→k,k→i
B(1)
i→j,j→(cid:96)ψi→j→(cid:96)
B(1)
i→j,j→kB(1)
j→k,k→iψi→j→k
which will be proved latter.
Combining Eq. (10) and Eq. (11), we can obtain
x − y =
1
λ
(B(1) − ∆B1)x,
which indicates
y =
(cid:18)
I − 1
λ
B(1) +
1
λ
(cid:19)
∆B1
x.
(12)
=
1
λ2
k∈Nj∩Ni
B(1)
i→j,j→kB(1)
j→k,k→ixk→i
− ∆i→j
λ3 xi→j +
1
λ3 yi→j,
(16)
where ∆i→j is the number of length-3 loops starting from
edge i → j.
Inserting Eq. (15) and Eq. (16) into Eq. (14), we have
Plugging Eq. (12) into Eq. (10) yields
xi→j =
1
λ
B(1)
i→j,j→kxj→k
(cid:88)
(cid:88)
k∈Nj\{i}
− 1
λ2
B(1)
i→j,j→kB(1)
j→k,k→ixk→i
k∈Nj∩Ni
λ3 xi→j − 1
∆i→j
+
λ3 yi→j.
x =
1
λ
+
B(1)x − 1
λ2 ∆B2x +
λ4 (B(1) − ∆B1)x.
1
1
λ3 (D∆ − I) x
(13)
Based on Eq. (13), we establish
M z = λz,
Recasting Eq. (17) in matrix notation, we can obtain
Eq. (10).
Proof of Eq. (11). Analogously, substituting Eq. (7) into
where z = (x(cid:62), 1
eigenvalue of B(2) corresponds to an eigenvalue of M .
λ3 x(cid:62))(cid:62). Thus, every non-zero
λ2 x(cid:62), 1
Proof of Eq. (10). Plugging Eq. (7) into Eq. (8), we have
xi→j =
1
λ
B(1)
i→j,j→k
B(1)
j→k,k→(cid:96)ψj→k→(cid:96)
λ x(cid:62), 1
(cid:88)
(cid:88)
k∈Nj\{i}
k∈Nj∩Ni
− 1
λ
B(1)
i→j,j→kB(1)
j→k,k→iψj→k→i.
(14)
Eq. (9), yi→j can be represented as
yi→j =
1
λ
B(1)
i→j,j→kB(1)
j→k,k→i
B(1)
j→k,k→(cid:96)ψj→k→(cid:96)
(cid:88)
(cid:88)
k∈Nj\{i}
(cid:88)
(cid:96)∈Nk\{j}
− 1
λ
k∈Nj\{i}
B(1)
i→j,j→kB(1)
j→k,k→iψj→k→i.(17)
In the r.h.s of Eq. (14), the first term can be rewritten as
The first term in r.h.s of Eq. (17) can be further expressed
as
(cid:88)
(cid:96)∈Nk\{j}
(cid:88)
(cid:88)
(cid:88)
k∈Nj\{i}
1
λ
1
λ
=
B(1)
i→j,j→k
B(1)
j→k,k→(cid:96)ψj→k→(cid:96)
k∈Nj\{i}
(cid:96)∈Nk\{j}
B(1)
i→j,j→kB(1)
j→k,k→i
B(1)
i→j,j→kxj→k.
(15)
=
B(1)
i→j,j→kB(1)
j→k,k→ixj→k.
(cid:88)
(cid:88)
k∈Nj\{i}
k∈Nj\{i}
1
λ
1
λ
(cid:88)
(cid:96)∈Nk\{j}
B(1)
j→k,k→(cid:96)ψj→k→(cid:96)
(18)
Instituting Eq. (16) and Eq. (18) into Eq. (17), one has
yi→j =
1
λ
B(1)
i→j,j→kB(1)
j→k,k→ixj→k
(cid:88)
(cid:88)
k∈Nj\{i}
− 1
λ2
B(1)
i→j,j→kB(1)
j→k,k→ixk→i
k∈Nj\{i}
λ3 xi→j − 1
∆i→j
+
λ3 yi→j,
which can be recast in matrix form to obtain Eq. (11).
√
3i)/2 and (1 − √
(ii) Now, we prove that every non-zero eigenvalue of M
equals to one of eigenvalues of B(2), except possible eigenval-
ues −1, (1 +
3i)/2. Let λ be an arbitrary
non-zero eigenvalue of M and z = (x(cid:62), 1
λ3 x(cid:62))(cid:62)
be its corresponding eigenvector. According to Eq. (7) and
Eq. (8), we have
λ2 x(cid:62), 1
λ x(cid:62), 1
λψi→j→k =
xj→k − ψj→k→i, i ∈ Nk
xj→k, i /∈ Nk.
(19)
(cid:40)
(a) burning probability 0.01
(b) 5000 nodes
Figure 2: Empirical and theoretical estimates of the
percolation threshold on the forest fire model.
√
3i)/2 or (1 − √
(a) scatter plot
(b) cumulative distribution of rel-
ative errors
3i)/2,
Figure 3: Test results of empirical and theoretical
percolation thresholds on 42 real-world networks.
.
(20)
We use the peak value of the second largest component
(Eq. (1)) as the ground truth of the bond percolation thresh-
old pc. For each network, the value of the empirical ground
truth pc is computed by 1000 independent Monte Carlo sim-
ulations of the percolation process as proposed by Newman
and Ziff [22].
(λ2xj→k − λxk→i + xi→j), i ∈ Nk
. (21)
5.1 Forest Fire Model
Thus, for the case of nodes i, j and k constituting a triangle,
we can establish the following equations:
λψi→j→k + ψj→k→i = xj→k
λψj→k→i + ψk→i→j = xk→i
λψk→i→j + ψi→j→k = xi→j
.
When λ3 + 1 (cid:54)= 0, i.e. λ (cid:54)= −1, (1 +
we have solutions as
1
ψi→j→k =
(λ2xj→k − λxk→i + xi→j)
(λ2xk→i − λxi→j + xj→k)
(λ2xi→j − λxj→k + xk→i)
λ3 + 1
1
λ3 + 1
1
λ3 + 1
ψj→k→i =
ψk→i→j =
Combining Eq. (19) and Eq. (20), we have
1
λ3 + 1
xj→k, i /∈ Nk
1
λ
ψi→j→k =
Thus, for any non-zero eigenvalue λ of M except −1, (1 +
√
3i)/2 and (1 − √
3i)/2, it satisfies B(2)ψ = λψ, and the
values of elements in ψ can be determined by Eq. (21).
Exploiting Theorem 2, we give an approach to save time
and space cost for computing p(2)
c . In particular, the num-
bers of edges and length-2 directed paths in a network G
i=1 di(di − 1), respec-
are E = 1
2
tively, where di
is the degree of node i. Thus, we re-
duce the size of the matrix to be computed by a factor of
(cid:80)N
i=1 di and P2 = (cid:80)N
i=1 di)/(4(cid:80)N
i −(cid:80)N
i=1 di) ≈ (cid:104)d2(cid:105)/(4(cid:104)d(cid:105)).
((cid:80)N
i=1 d2
5. EXPERIMENTS
In this section, we empirically investigate the validity
of our theoretical estimate for bond percolation threshold.
First, we compare p(2)
c with other theoretical indicators p(1)
and p(0)
on a class of synthetic networks generated by the
forest fire model [19]. Next, we perform extensive experi-
ments on 42 real networks to further explore the performance
of these estimations.
c
c
The forest fire model [19] is a family of evolutionary net-
works, controlled by burning probability q.
We denote the network at time t as Gt.
Initially (t =
1), there is only one node in G1. At time t > 1, there
is a new node u joining the network Gt−1 and generating
Gt. The node u establishes connections with other existing
nodes through the following process: (1) Node u first selects
an ambassador node v in Gt−1 uniformly at random and
connects to it. (2) We sample a random number a ∈ (0, 1]. If
a ≤ q, node u randomly chooses a neighbor of v, which is not
connected to u yet, and forms a link to it. Then repeat this
step. If a > q, this step ends and we label all nodes linking
to u at this step as w1, w2,··· , wk; (3) Let w1, w2,··· , wk
sequentially be the ambassador of node u and apply step (2)
for each of them recursively. A node in the process should
not be visited a second time.
The generation process of the forest fire model describes
new nodes joining social networks with an epidemic fashion.
In addition, forest fire model shares a number of remarkable
structural features with real networks, such as densification
and shrinking diameters [19]. Thus, studying percolation
on the forest fire model can enhance our understanding of
spreading in realistic systems.
02000400060008000100000.00.20.40.60.81.0 p(0)c p(1)c p(2)c pcPercolation ThresholdNumber of Nodes0.000.020.040.060.080.100.00.20.40.60.81.0 p(0)c p(1)c p(2)c pcPercolation ThresholdBurning Probability0.010.110.010.11 p(0)c p(1)c p(2)cPredicted Percolation ThresholdSimulated Percolation Threshold0.00.20.40.60.81.00.00.20.40.60.81.0Cumulative DistributionRelative Error p(0)c, AUC=0.6854 p(1)c, AUC=0.7685 p(2)c, AUC=0.7969(a) relative errors vs. empirical estimates
(b) relative errors vs. average degrees
(c) relative errors vs. categories
Figure 4: Relative errors of theoretical percolation thresholds on 42 real-world networks.
We first consider a case that the burning probability is
very small, so that the network Gt is sparse. In Figure 2a,
we plot bond percolation threshold estimated by different
approaches during the evolution of a forest fire model with
q = 0.01. It shows that along with the growth of the net-
work, the empirical estimate tends to 0.901. The predicted
percolation thresholds based on the adjacency and non-
backtracking matrices tend to 0.210 and 0.495, respectively,
which are far from the empirical estimate. Although p(1)
performs better than p(0)
in sparse networks, the appearance
of triangle structures largely weakens its effectiveness. The
estimation based on the 2nd-order non-backtracking matrix
shows remarkable improvement. At the end of the evolution,
p(2)
tends to 0.778, which corresponds to an improvement
c
of roughly 30% from p(1)
is evidently more
precise than p(1)
for sparse networks with triangles.
c . It indicates p(2)
c
c
c
c
Next we test the impact of burning probability on our in-
dicator.
In Figure 2b, we show the percolation threshold
given by the theoretical and simulated estimations versus
burning probability on forest fire model with 5000 nodes.
Each value is the average of 100 networks. We observe that,
along with the growth of the burning probability, the empir-
ical percolation threshold decreases, because of the increase
of the number of edges. For the theoretical indicators, it
is not surprising that p(2)
always performs better than p(1)
and p(0)
c , especially in the regime of small burning probabil-
ity. However, as burning probability becomes large, the pre-
cision of p(2)
c ,p(1)
c decreases. In addition, the values of p(0)
and p(2)
are getting close. This is because the growth of
the burning probability introduces more and more simple
cycles with length larger than 3, which would lead to over-
estimating probability θi→j→k for i → j → k in such a cycle.
Thus, p(2)
c becomes less effective in predicting the percola-
tion threshold.
5.2 Real Networks
c
c
c
c
c
For the purpose of better understanding the predictive
power of different theoretical estimations in real networks,
we evaluate bond percolation threshold predicted by p(0)
c ,
p(1)
c , p(2)
and simulations on 42 real networks. The dataset
includes social, infrastructural, animal and biological net-
works, which exhibit various topological properties, with
size from 23 to 4941.
In Table 1, we report the theoreti-
cal and empirical estimations for bond percolation threshold
on the 42 real networks. All networks are treated as undi-
rected unweighted networks. We only consider the largest
connected component in each network. All datasets are
from the Koblenz Network Collection (http://konect.uni-
koblenz.de/).
In Appendix ??, we display the structural information and
c
c
c , p(1)
and p(2)
detailed results for each network.
Figure 3a reports values of p(0)
is always closer to the empirical estimate than p(1)
as functions
of the empirical estimate for all 42 networks. It shows that
p(2)
and
c
p(0)
c , which is in agreement with our theoretical analysis. In
addition, we observe that there are some networks on which
p(2)
is not
c
always close enough to the empirical estimate, especially on
networks in the regime of large percolation threshold.
can attain the empirical estimate. However, p(2)
c
c
Next, we continue to quantitatively analyze how much im-
provement our proposed method attains. We define relative
error of the theoretical estimate as (pc − p(α)
)/pc (α = 0, 1
or 2). Then, we plot cumulative distribution of relative er-
rors of p(2)
in the collection of 42 networks,
as shown in Figure 3b. We adopt the area under the curve
(AUC) as a measurement for global performance. The re-
sults is that there is an improvement of 8% from p(0)
to p(1)
c ,
and 3% from p(1)
and p(0)
c , p(1)
to p(2)
c .
c
c
c
c
c
In order to further understand the influence of the true
percolation threshold on our theoretical prediction, we first
divide the range of possible values of the empirical estimate
in eight bins. Then, we calculate the average of the empir-
ical estimate and relative errors, respectively, in each bin.
Figure 4a reports the average of relative error with respect
to the average of the empirical estimate. It implies that p(2)
works well on the networks in the range of small true perco-
lation threshold; while it become less predictive on networks
with large true percolation threshold.
c
We also analyze the impact of density of networks on our
theoretical prediction. Analogously, we divide the range of
possible values of average degree in seven bins and sepa-
rately calculate the means of average degree and relative
errors in each bin. In Figure 4b, we plot the relative error
as a function of average degree for all three theoretical es-
timates. There are two main conclusions from this figure.
First, for all three theoretical predictions, they are more
precise on networks with large average degree than on net-
works with small average degree. Second, on networks in
the regime of small average degree, p(2)
in general has a bet-
ter improvement from p(1)
than on networks with relatively
c
c
0.010.110.10.20.30.40.50.60.7 p(0)c p(1)c p(2)cRelative ErrorSimulated Percolation Threshold100.10.20.30.40.50.60.7 p(0)c p(1)c p(2)cRelative ErrorAverage DegreeAnimalSocialInfrastructureBiology0.20.40.6 p(0)c p(1)cp(2)cRelative ErrorCategoryTable 1: Percolation threshold for 42 real networks.
Network
Zebra
Bison
Cattle
Sheep
Dolphins
Macaques
Nodes Edges
p(0)
c
Animal Networks
23
26
28
28
62
62
105
222
160
235
159
1167
0.0814
0.0544
0.0729
0.0548
0.1390
0.0256
Social Networks
Seventh Graders
Dutch College
Zachary Karate Club
Windsurfers
Train bombing
Hypertext 2009
Physicians
Manufacturing Emails
Jazz Musicians
Residence Hall
Haggle
Network Science
Infectious
Crime
Email
Hamsterster Friendships
Hamsterster Full
Facebook
Contiguous USA
Euroroad
Air Traffic
Open Flights
US Power
PDZBase
Caenorhabditis Elegans
Protein
Human Protein
Protein Figeys
Protein Vidal
Corporate Leadership
Florida Ecosystem Dry
Florida ecosystem Wet
Little Rock Lake
Unicode Languages
Blogs
Bible
29
32
34
43
64
113
117
167
198
217
274
379
410
829
1133
1788
2000
2888
250
422
78
336
243
2196
465
3250
2742
1839
2124
914
2765
1473
5451
12476
16098
2981
0.0532
0.0367
0.1487
0.0552
0.0739
0.0214
0.0994
0.0165
0.0250
0.0464
0.0193
0.0964
0.0428
0.1565
0.0482
0.0217
0.0200
0.0360
Infrastructural Networks
0.1880
0.2493
0.1086
0.0159
0.1336
107
1305
2408
15645
6594
1039
1226
2905
4941
49
Biological Networks
161
453
1458
1615
2217
2783
209
2025
1948
3106
6418
6007
0.1712
0.0380
0.1327
0.0571
0.0317
0.0628
Other Networks
24
128
128
183
614
1222
1773
86
2106
2075
2434
1245
16714
7105
0.1167
0.0249
0.0252
0.0242
0.0637
0.0135
0.0198
p(1)
c
p(2)
c
pc
0.0889
0.0577
0.0796
0.0581
0.1668
0.0263
0.0564
0.0381
0.1889
0.0588
0.0815
0.0219
0.1138
0.0168
0.0258
0.0492
0.0198
0.1148
0.0450
0.2198
0.0519
0.0226
0.0207
0.1339
0.2400
0.3906
0.1336
0.0163
0.1606
0.2483
0.0426
0.1980
0.0648
0.0359
0.0761
0.1339
0.0257
0.0260
0.0250
0.0811
0.0138
0.0247
0.0969
0.0608
0.0847
0.0609
0.1791
0.0268
0.0592
0.0395
0.2097
0.0614
0.0878
0.0222
0.1176
0.0171
0.0263
0.0503
0.0202
0.1294
0.0465
0.2220
0.0529
0.0228
0.0210
0.1456
0.2723
0.4050
0.1387
0.0165
0.1766
0.2484
0.0442
0.2154
0.0649
0.0360
0.0770
0.1430
0.0260
0.0264
0.0253
0.0853
0.0139
0.0257
0.1146
0.0651
0.0875
0.0656
0.2717
0.0308
0.0633
0.0432
0.2310
0.0712
0.1330
0.0262
0.1421
0.0200
0.0335
0.0629
0.0246
0.3862
0.0807
0.2628
0.0642
0.0266
0.0258
0.2885
0.3610
0.5908
0.2022
0.0193
0.6518
0.5237
0.0533
0.3094
0.0876
0.0474
0.0975
0.1512
0.0308
0.0315
0.0313
0.1059
0.0167
0.0268
large average degree. It can be accounted as on dense net-
works, p(0)
is already a good approximation for percolation
threshold, and under such case p(0)
c would be
very close to each other.
and p(2)
c , p(1)
c
c
At last, we discover the performance of theoretical pre-
dictions in different categories of networks. In Figure 4c, we
give the average of relative errors in each group of networks
for all three theoretical estimations. It can be found that
theoretical predictions are closer to true percolation thresh-
old in animal and social networks than in infrastructural and
biological networks.
6. DISCUSSION AND FUTURE WORK
c
Although p(2)
outperforms other theoretical estimations
for bond percolation threshold, it is still not sufficiently pre-
cise on some real networks, due to the appearance of cycles
larger than 3. A direct idea to further improve the preci-
sion is to use the reciprocal of the largest eigenvalue of higher
order non-backtracking matrices as the predictor for the per-
colation threshold. According to a similar deduction as in
Section 4.1, applying a g-th-order non-backtracking matrix
Figure 5: Bond percolation on a Barab´asi-Albert
network with 50 nodes and mean degree 4. The
empirical estimate is pc = 0.2834.
should avoid overestimating probability that node i connect-
ing to the giant component following a length-g path. More-
over, Theorem 1 also theoretically guarantees percolation
threshold estimated by g-th-order non-backtracking matrix
is non-decreasing with respect to g. In order to elaborate
it empirically, we consider bond percolation on a small net-
work with only 50 nodes, generated by the Barab´asi-Albert
network model [2]. In Figure 5, we give the expected rel-
ative sizes of the first and second largest cluster as a func-
tion of probability p. In addition, we derive theoretical esti-
mations for percolation threshold based on g-th-order non-
backtracking matrix (0 ≤ g ≤ 5), denoted separately as p(g)
.
We can observe p(3)
c
is a better approximation than p(2)
c .
c
c
However, theoretical estimation based on high-order non-
backtracking matrices still suffers the following two draw-
backs. First, along with the increase of g, the size of the g-th-
order non-backtracking matrix grows dramatically. It would
lead to a prohibitive cost for computing the largest eigen-
value for large-scale networks. Second, with a sufficiently
large g, p(g)
could be larger than the true percolation thresh-
old. As shown in Figure 5, p(4)
are already slightly
larger than the peak position of S2(p). It may be because
the heuristic analysis in Section 4.1 will be no longer hold for
high-order non-backtracking matrices. Thus, possible direc-
tions of future work include finding efficient techniques for
generating and analyzing high-order non-backtracking ma-
trices, and determining at which order p(g)
is the closest
to but still smaller than the true percolation threshold. It
is also possible that we can depart from non-backtracking
matrices and use some brand-new techniques to develop the
theoretical assessment of the percolation threshold.
and p(5)
c
c
c
In addition, the current lower bound derivation is based
on heuristic equations. A more mathematically sound
technique to show the effectiveness of high-order non-
backtracking matrices and the exact conditions that support
this effectiveness is also a future direction.
7. ACKNOWLEDGMENTS
The authors thank anonymous reviewers for their valuable
comments and helpful suggestions. Yuan Lin and Zhongzhi
Zhang are supported by the National Natural Science Foun-
dation of China (Grant No. 11275049). Wei Chen is par-
tially supported by the National Natural Science Foundation
of China (Grant No. 61433014).
0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0 S1(p) S2(p)Relative Sizepp(0)c=0.1700p(1)c=0.2347p(2)c=0.2530p(3)c=0.2696p(4)c=0.2849p(5)c=0.3005References
[1] J. Andrews, S. Shakkottai, R. Heath, N. Jindal,
M. Haenggi, R. Berry, D. Guo, M. Neely, S. Weber,
S. Jafar, and A. Yener. Rethinking information theory
for mobile ad hoc networks.
IEEE Communications
Magazine, 46(12):94–101, 2008.
[2] A.-L. Barab´asi and R. Albert. Emergence of scaling in
random networks. Science, 286(5439):509–512, 1999.
[3] B. Bollob´as, C. Borgs, J. Chayes, and O. Riordan. Per-
colation on dense graph sequences. The Annals of Prob-
ability, 38(1):150–183, 2010.
[4] A. E. Brouwer and W. H. Haemers. Spectra of graphs.
Springer Science & Business Media, 2011.
[16] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximiz-
ing the spread of influence through a social network.
In Proceedings of the 9th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
pages 137–146. ACM, 2003.
[17] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly,
L. Zdeborov´a, and P. Zhang. Spectral redemption in
clustering sparse networks. Proceedings of the National
Academy of Sciences, 110(52):20935–20940, 2013.
[18] R. Lemonnier, K. Scaman, and N. Vayatis. Tight
bounds for influence in diffusion networks and applica-
tion to bond percolation and epidemiology. In Advances
in Neural Information Processing Systems, pages 846–
854, 2014.
[5] D. S. Callaway, M. E. Newman, S. H. Strogatz, and
D. J. Watts. Network robustness and fragility: Per-
colation on random graphs. Physical Review Letters,
85(25):5468, 2000.
[19] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph
evolution: Densification and shrinking diameters.
ACM Transactions on Knowledge Discovery from Data,
1(1):2, 2007.
[6] C. Chen, H. Tong, B. A. Prakash, T. Eliassi-Rad,
M. Faloutsos, and C. Faloutsos. Eigen-optimization on
large graphs by edge manipulation. ACM Transactions
on Knowledge Discovery from Data, 10(4):49, 2016.
[7] C. Chen, H. Tong, B. A. Prakash, C. E. Tsourakakis,
T. Eliassi-Rad, C. Faloutsos, and D. H. Chau. Node
immunization on large graphs: Theory and algorithms.
IEEE Transactions on Knowledge and Data Engineer-
ing, 28(1):113–126, 2016.
[8] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen. Smart at-
IEEE
tacks in smart grid communication networks.
Communications Magazine, 50(8):24–29, 2012.
[9] R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin.
Resilience of the internet to random breakdowns. Phys-
ical Review Letters, 85(21):4626, 2000.
[10] M. Franceschetti, O. Dousse, N. David, and P. Thiran.
Closing the gap in the capacity of wireless networks via
percolation theory. IEEE Transactions on Information
Theory, 53(3):1009–1018, 2007.
[11] S. Galli, A. Scaglione, and Z. Wang. For the grid and
through the grid: The role of power line communi-
cations in the smart grid. Proceedings of the IEEE,
99(6):998–1027, 2011.
[12] K. E. Hamilton and L. P. Pryadko. Tight lower bound
for percolation threshold on an infinite graph. Physical
Review Letters, 113(20):208701, 2014.
[13] K. Hashimoto. Zeta functions of finite graphs and rep-
resentations of p-adic groups. Advanced Studies in Pure
Mathematics, 15:211–280, 1989.
[14] L. Jiang, Y. Miao, Y. Yang, Z. Lan, and A. G. Haupt-
mann. Viral video style: a closer look at viral videos
on youtube. In Proceedings of International Conference
on Multimedia Retrieval, page 193. ACM, 2014.
[15] B. Karrer, M. E. Newman, and L. Zdeborov´a. Per-
colation on sparse networks. Physical Review Letters,
113(20):208702, 2014.
[20] C. D. Meyer. Matrix analysis and applied linear al-
gebra, volume 2. Society for Industrial and Applied
Mathematics, Philadelphia, 2000.
[21] F. Morone and H. A. Makse. Influence maximization in
complex networks through optimal percolation. Nature,
524:65–68, 2015.
[22] M. Newman and R. Ziff. Efficient monte carlo algorithm
and high-precision results for percolation. Physical Re-
view Letters, 85(19):4104, 2000.
[23] M. E. Newman. Spread of epidemic disease on networks.
Physical Review E, 66(1):016128, 2002.
[24] P. Pako´nski, G. Tanner, and K.
Zyczkowski. Families
of line-graphs and their quantization. Journal of Sta-
tistical Physics, 111(5-6):1331–1352, 2003.
[25] F. Radicchi. Percolation in real interdependent net-
works. Nature Physics, 11(7):597–602, 2015.
[26] F. Radicchi. Predicting percolation thresholds in net-
works. Physical Review E, 91(1):010801, 2015.
[27] F. Radicchi and C. Castellano. Beyond the locally tree-
like approximation for percolation on real networks.
Physical Review E, 93(3):030302, 2016.
[28] Y. Wang, D. Chakrabarti, C. Wang, and C. Falout-
sos. Epidemic spreading in real networks: An eigen-
value viewpoint. In Proceedings of 22nd International
Symposium on Reliable Distributed Systems, pages 25–
34. IEEE, 2003.
[29] D. J. Watts. A simple model of global cascades on
random networks. Proceedings of the National Academy
of Sciences, 99(9):5766–5771, 2002.
[30] D. J. Watts and S. H. Strogatz. Collective dynamics
of small-world networks. Nature, 393(6684):440–442,
1998.
|
1507.06380 | 1 | 1507 | 2015-07-23T04:01:26 | Information Spread Over an Internet-mediated Social Network: Phases, Speed, Width, and Effects of Promotion | [
"cs.SI",
"physics.soc-ph"
] | In this study, we looked at the effect of promotion in the speed and width of spread of information on the Internet by tracking the diffusion of news articles over a social network. Speed of spread means the number of readers that the news has reached in a given time, while width of spread means how far the story has travelled from the news originator within the social network. After analyzing six stories in a 30-hour time span, we found out that the lifetime of a story's popularity among the members of the social network has three phases: Expansion, Front-page, and Saturation. Expansion phase starts when a story is published and the article spreads from a source node to nodes within a connected component of the social network. Front-page phase happens when a news aggregator promotes the story in its front page resulting to the story's faster rate of spread among the connected nodes while at the same time spreading the article to nodes outside the original connected component of the social network. Saturation phase is when the story ages and its rate of spread within the social network slows down, suggesting popularity saturation among the nodes. Within these three phases, we observed minimal changes on the width of information spread as suggested by relatively low increase of the width of the spread's diameter within the social network. We see that this paper provides the various stakeholders a first-hand empirical data for modeling, designing, and improving the current web-based services, specifically the IT educators for designing and improving academic curricula, and for improving the current web-enabled deployment of knowledge and online evaluation of skills. | cs.SI | cs |
Information Spread Over an
Internet-mediated Social Network:
Phases, Speed, Width, and Effects of Promotion
∗
Abigail C. Salvania and Jaderick P. Pabico
Institute of Computer Science
University of the Philippines Los Baños
College 4031, Laguna
ABSTRACT
In this study, we looked at the effect of promotion in
the speed and width of spread of information on the
Internet by tracking the diffusion of news articles over
a social network. Speed of spread means the number
of readers that the news has reached in a given time,
while width of spread means how far the story has
travelled from the news originator within the social
network. After analyzing six stories in a 30-hour time
span, we found out that the lifetime of a story’s pop-
ularity among the members of the social network has
three phases: Expansion, Front-page, and Saturation.
Expansion phase starts when a story is published and
the article spreads from a source node to nodes within a
connected component of the social network. Front-page
phase happens when a news aggregator promotes the
story in its front page resulting to the story’s faster
rate of spread among the connected nodes while at the
same time spreading the article to nodes outside the
original connected component of the social network.
Saturation phase is when the story ages and its rate
of spread within the social network slows down, sug-
gesting popularity saturation among the nodes. Within
these three phases, we observed minimal changes on
the width of information spread as suggested by rela-
tively low increase of the width of the spread’s diameter
within the social network. We see that this paper
provides the various stakeholders a first-hand empirical
data for modeling, designing, and improving the cur-
rent web-based services, specifically the IT educators
for designing and improving academic curricula, and
for improving the current web-enabled deployment of
knowledge and online evaluation of skills.
∗Author contributions: A.C.S. implemented the compu-
tational solution, conducted the computational experi-
ments, and prepared and edited the final paper. J.P.P.
formulated the computational solution, conducted the
statistical analysis, and wrote the final paper.
INTRODUCTION
1.
News articles are an important form of social commu-
nications because they provide records of recent history
that affected the community, as well as forecasts of
future events (e.g., weather and business forecasts) that
could potentially affect the members. Even before the
information age, and more so during the information
age, news articles have become an integral part of
human’s daily lives that more and more people have
become dependent on these type of information for
proper and timely decision-making processes.
Since
news have become an indispensible tool for humans,
their spreading across the social network also plays a sig-
nificant role in a variety of human affairs. For example,
they can shape the public opinion in a country [14],
greatly impact financial markets [18], cause citizens
to take actions on some issues [5], effect the spread
of technological
innovations [24, 25], and speed up
word-of-mouth effects in marketing [11, 17, 21]. The
information content of news articles can range from
simple reporting of an event containing basic infor-
mation, to advanced propaganda and marketing of
various stakeholders, such as that of private citizens
who selectively edit news items and then broadcasts
them via their own news conferences to further their
cause, or the goverment which filters information for
national security reasons. Mechanisms for spreading
information form the basis of the Internet which have
become,
in recent years, the playground for testing
and evaluating an important class of digital commu-
nication protocols. Measuring the speed and width of
information spread over an Internet-mediated social
network, as well as quantifying the effect of promotion
on these measures, may provide various scientists and
engineers a first-hand empirical result to aid them in
modeling, designing, and improving the current Internet
services. Likewise, this will aid IT technical trainors
and academic educators in designing innovative cur-
ricula, as well as use and improve tools for web-enabled
deployment and evaluation of knowledge and skills.
Researchers in the study of information spread have
assumed that information I diffuses over a social net-
work SN from a person v0 ∈ SN to another person
vj ∈ SN following an epidemic-like dynamics [10], and
spreading to other person-members of SN in a short
number of steps according to the small-world princi-
ples [26, 27]. Despite the numerous studies in the past
years under this scientific domain, the process of doc-
umenting, and thereby tracing, the dissemination of a
single piece of news article among the members of SN ,
particularly for nationally and globally-sized SN s, has
been rather difficult, not only due to the sheer size
of the study subject, but moreso due to the inherrent
dynamism of the subject SN . Thus, researchers have
not yet agreed whether the spread of I over a very large
and dynamic SN really follows a rapid, epidemic-like
fanning out, or it follows another process that could
be simpler or more complex than that of the epidemics
model.
In this effort, to characterize the spread of I over an
Internet-mediated SN , we followed the spread of I
through a social web over its perceived lifetime while
measuring its speed V and width W of spread, as well
as the effect of the promotion of I on these metrics. We
found out that the lifetime of the popularity of I among
the members of SN undergoes three phases, namely,
expansion, front-page, and saturation. We measured
the respective V and W of each phase and found out
the following:
1. Expansion Phase is when an I is published by a
member v0 ∈ SN and it spreads to other members
vi ∈ SN , ∀i > 0, who are directly related in one
way to v0. The speed of spread ranges from 1% to
12% of the total size of SN per hour.
2. Front-page Phase is when a news aggregator
promotes I resulting in faster V among the con-
nected members of SN , and at the same time
spreading I to members outside of this connected
members, which is rather contrary to previously
developed models [22]. During this time, V ranges
from 3% to 23% of the total size of SN per hour.
3. Saturation Phase happens when I ages and V
slows down suggesting saturation among the mem-
bers of SN . This time, V ranges from an hourly
1% to 4% of the total size of SN .
2. CONCEPTUAL FRAMEWORK
The social network SN is abstractly represented as
a graph G(V, E) composed of social members, such
as humans,
represented as a set V of n vertices
v0, v1, . . . , vn−1. The relationship of a member vi
to any other member vj , ∀i 6= j, is represented as an
edge (i, j). The relationship of all members with the
other members is a set E of edges, and can be mathe-
matically represented as an n × n adjacency matrix M.
The matrix element Mi,j = 1 if vi is related in someway
to vj . Otherwise, Mi,j = 0. We note here that the
relationship is symmetric such that vi having a rela-
tionship with vj also means vj having a relationship
with vi. Thus, Mi,j = Mj,i. Without loss of generality,
we set Mi,i = 0, ∀i. For relationships whose degrees r
can be quantified, the edge (i, j) is labeled by r, while
0 ≤ Mi,j ≤ 1, where Mi,j = r > 0 if vi is related
to vj to some degree, otherwise Mi,j = 0. In this case,
the relationship is no longer symmetric. Under these
degreed relationships, however, measuring r is quite
difficult to achieve objectively for most real world SN s.
In this paper, we assumed that Mi,j is binary, while
we will consider the more general 0 ≤ Mi,j ≤ 1 in the
future.
The degree ∆i of a vertex vi counts the number of
humans that member vi has a relationship with. Thus,
∆i = Pn
j=1 Mi,j . Recently, the frequency distribution
ρ(∆) of the degree in SN has been found by various
researchers [1–3] to asymptotically follow the power law
distribution of the form ρ(∆) = α × ∆ϕ. For social
networks, and all other biological networks, the power
usually takes the value −3 ≤ ϕ ≤ −2. Having ρ(∆) ∼
α × ∆ϕ makes SN scale-free [1].
An information I, usually in the form of a news article,
spreads through SN in the following manner. Let S(vi)
be a function that represents the state S of a vertex vi ∈
V . The state S(vi) = 0 if vi has no knowledge yet of the
presence of I. This, intuitively, means that I has not
reached vi yet. However, S(vi) = 1 if I has reached vi.
Note here that S only changes from 0 to 1 and not the
other way around. At time t0, I originates from a source
member v0 ∈ SN , at which time S(v0) = 1 while all the
others have S(vk) = 0, ∀k > 0. During the succeeding
time periods, t1, t2, . . . , tk, k > 0, I spreads through
SN via some of the edges that are connected to v0. In
turn, I spreads through members vi, for some i > 0, and
Mi,0 = 1, during which S(vi) = 1. The sum Pi S(vi)
within a time interval δt is the rate of spread V of I in
SN .
For the connected components of SN , there exists a
vertex vi ∈ SN whose state S(vi) = 1. From v0, we can
find a shortest path D0,i out of potentially many paths
from v0 to vi whose intermediate vertices vj , 0, i 6= j,
have S(vj ) = 1. The path distance can be computed as
D0,i = P S(vj ). Note that D0,i = Di,0. The longest
among all the shortest paths from v0 to vi is the radius of
spread of I through the connected components of SN .
Using the all-pairs shortest paths algorithms by Floyd
[13] and by Johnson [16], we can approximate the W by
computing for the longest shortest path of the connected
component within SN , but considering only those paths
that will traverse v0.
With this scenario, we may quantify the spread of I
over SN in two ways. First is the speed V at which
the information has reached the members of the com-
munity over a time period (Equation 1), and second is
the diameter width W of the component of SN at which
the information has spread from the source v0.
V =
i=0 S(vi)
Pn−1
δt
(1)
2.1 Internet-mediated social networks
In its early history, the Internet primarily served a
worldwide research community while its developers
worked on improving communication protocols and
inventing new ones to support emerging services. Even
though the growth of Internet eased as a result of the
bursting of the dot-com bubble in the early 2000’s, it
still has become an integral part of everyday life for
ordinary people [4] due to many reasons brought about
by the effect of technology in people’s lives. One among
the many reasons is that it has become an obiquitous
tool to meeting, communicating and collaborating with
other people resulting in the formation of the Social
Web.
The Social Web is a label that includes both the social
networking sites such as MySpace and Facebook, and
the social media sites such as Digg and Flickr. Figure 1
shows one of the many visualizations of the conceptual
framework of the social web. The social web, in its
many forms, has been tagged as one of the many forces
in changing the way content is created and distributed
in the Internet. This change was further expidiated
through the proliferation of web-based authoring tools
that enable users to rapidly publish content, such as sto-
ries, opinion pieces on weblogs, photographs and videos
on Flickr and YouTube, advices on Yahoo Answers, and
web discoveries on Del.icio.us and Furl. In effect, user-
generated content has fueled the rapid expansion of the
Web, accounting for much of the new Web content in the
Internet. In addition to allowing users to share content,
social web sites also include a social networking compo-
nent which allows users to mark other users as friends or
contacts. They also provide an interface to track their
friends’ activities [4]. These components have a signifi-
cant impact on the Internet traffic distribution. Under-
standing the feature and characteristics of these sites is
crucial to network traffic engineering and to sustain the
development of this new generation of service [23].
Figure 1: A popular visualization of the concep-
tual framework of the Social Web by Hayes [15]
out of the many visualizations that exist.
2.2 Recent studies in information spread
Different studies have been conducted in the past to
trace how I spreads on the Internet.
In one of their
recent studies, Liben-Nowell and Keilberg. [22] found
out that the path followed by I was narrow and is
characterized by a very deep tree-like pattern rather
than fanning out like the small world principle sug-
gests. They observed this particular behavior after
reconstructing the paths followed by I in a global-scale
Internet chain letter data. They reconstructed the
paths by tracing the signatories of the chain letter data.
In similar studies conducted by Lerman and Galstyan
[20] and Cheng et al. [6], where they independently
observed the spread of I on different social news aggre-
gators, they found out that SN play a significant role
in the promotion of I among the members of SN . In
fact, Cheng et al. [6] even found that the networks
of related I are characterized by a short path length
linking two similar Is together. This suggests that
the inferred SN in social news aggregators follow the
small-world principle.
2.3 Case study: digg.com
To characterize the spread of I over an Internet-
mediated SN , we followed the spread of I through a
social web called digg.com over a period of time. We
were able to measure the respective V and W of spread
of six stories {I1, I2, . . . , I6}, as well as the effect of
the promotion of the stories on V and W of these. The
social website digg.com is a digital media democracy
that allows its members to submit I in the form of news
stories that they discovered from the Internet. When a
member v0 ∈ SN submits a news article, digg.com will
list I under the submitter’s name, as well as put I to a
repository web page called “Upcoming Stories,” where
other members vi ∈ SN , ∀i > 0, can find I and, if they
like it, add a “digg” to it. Adding a “digg” to an I is
synonymous to “voting” for it. When a member vi diggs
an I, that I is saved to vi’s history. At the same time,
a so-called digg.com number is shown next to each I’s
title. This number simply counts how many members
have digged I in the past. Most diggs come from the
network neighbors of v0. New diggs might also attract
additional diggs from the neighbors of the diggers, and
so on.
If a submission fails to receive enough diggs within
a certain time period,
it eventually falls out of the
“Upcoming” section. However, if it earns a critical mass
of diggs in a short span of time, it becomes popular and
is promoted to the digg.com ’s front page. Most mem-
bers read only the front page stories, thus, getting on
the front page greatly increases a specific I’s visibility.
Promoted I is selected by digg.com ’s algorithms to be
displayed on the front page, but the exact formula for
how a story is selected is kept secret and changes peri-
odically (Figure 2). This prevents users from “gaming
the system,” a systematic crack by black hat hackers
for the sole purpose of promoting advertisement or
spam. However, it appears that the algorithm takes
into account, among other things, the number of votes
received by I [19].
3. METHODOLOGY
Instead of obtaining the data from the social web oper-
ator, we crawled our target SN by accessing the public
web interface provided by the digg.com API. Our
crawler was developed using Perl scripts and utilizes
the Linux command line programs grep and wget. The
public interface provided by the digg.com API outputs
an array of p pages containing n accounts. Each of the
first p − 1 pages lists 100 unique accounts while the last
page lists (n mod 100) accounts. The default account
the time of digging to accurately construct the evolution
graph of diggers.
We crawled the digg.com SN every hour to get a snap-
shot of the structure of the SN . For each reading, we
measured the number of diggers and network diameter
of the inferred SN . We considered the speed V of the
information spread as the number of diggers nt at a
certain time t, while the width W of information spread
is the network diameter of the connected component of
the graph, modified according to our needs. This means
that we only considered those nodes whose S(vi) = 1
and those paths which will travese v0.
4. RESULTS AND DISCUSSION
4.1 Stories traced
We set our crawler to trace the information spread of
six stories between January and February 2010. Spe-
cific information about the stories, its diggers and the
list of their friends were saved in a database. These sto-
ries are listed in Table 1, together with some statistics
that we gathered after the trace of our crawler. Story
I3 (Figure 3) had the most number of diggers and the
largest network diameter, while Story I2 had the least
number of diggers and Story I1 had the smallest net-
work diameter. Story I3 had the fastest rate and widest
width of information spread after 30 hours. Story I2 had
the slowest rate of information spread after 30 hours and
Story I1 had the least width of information spread after
30 hours.
Figure 3: The front page of story I3 (a) as seen
in digg.com on 27 February 2010, and (b) as seen
in its original news website Thomson Reuters
Foundation.
4.2 Phases in the life of a news article
Figure 4 shows the respective traces of Ii, ∀i = 1, . . . , 6
in terms of the percentage of the population of SN .
From the figures, we see three prominent patterns: The
Figure 2: Users have speculated how digg.com
promotes I into its front page because the exact
algorithm has been kept secret in an effort to
protect it from systematic cracking by malware
software writers. This figure by Finch [12] is one
of those speculations.
per page is 10 but the maximum allowed is 100, which
can be set by assigning the proper variable in the URL.
We automatically crawled the p pages by changing the
proper parameters in each URL, a method that we
adopted from the work done by Pabico and Arevalo
[23].
Our crawler first extracts the diggers or voters of a
given I. For each vi ∈ SN , our crawler then extracts
the list of vi’s friends. To be able to view the diggers
of a story, the digg.com API provided the URL that
shows the list of diggers of a certain story, including the
digg date, story id, digger’s user id and name, and the
status of the story [7]. To be able to view the list of
friends of the diggers of a story, digg.com API also pro-
vided the URL which contains the friends’ user name,
number of profile views, and registration date of user [8].
We stored these information in separate database tables
named “digger” and “friends,” respectively. The “digger”
table includes the user name, user id, story id, and digg
date as attributes. At the end of the crawl, for each I,
the “digger” table will contain n unique records corre-
sponding to each digger discovered by the crawler. The
“friends” table takes the user name of the diggers as
well as the user name of his friends. The digger’s user
name in the “digger” table is used as a foreign key for
the other table containing his friends. The crawler dis-
regards inactive users, which is already flagged by the
digg.com API. The trace for each story is stored in a
Information about the I, like its
different database.
title, story id, name of submitter, date the story was
submitted, and date the story was promoted were also
taken into account and stored. All of these information
can be viewed on the URL provided by the digg.com
API [9].
In representing the SN of digg.com users, we treated
the diggers as vertices while the relationships between
them as edges. We considered the first vertex v0 ∈ SN
as the submitter of I, while the succeeding other vertices
vi, ∀i > 0, were the diggers of I. Our crawler checks for
the succeeding digger’s user name if it has a relationship
with the previous diggers. If the succeeding digger vk ∈
SN is a friend of the previous diggers vi, ∀i < k, we
connect vk to those previous diggers. We also considered
Table 1: The six stories that we traced in this study: Story title, date submitted, name of the
submitter (v0), size n of SN and the W after 30 hours.
Story Title
I1
I2
I3
I4
I5
I6
Haterade Power Rankings Super Bowl Edition
NSAC Manny Pacquiao’s Drug Test results are Negative
A massive magnitude 8.3 earthquake struck Chile
China warns Obama not to meet Dalai Lama 2
Please Help The People of Haiti
Ohno’s Wins 7th Medal and Sets US Record
Date
Submitted
10 Feb 2010
16 Jan 2010
27 Feb 2010
02 Feb 2010
16 Jan 2010
21 Feb 2010
v0
n W
racheljtm
lovelezz
alanocu
divinediva
jayadelson
robinbal
181
147
1,378
989
661
177
4
7
10
9
7
5
behavior of the plot before the promotion, after promo-
tion, and an ageing pattern. We termed these phases as
follows:
1. Expansion Phase: This phase starts when I is
published and the article spreads from v0 to other
members of SN who are at least separated from
v0 by at least ∆ = 3.
2. Front-Page Phase: This phase happens for some
I wherein a news aggregator at time t promotes I
into its front page. This gives boost to the spread
of the article outside of the connected component
of v0 at t resulting to faster speed of spread.
3. Saturation Phase: This phase is considered when
the I ages and its popularity among the members
of the SN died down, that is δS/δt < 0.5. From
the figure, this usually happens when about 90%
of the population have already read about I.
Stories I1 and I6 seemed to follow the same pattern,
which is characterized by an upward slope δS/δt > 0.5
during the early hours of its life, and then leveling off
with δS/δt < 0.5.
It seemed that these two stories
have two phases because there is not much break on the
spead of spread of I before and after the promotion.
However, we note here that these two news articles are
both sports-related, both talk about the sports in the
US where most of the digg.com members reside, and
that the news articles were published when the respec-
tive sports are being talked about by the mainstream
media. This means that even though without the benefit
of the front-page promotion, we expected that these two
news items will have δS/δt > 0.5 because the respective
topics have already been promoted elsewhere.
Stories I2 through I5 show a more pronounced break
between the phases before and after promotion. For
example, I2 which been promoted about 28 hours after
its publication seemed to follow a natural ageing phase
after about the 9th hour of its life (Figure 4b). Notice,
however, that there was a considerable “jump” after
it has been promoted to the front-page. Likewise, I3
through I5 exhibit the same jump, after their promo-
tions on the 3rd, 7th, and 15th hours, respectively.
4.3 Speed, width, and effects of promotion
Figure 5 shows the plot of instantaneous speed V of
spread of each story during the 30-hour trace. Except
for I1 and I6, all other stories exhibit a tremendous rise
in V after their respective promotions to digg.com front-
page. Stories I1 and I6 did not show this pattern due to
the same characteristics enumerated above. Before the
promotion, the spread of a story loses speed as clearly
shown in the respective behaviours of I2, I4, and I5. A
single peak lasting about one hour is observed just after
promotion. Some others have multiple peaks, such as I3
and I4, but the height of the peaks is no greter than the
peak just after promotion. The V suffered a downward
patterns right after every peak, following the downward
path just before the second peak (see for example that
of I4 which has a more pronounced pattern than the
others), suggesting saturation of the population.
Figure 6 shows the various plots of the evolution of the
width W of spread of each story during the 30-hour
trace. The most notable value among the plots is that
the minimum W = 3. The physical implication of this
minimum W value is that at this width, I has only
reached the immediate neighbors of v0, wherein at least
one neighbor vi is not directly connected to the other
neighbors of v0. One notable story is I2, wherein it
spread only to the immediate neighbors of the submitter
v0 during the first 28 hours of the story’s life. However,
after the story’s promotion to the front-page, the width
of spread expanded up to seven members within a two-
hour span. Only I2 and I6 experienced an immediate
expansion of the width of spread after promotion, width
inf o2 expanding by one member and I6 by two. All the
other stories continued on with their respective widths
until at least one hour after the front-page promotion.
The physical implication of a decreasing W is that I
has reached a member that caused the longest shortest
path to shorten.
4.4 Evolution of information spread
Figures 7 and 8 show the respective evolution graphs
of I1 and I5 during the three phases. During the expan-
sion phase (Figures 7a–b and 8a–b), I1 is visible from
the upcoming queue. Most of the first few diggers are
direct friends of the submitter v0, thus the visualization
shows a connected graph. During the front-page phase
(Figure 7c–d and 8c–d), I1 became more visible to the
other member of SN causing it to accumulate votes at
a faster rate. Some of the diggers are disconnected from
the largest connected component. During the saturation
phase (Figure 7e–f and 8e–f), I1 ages. This is charac-
terized by the slow down of the accumulation of votes.
Figure 4: Percentage of population reached by various stories within the 30-hour trace: (a) I1; (a) I2;
(b) I3; (c) I4; (d) I5; and (e) I6. Each red vertical line marks the time when the story was promoted
to the front-page.
The respective evolution graphs for I3, I4, and I6 are
shown in Figure 9.
5. CONCLUSION AND RECOMMEN-
DATIONS
We looked at the effect of promotion in the speed
and width of spread of information on the Internet
by tracking the diffusion of news articles over a social
network. We defined the speed V of spread as the
number of readers that the news has reached in a given
time, while width of spread means how far the story
has travelled from the news originator within the social
network. After analyzing six stories in a 30-hour time
span, we found out that the lifetime of a story’s pop-
ularity among the members of the social network has
three phases, namely, the expansion, the front-page,
and the saturation phases. The expansion phase starts
when a story is published and the article spreads from a
source node to nodes within a connected component of
the social network. The front-page phase happens when
a news aggregator promotes the story in its front page
resulting to the story’s faster rate of spread among the
connected nodes, while at the same time spreading the
article to nodes outside the original connected compo-
nent of the social network. Saturation phase happens
when the story ages and its rate of spread within the
social network slows down suggesting popularity satu-
ration among the social members. Within these three
phases, we observed minimal changes on the width
of information spread as suggested by relatively low
increase of the width of the spread’s diameter within
the social network. The contribution of this paper is
that this provides various stakeholders, such as the
scientists and engineers, a first-hand empirical data to
help them in modeling, designing, and improving the
current web-based services. Similarly, the IT trainors
and educators may find the information here useful
for designing and improving curricula, as well as in
Figure 5: Various plots of instantaneous speed V of spread of the stories during the 30-hour trace:
(a) I1; (a) I2; (b) I3; (c) I4; (d) I5; and (e) I6. Each red vertical line marks the time when the story
was promoted to the front-page.
improving the web-enabled deployment of knowledge
and online evaluation of skills.
[5] D. Carr. Why Twitter will endure?, 2010. New
York Times.
6. ACKNOWLEDGMENTS
This research effort is funded by the Institute of Com-
puter Science, University of the Philippines Los Banos.
References
[1] R. Albert and A.L. Barabasi. Statistical mechanics
of complex networks. Reviews of Modern Physics,
74:47–97, 2002.
[6] Xu Cheng, Cameron Dale, and Jiangchuan Liu.
Understanding the characteristics of Internet short
video sharing: Youtube as a case study. CoRR,
abs/0707.3670, 2007.
[7] digg.com .
Digg API story.getDiggs, 2009.
http://services.digg.com.
[8] digg.com .
Digg API
friend.getAll,
2009.
[2] A.L. Barabasi.
Scale-free networks.
Scientific
http://services.digg.com.
American, 288:60–69, 2003.
[3] A.L. Barabasi and R. Albert. Emergence of scaling
in random networks. Science, 286:509–512, 1999.
[4] N. Brownlee and K. Claffy.
Internet measure-
IEEE Internet Computing, 30:1089–7801,
ment.
September/October 2004.
[9] digg.com .
Digg API
story.getInfo,
2009.
http://services.digg.com.
[10] P.S. Dodds and D.J. Watts. Universal behavior in
a generalized model of contagion. Physical Review
Letters, 92(21):218701, 2004.
Figure 6: Various plots of width W of spread of the stories during the 30-hour trace: (a) I1; (a) I2;
(b) I3; (c) I4; (d) I5; and (e) I6. Each red vertical line marks the time when the story was promoted
to the front-page.
[11] P. Domingos and M. Richardson. Mining the net-
work value of customers. In F. Provost, R. Srikant,
M. Schkolnick, and D. Lee, editors, Proceedings of
the 7th ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, pages
57–66, New York, 2001. Association for Computing
Machinery.
[12] S. Finch. The great digg.com promotion algo-
http://crenk.com/great-
rithm flowchart, 2009.
digg-promotion-algorithm-flow-chart/.
[13] R.W. Floyd. Algorithm 97: Shortest path. Com-
munications of the ACM, 5(6):345, 1962.
[14] S. Galam. Modeling rumors: The no plane pen-
tagon French hoax case. Physica A, 320:571–580,
2003. doi:10.1016/s0378-4371(02)01582-0.
[15] G. Hayes. The social media campaign, 2008.
http://www.personalizemedia.com/.
[16] D.B. Johnson. Efficient algorithms for shortest
paths in sparse networks. Journal of the ACM, 24
(1):1–13, 1977.
[17] D. Kempe, J. Klienberg, and E. Tardos. Maxi-
mizing the spread of influence through a social net-
work.
In Proceedings of the 9th ACM SIGKDD
International Conference on Knowledge Discovery
and Data Mining, 2003.
[18] M. Kosfeld. Rumours and markets.
Journal
of Mathematical Economics, 41(6):646–664, 2005.
doi:10.1016/j.jmateco.2004.05.001.
[19] Kristina Lerman. Social information processing in
social news aggregation. CoRR, abs/cs/0703087,
2007.
[20] Kristina Lerman and Aram Galstyan.
Anal-
ysis of social voting patterns on digg. CoRR,
abs/0806.1918, 2008.
Figure 7: The evolution graph for I1 during: (a) Hour 1; (b) Hour 2; (c) Hour 4; (d) Hour 5; (e) Hour
29; and (f ) Hour 30.
[21] J. Leskovec, L.A. Adamic, and B.A Huberman.
The dynamic of viral marketing. In Proceedings of
the 7th ACM Conference on Electronic Commerce,
pages 228–237, 2006.
[22] D. Liben-Nowell and J. Keilberg. Tracing infor-
mation flow on a global scale using internet chain
letter data. Proceedings of the National Academy of
Sciences of the United States of America, 105(12):
4633–4638, 2008.
[23] J.P. Pabico and C.C.P. Arevalo.
Patterns of
Internet-based friendship among residents of Los
Banos, Laguna: The Friendster case. Transac-
tions of the National Academy of Science and Tech-
nology, Philippines, 30(1):220, 2008.
[24] E.M. Rogers. Diffusion of Innovations. Free Press,
New York, 4 edition, 1995.
[25] D. Strang and S.A. Soule. Diffusion in organiza-
tions and social movements: From hybrid corn to
poison pills. Annual Review of Sociology, 24:265–
290, 1998.
[26] J. Travers and S. Milgram. An experimental study
of the small world problem. Sociometry, 32(4):425–
443, 1969.
[27] D.J. Watts and S.H. Strogatz. Collective dynamics
of ´small world´networks. Nature, 393:440–442, 1998.
Figure 8: The evolution graph for I5 during: (a) Hour 1; (b) Hour 2; (c) Hour 15; (d) Hour 16;
(e) Hour 29; and (f ) Hour 30.
Figure 9: The respective evolution graphs of (a) I3, (b) I4, and (c) I6 showing only Hour 1 and
Hour 30.
|
1503.06652 | 1 | 1503 | 2015-03-23T14:29:15 | Evolutionary Dynamics of Complex Networks: Theory, Methods and Applications | [
"cs.SI",
"physics.soc-ph"
] | We propose new direction to understanding evolutionary dynamics of complex networks using two different types of collaboration networks: academic collaboration networks; and, disaster collaboration networks. The results show that academic collaboration network has all properties of small-world networks and can be considered a real small-world network with the result of its structural analysis maybe being extendable for other real-networks who share the common grounds of small-world properties. | cs.SI | cs | Evolutionary Dynamics of Complex Networks:
Theory, Methods and Applications
Alireza Abbasi
School of Engineering & IT,
University of New South Wales Canberra
ACT 2600, Australia
Liaquat Hossain (Corresponding Author)
Liaquat Hossain
Professor, Information Management
Division of Information and Technology Studies
The University of Hong Kong
[email protected]
Honorary Professor, Complex Systems
School of Civil Engineering
Faculty of Engineering and IT
The University of Sydney, Australia
[email protected]
Rolf T Wigand
Maulden-Entergy Chair & Distinguished Professor
Departments of Information Science & Management
UALR, 548 EIT Building
2801 South University Avenue
Little Rock, AR 72204-1099, USA
Evolutionary Dynamics of Complex Networks:
Theory, Methods and Applications
Abstract
We propose a new direction to understanding evolutionary dynamics of complex networks. We
focus on two different types of collaboration networks—(i) academic collaboration networks (co-
authorship); and, (ii) disaster collaboration networks. Some studies used collaboration networks to
study network dynamics (Barabási & Albert, 1999; Barabási et al., 2002; Newman, 2001) to reveal
the existence of specific network topologies (structure) and preferential attachment as a structuring
factor (Milojevi 2010). The academic co-authorship network represents a prototype of complex
evolving networks (Barabási et al., 2002). Moreover, a disaster collaboration network presents a
highly dynamic complex network, which evolves over time during the response and recovery
phases of a disaster. We have chosen these two networks even though they are different in terms of
complexity and domain but have common properties: open-based communication platform (self-
organized system); geographically disperse actors (locational and cultural diversity of actors);
autonomous behavior systems (non- hierarchy structure). The results show that the academic
collaboration network has all the properties of small-world networks and can be considered a real
small-world network with the result of its structural analysis maybe being extendable for other real-
networks who share the common grounds of small-world properties. Our results further illustrate
that the networks‟ clustering coefficients remain almost static over the evolution of both networks
while the network is expanding over time through adding new actors and links to the networks.
Keywords: Evolutionary Dynamics; Complex Networks; self-organized systems; autonomous
behavior; network theory; social networks analysis; collaborative systems.
Evolutionary Dynamics of Complex Networks:
Theory, Methods and Applications
Introduction
Collaboration is one of the defining features of modern science (Milojevi 2010). It is defined as
“working together for a common goal and sharing of knowledge” (Hara, Solomon, Kim, &
Sonnenwald, 2003) (p. 853). Therefore, collaboration can be regarded as a social process which
enables the collective shared intelligence of a group (Bordons & Gómez, 2000; Milojevi 2010;
Shrum, Genuth, & Chompalov, 2007). As Milojevic (2010, p. 1410) formulated, “The most
commonly used methods for studying collaboration networks have been: bibliometrics (Bordons &
Gómez, 2000); social network analysis/network science (Barabási et al., 2002; Kretschmer, 1997;
Newman, 2001c, 2004a; Wagner, 2008; Wagner & Leydesdorff, 2005); qualitative methods of
observation and interviews (Hara et al., 2003; Shrum et al., 2007); and surveys.
Currently, however, it is not clear which collaboration data is useful for evaluating the academic
community. Although there is a large set of potential collaboration data (e.g., joined conference
organization, joined research proposal submissions, joined publications, joined conference
attendance, and teacher-student relationships) (Abbasi, Altmann, & Hossain, 2011), which qualifies
for being analyzed through appropriate network measures but co-authorship is the most visible
indicator of scientific collaboration and has thus been frequently used to measure collaborative
activity, especially in bibliometric and network analysis studies. Bibliometric studies of co-
authorship have emphasized the effects of collaboration on scientific activity as well as on
organizational and institutional aspects of collaboration applying different units of analysis (i.e.,
authors, institutions, and countries) (Milojevi 2010).
Since previous reports showed, worldwide, losses from disasters related to natural hazards had risen
dramatically (Munich Re Group, 2005; Swiss Reinsurance Company, 2006) and that trend was
growing due to human-induced climate change (Crompton & McAneney, 2008); so it is expected to
grow exponentially now and in the future. A disaster is defined as a destructive event creating
negative social and economic conditions that interrupt the day-to-day activities of a society (Abbasi,
Hossain, Hamra, & Owen, 2010; Hossain & Kuti, 2010; Kapucu, 2005; Waugh, 2003). In such
special events, as the situations become more severe and complex, a coordination network
consisting of different organizations and agencies is needed to manage and respond to the events
optimally. Therefore, it is important for organizations to form cooperative information exchanges in
order to respond to disasters effectively and efficiently to achieve a common goal (Abbasi &
Kapucu, 2012). Poor coordination is a fundamental problem for an emergency response, and is
primarily due to lack of good communication between and among organizations; a lack of up-to-
date and relevant information circulating through the emergency response network; and, insufficient
access to data and action plans (Hossain & Kuti, 2010; Van Borkulo, Scholten, Zllatanova, & van
den Brink, 2005).
Coordinating activities or tasks in a complex system during a disaster for effective response is one
of the most important issues to protect human, natural lives as well as protecting these from
infrastructure damage. In any system and especially disasters, if the situation becomes more
complex, by increasing interactions and interdependency among actors (e.g., individuals and
organisations), the need for coordination increases in order to achieve a common goal. It has been
documented in previous studies that the efficiency of disaster response is influenced by the severity
of disaster, type and amount of resources available, number of jurisdictions involved, and
complexity of the response strategies (Comfort, Ko, & Zagorecki, 2004). On the other hand,
flexibility gives the involved participants and organizations ability to respond to unanticipated
events. During an emergency situation, flexibility will support organizations to be properly prepared
and improvise to fit the requirements of the current situation (Mendonça, Beroggi, & Wallace,
2001). Thus, flexibility and adaptation of the coordinating networks in uncertain and dynamic
conditions (e.g., disasters) needs to be seen pivotal to effective response and recovery efforts
(Dwyer & Owen, 2009).
Complex adaptive systems exhibit coherence and persistence in the face of change and dependence
on extensive interaction (Holland, 1993). Crisis environments are complex, dynamic and place
lives, property, and continuity of operations in our communities at risk. Concepts from the
emerging science of complex adaptive systems (CAS) help us to understand these environments
better and offer fresh insight into the challenging problems of inter-organizational coordination
(Comfort, 1999). Modern organizational environments are becoming more complex at an increasing
rate, largely through networks (Kauffman, 1993; Scott, 1998; Waldrop, 1992; Weick, 2001). “The
interactions of organizations in a large system can generate greater complexity than the
organizations themselves. Today‟s organizations have become too interconnected and too complex
to be managed by traditional top-down and hierarchical means” (Kapucu, 2004). The science of
complex adaptive systems offers a new mind-set and a scientific basis for managing complex
partnerships using the principles of self-adaptive systems (Clippinger, 1999).
Common properties of the two networks
Open-based communication platform (self-organized system)
Disaster collaboration networks resemble open-based communication platforms. Although usually
there is a systematic hierarchy for response to disasters, they follow a bottom-up perspective. A
disaster collaboration network is a self-organized system meaning that individual agents (e.g.,
personnel, agencies and organizations) organize their communication with other involved actors as
an incident (disaster) evolves. Similarly, an academic collaboration (co-authorship) network does
not have a hierarchical structure and individual agents (i.e. authors) organize whole network
topology and state through their collaboration with others. In disaster collaboration networks,
bottom up information could be used at the top down command and control in ensuring adequacy in
situation awareness of the affected communities. In these networks, in order to transmit the local
knowledge of the affected areas/communities to central command and control so that a realistic
disaster response and recovery effort should become deliverable.
Geographically dispersed groups (locational and cultural diversity of actors)
During response to a complex disaster, several agents from different organizational cultures and
locations cooperate with each other for a common goal. For instance, in order to respond to a large
bushfire several agencies from different organizational cultures (such as fire services, police,
ambulance) and usually from different jurisdictions come together. Similarly, scholars from
different locations around the world and diverse disciplines collaborate with each other to have a
joint publication.
Autonomous behaviour systems (non-hierarchical structure)
There is no hierarchical structure (command and control) among authors in an academic co-
authorship collaboration network meaning that often the authors are not forced to collaboration with
another author. It is usually the same in disaster collaboration networks too. Although most
emergency response organizations plan their general tasks and probable contacts, but as the disaster
circumstances are very dynamic their links shape autonomously. In addition, academic
collaboration networks can be referred to as stable networks while disaster collaboration networks
are more complex and dependent on the environment. Analysis of these two types of networks
would provide us with new insights about the effects of complexity on the behavior of network
dynamics and evolution.
Towards a Complex Adaptive Systems Cycle Model
In our proposed model presented in Figure 1, the co-evolution of local dynamics versus global
dynamics of networks over time has been explored. To study dynamics on networks, the nodes‟
local structure correlation to networks topology in each time slot (static analysis) has been
examined. On the other hand, as networks evolve over time represents that new nodes and links add
to the network and both nodes and the whole network (locally and globally) structure changes due
to different link attachment rules over the evolution of the network. To study dynamics of network
over time, the dynamics of both node‟s local structure and network‟s topology compare to its
immediate previous time slot has been further explored.
Using different dimensions of our model framework discussed above, we propose the following
research questions in order to investigate collaboration networks‟ co-evolutionary adaptive
behaviour formulated by (Gross & Blasius, 2008): dynamics of networks (the topology of the
network changes in time according to specific, often local, rules); and dynamics on networks (the
topology of the network remains static while the states of the nodes change dynamically).
Do positions (roles) of existing actors in their collaboration network associate with their future
attachment behavior?
If so, what is the most favorable position to attract more partners?
Does this phenomenon differ between a stable collaboration network and a dynamic complex
collaboration network?
s
k
r
o
w
t
e
N
n
o
s
c
i
m
a
n
y
D
Node
Structure (t1)
Node
Structure (t2)
Node
Structure (tn)
attachment rules
attachment rules
attachment rules
Network
Topology
(t1)
Network
Topology
(t2)
Dynamics of Networks
Network
Topology
(tn)
Figure 1: A co-evolutionary dynamic model
Providing answers for these questions helps us to understand the selection mechanisms of network
evolution during the evolution of networks. Such understanding can help researchers, decision
makers and practitioners to reach their goals. In particular the findings could help to identify the
behavioral attachment patterns particularly identifying which characteristic(s) of existing actors
more attract new actors or cause new actors attach to them (to evaluate the selection mechanism).
Thus the following questions arise:
What are the logics of actors for their attachment behavior during the evolution of a network?
(How do actors choose links during their collaboration network evolution?)
Do the complexity and dynamicity of the collaboration networks affect the actors‟ logics of
attachment?
Which attachment logic is the best driver of network evolution in each case of (stable or
dynamic) the collaboration network?
Answering these questions helps us to check if different attachment logics (e.g., homophily,
preferential attachment, embedding, and multi-connectivity) change network topologies. And if
they do, what is the effect of each one on the network structural change. The findings help to
determine how the topology of the network changes in time according to actors‟ attachment logics,
which is useful in investigating the retention mechanism by analyzing dynamics of networks. It
further assists in finding attributes of the network topology which remains static while the states of
the actors change over time representative by evaluating the variation mechanism by investigating
dynamics on networks.
Social Networks Research Design, Data Collection and Analysis
In order to answer these research questions, we extract two types of collaboration networks
(academic and disaster) from the datasets, which have been normalized or our analysis. Then, we
apply social network analysis metrics to explore each and all network properties. Social network
metrics also help us to identify the parameters of our model. Subsequently, we use statistical
analysis to examine our hypotheses.
Network data is most commonly collected on relationships linking a set of social units on a single
type of relationship and is most often represented in a matrix X={xi,j} where xi,j is the strength from
unit i to unit j (Papachristos, 2006; Wigand, 1988). Data on social networks can be collected for all
links (whole network data) or for the sets of links surrounding a specified social entity (ego-network
data) (Marsden, 1990). The socio-centric network approach identifies structural patterns of
interaction in a network but the ego-centric network approach helps to understand the social
structure of the ego (Abbasi, Chung, & Hossain, 2012; Chung, 2009). Network data can come from
“questionnaires, archives, observations, diaries, electronic traces and experiments” (Marsden,
1990). Survey and questionnaires are the most widely used method followed by archival resources
(Marsden, 1990). In surveys (questionnaires) respondents are usually asked to identify their contacts
for a specific type of relationship. Thus respondents self-report their network. Archive resources
could from social network systems (e.g., Facebook, Linkedin, google+), online games, forums in
which the people‟s interaction log shows who is connecting to whom. Also, text reports of
interactions especially during an emergency response event such as newspaper reports on the
responding organizations to disasters (e.g., Hurricanes in USA, Fire in Australia) are other types of
archival resources for which some text mining techniques are needed to extract network data.
Academic Collaboration Network Data
In an academic collaboration network, nodes are referred as authors and ties (links) are co-
authorship relations among them. A tie exists between each two authors (scholars) if they have at
least one co-authored publication. In general, scientific collaboration (co-authorship) networks can
be represented as a graph. The nodes (actors, vertices) of the graph represent authors and the links
(ties, edges) between each two nodes indicate a co-authorship relationship between them. The
weights of links denote the number of publications that two authors (co-authors) have jointly
published.
Academic collaboration networks are complex types of social networks since both the numbers of
authors (nodes) and co-authorship links among them are growing over time. Additionally, the
structure of the network (the way the authors are connected) and the positions of authors in the
network may vary over time. Analysis of the attachment behaviour of authors (as nodes) in terms of
the nodes‟ positional properties may help to explore the dynamics of structural change and
evolutionary behaviour in scientific collaboration networks. Scopus1 is one of the main widely used
and authorized sources (in addition to ISI Web of Knowledge2) which store bibliometric data. It has
an advanced search engine to look for publications based on a variety of combinations of fields. In
the search results, it shows the number citations each publication has received. To construct our
database, we extract publications which “information science” phrase has been used in their titles or
keywords or abstracts by restricting to only the journal publications written in English. Indeed, the
publications extracted cannot be considered as representing the world production in the field of
“information science” but it illustrates a good portion of publications in this field that do not have
limitation to a specific sub-field, conference, journal, institutions and country.
After extracting the publications meta-data, we used an application program, AcaSoNet, (Abbasi &
Altmann, 2010) for extracting publication information (i.e. title, publication date, author names,
affiliations, publisher, number of citations, etc.). It also extracts relationships (e.g., co-authorships)
between authors and finally stores the data in the format of tables in its local database. Different
types of information were extracted from each publication meta-data: publications information (i.e.
title, publication date, journal name, etc.); and authors‟ names and affiliations (including country
and institution names). As we are interested in different macro and micro level analysis (i.e. country
and institution), affiliation data is so important for our research. Exploring our originally extracted
data, we found affiliation information messy, as there were several fields missing for some of the
1 www.scopus.com.
2 apps.isiknowledge.com
publications and also differently written names for the country of origin and institutions. Thus, in
our second step, we did some manual checking (using Google) to fill some missing fields (e.g.,
country) using other existing fields mainly the institution's name. We also tried to manually merge
the institutions which had different written formats in our originally extracted dataset. After the
cleansing of the publication data, the resulting database contained 4,579 publications reflecting the
contributions of 10,130 authors and 22,962 co-authorships from 3,196 different institutions (i.e.
universities and private companies) from 99 countries. All publications together received 49,154
citations.
Disaster Coordination Network Data
During emergency and disaster situations individuals from different agencies cooperate to properly
respond to the incident collectively. Inevitably, participants need to interact, communicate and
cooperate with each other through the use of sharing information and experience, reporting and
briefings, requesting resources and so on. Therefore, coordination network shapes, including
agencies or participants from different organizations (agencies) as actors and their communication
(interaction), represent the links or ties among actors in order to respond to the emergency.
Coordinating activities or tasks in a complex system during a disaster for effective response is one
of the most important issues to protect human, natural lives as well as from infrastructure damage.
Therefore, a deep understanding of inter-organizational response network structure and the process
of locating information flow and exchange is necessary in optimizing the response networks. This
helps emergency managers and policy makers in making better informed decisions.
In 2009, the State of Victoria (Australia) experienced severe bush fires during February 2009.
Although several agencies warned of the continuing fire threat and the forecast of extreme
conditions for 6 and 7 February but “Conditions prevailing in the State on 7 February were
unparalleled in Australia‟s history” (Clelland, Livermore, & Button, 2009). The 2009 Victorian
Bushfires Royal Commission was established on 16 February 2009 to investigate the causes and
responses to the bushfires which swept through parts of Victoria in late January and February 2009.
The data used in this research comes from content analysis by reviewing Victorian Bushfires Royal
Commission situation reports after the February 7, 2009 (Black Saturday). Royal Commission
situation
reports were made
available
to
the public
and
are
retrievable
from
http://www.royalcommission.vic.gov.au. The Kilmore East Fire (which was actually a group of
separate fires) started on February 7. The Kilmore East Fire that ignited on 7 February 2009 was
extraordinary and unprecedented. It was the fire with the most severe damages and fatalities. In all
Kilmore East Fires, “119 people died and 1,242 homes were destroyed. The combined area burnt by
the Murrindindi and Kilmore East fires, which later merged, was 168,542 hectares. The Kilmore
East Fire alone burnt 125,383 hectares” (Government, 2009).
During the data collection process, we first reviewed the brief reports on the Kilmore East Fire.
Then, identifying key participants mainly in the Incident Management Teams (IMTs) such as
Incident Controller (IC) and its deputy (DIC), Planning Officers (PO), etc. involved in the
emergency response network, we looked for these individuals‟ statements in the Royal Commission
dataset. From the result of the content analyses of the 2009 Kilmore East Fire, we identified the
main key actors involved in the response, and the support management mainly in the incident
management team. Then, the statements of each key actor were extracted again searching the Royal
Commission dataset. Applying content analyses on the key players‟ statements, their interactions
were documented. Finally, 104 distinct actors and 286 interactions among them were extracted.
We have used UCINET (Borgatti, Everett, & Freeman, 2002), a social network analysis software
program, to analyze the coordination network and its actors. UCINET is a comprehensive, well-
accepted and long-standing program for the analysis of social networks. The program contains
several network analysis routines (e.g., centrality measures, cohesion measures, positional analysis
algorithms, and cliques), and general statistical and multivariate analysis tools (Borgatti et al.,
2002).
Testing and Evaluation
Preliminary analysis of the data related to its distribution and potential relationships amongst
variables needs to be considered. This can be done using descriptive statistics, histograms,
normality tests and scatter plots. For normally distributed data, statistical tests examining
relationships amongst variables such as Pearson‟s correlations can be used. However, if the data
distribution is not normal, then non-parametric tests such as Spearman‟s rank correlation test should
be applied. In order to answer the research hypotheses, the collaboration network data should be
transferred to a matrix format such that we can apply mathematical analysis and metrics. Therefore,
the social network analysis measures (e.g., individual centrality measures, network centralizations,
network density, and network clustering coefficient) can be used in order to quantify individuals
(actors) and networks properties and structural attributes.
Characteristics of the Collaboration Networks Data
Figure 2 below depicts the number of actors (authors) and their respective collaborations‟ frequency
for academic collaboration networks (e.g., co-authorship networks of the Information Science
research community) between 2001 and 2010. Therefore, the academic collaboration network can
be regarded as a complex network in which the number of nodes and links in the networks is
growing rapidly over time. This may lead to rapid change of the network structure. Figure 3
llustrates an increasing trend of collaborations count, which is much faster than the increment of the
number of actors especially during the last periods. This highlights the existence of redundant links
among already connected actors during the evolution of the collaboration networks.
Figure 2: Academic collaboration network’s actors and collaboration cumulative frequency over time
Figure 3 presents the number of actors and their collaborations‟ frequency for the Kilmore Fire
disaster collaboration networks evolution over time. It shows that the disaster collaboration network
is a complex network with the number of nodes and links in the networks growing over time, which
leads to a change in the network structure. The disaster collaboration network growth over time
shows an increasing trend of collaborations count, which is much faster than the increment of
number of actors especially during the last periods. This highlights the existence of redundant links
among already connected actors during the evolution of the collaboration networks.
Figure 3: Disaster collaboration networks actors and collaboration cumulative frequency over time
Small-World Properties of the Collaboration Networks
It has been discussed earlier that most of the real-worlds networks have common properties (i.e. low
density, high clustering, small diameter, and scale-free structure), which have also been called
„small-word properties‟ (Watts & Strogatz, 1998). In order to test the common properties of
academic collaboration networks, these properties have been measured over ten years between 2001
and 2010. Cumulative numbers of authors (nodes) and links over time are used. For instance, the
2005 academic collaboration network statistics reported in Table 1 consist of all the authors (and
their links) of the papers published between 2001 and 2005. Table 1 indicates the small-world
property measures for each year. The results show that the academic collaboration network‟s
density is very low for each period and is decreasing over time from 0.5% in 2001 to 0% in 2006,
which remain unchanged over time. In addition, the results indicate that the academic collaboration
network‟s clustering coefficient is high and remains almost constant with very small fluctuations
between minimum of 0.72 at 2003 and maximum of 0.79 in the first year.
Table 1: Academic collaboration network statistics and measures over time
# of Actors
# of Links
2001
2002
2003
2004
2005
2006
2007
2008
2009
20010
818
1466
2168
3220
4005
5320
6623
7992
9021
10130
1571
2859
3792
6409
8307
10852
14334
17435
20259
22962
Sum of Links
1580
2903
3849
6513
8476
11040
14568
17735
20985
23730
Density (%)
Clustering Coefficient
Diameter
0.5
.79
3
0.3
.75
3
0.1
.72
3
0.1
.74
3
0.1
.74
3
0
0
0
0
0
.74
.74
.75
.76
.76
4
5
8
8
9
Average Distance
1.08
1.06
1.08
1.10
1.10
1.16
1.21
1.32
1.33
1.44
Degree Dist. Power-law λ
1.53
1.42
1.79
1.70
1.75
1.83
1.78
2.04
1.89
2.06
To examine the network diameter, the distance between each pair of nodes in the giant component
(the largest connected component) has been explored. As shown in Table 1, the academic
collaboration network‟s diameter is also very low but increases slowly over time (from 3 in 2001 to
9 in 2010) as the network grows. To consider a much-related concept, average distance between all
pairs of nodes is measured. The result indicates a very low distance among each pair of nodes that is
increasing slightly over time (from 1.08 in 2001 to 1.44 in 2010). Furthermore, the nodes degree
distributions are also calculated over time. Figure 4 depicts the academic collaboration networks‟
degree distributions for four points in time (i.e. 2000, 2005, 2007, and 2010). The result of degree
distributions implies that there are a few nodes with high degree but so many with low-degree
nodes. Thus, the degree distributions follow a power-law distribution especially when the networks
are larger (having more nodes and links).
T1
T1-T5
T1-T7
T1-T10
Figure 4: Academic collaboration network’s degree distribution
In order to find the power-law coefficient (λ) of the network, the log-log distribution of degree and
frequency for each year is drawn. Figure 5 depicts the academic collaboration networks‟ log-log
degree distributions of the same years depicted in Figure 4, including the power-law coefficient and
the explained variance R2. The R2 shows to what extent the linear function (the straight line) is
fitted, the higher the R2 values (i.e. those closer to one) the fitter the model. The power-law
coefficient of the academic collaboration network is calculated for all years and shown in Table 1.
The result implies that it is increasing over time (by growth of the network) from 1.43 in 2001 to
2.06 in 2010 (1.43 < λ < 2.06), with a few small fluctuations, respectively.
T1
T1-T5
T1-T7
T1-T10
Figure 5: Academic collaboration network’s log-log degree distribution over time
In conclusion, the academic collaboration networks of the Information Science research community
has all the properties of small-world networks and can be considered a real small-world network
with the result of its structural analysis maybe being extendable for other real-networks who share
the common grounds of small-world properties.
Disaster Collaboration Networks’ Small-World Properties
Similar to academic collaboration networks, the common properties of disaster collaboration
networks (i.e. Kilmore Fire collaboration network) have been tested by measuring the properties of
the disaster collaboration network. During the first day of the Kilmore Fire incident (February 7,
2009), 286 interactions among 104 distinct actors, individual people indicating the inter-personal
cooperation (collaboration) network in response to the incident, is extracted.
The extracted interactions are mainly the ones for the day of the incident (7 February 2009) up to
midnight in addition to some interaction prior to the incident day, during the preparedness phase, as
the fire was forecasted due to hot weather and lack of humidity. To transfer the interaction data to
longitudinal data for investigating the evolution of the network over time and to evaluate dynamic
structural changes of the network, four important time points are used to make four consecutive
periods (durations) expressing the evolution of the network during the disaster. The first point in
time is at 11:50 (7 February) that the fire ignited. So, the first period (duration) contains any day
before starting the fire (preparedness phase). The second point in time is 13:05 (7 February), when
the Kilmore Fire station became the Incident Control Center (ICC). The third point in time is about
16:00 (7 February) that the Kilmore Incident Controller (IC) was replaced with a new IC. The last
point in time is around mid-night (00:00, 8 February) as most of the logs and reports were available
up to midnight). Table 2 shows the Kilmore Fire disaster interpersonal collaboration network
statistics over time including a distinct number of actors (nodes), the number of interactions
(number of links) and network properties (density, clustering coefficients, diameter, average path,
degree distribution‟s power-law coefficient average degree and network centralization measures)
for each period.
Table 2: Disaster collaboration network statistics and measures
# of Actors
# of Links
Sum of Links
Density (%)
Clustering Coefficient
Diameter
Average Distance
Degree Dist. Power-law λ
T1
43
46
73
8.08
.07
5
2.60
1.12
T1-T2
T1-T3
T1-T4
58
86
153
9.26
.20
5
2.77
1.17
76
115
213
98
153
286
7.47
6.02
.17
5
2.94
1.07
.17
5
2.93
1.11
The results show that the disaster collaboration network‟s density is very low for each period.
This means that the interpersonal response networks in all durations are rather sparse. The second
duration network has the densest structure but the density of the network structure is decreasing
over time.
In addition, these results indicate that the disaster collaboration network clustering coefficient is
also low but contrary to network density, which shows increase over time from 0.07 to 0.17. This
demonstrates the lack of many clusters (group of highly connected actors) in the disaster
collaboration network and its growth during the response phase to the incident. As shown in Table
2, the disaster collaboration network‟s diameter is also very low and fixed at five for all periods.
Moreover, average distance between all pairs of nodes is measured. The results show a very low
distance among each pair of nodes (on average) which is increasing very slightly over time from
2.60 at T1 to 2.93 at T1-T4. Figure 6 depicts the disaster collaboration networks‟ degree
distributions of four time periods. As shown, disaster collaboration networks follow a power-law
distribution especially when the networks are larger. This means that there are few actors (nodes)
having many connections (high degree) and there are many low-degree actors.
T1
T1-T3
T1-T2
T1-T4
Figure 6: Kilmore Fire disaster collaboration network degree distribution over time
The log-log distribution of degree and frequency of each network is drawn for each period to
calculate the power-law coefficient of the networks‟ degree distribution. Figure 7 depicts the
disaster collaboration networks‟ log-log degree distributions of four time periods. The power-law
coefficients of all periods are also reported in Table 2. The results indicate that the disaster
collaboration degree distribution power-law coefficients show a moderate increase for the second
period (T1-T2) and then decreasing over time during the third and fourth period. The disaster
collaboration power-law coefficient is between 1.07 and 1.17 (1.07 < λ < 1.17).
T1
T1-T2
T1-T3
T1-T4
Figure 7: Kilmore Fire disaster collaboration network log-log degree distribution
In conclusion, the results demonstrate that the Kilmore Fire disaster collaboration networks
represent a very sparse scale-free network structure with low diameter, although their clustering
coefficient is very low. Therefore, based on the literature, the Kilmore Fire disaster collaboration
network cannot be considered as a small-world network and the results for analyzing its structure
and evolution may not be applicable in other cases.
Conclusions
This study synthesized different theories and approaches on the evolution and adaptation of
complex networks from various fields for exploring the attachment behavior of actors in the
networks. The adaptation behavior of complex networks over time in spite of dynamic changes of
network structure, due to entrance of new actors and links to the network over time, are also
examined. First, the common properties of small-world networks are examined on the two sample
collaboration networks used in this study. The results show that the academic collaboration network
(i.e. co-authorship networks of scholars in the field of Information Science) is very sparse and
highly clustered with low diameter and actors‟ degree distribution has a scale-free structure.
Therefore, the results of its networks analysis may be applicable to other complex networks which
have similar common properties (Watts & Strogatz 1998). But the Kilmore Fire disaster
collaboration network, as a representation of a network in a dynamic and complex environment,
cannot be considered as small-world networks as its clustering is low.
Then, in light of the analyzing mechanism of (network) evolution (i.e. selection, retention and
variation), the attachment behavior of actors are investigated to find whether attributes of actors
attract more actors to attach to them. In other words, the attributes of actors which impact on the
fitness function that other actors use to select them for attachment (in the selection process) is
evaluated. To do this, actors‟ different logics of attachment are examined on two sample
collaboration networks. The results of the longitudinal analysis supported the existence of at least
three of them for both collaboration networks. Multi-connectivity (having divers partners),
homophily (having partners with similar connectivity) and preferential attachment (having tendency
to authors who have high betweenness centrality (Abbasi, Hossain, & Leydesdorff, 2012)) have
been found having impact on the link formation (attachment) of authors in the academic
collaboration network over time. On the other hand, multi-connectivity, preferential attachment and
embedding (weakly) found to have effects on actors‟ attachment in the disaster collaboration
network. Then to investigate the retention mechanism of the networks, the dynamic of networks is
tested to see how the topology of the network changes in time according to actors‟ attachment
logics. Actors‟ log-log degree distribution‟s exponent (λ), Pearson degree correlation, average
strength, and actors‟ average neighbors‟ degree are used as proxies for preferential attachment,
homophily, embedding and multi-connectivity, respectively.
Correlation tests between the networks topology (measured by network centralization) and the
actors‟ attachment logics are applied to identify which attachment logic leads to higher network
topology change. The result of the correlation test for the academic collaboration network indicates
actors‟ preferential attachment as the most influential driver of network topology changes. But
multi-connectivity is detected as the most effective driver of network topology changes in the
disaster collaboration network although other logics of attachment were found effective as well for
both networks. Finally, to evaluate the variation mechanism of networks, the dynamic on networks
is examined to see what attributes of the network topology remains static while the states of the
actors change over time. The results illustrate that the networks‟ clustering coefficients remain
almost static over the evolution of both networks while the network is expanding over time through
adding new actors and links to the networks.
References
1. Abbasi, A., & Altmann, J. 2010. A Social Network System for Analyzing Publication
Activities of Researchers. In T. J. Bastiaens, U. Baumol, & B. J. Kramer (Eds.), On
Collective Intelligence, Vol. 76: 49-61. Berlin: Springer-Verlag Berlin.
2. Abbasi, A., Altmann, J., & Hossain, L. 2011. Identifying the Effects of Co-Authorship
Networks on the Performance of Scholars: A Correlation and Regression Analysis of
Performance Measures and Social Network Analysis Measures. Journal of Informetrics,
5(4): 594-607.
3. Abbasi, A., Chung, K. S. K., & Hossain, L. 2012. Egocentric Analysis of Co-authorship
Network Structure, Position and Performance. Information Processing & Management,
48(4): 671-679.
4. Abbasi, A., Hossain, L., Hamra, J., & Owen, C. 2010. Social Networks Perspective of
Firefighters' Adaptive Behaviour and Coordination among Them. Paper presented at the
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social
Computing (CPSCom), China.
5. Abbasi, A., Hossain, L., & Leydesdorff, L. 2012. Betweenness Centrality as a Driver of
Preferential Attachment in the Evolution of Research Collaboration Networks. Journal of
Informetrics, 6(1): 403-412.
6. Abbasi, A., & Kapucu, N. 2012. Structural Dynamics of Organizations during the Evolution
of Interorganizational Networks in Disaster Response. Journal of Homeland Security and
Emergency Management, 9(1).
7. Barabási, A. L., & Albert, R. 1999. Emergence of scaling in random networks. Science,
286(5439): 509.
8. Barabási, A. L., Jeong, H., Néda, Z., Ravasz, E., Schubert, A., & Vicsek, T. 2002. Evolution
of the social network of scientific collaborations. Physica A: Statistical Mechanics and its
Applications, 311(3-4): 590-614.
9. Bordons, M., & Gómez, I. 2000. Collaboration networks in science. In B. Cronin, & H. B.
Atkins (Eds.), The web of knowledge: A Festschrift in honor of Eugene Garfield: 197-213.
Medford, NJ: Information Today.
10. Borgatti, S., Everett, M., & Freeman, L. 2002. Ucinet for windows: Software for social
network analysis (version 6). Harvard, MA: Analytic Technologies.
11. Chung, K. K. S. 2009. Understanding Attitudes towards Performance in Knowledge-
intensive Work: The Influence of Social Networks and ICT Use: University of Sydney.
12. Clelland, N., Livermore, G., & Button, C. 2009. Victorian Bushfires Royal Commission
Final Report: Submission on the Kilmore East Fire. Parliament of Victoria, Government
Printer for the State of Victoria.
13. Clippinger, J. H. 1999. Order form the Bottom Up: Complex Adaptive Systems and Their
Management. San Francisco: Jossey-Bass Publishers.
14. Comfort, L. K. 1999. Shared risk: Complex systems in seismic response: Pergamon.
15. Comfort, L. K., Ko, K., & Zagorecki, A. 2004. Coordination in rapidly evolving disaster
response systems. American Behavioral Scientist, 48(3): 295.
16. Crompton, R. P., & McAneney, K. J. 2008. Normalised Australian insured losses from
meteorological hazards: 1967-2006. Environmental Science & Policy, 11(5): 371-378.
17. Dwyer, I., & Owen, C. 2009. Emergency incident management: an evolving incident control
system framework. Journal of Pacific Rim Psychology, 3(2): 66-75.
18. Government, V. 2009. The Kilmore East Fire, Victorian Bushfires Royal Commission
Final Report, Vol. 1.
19. Gross, T., & Blasius, B. 2008. Adaptive coevolutionary networks: a review. Journal of the
Royal Society Interface, 5(20): 259.
20. Hara, N., Solomon, P., Kim, S. L., & Sonnenwald, D. H. 2003. An emerging view of
scientific collaboration: Scientists' perspectives on collaboration and factors that impact
collaboration. Journal of the American Society for Information Science and Technology,
54(10): 952-965.
21. Holland, J. H. 1993. Innovation in complex adaptive systems: Some mathematical sketches:
Working Paper 93-10-062, Santa Fe Institute, Santa Fe, NM.
22. Hossain, L., & Kuti, M. 2010. Disaster response preparedness coordination through social
networks. Disasters: 755-786.
23. Kapucu, N. 2004. Coordinating without hierarchy: Public-nonprofit partnerships. Journal of
China National School of Administration, 1.
24. Kapucu, N. 2005. Interorganizational coordination in dynamic context: Networks in
emergency response management. Connections, 26(2): 33-48.
25. Kauffman, S. A. 1993. The origins of order: Self organization and selection in evolution:
Oxford University Press, USA.
26. Marsden, P. V. 1990. Network data and measurement. Annual review of sociology: 435-
463.
27. Mendonça, D., Beroggi, G. E. G., & Wallace, W. A. 2001. Decision support for
improvisation during emergency response operations. Int. J. Emergency Management,
1(1).
28. Milojevi , S. 2010. Modes of collaboration in modern science: Beyond power laws and
preferential attachment. Journal of the American Society for Information Science and
Technology, 61(7): 1410-1423.
29. Munich Re Group. 2005. Annual review: natural catastrophes 2004.
30. Newman, M. E. J. 2001. Clustering and preferential attachment in growing networks.
Physical review E, 64(2): 025102.
31. Papachristos, A. V. 2006. Social network analysis and gang research: Theory and methods.
Studying youth gangs: 99-116.
32. Scott, W. R. 1998. Organizations: Rational, natural, and open systems: Prentice hall
Upper Saddle River, NJ.
33. Shrum, W., Genuth, J., & Chompalov, I. 2007. Structures of scientific collaboration: the
mIt Press.
34. Swiss Reinsurance Company. 2006. Natural catastrophes and man-made disasters 2005:
high earthquake casualties, new dimension in windstorm losses., Vol. Sigma No. 2, Zurich.
35. Van Borkulo, E., Scholten, H., Zllatanova, S., & van den Brink, A. 2005. Decision making
in response and relief phases.
36. Waldrop, M. M. 1992. Complexity: The emerging science at the edge of order and chaos.
New York.
37. Watts, D., & Strogatz, S. 1998. Small world. Nature, 393: 440-442.
38. Waugh, W. 2003. Terrorism, homeland security and the national emergency management
network. Public Organization Review, 3(4): 373-385.
39. Weick, K. E. 2001. Making sense of the organization: Wiley-Blackwell.
40. Wigand, R. T. (1988). Communication Network Analysis: A History and Overview. In
(eds.), Handbook of Organizational
Gerald Goldhaber and George Barnett
Communication. Norwood, NJ: Ablex, 319 358.
|
1702.01452 | 1 | 1702 | 2017-02-05T21:09:25 | Towards Optimal Strategy for Adaptive Probing in Incomplete Networks | [
"cs.SI",
"physics.soc-ph"
] | We investigate a graph probing problem in which an agent has only an incomplete view $G' \subsetneq G$ of the network and wishes to explore the network with least effort. In each step, the agent selects a node $u$ in $G'$ to probe. After probing $u$, the agent gains the information about $u$ and its neighbors. All the neighbors of $u$ become \emph{observed} and are \emph{probable} in the subsequent steps (if they have not been probed). What is the best probing strategy to maximize the number of nodes explored in $k$ probes? This problem serves as a fundamental component for other decision-making problems in incomplete networks such as information harvesting in social networks, network crawling, network security, and viral marketing with incomplete information.
While there are a few methods proposed for the problem, none can perform consistently well across different network types. In this paper, we establish a strong (in)approximability for the problem, proving that no algorithm can guarantees finite approximation ratio unless P=NP. On the bright side, we design learning frameworks to capture the best probing strategies for individual network. Our extensive experiments suggest that our framework can learn efficient probing strategies that \emph{consistently} outperform previous heuristics and metric-based approaches. | cs.SI | cs | Towards Optimal Strategy for Adaptive Probing in Incomplete Networks
Tri P. Nguyen, Hung T. Nguyen and Thang N. Dinh∗
probed, all neighbors v ∈ G of u will be observed and can
be probed in the following steps. Given a budget k, the agent
wishes to identify k nodes from G(cid:48) to probe to maximize the
number of newly observed nodes.
7
1
0
2
b
e
F
5
]
I
S
.
s
c
[
1
v
2
5
4
1
0
.
2
0
7
1
:
v
i
X
r
a
Abstract
We investigate a graph probing problem in which an agent has
only an incomplete view G(cid:48) (cid:40) G of the network and wishes
to explore the network with least effort.
In each step, the agent
selects a node u in G(cid:48) to probe. After probing u, the agent gains
the information about u and its neighbors. All the neighbors of
u become observed and are probable in the subsequent steps (if
they have not been probed). What is the best probing strategy to
maximize the number of nodes explored in k probes? This problem
serves as a fundamental component for other decision-making
problems in incomplete networks such as information harvesting
in social networks, network crawling, network security, and viral
marketing with incomplete information.
While there are a few methods proposed for the problem, none
can perform consistently well across different network types. In this
paper, we establish a strong (in)approximability for the problem,
proving that no algorithm can guarantees finite approximation ratio
unless P=NP. On the bright side, we design learning frameworks to
capture the best probing strategies for individual network. Our ex-
tensive experiments suggest that our framework can learn efficient
probing strategies that consistently outperform previous heuristics
and metric-based approaches.
1 Introduction
In many real-world networks, complete network topology is
almost intractable to acquire, thus, most decisions are made
based on incomplete networks. The impossibility to obtain
complete network may stem from various sources: 1) the
extreme size of the networks, e.g., Facebook, Twitter with
billions of users and connections or the Internet spanning
the whole planet, 2) privacy or security concerns, e.g., in
Online social networks, we may not be able to see users'
connections due to their own privacy settings to protect them
from unwelcoming guests, 3) being hidden or undercover,
e.g., terrorist networks in which only a small fraction is
exposed and the rest is anonymous.
To support decision making processes based on local
view and expand our observations of the networks, we inves-
tigate a network exploring problem, called Graph Probing
Maximization (GPM). In GPM, an agent is provided with
an incomplete network G(cid:48) which is a subnetwork of an un-
derlying real-world network G (cid:41) G(cid:48) and wants to explore
G swiftly through node probing. Once a node u ∈ G(cid:48) is
∗Computer Science Department, Virginia Commonwealth University.
Email: {trinpm,hungnt,tndinh}@vcu.edu
Real-world applications of GPM includes exploring ter-
rorist networks to help in the planning of dismantling the
network. Given an incomplete adversarial network, each sus-
pect node can be "probed", e.g., getting court orders for com-
munication record, to reveal further suspects. In cybersecu-
rity on Online social networks (OSNs), intelligent attackers
can gather users' information by sending friend requests to
users [1]. Understanding the attacker strategies is critical in
coming up with effective hardening policies. Another ex-
ample is in viral marketing, from a partial observation of the
network, a good probing strategy for new customers can lead
to exploration of potential product sales.
While several heuristics are proposed for GPM [2, 3, 4,
5], they share two main drawbacks. First, they all consider
selecting nodes in one batch. We argue that this strategy is
ineffective as the information gained from probing nodes is
not used in making the selection as shown recently [6, 7].
Secondly, they are metric-based methods which use a single
measure to make decisions. However, real-world networks
have diverse characteristics, such as different power-law de-
gree distributions and a wide range of clustering coefficients.
Thus, the proposed heuristics may be effective for particular
classes of networks, but perform poorly for the others.
In this paper, we first formulate the Graph Probing Max-
imization and theoretically prove the strong inapproximabil-
ity result that finding the optimal strategy based on local in-
complete network cannot be approximated within any finite
factor. That means no polynomial time algorithm to approx-
imate the optimal strategy within any finite multiplicative er-
ror. On the bright side, we design a novel machine learn-
ing framework that takes the local information, e.g., node
centric indicators, as input and predict the best sequence of
k node probing to maximize the observed augmented net-
work. We take into account a common scenario that there
is available a reference network, e.g., past exposed terrorist
networks when investigating an emerging one, with similar
characteristics. Our framework learns a probing strategy by
simulating many subnetwork scenarios from reference graph
and learning the best strategy from those simulated samples.
The most difficulty in our machine learning framework
is that of find the best probing strategy in sampled subnet-
work scenarios from the reference network. That is how
to characterize the potential gain of a probable node in
long-term (into future probing). We term this subproblem
Topology-aware GPM (Tada-GPM) since both subnetwork
scenario and underlying reference network are available.
r+1 )-approximation algorithm
Therefore, we propose an ( 1
for this problem where r is the radius of the optimal solu-
tion. Here, the radius of a solution is defined to be the largest
distance from a selected node to the subnetwork. Our algo-
rithm looks far away to the future gain of selecting a node
and thus provides a nontrivial approximation guarantee. We
further propose an effective heuristic improvement and study
the optimal strategy by Integer Linear Programming.
Compared with metric-based methods with inconsistent
performance, our learning framework can easily adapt to net-
works in different traits. As a result, our experiments on real-
world networks in diverse disciplines confirm the superiority
of our methods through consistently outperforming around
20% the state-of-the-art methods.
Our contributions can be summarized as follows:
• We first formulate the Graph Probing Maximization
(GPM) and show that none of existing metric-based
methods consistently work well on different networks.
Indeed, we rigorously prove a strong hardness result of
GPM problem: inapproximable within any finite factor.
• We propose a novel machine learning framework which
looks into the future potential benefit of probing a node
to make the best decision.
• We experimentally show that our new approach signif-
icantly and consistently improves the performance of
the probing task compared to the current state-of-the-art
methods on a large set of diverse real-world networks.
Related works. Our work has a connection to the early
network crawling literature [8, 9, 10, 11]. The website
crawlers collect the public data and aim at finding the least
effort strategy to gain as much information as possible. The
common method to gather relevant and usable information is
following the hyperlinks and expanding the domain.
Later, with the creation and explosive growth of OSNs,
the attention was largely shifted to harvesting public infor-
mation on these networks [12, 13, 14]. Chau et al. [12] were
able to crawl approximately 11 million auction users on Ebay
by a parallel crawler. The record of successful crawling be-
longs to Kwak et al. [14] who gathered 41.7 million public
user profiles, 1.47 billion social relations and 106 million
tweets. However, these crawlers are limited to user public
information due to the privacy setting feature on OSNs that
protects private/updated data from unwelcoming users.
More recently, the new crawling technique of using
socialbots [15, 16, 17, 18, 19, 1] to friend the users and be
able to see their private information. Boshmaf et al. [15]
proposed to build a large scale Socialbots system to infiltrate
Facebook. The outcomes of their work are many-fold: they
were able to infiltrate Facebook with success rate of 80%;
there is a possibility of privacy breaches and the security
defense systems are not effective enough to prevent/stop
Socialbots. The works in [16, 17] focus on targeting a
specific organization on Online social networks by using
Socialbots to friend the organization's employees. As the
results, they succeed in discovering hidden nodes/edges and
achieving an acceptance rate of 50% to 70%.
Graph sampling and its applications have been widely
studied in literature. For instance, Kim and Leskovec [20]
study problem of inferring the unobserved parts of the net-
work. They address network completion problem: Given a
network with missing nodes and edges, how can ones com-
plete the missing part? Maiya and Berger-Wolf [21] propose
sampling method that can effectively be used to infer and
approximate community affiliation in the large network.
Most similar to our work, Soundarajan et al. propose
MaxOutProbe [3] probing method. MaxOutProbe estimates
degrees of nodes to decide which nodes should be probed
in partially observed network. This model shows better
performance as compared with probing approaches based
on node centralities (selecting nodes that have high degree
or low local clustering). However, through experiments, we
observe that MaxOutProbe's performance is still worst than
the one that ranks nodes based on PageRank or Betweeness.
The probing process can be seen as a diffusion of
deception in the network. Thus, it is related to the vast
literature in cascading processes in the network [22, 23, 24,
25].
Organization: The rest of this paper is divided into
five main sections. Section 2 presents the studied problem
and the hardness results. We propose our approximation
algorithm and machine learning model in Section 3. Our
comprehensive experiments are presented in Section 4 and
followed by conclusion in Section 5.
2 Problem Definitions and Hardness
We abstract the underlying network using an undirected
graph G = (V, E) where V and E are the sets of nodes
and edges. G is not completely observed, instead a subgraph
G(cid:48) = (V (cid:48), E(cid:48)) of G is seen with V (cid:48) ⊆ V , E(cid:48) ⊆ E. Nodes in
G can be divided into three disjoint sets: V f , V p and V u as
illustrated in Fig. 1.
• Black/Fully observed nodes: V f contains fully ob-
served nodes (probed) meaning all of their connections
are revealed. That is if u ∈ V f and (u, v) ∈ E then
(u, v) ∈ E(cid:48).
• Gray/Partially observed nodes: V p contains partially
observed nodes u that are adjacent to at least one fully
probed node in V f and u /∈ V f . Only the connections
Figure 1: Incomplete view G(cid:48) (shaded region) of an underly-
ing network G. Nodes in G(cid:48) are partitioned into two disjoint
subsets: black nodes in V f which are fully observed and the
gray nodes in V p which are only partially observed. Nodes
outside of G(cid:48) are colored white
between u ∈ V p and nodes in V f are observed while
the others to unobserved nodes are hidden. Therefore,
those nodes u ∈ V p become the only candidates for
discovering unobserved nodes. Note that V (cid:48) = V f ∪
V p.
• White/Unobserved nodes: V u = V \ V (cid:48) consists of
unobserved nodes. The nodes in V u have no connection
to any node in V f but may be connected with nodes in
V p.
Node probing: At each step, we select a candidate gray
node u ∈ V p to probe. Once probed, all the neighbors
of u in G and the corresponding edges are revealed. That
is u becomes a fully observed black node and each white
neighbor node v ∈ V u of u becomes gray and is also
available to probe in the subsequent steps. We call the
resulted graph after probing augmented graph and use the
same notation G(cid:48) when the context is clear. The main goal of
ada-GPM is to increase the size of G(cid:48) as much as possible.
Probing budget k: In addition to the subgraph G(cid:48), a
budget k is given as the number of nodes we can probe. This
budget k may resemble the effort/cost that can be spent on
probing. Given this budget k, our probing problem becomes
selecting at most connected k nodes that maximizes the size
of augmented G(cid:48). Alternatively, we want to maximize the
number of newly observed nodes.
We call our problem Graph Probing Maximization
(GPM). There is a crucial consideration at this point: Should
we select k node at once or we should distribute the allowed
budget in multiple steps? The answer to this question leads to
two different interesting versions: Non-Adaptive and Adap-
tive. We focus on the adaptive problem.
DEFINITION 2.1. (ADAPTIVE GPM (ADA-GPM)) Given
an incomplete subnetwork G(cid:48) of G and a budget k, the
Adaptive Graph Probing Maximization problem asks for k
partially probed nodes in k consecutive steps that maximizes
the number of newly observed nodes in G(cid:48) at the end.
In our ada-GPM problem, at each step, a node is
selected subject to observing the outcomes of all previous
probing. This is in contrast to the non-adaptive version
which asks to make k selections from the initial V p at
once. Thus, the adaptive probing manner is intuitively more
effective than the non-adaptive counterparts. However, it
is also considerably more challenging compared to non-
adaptivity due to the vastly expanded search space.
Table 1: Highest performance (Perf.) metric-based methods.
GnuTella
Top 5
Perf.
Collaboration
Perf.
Top 5
Road
Top 5
Perf.
CLC
BC
CC
PR
DEG
2471
2341
1999
1994
1958
BC
PR
CC
CLC
DEG
2937
2108
2085
2061
2048
CLC
DEG
BC
PR
CC
358
346
346
342
326
2.1 Hardness and Inapproximability.
2.1.1 Empirical Observations. We show the inconsis-
tency in terms of probing performance of metric-based meth-
ods,
i.e., clustering coefficient (CLC), betweenness cen-
trality (BC), closeness centrality (CC), Pagerank (PR), lo-
cal degree (DEG), MaxOutProbe [3] and random (RAND),
through experiments on 3 real-world networks, i.e., Gnutella,
Co-authorship and Road networks (see Sec. 4 for a detailed
description). Our results are shown in Fig. 1. From the fig-
ure, we see that the performance of metric-based methods
varies significantly on different networks and none of them
is consistently better than the others. For example, clustering
coefficient-based method exhibits best results on Gnutella
but very bad in Collaboration networks. On road networks,
all methods seem to be comparable in performance.
Inapproximability Result. Here, we provide the
2.1.2
hardness results of the ada-GPM problem. Our stronger
result of inapproximability is shown in the following.
THEOREM 1. ada-GPM problem on a partially observed
network cannot be approximated within any finite factor.
Here, the inapproximability is with respect to the optimal
solution obtained when the underlying network is known.
To see this, we construct classes of instances of the problems
that there is no approximation algorithm with finite factor.
Figure 2: Hardness illustration.
We construct a class of instances of the probing prob-
lems as illustrated in Figure 7a. Each instance in this class
has: a single fully probed node in black b1, n observed
nodes in gray each of which has an edge from b1 and one
of the observed nodes, namely g∗ varying between differ-
ent instances, having m connections to m unknown nodes
in white. Thus, the partially observed graph contains n + 1
nodes, one fully probed and n observed nodes which are se-
lectable, while the underlying graph has in total of n + m + 1
nodes. Each instance of the family has a different g∗ that m
unknown nodes are connected to. We now prove that in this
class, no algorithm can give a finite approximate solution for
the two problem.
First, we observe that for any k ≥ 1, the optimal solu-
tion which probes the nodes with connections to unknown
nodes has the optimal value of m newly explore nodes, de-
noted by OP T = m. Since any algorithm will not be aware
of the number of connections that each gray node has, it does
not know that g∗ leads to m unobserved nodes. Thus, the
chance that an algorithm selects g∗ is small and thus, can
perform arbitrarily bad. Our complete proof is presented in
the supplementary material.
3 Learning the Best Probing Strategy
Due to the hardness of ada-GPM that no polynomial time al-
gorithm with any finite approximation factor can be devised
unless P = N P , an efficient algorithm that provides good
guarantee on the solution quality in general case is unlikely
to be achievable. This section proposes our machine learn-
ing based framework to tackle the ada-GPM problem. Our
approach considers the cases that in addition to the probed
network, there is a reference network with similar character-
istics and can be used to derive a good strategy.
Designing such a machine learning framework is chal-
lenging due to three main reasons: 1) what should be selected
as learning samples, e.g., (incomplete) subgraphs or (gray)
nodes and how to generate them? (Subsec. 3.1); 2) what fea-
tures from incomplete subnetwork are useful for learning?
(Subsec. 3.2) and 3) how to assign labels to learning samples
to indicate the benefit of selecting that node in long-term,
i.e., to account for future probes?(Subsec. 3.2).
Figure 3: Learning Framework
Overview. The general framework, which is depicted in
Figure 3, contains four steps: 1) Graph sampling which gen-
erates many subnetworks from Gr where each subnetwork
is a sampled incomplete network with black, gray and white
nodes; each candidate gray node in each sampled subnet-
work creates a data point in our training data; 2) Data label-
ing which labels each gray node with their long-term probing
benefit; 3) Training a model to learn the probing benefit of
nodes from the features and 4) Probing the targeted network
guided by the trained machine learning model.
1, G(cid:48)
2, ...G(cid:48)
3.1 Building Training Dataset. Given the reference net-
work Gr = (V r, Er), where V r is the set of n nodes and Er
is set of m edges. Let G = {G(cid:48)
K} be a collection
of subnetwork sampled from Gr. The size of sampled sub-
graph G(cid:48)
i is randomly drawn between 0.5% to 10% of the ref-
erence graph Gr following a power-law distribution. Given a
subnetwork size, the sample can be generated using different
mechanisms, e.g., Breadth-First-Search, Depth-First-Search
or Random Walk [21]. We use G to construct a training data
where each data point is a feature vector representing a can-
i, (1 ≤ i ≤ K), in
didate gray node. For each sample G(cid:48)
G, let V p
i, we compute all
G(cid:48)
the features for each node u ∈ V p
to form a data point.
G(cid:48)
i creates V p
training data points.
As such, each sample G(cid:48)
G(cid:48)
For assigning the label for each data point, we use our pro-
posed algorithm Tada-Probe, the heuristic improvement or
the ILP algorithm (presented in Subsec. 3.3).
be the set of gray nodes in G(cid:48)
i
i
i
3.2 Features for Learning. We select a rich set of intrin-
sic node features that only depend on the incomplete subnet-
work and will be embedded in our learning model. Table 2
shows a complete list of node features that we use in our
machine learning model.
Table 2: Set of features for learning
Factor
Description
Betweenness centrality score [26] of u in G(cid:48)
Closeness centrality score [26] of u in G(cid:48)
Eigenvalue centrality score [26] of u in G(cid:48)
Pagerank centrality score [26] of u in G(cid:48)
Katz centrality score [26] of u in G(cid:48)
Clustering coefficient score of u in G(cid:48)
Degree of u in G(cid:48)
BC
CC
EIG
P R
Katz
CLC
DEG
BN um Number of black nodes in G(cid:48)
GN um Number of gray nodes in G(cid:48)
BDeg
BEdg
Total degree of black nodes in G(cid:48)
Number of edges between black nodes in G(cid:48)
1
r+1-Approximation Algorithm for Tada-GPM.
3.3 An 1
r+1-optimal strategy for Tada-GPM
We first propose an
to probe a sampled subnetwork of the reference network,
where r, called radius, is the largest distance from a node in
the optimal solution to the initially observed network. This
algorithm assigns labels for the training data.
An intuitive strategy, called Naive Greedy, is to select
node with highest number of connections to unseen nodes.
Training Data…𝑮𝒓𝑮𝟏′𝑮𝟐′𝑮𝑲′Graph SamplingData LabelingTraining𝑮′ProbingTrained ModelUnfortunately, this strategy can be shown to perform arbi-
trarily bad by a simple example. The example includes a
fully probed node having a connection to a degree-2 node,
which is a bridge to a huge component which is not reach-
able from the other nodes, and many other connections to
higher degree nodes. Thus, the Naive Greedy will not select
the degree-2 node and never reach the huge component.
Our algorithm is inspired by a recent theoretical result
for solving the Connected Maximum Coverage (Connected
Max-Cover) problem in [27]. The Connected Max-Cover
assumes a set of elements I, a graph G = (V, E) and
a budget k. Each node v ∈ V associates with a subset
Pv ⊆ I. The problem asks for a connected subgraph g
with at most k nodes of G that maximizes ∪v∈gPv. The
proposed algorithm in [27] sequentially selects nodes with
highest ratio of newly covered nodes to the length of the
shortest path from observed nodes and is proved to obtain
an
e−1
(2e−1)r -approximation factor.
Algorithm 1 Tada-Probe Approximation Algorithm
Input: The reference network G = (V, E), a sampled subnetwork
G(cid:48) = (V (cid:48), E(cid:48)) and a budget k.
Output: Augmented graph of G(cid:48).
1: Collapse all fully observed nodes to a single root node R
2: i = 0
3: while i < k do
4:
5:
6:
7:
8: end while
9: return G(cid:48) = (V (cid:48), E(cid:48))
O(v)\V (cid:48)
vmax ← maxv∈V \V f ,P
V f (v)≤k−i
V f (v)
P
Probe all the nodes v ∈ PV f (vmax)
Update V (cid:48), V f , V p, V u and E(cid:48) accordingly
i = i + PV f (vmax)
Each node in a network can be viewed as associated
with a set of connected nodes. We desire to select k
connected nodes to maximize the union of k associated
sets. However, different from Connected Max-Cover in
which any connected subgraph is a feasible solution, Tada-
GPM requires the k selected nodes to be connected from
the fully observed nodes V f . Thus, we analogously put
another constraint of connectivity to a fixed set of nodes
on the returned solution and that adds a layer of difficulty.
Interestingly, we show that rooting from observed nodes and
greedily adding nodes in the same manner as [27] gives an
r+1-approximate solution. Additionally, our analysis leads
to a better approximation result for Connected Max-Cover
e−1
since
(2e−1)r < 1
Let denote O(v) to be the set of nodes that v is con-
nected to, i.e., O(v) = {u(v, u) ∈ E} and PV f (v) be the
set of nodes on the shortest path from nodes in V f to v. For
a set of nodes S, we call f (S) the number of newly discov-
ered nodes by probing S. Hence, f (S) is our objective func-
tion. Our approximation algorithm, namely Topology-aware
Adaptive Probing (Tada-Probe), is described in Alg. 1.
2.58·r < 1
r+1.
1
The algorithm starts by collapsing all fully observed
nodes in G(cid:48) into a single root node R which serves as the
starting point. It iterates till all k alloted budget have been
exhausted into selecting nodes (Line 3). In each iteration,
it selects a node vmax ∈ V \V f within distance k − i
having maximum ratio of the number of unobserved nodes
O(v)\V (cid:48) to the length of shortest path from nodes in V f
to v (Line 4). Afterwards, all the nodes on the shortest path
from V f to vmax are probed (Line 5) and the incomplete
graph is updated accordingly (Line 6).
The approximation guarantee of Tada-Probe is stated
in the following theorem.
THEOREM 2. Tada-Probe returns an
r+1 -approximate
probing strategy for Tada-GPM problem where r is the ra-
dius of the optimal solution.
1
1, v∗
2, . . . , v∗
Proof. Let denote the solution returned by Tada-Probe
S and an optimal solution S∗ = {v∗
k} which
results in the maximum number of newly discovered nodes,
denoted by OP T . We assume that both S and S∗ contain
exactly k nodes since adding more nodes never gives worse
solutions. We call the number of additional unobserved
nodes discovered by S(cid:48) in addition to that of S, denoted by
∆S(S(cid:48)), the marginal benefit of S(cid:48) with respect to S. For a
single node v, ∆S(v) = ∆S({v}). In addition, the ratio of
the marginal benefit to the distance from the set S to a node
v, called benefit ratio, is denoted by δS(v) = ∆S (v)
PS (v).
Since in each iteration of Tada-Probe, we add all the
nodes along the shortest path connecting V f to vmax, we
assume that t ≤ k iterations are performed.
In iteration
i ≥ 0, node vi
max is selected to probe and, up to that
iteration, Si nodes have been selected so far.
Due to the greedy selection, we have, ∀i ≥ 1,∀v ∈
Si\Si−1,∀v∗ ∈ S∗,
(3.1)
δSi−1 (vi
(3.4)
δSi−1(v∗
j )
The left hand side is actually f ( S) which is sum of marginal
benefit over all iterations. The other is the sum of benefit
ratios over all the nodes in the optimal solution S∗ with
respect to sets Si−1, where 0 ≤ i ≤ k − 1, which are subsets
of S. Thus, ∀i, j,
max) ≥ δSi−1 (v∗)
Si(cid:88)
(3.2)
Thus, we obtain,
PSi−1 (vi
or, equivalently,
(3.3)
∆Si−1(vi
max) ≥
max) · δSi−1 (vi
max) ≥
Si(cid:88)
max) ≥ t(cid:88)
j=Si−1
∆Si−1(vi
Si(cid:88)
t(cid:88)
i=1
i=1
j=Si−1
Adding Eq. 3.3 over all iterations gives,
δSi−1(v∗
j )
j=Si−1
δSi−1 (v∗
j )
r
j )
(3.5)
(3.6)
t(cid:88)
δSi−1 (v∗
j ) ≥ δ S(v∗
Si(cid:88)
Then, the right hand side is,
Notice that ∆ S(v∗
j ) is the marginal benefit of node v∗
t(cid:88)
respect to set S, hence, the summation itself becomes,
j ) ≥ ∆ S(v∗
j ) ≥ ∆ S(v∗
j )
P S(v∗
j ) ≥ t(cid:88)
Si(cid:88)
∆ S(v∗
j )
r
k(cid:88)
δSi−1 (v∗
Si(cid:88)
j=Si−1
j=Si−1
i=1
i=1
∆ S(v∗
j ) =
∆ S(v∗
i=1
j=Si−1
j=1
j ) = f (S∗) − f ( S)
= OP T − f ( S)
j with
Thus, Eq. 3.4 is reduced to,
f ( S) ≥ OP T − f ( S)
(3.7)
Rearranging the above equation, we get,
r
(3.8)
which completes our proof.
f ( S) ≥ OP T
r + 1
1
the
Heuristic. Despite
3.3.1 Improved
r+1-
approximation guarantee, Tada-Probe algorithm only
considers the gain of ending node in a shortest path and
completely ignores the on-the-way benefit. That is the
newly observed nodes discovered when probing the inter-
mediate nodes on the shortest paths are neglected in making
decisions. Thus, we can improve Tada-Probe by counting
all the newly observed nodes along the connecting paths
which are not necessarily the shortest paths and the selection
criteria of taking the path with largest benefit ratio is applied.
Since the selected path of nodes has the benefit ratio of at
least as high as that of considering only the ending nodes,
the 1
r+1-approximation factor is preserved.
Following that idea, we propose a Dijkstra based algo-
rithm to select the path with maximum benefit ratio. We as-
sign for each node u a benefit ratio δ(u), a distance measure
d(u) and a benefit value ∆(u). Our algorithm iteratively se-
lects a node u with highest benefit ratio and propagates the
distance and benefit to its neighbors: if neighbor node v ob-
serves that by going through v, u's benefit ratio gets higher,
v will update its variables to have u as the direct predecessor.
Our algorithm finds the path with highest benefit ratio.
Note that extra care needs to be taken in our algorithm
to avoid having loops in the computed paths. The loops
normally do not appear since closing a loop only increases
the distance by one while having the same benefit of the
path. However, in extreme cases where a path passes through
a node with exceptionally high number of connections to
unobserved nodes, loops may happen. To void having loops,
we check whether updating a new path will close a loop by
storing the predecessor of each node and traverse back until
reaching a fully observed node.
3.3.2 Optimal ILP Algorithm. To study the optimal so-
lution for our Tada-GPM problem when topology is avail-
able, we present our Integer Linear Programming formula-
tion. Hence, We can use a convenient off-the-shelf solver,
e.g., Cplex, Gurobi, to find an optimal solution. Unfor-
tunately, Integer Linear Programming is not polynomially
solvable and thus, extremely time-consuming.
In the prior step, we also collapse all fully probed nodes
into a single node r and have connections from r to partially
observed nodes. Assume that there are n nodes including r,
for each u ∈ V , we define yu ∈ {0, 1},∀u ∈ V such that,
(cid:40)
yu =
1
0
if node u is observed,
otherwise.
(cid:40)
Since at most k nodes are selected adaptively, we can view
the solution as a tree with at most k layers. Thus, we define
xuj ∈ {0, 1},∀u ∈ V, j = 1..k such that,
1
0
xuj =
if node u is selected at layer j or earlier,
otherwise.
The Tada-GPM problem selects at most k nodes,
i.e.,
u∈V xuk ≤ k to maximize the number of newly observed
u∈V yu. A node is observed if at least one of
v∈N (u) xvk where
N (u) denotes the set of u's neighbors. Since r is the initially
fully observed nodes, we have xr0 = 1. Furthermore, u can
be selected at layer j if at least one of its neighbors has been
(cid:80)
nodes, i.e.,(cid:80)
its neighbors is selected meaning yu ≤(cid:80)
probed and thus, xuj ≤(cid:80)
(cid:88)
Our formulation is summarized as follows,
v∈N (u) xv(j−1).
yu − N (r) − 1
u ∈ V, u (cid:54)= r
(3.9)
s.t.
max
u∈V
xr0 = 1, xu0 = 0,
(cid:88)
yu ≤ (cid:88)
u∈V
xuk ≤ k
v∈N (u)
xvk,
∀u ∈ V,
(cid:88)
∀u ∈ V, j = 0..k − 1,
xuj ≤ xu(j+1),
xuj ≤ xu(j−1) +
xuj, yu ∈ {0, 1},∀u ∈ V, j = 0..k.
v∈N (u)
xv(j−1), ∀u ∈ V, j = 1..k,
From the solution of the above ILP program, we obtain
the solution for our Tada-GPM instance by simply selecting
nodes u that xuk = 1. Note that the layering scheme in our
formulation guarantees both the connectivity of the returned
solution and containing root node r and thus, the returned
solution is feasible and optimal.
THEOREM 3. The solution of the ILP program in Eq. 3.9
infers the optimal solution of our Tada-GPM.
Table 3: Statistics for the networks used in our experiments.
ACC stands for Average Clustering Coefficient. Bold and
underlined networks are used for training.
Name
Network Type
Roadnw-CA Road
21k
Roadnw-OL Road
6k
Roadnw-TG Road
18k
p2p (GnuTella)
GnuTella04
11k
GnuTella05
p2p
9k
GnuTella09 p2p
8k
Collaboration (CA) 5k
Ca-GrQc
Collaboration
Ca-HepPh
12k
Ca-HepTh
Collaboration
10k
Ca-CondMat Collaboration
23k
Ca-AstroPh Collaboration
18k
#Node #Edges ACC
7.10−5
0.01
0.018
0.006
0.007
0.009
0.529
0.611
0.471
0.633
0.630
21k
7k
23k
40k
32k
26k
14k
118k
26k
93k
198k
network includes several snapshots of GnuTella network
with nodes represent hosts in GnuTella network topology
and edges represent connections between hosts.
In the
third type, we use five collaboration networks that cover
scientific collaborations between authors papers in which
nodes represent scientists, edges represent collaborations.
The last type of network models metabolic pathways which
are linked series of chemical reactions occurring in cell.
Table 4: Number of new explored nodes at budget k = 300
from all implemented probing methods in all datasets.
XXXXXXXXX
Methods
Dataset GnuTella Net. CA Net. Road Net.
CLC
BC
DEG
CC
PR
RAND
MaxOutProbe
2471
2341
1958
1999
1994
2381
1820
3098
5052
3471
3547
3639
2911
902
358
346
346
326
342
329
28
Sampling Methods. We adopt the Breadth-First Search
sampling [21] to generate subgraphs for our experiments.
In our regression model, for each network that is marked
for training in Table 3, we generate samples with number
of nodes varies from 0.5% to 10% number of nodes in G.
The size distribution of the subgraphs follows a power law
distribution with power-exponent γ = −1/4. The size of
subgraphs used in validation is kept to be roughly 5% of the
network size.
Probing Methods. We compare performance of our
linear regression (LinReg) and logistic regression (LogReg)
probing method with MaxOutProbe[3], RAND (probe a
random gray node), and centrality-based methods DEG,
Figure 4: Performance of different algorithms
3.3.3 Empirical Evaluation. Here, we compare the prob-
ing performance in terms of the number of newly probed
nodes that different algorithms deliver on a Facebook ego
network1 with 347 nodes and 5029 edges. The results are
presented in Fig. 4. The figure shows that our Heuristic im-
provement very often meets the optimal performance of the
ILP algorithm while Tada-Probe is just below the former two
methods. However, the naive Greedy algorithm performs
badly due to having no guarantee on solution quality.
3.4 Training Models. We consider two classes of well-
studied machine learning models. First, linear regression
model is applied to learn a linear combination of features
characterized by coefficients. These coefficients learn a
linear representation of the dependence of labels on the
features. The output of training phase of linear regression
model is a function fLin(.) which will be used to estimate
u of probing a node u in subgraph G(cid:48). It is noted
the gain wo
that we learn fLin(.) from sampled graph G(cid:48)
i of the reference
graph Gr and use fLin(.) to probe the incomplete G(cid:48).
u, wo
Secondly, we consider logistic regression to our problem
v be the gain of probing the two nodes
as follow: Let wo
u and v respectively. Given a pair of nodes < u, v > in
V p
, our logistic model fLog(.) learns to predict whether wo
G(cid:48)
u
i in G, we compute node
is larger than wo
features of each node u ∈ V p
G(cid:48)
nodes for each subgraph G(cid:48)
i and then concatenate features of
two nodes in a pair to form a single data point. Each data
point < u, v > is labeled by binary value (1 or 0):
. We generate(cid:0)V p
(cid:1) pairs of
v. Thus, for each G(cid:48)
Gi
2
i
i
(cid:40)
if wo
if wo
u ≥ wo
v;
u < wo
v.
1
0
(3.10)
l =
4 Experiments
In this section, we perform experiments on real-world net-
works to evaluate performance of the proposed methods.
Datasets. Table 3 describes three types of real-world
networks used in our experiments. The road network [28,
29] includes edges connecting different points of interest
(gas stations, restaurants) in cites. The second type of
1http://snap.stanford.edu/data/egonets-Facebook.html
0 100 200 300 0 2 4 6 8 10# Newly Probed NodesBudget (k)Optimal ILPTada-HeuristicTada-ProbeGreedy(a) GnuTella Network
(b) Collaboration Network
(c) Road Network
Figure 5: Performance Comparison of Base Case Machine Learning (h = 1) with Metric-based and Heuristic Approaches.
(a) GnuTella Network
(b) Collaboration Network
(c) Road Network
Figure 6: Performance of Machine Learning Method with Further Looking Ahead and Other Probing Methods.
BC, CC, PR, CLC (see table 2) that probe the node with
the highest centrality value in each step. Each considered
method has different objective function for selecting nodes
to probe. Sharing the same idea, all of these methods rank
nodes in set V p of G(cid:48), and select the nodes with highest
ranking to probe first.
Performance Metrics. For each probing method, we
conduct probing at budgets k ∈ {1, 100, 200, 300}. During
probing process, we compare performance among probing
methods using newly explored nodes, i.e., the increase in
the number of nodes in G(cid:48) after k probes. For each of the
network used in the validation, we report the average results
over 50 subgraphs. For obvious reason, we do not use the
training network for validation.
We use statistical programming language R to imple-
ment MaxOutProbe and use C++ with igraph framework
to implement LinReg, LogReg and metric-based probing
methods. All of our experiments are run on a Linux server
with a 2.30GHz Intel(R) Xeon(R) CPU and 64GB memory.
In Fig. 5, we take top 3 metric-based methods in each
type of network and compare their performance with Lin-
Reg and LogReg. Here, both machine learning methods
are trained by using the benefit of node in only 1-step ahead
(h = 1, i.e., setting k = 1 in Alg. 1). Their probing perfor-
mance outperforms metric-based methods in GnuTella net-
work 20% on average. They match performance of other
methods in Road network and are 7% worse than BC in Col-
laboration network. The experiment with MaxOutProbe in
Road network faces the problem of non-adaptive behavior of
MaxOutProbe: V p of Road network's samples is smaller
than maximal budget k, besides, due to the very low density
property of Road network, after probing V p nodes in sam-
pled networks MaxOutProbe explores only few new nodes
in underlying network; these factors lead to very poor per-
formance of MaxOutProbe. MaxOutProbe also performs
poorly as compared with adaptive implementation of metric
based methods: It is 67%, and 36% worse than LinReg in
Collaboration, GnuTella network respectively.
4.1 Comparison between Machine Learning Methods
and Metric-based Probing Methods. Table 4 presents
probing performance of metric-based methods in each group
of networks with the best one is highlighted. Reported re-
sult is the number of explored nodes at the end of probing
process (k = 300).
4.2 Benefits of Looking Into Future Gain. For LinReg
and LogReg, we use different functions trained by different
labels (marked as h = 1, h = 2, h = 3, h = 4 , which
indicates regression functions are trained with benefits of
node in 1-step, 2-step, 3-step or 4-step ahead). In Fig. 6,
we evaluate LinReg and LogReg with RAND and the best
0 1000 2000 30001100200300#Newly Explored NodesBudget (k)LinRegLogRegCLCBCCCMax. 0 1000 2000 30001100200300#Newly Explored NodesBudget (k)BCLinRegLogRegPRCCMax. 0 150 300 4501100200300#Newly Explored NodesBudget (k)CLCLogRegBCLinRegDEGMax.119102126100145146147132137137138134121h=1h=2h=3h=4h=1h=2h=3h=4100125150BCCCCLCDEGLinRegLinRegLinRegLinRegLogRegLogRegLogRegLogRegRANDProportion to Node Degree Centrality (%)14310210310013315215413812312012011894.9h=1h=2h=3h=4h=1h=2h=3h=4100125150BCCCCLCDEGLinRegLinRegLinRegLinRegLogRegLogRegLogRegLogRegRANDProportion to Node Degree Centrality (%)10010310010099105106951021021019795h=1h=2h=3h=4h=1h=2h=3h=49095100105110BCCCCLCDEGLinRegLinRegLinRegLinRegLogRegLogRegLogRegLogRegRANDProportion to Node Degree Centrality (%)metric-based methods for each type of network reported in
Table 4. We use of DEG as baseline for our performance
comparison. Specifically, we take the ratio of number of
newly explored nodes of each probing method to number
of newly explored nodes of DEG at the end of probing
process. We omit result of MaxOutProbe due to its poor
performance observed from previous subsection.
LinReg shows consecutive improvement in probing per-
formance with h = 1, h = 2, h = 3 as it ranks candidate
nodes in set V p based on their predicted gain at increasing
number of hops far away from them. Overall, LinReg has
better performance than LogReg. The h = 3 of LinReg and
LogReg outperforms DEG from 12% to 15% in Collabo-
ration and GnuTella network. The result observed for Road
network is from 1% to 5%. LinReg with h = 3 outperforms
the best metric-based method in GnuTella network 11.6%;
the improvement for Collaboration and Road network are
7.5%, 2.2% respectively. The h = 4 of LinReg and Lo-
gReg starts decreasing compared with h = 1, h = 2 and
h = 3. This indicates the benefit of looking further benefits
of selecting a node is true within specific number of hops far
away from nodes.
Among metric-based methods, while BC consistently
performs well, the best method varies across the networks.
It indicates the underlying network structure impacts perfor-
mance of metric-based method and it is hard to determine
which node centrality method is the best for which type
of network. Interestingly, performance of random probing
matches or even outperforms BC, DEG, CC in GnuTella
networks. It is because GnuTella networks have low aver-
age clustering coefficient that makes BFS-based samples of
these networks have star structure. Consequently, metric-
based methods tend to rank candidate nodes in sampled net-
work with same score. This helps random probing performs
better than metric-based methods in this type of network.
5 Conclusion
This paper studies the Graph Probing Maximization problem
which serves as a fundamental component in many decision
making problems. We first prove that the problem is not
only NP-hard but also cannot be approximated within any
finite factor. We then propose a novel machine learning
framework to adaptively learn the best probing strategy in
any individual network. The superior performance of our
method over metric-based algorithms is shown by a set of
comprehensive experiments on many real-world networks.
References
[1] H. T. Nguyen and T. N. Dinh, "Targeted cyber-attacks: Un-
veiling target reconnaissance strategy via social networks," in
INFOCOM WKSHPS, pp. -- , IEEE, 2016.
[2] K. Avrachenkov, P. Basu, G. Neglia, B. Ribeiro, and
D. Towsley, "Pay few, influence most: Online myopic net-
work covering," in INFOCOM WKSHPS, pp. 813 -- 818, IEEE,
2014.
[3] S. Soundarajan, T. Eliassi-Rad, B. Gallagher, and A. Pinar,
"Maxoutprobe: An algorithm for increasing the size of par-
tially observed networks," NIPS, 2015.
[4] S. Hanneke and E. P. Xing, "Network completion and survey
sampling.," in AISTATS, pp. 209 -- 215, 2009.
[5] F. Masrour, I. Barjesteh, R. Forsati, A. Esfahanian, and
H. Radha, "Network completion with node similarity: A
matrix completion approach with provable guarantees," in
ASONAM, pp. 302 -- 307, IEEE, 2015.
[6] D. Golovin and A. Krause, "Adaptive submodularity: A new
approach to active learning and stochastic optimization.," in
COLT, pp. 333 -- 345, 2010.
[7] L. Seeman and Y. Singer, "Adaptive seeding in social net-
works," in FOCS, pp. 459 -- 468, IEEE, 2013.
[8] J. Cho, H. Garcia-Molina, and L. Page, "Efficient crawling
through url ordering," 1998.
[9] S. Chakrabarti, Mining the Web: Discovering knowledge from
hypertext data. Elsevier, 2002.
[10] M. Ester, H.-P. Kriegel, and M. Schubert, "Accurate and
efficient crawling for relevant websites," in VLDB, pp. 396 --
407, VLDB Endowment, 2004.
[11] S. Chakrabarti, M. Van den Berg, and B. Dom, "Focused
crawling: a new approach to topic-specific web resource
discovery," Computer Networks, vol. 31, no. 11, pp. 1623 --
1640, 1999.
[12] D. H. Chau, S. Pandit, S. Wang, and C. Faloutsos, "Parallel
crawling for online social networks," in WWW, pp. 1283 --
1284, ACM, 2007.
[13] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and
B. Bhattacharjee, "Measurement and analysis of online social
networks," in SIGCOMM, pp. 29 -- 42, ACM, 2007.
[14] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter,
a social network or a news media?," in WWW, pp. 591 -- 600,
ACM, 2010.
[15] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu,
"Key challenges in defending against malicious socialbots,"
in USENIX, 2012.
[16] A. Elishar, M. Fire, D. Kagan, and Y. Elovici, "Organizational
intrusion: Organization mining using socialbots," in SocialIn-
formatics, pp. 7 -- 12, IEEE, 2012.
[17] A. Elyashar, M. Fire, D. Kagan, and Y. Elovici, "Homing
socialbots:
intrusion on a specific organization's employee
using socialbots," in ASONAM, pp. 1358 -- 1365, ACM, 2013.
[18] M. Fire, R. Goldschmidt, and Y. Elovici, "Online social
networks: Threats and solutions," Communications Surveys
& Tutorials, IEEE, vol. 16, no. 4, pp. 2019 -- 2036, 2014.
[19] A. Paradise, A. Shabtai, and R. Puzis, "Hunting organization-
targeted socialbots," in ASONAM, pp. 537 -- 540, ACM, 2015.
[20] M. Kim and J. Leskovec, "The network completion problem:
Inferring missing nodes and edges in networks.," in SDM,
vol. 11, pp. 47 -- 58, SIAM, 2011.
[21] A. S. Maiya and T. Y. Berger-Wolf, "Sampling community
structure," in WWW, pp. 701 -- 710, ACM, 2010.
[22] N. P. Nguyen, Y. Xuan, and M. T. Thai, "A novel method
for worm containment on dynamic social networks," in
Military Communications Conference, 2010-MILCOM 2010,
pp. 2180 -- 2185, IEEE, 2010.
[23] T. N. Dinh, D. T. Nguyen, and M. T. Thai, "Cheap, easy, and
massively effective viral marketing in social networks: truth
or fiction?," in Proceedings of the 23rd ACM conference on
Hypertext and social media, pp. 165 -- 174, ACM, 2012.
[24] N. P. Nguyen, T. N. Dinh, D. T. Nguyen, and M. T. Thai,
"Overlapping community structures and their detection on
social networks," in Privacy, Security, Risk and Trust (PAS-
SAT) and 2011 IEEE Third Inernational Conference on So-
cial Computing (SocialCom), 2011 IEEE Third International
Conference on, pp. 35 -- 40, IEEE, 2011.
[25] T. N. Dinh, H. Zhang, D. T. Nguyen, and M. T. Thai,
"Cost-effective viral marketing for time-critical campaigns
in large-scale social networks," IEEE/ACM Transactions on
Networking, vol. 22, no. 6, pp. 2001 -- 2011, 2014.
[26] M. Newman, Networks: an introduction. OUP Oxford, 2010.
[27] F. Vandin, E. Upfal, and B. J. Raphael, "Algorithms for
detecting significantly mutated pathways in cancer," J. Comp.
Biol., vol. 18, no. 3, pp. 507 -- 522, 2011.
[28] F. Li, D. Cheng, M. Hadjieleftheriou, G. Kollios, and S.-
H. Teng, "On trip planning queries in spatial databases," in
SSTD, pp. 273 -- 290, Springer, 2005.
[29] T. Brinkhoff, "A framework for generating network-based
moving objects," GeoInformatica, vol. 6, no. 2, pp. 153 -- 180,
2002.
Supplementary Material for 'Towards Optimal Strategy
for Adaptive Probing in Incomplete Networks'
Complete proof of Theorem 1
Proof. To prove Theorem 1, we construct classes of in-
stances of the problems that there is no approximation al-
gorithm with finite factor.
(a) Without global degrees
(b) With global degrees
Figure 7: Hardness illustration on global node degrees.
We construct a class of instances of the probing prob-
lems as illustrated in Figure 7a. Each instance in this class
has: a single fully probed node in black b1, n observed
nodes in gray each of which has an edge from b1 and one
of the observed nodes, namely g∗ varying between differ-
ent instances, having m connections to m unknown nodes
in white. Thus, the partially observed graph contains n + 1
nodes, one fully probed and n observed nodes which are se-
lectable, while the underlying graph has in total of n + m + 1
nodes. Each instance of the family has a different g∗ that m
unknown nodes are connected to. We now prove that in this
class, no algorithm can give a finite approximate solution for
the two problem.
First, we observe that for any k ≥ 1, the optimal solu-
tion which probes the nodes with connections to unknown
nodes has the optimal value of m newly explore nodes, de-
noted by OP T = m. We sequentially examine two possible
cases of algorithms, i.e., deterministic and randomized.
• Consider a deterministic algorithm A, since the A is
unaware of the connections from gray to unknown
nodes, given a budget 1 ≤ k (cid:28) n, the lists or sequences
of nodes that A selects are exactly the same for different
instances of problems in the class. Thus, there are
instances that g∗ is not in the fixed list/sequence of
nodes selected by A.
In such cases, the number of
unknown nodes explored by A is 0. Compared to the
OP T = m, A is not a finite factor approximation
algorithm.
• Consider a randomized algorithm B, similarly to the de-
terministic algorithm A, B does not know the connec-
tions from the partially observed nodes to white ones.
Thus, the randomized algorithm B essentially selects at
random k nodes out of n observed nodes. However, this
randomized scheme does not guarantee to select g∗ as
one of its selected nodes and thus, in many situations,
the number of unknown nodes discovered is 0 that inval-
idates B to be a finite factor approximation algorithm.
In average, B has k
n chance of selecting g∗ which leads
to an optimal solutions with OP T = m. Hence, the
n and the ratio with optimal value
objective value is km
n. Since k (cid:28) n, we can say that the ratio is O( 1
is k
n )
which is not finite in the average case for randomized
algorithm B.
In both cases of deterministic and randomized algorithms,
there is no finite factor approximation algorithm for ada-
GPM or batch-GPM.
|
1608.00142 | 1 | 1608 | 2016-07-30T16:41:58 | Identifying vital edges in Chinese air route network via memetic algorithm | [
"cs.SI",
"physics.soc-ph"
] | Due to its rapid development in the past decade, air transportation system has attracted considerable research attention from diverse communities. While most of the previous studies focused on airline networks, here we systematically explore the robustness of the Chinese air route network, and identify the vital edges which form the backbone of Chinese air transportation system. Specifically, we employ a memetic algorithm to minimize the network robustness after removing certain edges hence the solution of this model is the set of vital edges. Counterintuitively, our results show that the most vital edges are not necessarily the edges of highest topological importance, for which we provide an extensive explanation from the microscope of view. Our findings also offer new insights to understanding and optimizing other real-world network systems. | cs.SI | cs | Identifying vital edges in Chinese air route network via
memetic algorithm
Wen-Bo Dua,b, Bo-Yuan Lianga,b, Gang Yanc, Oriol Lordand, Xian-Bin Caoa,b*
aSchool of Electronic and Information Engineering, BeihangUniversity, Beijing 100191, P.R.China
bBeijing Key Laboratory for Network-based Cooperative Air Traffic Management, Beijing 100191,
c School of Physics Science and Engineering, Tongji University, Shanghai 200092, P. R. China
dUniversitat Politècnica de Catalunya-BarcelonaTech, C/Colom no. 11, Terrassa 08222, Spain
P.R.China
Abstract
Due to its rapid development in the past decade, air transportation system has attracted considerable research
attention from diverse communities. While most of the previous studies focused on airline networks, here we
systematically explore the robustness of the Chinese air route network, and identify the vital edges which form the
backbone of Chinese air transportation system. Specifically, we employ a memetic algorithm to minimize the
network robustness after removing certain edges hence the solution of this model is the set of vital edges.
Counterintuitively, our results show that the most vital edges are not necessarily the edges of highest topological
importance, for which we provide an extensive explanation from the microscope of view. Our findings also offer
new insights to understanding and optimizing other real-world network systems.
Keywords: vital edges; air route network; memetic optimization.
1. Introduction1
With the increasing people and goods transport demand during the accelerating globalization
process, the air transportation system plays a more and more important role than ever before due to its
high-speed and high-security advantages. For example, the air transport volume of China grows at an
average annual speed of over 10% in the past decades, and now it possesses over one seventh of the
total comprehensive transport volume (including roadways, railways, shipping and air transport), which
was only 7.9% in 2000. Hence the air transportation system has been drawing much attention from
different research communities. One of the most interesting directions is to analyze the structure and
function of air transportation systems within the framework of complex network theory.
The air transportation system can be represented as a network, in which nodes denote airport and
an edge will be created if there is a direct flight between two airports. In the vast majority of previous
literature, the air transport network (ATN) was primarily classified into two scales: worldwide and
national.
For the worldwide scale, Amaral et al. firstly found worldwide ATN is a small-world network with
a power-law degree distribution, and the highest-degree airport is not necessarily the most central node,
prompting them to propose a network model where both geographical and political factors are taken
into account[1-2]. Barrat et al. investigated the worldwide ATN from a perspective of complex weighted
networks and found the nonlinear positive correlation between flight flow and topology properties[3-4].
They proposed a weighted network model, enlightening the understanding of weighted feature of
complex systems. Verma et al. decomposed the worldwide ATN into three distinct layers via k-core
decomposition and found that this network is robust to the removal of long distance edges, but fragile
to the disconnectivity of short and apparently insignificant edges[5-6].
For the national scale, ATNs of several major nations, such as US, Brazil, India and China, are
extensively studied[3, 7-11], and the national ATNs usually exhibit different features from the worldwide
ATN. Gautreau et al. studied US ATN during 1990–2000[3]. A remarkable result they presented is that
although most statistical properties are stationary, an intense activity takes place at the local level.
Fleurquin et al. proposed a delay propagation model via quantifying the network congestion for US
ATN, revealing that even under normal operating condition the systemic instability risk is
*Corresponding author. Tel.: +86-10-82314318
E-mail address: [email protected]
non-negligible[11]. Rocha investigated the Brazilian ATN during 1995-2006, and found that it shrank in
topology but grew in traffic volume [7]. Bagler et al. studied the Indian ATN, and found its signature of
hierarchy feature[12]. As the most active economy, the Chinese aviation industry ranks second to US in
the past decade and keeps a high increase rate. Consequently, Chinese ATN attracts continuous
attention in different aspects, from topology to dynamics and evolution [8-10, 13-14], one of which is to
investigate the backbone of ATN, the air route network (ARN).
ATN is actually a logic network with Origin-Destination (OD) relationships. In real air traffic
operation, a flight does not straightly fly from departure airport to landing airport, but along some air
route waypoints. ARN consists of air route waypoints and connections between them. In 2012, Cai et al.
firstly investigated the Chinese ARN[15] and found that the degree distribution of Chinese ARN is
homogeneous but the traffic flow on it is rather heterogeneous. Vitali et al then investigated the
horizontal deviation and delays in Italian ARN[16]. The analysis of ARN is quite a novelty in the
literature. However, the network robustness, which is an important issue for infrastructure systems[17]
and has been extensively studied in ATN [18-21] ,is still rare in ARN. In the typical network robustness
model, edges are removed by different targeted attack strategies and the size of giant component
estimates the robustness of the network[30]. When a small amount of edges are removed, the size of
giant component is of a very small change. In this paper, we focus on identifying the vital edges in
Chinese ARN by examining the robustness of the new network after removing an edge set via memetic
optimization. Remarkably, we find that the most vital edges are not necessarily the edges of highest
topological importance.
The rest of paper is organized as follows. In the next section we demonstrate Chinese air route
network and its basic properties. Section 3 describes the optimization model and the memetic
algorithm. Section 4 presents the simulation results and corresponding analysis. Finally, the paper is
concluded in Section 5.
2. Chinese air route network
The latest data of the Chinese air route network are provided by the Air Traffic Management
Bureau (ATMB) of China. In the Chinese ARN, airports or air route waypoints are nodes and edges are
represented by the air route segments. An air route waypoint is a navigation marker which keeps the
pilots informed about the desired track. In the air transportation system, the flights will fly along the air
route waypoints, but not directly fly from one airport to another (Fig.1). Figure 1 is an illustration of
ARN, where airlines are depicted by the dotted line and air route segments are denoted by the solid line.
Figure 2 shows the structure of the Chinese ARN, which contains 𝑁 = 1,499 nodes and 𝑀 = 2,242
edges.
In ref. [15], the authors found that the topology structure of the Chinese ARN is homogeneous, yet
its distribution of flight flow is quite heterogeneous. If we compare the Chinese ATN with the Chinese
ARN we found significant differences. On one hand, the Chinese ATN is a typical small-world with
low average shortest path length and large clustering coefficient. On the other hand, the Chinese ARN
is not a small-world network due its low clustering coefficient, large average shortest path length and
exponential spatial distance distribution.
Fig. 1 An illustration of ARN.
Air route waypointAir route segmentAirlineAirport AAirport BFig.2 The structure of the Chinese ARN. Here the Chinese ARN contains 𝑁 = 1,499 nodes and
𝑀 = 2,242 edges.
3. Model
3.1. Optimization Model
The static robustness of complex networks has been extensively studied in the past decades. In ref
[22], it is quantified by the relative size of the largest connected component 𝑮 = 𝑵′/𝑵, where 𝑵 is
the total number of nodes in initial network and 𝑵′ is the number of nodes in largest component after
attack. The larger value of 𝑮 represents a more robust network. Based on the largest connected
component, Schneider et al. proposed a measure 𝑹 to evaluate the robustness against targeted attack
on nodes[17].
𝑅 =
1
𝑁
𝑁
∑ 𝑠(𝑄)
𝑄=1
where 𝒔(𝑸) is the fraction of nodes in largest component after removing 𝑸 nodes. For calculating the
robustness of a network we will follow a degree adaptive strategy: the highest degree nodes will be
systematically remove one by one. It is a more comprehensive measure of network robustness.
Obviously, a network with higher R has a stronger resistance to targeted attacks.
In the Chinese ARN, the closure of air route segment will decrease the connectivity of the whole
network. It is of great significance to identify vital edges that lead to the vulnerability of ARN. In ref
[23], Freeman proposed a global metric edge-betweenness to measure the importance of an edge, which
can identify influential edges effectively. It is defined as follows,
𝐵𝐸(𝑖) = ∑
𝑗,𝑘∈𝑉,𝑗≠𝑘
𝑛𝑗𝑘(𝑖)
𝑛𝑗𝑘
where V is the set of nodes, and 𝒏𝒋𝒌(𝒊) denotes the number of shortest paths from j to k. 𝒏𝒋𝒌(𝒊)
denotes the number of shortest paths from j to k that via edge i.
In this work, we formulate a combinational optimization problem to identify the vital edges within
network robust model in the Chinese ARN. The objective is to minimize the network robustness after
removing certain edges, i.e. closing certain air route segments. Therefore, these edges play an important
role in maintaining network robustness. The optimization model is formulated as follows,
min 𝑅′(𝑥)
𝑥 = [𝑒(1), 𝑒(2), … , 𝑒(𝑉)]
𝑉
s. t. ∑ 𝑥𝑖
= 𝑐𝑜𝑠𝑡
where V is the total number of edges in the network and x is a V dimensional binary variable, 𝒆(𝒌) ∈
{𝟎, 𝟏} (𝒆(𝒌) represents the kth edge in the network). 𝒆(𝒌) = 𝟏 represents the edge 𝒆(𝒌) is removed,
𝑖=1
otherwise it remains in the network. The total number of removed edges is certain and denoted as cost
(C). So, we can identify critical edges in the network minimizing its robustness.
3.2. Memetic Algorithm
For solving this optimization model we will use the memetic algorithm (MA), a useful tool for
dealing with large-scale combinational problem[24-27]. Coming from the concept of meme, MA is
defined as a part of local improvement in the process of cultural evolution. It is a hybrid metaheuristic
of global search and heuristic local search with three operations: crossover, local search and tournament
selection.
Initialization
In MA, the population is composed of 𝑿𝒏 individuals. Each individual x represents a scheme of
removing edges in the network and was generated randomly.
Crossover
The crossover operator works on two parent individuals and can search in a large area. Suppose
that 𝒙𝒑𝟏 and 𝒙𝒑𝟐 are two parent individuals, and 𝒙𝒄𝟏 and 𝒙𝒄𝟐 are two child individuals. First, we
assign 𝒙𝒑𝟏 to 𝒙𝒄𝟏 and 𝒙𝒑𝟐 to 𝒙𝒄𝟐 and obtain the following sets of edges.
𝐸𝑐 = {𝑒𝑒 ∈ 𝑥𝑐1, 𝑒 ∈ 𝑥𝑐2}
𝐸𝑐1 = 𝑥𝑐1 − 𝐸𝑐
𝐸𝑐2 = 𝑥𝑐2 − 𝐸𝑐
In fact, 𝐸𝑐 is the set of common edges of 𝑥𝑐1 and 𝑥𝑐2. 𝐸𝑐1 and 𝐸𝑐2 are the set of edges of the
network after removing the common edges of 𝑥𝑐1 and 𝑥𝑐2. That is, 𝐸𝑐1 and 𝐸𝑐2 have the same
number of edges but completely different. Then, for each pair of edges in 𝐸𝑐1 and 𝐸𝑐2 we conduct
the following operations with the probability Pc.
𝑥𝑐1 = 𝑥𝑐1 − 𝐸𝑐1[𝑖] + 𝐸𝑐2[𝑖]
𝑥𝑐2 = 𝑥𝑐2 − 𝐸𝑐2[𝑖] + 𝐸𝑐1[𝑖]
Fig.3 An illustration of crossover process.
In summary, only the set of non-common edges we want to remove will be swapped between 𝒙𝒄𝟏
and 𝒙𝒄𝟐 (Fig. 3).
Local Search
The local search operator is an important part in MA that can accelerate the convergence speed.
Based on previous edge importance evaluations[28-29], we adopted a local search in the direction of
removing more important edges. We first select an individual from parent and child population using
the roulette wheel selection based on their fitness. Then for each edge of the selected individual we
conduct a local search with probability Pl. For example, edge 𝑒𝑖𝑗 (𝑒𝑖𝑗 represents the edge between
node i and node j) will mutate to a randomly selected existing edge 𝑒𝑙𝑚 but not in its individual. This
mutation will be accepted when the following formula is satisfied.
𝜇 ∙ 𝑘𝑙 − 𝑘𝑚 − 𝑘𝑖 − 𝑘𝑗 > 0
where 𝜇 is a formula parameter in the range [0,1] and 𝑘𝑙, 𝑘𝑚, 𝑘𝑖 and 𝑘𝑗 represents the degree of
nodes l, m, i and j respectively.
Tournament selection
Commone(i)e(i+1)... ...e(C-1)e(C)xc1Commone(i)e(i+1)... ...e(C-1)e(C)xc2swap with PcIn this part, two individuals are respectively chosen from parent population and child population
to run a tournament for the tournament selection. The population with the best fitness is selected for the
next generation, and the total number of generation is 𝑃𝑚.
To conclude, the pseudocode of MA proposed is presented as follows.
Table 1 The pseudocode of MA
Randomly selected two individual 𝑥𝑝𝑖 and 𝑥𝑝𝑗 that have not been selected.
If rd < 𝑝𝑐
end if
Assign parent 𝑥𝑝𝑖 and 𝑥𝑝𝑗 to child 𝑥𝑐𝑖 and 𝑥𝑐𝑗.
(𝑥𝑐𝑖, 𝑥𝑐𝑗) ←Crossover (𝑥𝑝𝑖, 𝑥𝑝𝑗).
Begin
Initialize 𝑃𝑛 individuals with randomly selected existing edges in network.
While g < 𝑃𝑚
Repeat
Until (all individuals have been selected)
For i = 1 to 2𝑃𝑛
Calculate the robustness of each individual in parent and child.
Pnext ← 2-Tournament Selection (Pparent, Pchild);
end while;
End
select an individual 𝑥𝑙 using the roulette wheel selection based on the fitness.
For each edge 𝑒𝑖𝑗 in individual 𝑥𝑙
end for
mutate with a new randomly selected edge 𝑒𝑙𝑚 but not in 𝑥𝑙.
if 𝜇 ∙ 𝑘𝑙 − 𝑘𝑚 − 𝑘𝑖 − 𝑘𝑗 > 0
end if
if rd < 𝑝𝑙
end if
Accept the local search.
4. Result
Here, in order to identify the vital edges, we examine the robustness of the new networks after
removing edges via memetic algorithm (MA), and compare it with the highest edge-betweenness
adaptive strategy (BEAS). To demonstrate the universality of our method, the experiments are carried
out on both Chinese ARN and the general Barabási- Albert (BA) scale-free network. The Chinese ARN
has 1,499 nodes and 2,242 edges. The BA scale-free network is generated with 𝑚0 nodes and a new
node is added with m edges at each time step, which connect the new node with m different existing
nodes. Here, it is set that 𝑚0 = 2 and 𝑚 = 2 and the BA network is of 1,000 nodes and 2,000
edges. The cost denoting total number of removing edges is set from 0 to 300 and the network without
edges removed represents the initial network. Table 2 shows the configurations of the memetic
algorithm parameters used on the optimization model.
𝑋𝑛
20
Table 2 The parameters of the memetic algorithm.
𝑃𝑐
0.8
𝑃𝑙
5/𝐶
μ
0.7
𝑃𝑚
500
Figure 4 shows the simulation results of the memetic algorithm (MA) and edge-betweenness
adaptive strategy (BEAS) of identifying the vital edges for the BA network and Chinese ARN. Looking
at both networks via MA, we can see that the robustness R decreases and the cost C increases when
removing edges. It can also be noticed that the MA is significantly better than the BEAS. The difference
between the two methods is especially high. It is obvious that the critical edges in the network are not
extremely related with the edge-betweenness. Moreover, the memetic algorithm works better in the
Chinese ARN decreasing its robustness R faster when a few edges are removed. That is because of the
Chinese ARN is not a small-world network. And the Chinese ARN is vulnerable because of its small
clustering coefficient and large average shortest path length.
Fig. 4 The robustness R as a function of the cost C of removing edges for (a) the Chinese
ARN and (b) the BA network.
We have seen that the memetic algorithm works on both Chinese ARN and BA network. In order
to reveal the underlying mechanism clearly, we examine a toy model with a network containing 10
nodes and 17 edges (Figure 5). In figure 5, the blue lines are the existing edges and gray dotted lines
are edges removed in that step. In the same way, the gray nodes mean that these nodes are removed and
yellow nodes still exist. When no edge is removed from the network as shown in Fig. 5(a), the
robustness of the initial network is 0.35. Here, three edges are removed to measure the criticality of
these edges using the MA and BEAS methods. Since edges 𝑒1,4, 𝑒2,7 and 𝑒4,9 have the highest edge
-betweenness in the network, they are removed in the BEAS (Fig.5(b)) and now we have a new network
named A. Similarly, edges 𝑒1,3, 𝑒4,9 and 𝑒7,9 are identified as the most important in the MA, and we
now have a new network B (Fig. 5(f)). For estimating which group of edges is critical, we compare the
robustness of network A and B (see Fig. 5(c-e) and Fig. 5(g-i)). Figure 6 illustrates the corresponding
solutions and the robustness of the solution for both methods.
In network A (BEAS) we first remove node 2 with the highest-degree together with all edges
connected with it: 𝑒2,3, 𝑒2,4, 𝑒2,5, 𝑒2,8 and 𝑒2,10. s(Q=1) of the new network is 0.9, which is the
fraction of nodes in the giant component after removing 1 node (fig.5(c)). However in network B (MA),
0501001502002503000.100.120.140.160501001502002503000.100.120.140.16 RC MA BEAS(a) RC MA BEAS(b)the value of s(Q=1) quickly decrease to 0.7 (fig.5(g)). Then, after the second nodes are removed,
s(Q=2) in both networks A and B are 0.4 and 0.3 respectively (fig.5(d) and fig.(h)), which is reduced to
0.4 and 0.2 after the third node is removed (fig.5(e) and fig.5(i)). At the end, all nodes are removed
from the network and the robustness of network A and B is 0.37 and 0.29 respectively. Thus, as
previous results pointed, the critical edges in the network are not extremely related to the
edge-betweenness, which apparently contradicts common intuitions.
Fig.5 An illustration of malicious attack process of the toy model with 10 nodes via MA and strategy.
Here in the network after removing Q nodes and the edges connected with them, N is the number of
nodes, M is the number of edges, s(Q) is the fraction of nodes in largest component.
Table 3 illustrates the corresponding solutions and the robustness of the solution to both methods
of the toy model in Fig.5. The results demonstrate that the most vital edges are not necessarily the edge
with highest topological importance. Thus these edges identified by MA are important for the network
robustness and should be protected to ensure the survivability of the network.
Table 3 An illustration of the vital edges identified by MA and BEAS.
N=10M=141245678910312456789103124567891031245678910314567891031456789103156789103156789103N=9M=9s(Q)=0.9Q=1N=8M=6s(Q)=0.4Q=2N=7M=4s(Q)=0.4Q=3N=7M=2s(Q)=0.2Q=3N=8M=4s(Q)=0.3Q=2N=9M=8s(Q)=0.7Q=1N=10M=14N=10M=1712456789103(a)(b)(f)(c)(g)(d)(h)(e)(i)MA
𝑒1,10
𝑒4,6, 𝑒5,6
𝑒1,3, 𝑒4,9, 𝑒7,9
𝑒2,5, 𝑒2,7, 𝑒7,9, 𝑒8,10
𝑒1,10, 𝑒4,9, 𝑒5,7, 𝑒7,9, 𝑒8,10
𝑒1,3, 𝑒1,10, 𝑒2,3, 𝑒2,5, 𝑒2,7, 𝑒7,9
R
0.33
0.32
0.29
0.27
0.24
0.24
BEAS
𝑒4,9
𝑒4,9, 𝑒1,4
𝑒4,9, 𝑒1,4, 𝑒2,7
𝑒4,9, 𝑒1,4, 𝑒2,7, 𝑒4,6
𝑒4,9, 𝑒1,4, 𝑒2,7, 𝑒4,6, 𝑒2,3
𝑒4,9, 𝑒1,4, 𝑒2,7, 𝑒4,6, 𝑒2,3, 𝑒4,8
R
0.35
0.35
0.37
0.36
0.35
0.34
C
1
2
3
4
5
6
5. Conclusion
It is of great importance to improve the robustness of real networks. In this paper, we identified
the vital edges in Chinese air route network, which lead to fast breakdown after targeted attacks. Our
results revealed that the edge-betweenness, an index to measure the importance of edges in short paths,
is of little relevance to this problem. Furthermore, we demonstrated that the memetic algorithm is able
to pinpoint the edges that have been proven more important than edges of high edge-betweenness. We
also confirmed these findings in scale-free model networks, hence offering novel insights of edge
essentiality in various real networks. Thus, we think the vital edges identified by memetic algorithm
should be especially protected to ensure a good performance of a network. In Chinese ARN this means
that air traffic managers should foresight complex solutions when considering the closure of one vital
air route segment.
Acknowledgement
This paper is supported by the National Natural Science Foundation of China (Grant Nos.
91538204, 61425014, 61521091), National Key Research and Development Program of China (Grant
No. 2016YFB1200100), and National Key Technology R&D Program of China (Grant No.
2015BAG15B01).
References
1. Amaral LAN, Scala A, Barthélémy M, Stanley HE. Classes of small-world networks. Proc Natl Acad
Sci. USA. 2000;97:11149-11152.
2. Guimerà R, Mossa S, Turtschi A, Amaral LAN. The worldwide air transportation network:
Anomalous centrality, community structure, and cities' global roles. Proc Natl Acad Sci.
USA.2005;102:7794-7799.
3. Barrat A, Barthélemy M, Pastor-Satorras R, Vespignani A. The architecture of complex weighted
networks. Proc Natl Acad Sci. USA.2004;101:3747-3752.
4. Gautreau A, Barrat A, Barthélemy M. Microdynamics in stationary complex networks. Proc Natl
Acad Sci. USA.2009;106:8847-8852.
5. Verma T, Araújo NAM, Herrmann HJ. Revealing the structure of the world airline network. Scientific
reports. 2014;4:5638.
6. Verma T, Russmann F, Araújo NAM, Nagler J, Herrmann HJ. Emergence of core–peripheries in
networks. Nature Commu. 2016;7:10441.
7. da Rocha LEC. Structural evolution of the Brazilian airport network. J. Stat Mech. 2009; P04020.
8. Wang JE, Mo HH, Wang FH. Evolution of air transport network of China 1930–2012. Journal of
Trans Geo. 2014;40:145-158.
9. Zhang J, Cao XB, Du WB, Cai KQ. Evolution of Chinese airport network. Phys A.
2010;389:3922-3981.
10. Li W, Cai X. Statistical analysis of airport network of China. Phys Rev E. 2004;69:046106.
11. Fleurquin P, Ramasco JJ, Eguiluz VM, Victor M. Characterization of Delay Propagation in the US
Air-Transportation Network. Trans Journal. 2014;53:330-344.
12. Bagler G. Analysis of the airport network of India as a complex weighted network. Phys A.
2008;387:2972-2980.
13. Du WB, Zhou XL, Lordan O, Wang Z, Zhao C, Zhu YB. Analysis of the Chinese Airline Network
as multi-layer networks. Trans Research Part E. 2016;89:108-116.
14. Liu HK, Zhou T. A review of transport network. Prog Natural Sci. 2008;18:601.
15. Cai KQ, Zhang J, Du WB, Cao XB. Analysis of the Chinese air route network as a complex
network. Chin Phys B. 2012;21:028903.
16. Vitali S, Cipolla M, Gurtner G, Lillo F, Beato V, Pozzi S. Statistical Regularities in ATM: network
properties, trajectory deviations and delays. Second SESAR Innovation Days. 2012 November 27-29.
17. Schneider CM, Moreira AA, Andrade JS, Jr., Havlin S, Herrmann HJ. Mitigation of malicious
attacks on networks. Proc Natl Acad Sci. 2011;108:3838-3841.
18. Lordan O, Sallan JM, Simo P, Gonzalez-Prieto D. Robustness of airline alliance route networks.
Commu Nonlin Sci Numer Simu. 2015;22:587-595.
19. Lordan O, Sallan JM, Escorihuela N, Gonzalez-Prieto D. Robustness of airline route networks.
Phys A. 2016;445:18-26.
20. Lordan O, Sallan JM, Simo P, Gonzalez-Prieto D. Robustness of the air transport network. Trans
Research Part E. 2014;68:155-163.
21. Lordan O, Sallan JM, Simo P. Study of the topology and robustness of airline route networks from
the complex network approach: a survey and research agenda. Journal of Trans Geo. 2014;37:112-120.
22. Motter AE, Lai YC. Cascade-based attacks on complex networks. Phys Rev E. 2002;66:065102.
23. Freeman L. Set of Measures of Centrality Based on Betweenness. Sociometry. 1977;40:35–41.
24. Mencía R, Sierra MR, Mencía C, Varela R. Memetic algorithms for the job shop scheduling
problem with operators. Appl Soft Comput. 2015;34:94–105.
25. Gong MG, Cai Q, Li YY, Ma JJ. An improved memetic algorithm for community detection in
complex networks. WCCI 2012 IEEE World Cong Comput Intel; 2012 June 10-15, Brisbane, Australia.
26. Neri F, Cotta C. Memetic algorithms and memetic computing optimization: a literature review.
Swarm Evol Comput. 2012;2:1–14.
27. Bhuvana J, Aravindan C. Memetic algorithm with Preferential Local Search using adaptive weights
for multi-objective optimization problems. Soft Comput. 2016;20:1365–1388.
28. F. Tan, Y.X. Xia, W.P. Zhang, X.Y. Jin. Cascading failures of loads in interconnected networks
under intentional attack, EPL. 2013; 102:28009.
29. X.Z. Peng, H. Yao, J. Du. Load-induced cascading failures in interconnected networks, Nonlin
Dyna. 2015;82: 97–105.
30. Zeng A, Liu WP. Enhancing network robustness against malicious attacks. Phys Rev E.
2012;85:066130.
|
1701.05225 | 1 | 1701 | 2017-01-18T20:29:06 | A Warm Welcome Matters! The Link Between Social Feedback and Weight Loss in /r/loseit | [
"cs.SI"
] | Social feedback has long been recognized as an important element of successful health-related behavior change. However, most of the existing studies look at the effect that offline social feedback has. This paper fills gaps in the literature by proposing a framework to study the causal effect that receiving social support in the form of comments in an online weight loss community has on (i) the probability of the user to return to the forum, and, more importantly, on (ii) the weight loss reported by the user. Using a matching approach for causal inference we observe a difference of 9 lbs lost between users who do or do not receive comments. Surprisingly, this effect is mediated by neither an increase in lifetime in the community nor by an increased activity level of the user. Our results show the importance that a "warm welcome" has when using online support forums to achieve health outcomes. | cs.SI | cs | A Warm Welcome Matters! The Link Between Social
Feedback and Weight Loss in /r/loseit∗
Tiago O. Cunha,1,2 Ingmar Weber,1 Gisele L. Pappa2
1Qatar Computing Research Institute, HBKU, Qatar
2Federal University of Minas Gerais, Brazil
[email protected], [email protected], [email protected]
7
1
0
2
n
a
J
8
1
]
I
S
.
s
c
[
1
v
5
2
2
5
0
.
1
0
7
1
:
v
i
X
r
a
ABSTRACT
Social feedback has long been recognized as an important element
of successful health-related behavior change. However, most of the
existing studies look at the effect that offline social feedback has.
This paper fills gaps in the literature by proposing a framework to
study the causal effect that receiving social support in the form of
comments in an online weight loss community has on (i) the prob-
ability of the user to return to the forum, and, more importantly, on
(ii) the weight loss reported by the user. Using a matching approach
for causal inference we observe a difference of 9 lbs lost between
users who do or do not receive comments. Surprisingly, this effect
is mediated by neither an increase in lifetime in the community nor
by an increased activity level of the user. Our results show the im-
portance that a "warm welcome" has when using online support
forums to achieve health outcomes.
1.
INTRODUCTION
Over the last decades, obesity rates have increased in many coun-
tries around the world, making the condition a major public health
problem. Obesity is associated with significantly increased risk of
more than 20 chronic diseases and health conditions [39], and di-
rectly affects quality of life. In the U.S. 68.8% of adults are over-
weight or obese1. Financially, health issues related to obesity and
life style diseases impose an ever-increasing burden with medical
costs linked to obesity estimated at USD 147 billion in 20082.
Though the percentage of U.S. adults self-reporting to be on a
diet in any given week has fallen from 31% in 1991, 20% are still
trying to lose weight through dieting at any point in time3. Previ-
ous studies have tied successful weight loss as well as other positive
health outcomes to the presences of social support. In particular for
long-term behavioral changes required for achieving and maintain-
ing weight loss, user engagement is essential [38]. Previous studies
showed that users who stay longer in these programs have greater
success in achieving their goals [30].
Through the internet and social media it has become easier for
users to find virtual support groups for anything from weight loss
to drug addiction or depression. Though there are a number of
studies looking at the effect of receiving social support on sustained
engagement with an online community [7, 10, 2], the effect of such
support on health outcomes has not been thoroughly studied. In
particular, it is not clear how large one would expect the effect of
receiving online comments on observed health outcomes to be as,
∗This is a preprint of an article appearing at WWW 2017
1http://www.niddk.nih.gov/health-information/health-statistics/
Pages/overweight-obesity-statistics.aspx
2http://www.cdc.gov/chronicdisease/overview/#sec3
3http://goo.gl/0naf5U
arguably, many other effects from one's social environment should
dominate the benefits of receiving encouragement from potential
strangers online.
To study the importance of online support, one would, ideally, set
up a proper experiment with a randomized control and treatment
group. The treatment group would then receive encouragement
while the control group remains ignored. However, such studies
both require access to an appropriate platform and they also come
with certain ethical concerns [34]. Pushed to the limit it would, for
example, be unethical to withhold online social support from a sui-
cidal person wanting to chat. Even not offering support to a person
trying to lose weight could be questionable.
In this work, we propose a framework for conducting causation
studies on weight loss from social media data. We make use of
a growing collection of methods for causal inference from obser-
vational data. Though not without their limitations, such methods
allow to go beyond arguing about correlations, attempting to rule
out as many confounding factors as possible. In this study we look
at the effect of receiving social support in a popular weight loss
community, the /r/loseit subreddit, on users' self-reported weight
loss. Specifically, we look at whether users who receive a certain
number of comments on their first post in the community are more
likely than those who do not to (i) return for another activity in the
community, and to (ii) later report a higher weight loss, as mea-
sured to the community's badge system. To correct for content dif-
ferences in users' posts, which are linked to receiving more or less
support, we apply a matching approach: a post receiving a number
of comments bigger than a cutoff is paired with a post very simi-
lar in content that received a number of comments smaller than the
cutoff. Here similarity is defined in terms of posts exhibiting sim-
ilar features derived via a statistical model using LDA topics [5],
Linguistic Inquiry and Word Count (LIWC) 4 features, sentiment
analysis [19], question-centric words and posts length.
Similar to previous work [10, 2], we observe an increase in return
probability to the community for those users receiving feedback.
We then extend previous work by showing that, among returning
users, those who had previously received comments on their post
report higher weight loss than the matched control group who did
not (46 lb vs. 37 lb). These findings are statistically significant.
To see if, for those users returning to the community, the differ-
ence in reported weight loss is mediated by a difference in (i) future
lifetime in the community, or (ii) an increased engagement with the
community we applied a so-called Sobel. Somewhat surprisingly,
only about 5% of the difference in reported weight loss appears to
be mediated by an increased lifespan in the community, and this
is not statistically significant even at p = .1. Instead, the rate of
weight loss is the main difference between the two groups.
4http://www.liwc.net
Our main contributions are as follows.
• We propose a framework to study the effect of receiving
comments on a user's first post in a weight loss community
on later reported weight loss.
• Confirming prior work, we observed an increased return prob-
ability for those users who receive comments vs. those who
do not.
• Among those users who return and report weight loss through
their badges, there is a 9 lbs difference between those who
had previously received comments and those who had not.
• We show that the difference in reported weight loss is not
mediated by (i) a longer lifetime in the community or (ii) an
increased activity level in the community.
• We provide a detailed discussion of limitations, design im-
plications and potential extensions.
We hope that the insights derived from our study lead to mech-
anisms further strengthening the social support online forums pro-
vide, especially to new users.
2. RELATED WORKS
On the importance of social support for positive health out-
comes. Prior research has extensively examined the role of social
support in enhancing mental and physical health. It has been ar-
gued that receiving social support may reduce the rate at which
individuals engage in risky behaviors, prevent negative appraisals,
and increase treatment adherence [15]. Research has shown that
conditions such as smoking [26], depression [16], and coronary dis-
ease [25] may be controlled with social support. Also, face-to-face
support groups are positively correlated with desirable outcomes,
such as lower blood pressure, and lower blood sugar levels, result-
ing indirectly from adaptive coping skills and responses [36].
In the context of obesity, improvements in healthy eating and
physical activity, as well more successful outcomes in weight re-
duction programs, have been demonstrated in studies considering
offline support groups [43].
Online support forums. The main implication of these studies
is that developing social support networks may help people man-
age their health conditions. Online health communities can be
used to develop large social support networks, to understand and
to promote health behavior. People have always tried to answer
health related questions by themselves, now the Internet has be-
come an important resource. Previous studies suggest that 30% of
U.S. Internet users have participated in medical or health-related
groups. Advantages of online communities include access to many
peers with the same health concerns, and convenient communica-
tion spanning geographic distances. These communities present an
interesting contrast to similar offline groups, as they provide an en-
vironment where people are more likely to discuss problems that
they do not feel comfortable discussing face-to-face . In addition
such online health communities are known to foster well-being, a
sense of control, self-confidence and social interactions [22].
Still, little is known about how the support provided in these
communities can help enhance positive health outcomes, such as
weight loss. The literature offers little information about how mem-
bers of large online health communities experience social support
for weight loss. Most works concentrate on showing that social
support exists in online weight-management communities, and qual-
ify the types of support present online [41, 3]. For example, the
presence of support was shown in popular weight-loss communi-
ties, including SparkPeople [20] and FatSecret [4].
Based on the fact that support exists, a few studies have tried
to correlate online engagement and support with the effectiveness
of weight loss [41], or to show that a network of engaged users
is linked to persistent sharing of fitness related information [29].
The latter is of great importance as self-monitoring is one of the
factors already shown to be associated with increased weight loss
[18]. However, none of these studies were able to isolate the effects
of online social support on weight loss, as there are many other
underlying factors and real-world variables difficult to account for.
The main goal of our work is to move from detecting correlation
and towards demonstrating causation. For that, we need to ade-
quately control for covariates that affect the probability of receiving
social support. For example, different types of people might differ
in their ability to elicit social support because of differences in their
personality, their mood, or their writing style. Similarly, mediation
mechanisms that may underlie the observed relationship between
social support and weight loss, and which are not typically investi-
gated, need to be considered. We proposed to improve the ability to
explain the effect of the support received by (i) applying a match-
ing approach to reduce the bias in estimating the effect of receiving
social support, and (ii) applying Sobel Tests to test for the existence
of mediating effects.
Studies of health communities in Reddit. Reddit has been used
to study different health conditions under different perspectives, in-
cluding social support. For instance, Cunha et al. [10] study the
r/loseit subreddit and observe that social support seems to be linked
to an increase in return probability, a finding our analysis confirms.
Nevertheless, the great majority of Reddit health community stud-
ies perform more exploratory analysis of users behavior or deter-
mine correlations between language and health outcomes, with the
few studies looking at causality mentioned in the next subsection.
In the first category, Eschler et al. [14] perform a content analysis
in the posts of patients in different cancer stages in the subreddit
r/cancer, showing that patients and survivor participants show dif-
ferent types of emotional needs according to their illness phase. In
the second category, Tamersoy et al. [37] performed an analysis to
identify key linguistic and interaction characteristics of short-term
and long-term abstainers, focusing on tobacco or alcohol.
Causal inference from user-generated observational data. A
common methodology for causal inference from observational data
was borrowed from the domain of medicine and applies propensity
score matching [21]. This methodology is used by Choudhury et al.
[11] to identify suicidal ideation in Reddit mental health commu-
nities, Tsapeli and Musolesi [40] to investigate the causal impact
of several factors on stress level using smartphone data, Dos Reis
and Cullota [13] to study the effect of exercise on mental health,
and Cheng et al. [8] to understand whether community feedback
regulates the quality and quantity of a user's future contributions
in a way that benefits the community. Olteanu et al. [28] present
a more general framework for applying the methodology to social
media timelines.
However, we did not find any studies looking at causality be-
tween online variables and weight loss in online communities. Cunha
et al. [10] apply a similar matching framework to the one proposed
here to study the effect of social support on a change in return prob-
ability in the subreddit r/loseit. They do not, however, study the
ultimately more important issue of weight loss, and do not consider
mediating effects. They also fail to report on formal measures of
the quality of the matching, such as whether the covariates are in-
deed balanced in the control and the treatment group. Here, we
apply this well-known methodology to study causality in weight
loss, accounting for balance checking and mediation analysis. Our
matching occurs directly on the variables and not on the propensity
scores which, as shown in [24], is preferable.
3. DATA
Reddit5 is a social news website and forum. Its content is or-
ganized in communities by areas of interest called subreddits. In
2015 it had 8.7 million users from 186 countries writing 73.2 mil-
lion posts and 725.9 million comments in 88,700 active subreddits6.
For our study we look at the popular weight loss subreddit loseit7.
The data used in our analysis covers five years (August 2010 to
October 2014) and was crawled from Reddit using PRAW (Python
Reddit API Wrapper), a Python package that allows simple access
to Reddit's official API in November 2014. In Reddit users can
submit content, such as textual posts or direct links to other sites,
both collectively referred to as posts. The community can then vote
posted submissions up (upvotes) or down (downvotes) to organize
the posts and determine their position on the site's pages. Infor-
mation on downvotes and upvotes is, however, not exposed via the
API, instead they expose the aggregated number of votes, referred
to as score (number of upvotes minus number of downvotes). Users
can also reply to posts with comments.
The data we collected include posts, comments and other meta-
data (i.e., timestamp, user name, score).
In total, we obtained
70,949 posts and 922,245 comments. These data were generated
by 107,886 unique users, of which 38,981 (36.1%) wrote at least
one post and 101,003 (93.6%) at least one comment. Table 1 shows
the mean, median and standard deviation (SD) for basic statistics
of the dataset, including the length of posts and comments and the
number of daily messages.
Posts per day
Comments per day
Score per post
Score per comments
Words per posts
Words per comments
Mean Median
45.5
586.6
35.7
3.1
89.3
25.5
45
599
6
2
64
14
SD
22.7
264.3
126.7
11.4
95.8
35.3
Table 1: Basic statistics of loseit dataset.
A participating user can add a "badge" (the icon which appears
next to usernames, see Figure 1) to their profile that indicates self-
reported information about their weight loss progress in pounds and
kilograms. The badges can be updated by the users at any time.
(link post). This gave us a set of 25,647 users who had no pub-
lic activity in the community prior to their post. We use this user
set to study the effect of receiving comments on this post on the
probability to return later.
Group 2 (G2). For users in Group 1, we extracted the list of
unique users that both (i) returned again to the community later
to comment or post and (ii) also had badge information indicating
weight loss. This left us with a set of 6,143 users. Figure 2 shows
the weight loss distribution displayed in the badges. We use this
set of returning users to study the effect of receiving comments on
their initial post on the weight loss they achieve.
Figure 2: Users' weight loss distribution displayed in the badges.
4. METHODS
In this section, we discuss our matching methodology to investi-
gate a potential causal effect of receiving social support in the Red-
dit loseit community. First we present the steps of our matching
approach (see Figure 3), later we explain the mediation test.
Figure 1: Examples of the users' weight loss badges on loseit. The
weight loss value is displayed in pounds and kilograms.
To answer our research questions we created two sets of users.
Group 1 (G1). We extracted the list of unique users whose first
recorded activity in the community was a textual post (self post),
rather than a comment or a post consisting exclusively of a URL
5https://www.reddit.com
6"Active" is determined by having 5 or more posts and comments
during at least one week in 2015.
7loseit - Lose the Fat, https://www.reddit.com/r/loseit/.
Figure 3: Matching approach diagram.
Step 1 - Treatment and control definition - The first step of our
matching approach is to choose the appropriate definition of treat-
ment. Given the fact that 96% of the first posts received at least
one comment, we experimented with different definitions of treat-
ment to avoid that the number of remaining matched observations
becomes too small to draw any statistically significant conclusions.
After running the experiments, we defined the treatment group as
those users who received at least 4 comments on their first post in
loseit. The control group consists of all users who received 3 or less
comments on their first post. With this definition, we can guarantee
(i) statistical significance of our findings, and (ii) the balance (see
Step 4) between the two groups after performing matching.
Step 2 - Statistical method for covariates selection - Choosing
appropriate confounding variables is an important step in match-
ing methods. Ideally, conditional on the observed covariates, there
should be no observed differences between the treatment and con-
trol groups. To satisfy the assumption of ignorable treatment as-
signment, it is important to include in the matching procedure all
variables known to be related to the treatment assignment. Gener-
ally poor performance is found by methods using a relatively small
set of "predictors of convenience", such as gender only. Oppo-
sitely, including variables that are actually unassociated with the
outcome can yield slight increases in variance. Commonly the con-
foundings' choice is based on previous research and scientific un-
derstanding, which can yield researcher discretion and bias [35].
Here instead, we propose to use a statistical model to select the
most important covariates. We first examine whether attributes
of the content of posts, are predictive of receiving treatment. We
model a prediction task with the data being split into two cate-
gories, the ones that received treatment and the ones that did not.
Then we use the variables that remained in the final model as the
confoundings in the matching approach (see Step 3).
In our case, the definition of the predictive variables was moti-
vated by the hypothesis that posts with similar content have a sim-
ilar probability of receiving feedback. Since user attributes like
demographics or profile images are not available in Reddit, and
hence the sole focus on the post's content is natural. We used a
topical representation of the first post's content (title + body) ex-
tracted by Latent Dirichlet Allocation (LDA) [5], the various se-
mantic categories of words extracted from LIWC, sentiment anal-
ysis computed with Valence Aware Dictionary for sEntiment Rea-
soning (VADER) [19], counts of question-centric words (what, where,
when, which, who, whose, why, how) and the length of a post
(number of whitespace delimited words), a total of 78 variables.
The required parameters for LDA – number of topics, number of
iterations, α and β – were empirically defined as 20, 2,000, 0.4 and
0.1. The rationale to get question words is to understand to what
extent posts on weight loss seek explicit feedback or suggestions
from the Reddit community.
We used a logistic regression with LASSO as our prediction
method. Logistic regression is well-suited to handle binary de-
pendent variables, while LASSO is a method that performs both
variable selection and regularization in order to enhance the pre-
diction accuracy and interpretability of the statistical model. To
assess the quality of the model produced, we (i) computed the
mean AUC (Area Under the Curve) over the 10-fold cross vali-
dation setting, and (ii) performed a qualitative analysis using the
features that remained in the model to compute the similarity be-
tween posts. As the goal of the matching is to pair posts that "look
similar to a human reader", this qualitative analysis is important to
understand whether features have succeeded to adequately identify
similar texts.
The highest cross-validated AUC of 0.62 was obtained for 37
variables. However, in order to further reduce the dimensionality
of the space used for matching, we chose features from a model
with slightly lower AUC (0.61) but which used only 20 variables.
In terms of qualitative analysis, both models fared similarly without
any noticeable difference.
The 20 variables that "survived" the shrinkage were: 5 LIWC
categories (negative emotions, anger, sexual, reward and work),
sentiment and 14 LDA topics. Additionally we use the coefficient
values as covariates "weights" in the similarity computation in Step
3. This choice was motivated by the fact that the regression coef-
ficients have two desirable properties. The first one is a scale nor-
malization property, where something measured in, say, kilometers
would have a larger coefficient than the same property measured
in meters. This normalization is crucial for computing meaningful
similarities in a metric space. Second, they reflect an importance
of the predictive variable in relation to the response variable. This
means that variables with more effect on receiving feedback will be
given more importance on the post similarity.
Step 3 - Matching approach - Matching is a nonparametric
method of controlling for the confounding influence of pretreat-
ment control variables (also known as confounding or covariates)
in observational data. The key goal of matching is to prune obser-
vations from the data so that the remaining data have better balance
between the treated and control groups, meaning that the empirical
distributions of the covariates in the groups are more similar and
model dependency is reduced [23].
Without matching we may have imbalance, for example, a gen-
erally optimistic user might write a first post with a more positive
tone than a more pessimistic counterpart. Let us imagine that, in
response to their posts, the former user receives lots of support and
the latter receives none. Now let us further imagine that the for-
mer user returns for more activity on the subreddit later, whereas
the latter user is never to be seen again. The question then arises
whether the support received "caused" the former user to return or,
rather, whether that user was at a higher disposition to return any-
way and the social support received was a mere correlate. Here
the tone of the posts, an important covariate, is imbalanced and is
generally more positive in the treated group (= those with social
support) than in the control group (= those without social support).
Matching approaches are applied in such scenarios to remove the
relationship between the covariates and the supposed causal vari-
able by reducing the imbalance.
In the simplest case, matching is applied to settings of a depen-
dent outcome variable Yi, a treatment variable Ti(1 = treated, 0 =
control) and a set of pretreatment covariates Xi [32]. We want
to observe the treatment effect for the treated observation i (T Ei),
which is define as the value of i when i receives the treatment minus
the value of i when it does not receive the treatment.
T Ei = Yi(1) − Yi(0) = observed − unobserved
(1)
Obviously if i is treated, we can not also observe i when it does
not receive the treatment. Hence, matching estimates Yi(0) with a
Y j(0), where j is similar to i. In the best case, each i is matched
to a j with the exact same values for all the control variables. In
practice, "similar enough" observations are being matched.
Matching can be viewed as trying to find hidden randomized
experiments inside observational data. The most commonly used
matching method is Propensity Score Matching (PSM) [24], which
aims to approximate a complete random experiment. PSM first
builds a model to predict the probability of a particular user to
receive the treatment. Users are then matched according to their
probability of receiving the treatment. However, recently King and
Nielsen [24] showed that this method is suboptimal and that PSM
can, under certain circumstances, even increase the bias in the data.
Here, we apply a matching distance approach (MDA) [31], which
aims to approximate a fully blocked experiment [21]. For this we
measure the cosine distance among the observations based on their
covariates. Treated units are matched to their nearest control, as-
suming they pass a predefined similarity threshold, a.k.a. caliper.
Ideally this similarity threshold should be as close as possible to
1, barring constraints related to data sparsity. To find an appropri-
ate value, we gradually increase the value, starting from 0.9, until
we are able to observe three conditions: (i) the matched posts are
similar enough (based on a qualitative analysis), (ii) treatment and
control groups are balanced (see Step 4), and (iii) results are statis-
tically significant. We allow one-to-many matches, i.e., we match
with replacement.
Pruning the unmatched observations makes the control variables
matter less.
In other words, it breaks the link between the con-
founding and the treatment variable, consequently reducing the im-
balance, model dependence, research discretion and bias.
Step 4 - Balance check - One necessary condition for a success-
ful application of a matching methodology is a balance of the co-
variates. If, say, one LDA topic was more strongly pronounced in
the treatment group than in the control group then this imbalance,
rather than any causal effect, could lead to an apparent treatment
effect. To assess if the treatment and control groups are sufficiently
balanced after the matching, we check the standardized mean dif-
ference [1] for each confounding variable c. For a continuous co-
variate, the standardized mean difference is defined as:
dc =
(cid:113)
( ¯xtreatment − ¯xcontrol)
s2
treatment +s2
control
2
(2)
(cid:80)N
where ¯xtreatment and ¯xcontrol denote the mean of the covariate in
control
the treatment and control groups, respectively. s2
denote the corresponding sample variances.
treatment and s2
The standardized difference compares the difference in means
in units of the pooled standard deviation. It is not influenced by
sample size and allows for the comparison of the relative balance.
The remaining bias from a confounding variable c is considered to
be insignificant if dc is smaller than 0.1 [27].
Step 5 - Effect size estimation - After showing that any con-
founding bias has been sufficiently eliminated, we can estimate the
effect of treatment on the matched treated and control units. Here
for a given matching of treated and control units, we compute the
estimated average treatment effect (EATE).
EAT E =
i=1, j=1
(Yi(1)−Y j(0))∗100
Y j(0)
N
(3)
Mediation test - Though matching methods can shed light on
whether a change in the treatment condition T likely causes a change
in the dependent variable Y, matching methods do not provide in-
sights into whether (i) this causal relationship is "direct", or whether
(ii) it is being mediated by another variable M. In our case, receiv-
ing social support might lead to an increased engagement with the
community which, in turn, is responsible for an increase in weight
loss success. Thus the weight loss success would be mediated by
an increased engagement with the community.
Mediation analysis is the process of determining whether or not
variables acting as an in-between step, called mediators, are present
when looking at the relationship between an independent variable T
(here the treatment confidtion) and a dependent outcome variable Y.
As a result, when the mediator is included in an analysis model with
the independent variable, the effect of the independent variable is
reduced and the effect of the mediator remains significant [6].
To verify if any variable plays the role of a mediator and its sig-
nificance in the relationship of social support and weight loss, we
apply the Sobel test [33]. The Sobel test assesses the statistical
significance of the indirect effect.
Note that such analysis works naturally with matching as a pre-
processing step: the matching reduces imbalance between the treated
and control groups in terms of the covariates used for matching.
Hence, the remaining unpruned observations are similar except for
the treatment condition, and the treatment condition can be used as
an independent variable in the Sobel test.
5. RESULTS
In this section we present the results of the causal inference anal-
ysis we conducted to measure the effect of receiving social support
for the first post a user shares with the community. In Figure 5 the
stars indicate the significance levels for a permutation test, with the
number of asterisks corresponding to the p-values, *** for 0.1%, **
for 1%, and * for 5%. In a permutation test, the labels (C)ontrol and
(T)reatment are repeatedly randomly shuffled and for each (fake)
control-treatment assignment the effect size is measured. The sig-
nificance level indicates the fraction of permutations that lead to an
effect size bigger than the one actually observed.[17].
User engagement
We start by analyzing the effect of receiving social support on the
probability of a user to return to the community to comment or
post again. For this analysis we used the 25,647 users present in
Group 1 (see Section 3). Among those users, 18,000 received the
treatment (at least 4 comments) and 7,647 did not (control).
We applied our one-to-many matching approach with a similar-
ity threshold of 0.965 to ensure that for Group 1 our method was
matching similar enough posts and balancing the groups (see Fig-
ure 4). The matching produced 14,570 similar pairs (14,570 unique
treatment and 5,279 unique control users). Our results indicate that
receiving social support increases the relative probability of a user
returning to the community by roughly 66% (see Figure 5, red bar).
This analysis is statistically significant at 0.1%. These results pro-
vide evidence for how important social support is to increase user
engagement, which is associated with better chances of obtain suc-
cess in weight loss programs [30]. Note that this effect sizes is big-
ger than the one reported in a similar study [10]. There the authors
used a different definition of control and treatment group based on
ranking the posts by the number of comments received than getting
"top 40%" vs. "bottom 40%" comments, rather than our "at least
4" vs. "at most 3".
Figure 4: Standardized difference of means for each confounding
variable (Group 1). Note that after the matching all the values are
below 0.1, thus the groups are balanced.
Figure 5: The effect size for the factors analyzed.
To show that the matching approach indeed matches similar posts,
we present in Table 2 parts of a pair of posts matched according to
our approach, this pair had a cosine similarity of 0.97.
Treatment: Hi guys, new here, I'm on a low carb and dairy
(pale) diet, but recently i just went on a vacation, I ate..- Wrap
with grilled chicken, lettuce, and a small amount of buffalo
sauce, on whole grain wrap,Banana, Apple, Orange, and plain
oatmeal - Tossed salad with grilled chicken.
Is this healthy
eating on the pale diet? I also did not exercise, but we did
some walking around...
Control: Hey everyone, I'm new to loseit. I'm starting my
first workout/diet routine ever. My doctor says I need to get my
cholesterol under control. So far, I've been doing 30 minutes of
cardio and taking care of my diet. I've cut out soda, beer, and
red meat. I've switched to skim milk, olive oil, whole grain,
and brown rice...
Table 2: Parts of similar posts matched.
Weight loss
Next we investigated the effect of receiving social support on weight
loss. For this analysis we used the set of 6,143 users in Group 2
(see Section 3), among those users 4,657 received at least 4 com-
ments (treatment group) and 1,486 did not (control group). Here,
to ensure similar enough posts and balanced groups in the match-
ing for Group 2, we used a similarity threshold of 0.955. Figure 5
(green bar) shows that receiving social support in the first post leads
to a relative increase in the achieved weight loss of 26%, or an ab-
solute mean difference of 9 lbs. The observed effect size is statisti-
cally significant and after applying the balance check (see Figure 6)
we confirmed that all covariates were balanced between the control
and treatment groups.
However, note that the frequency with which people update their
badges may interfere in this analysis. Maybe users who do not get
comments do not update their badges as often, even if they lose as
much weight as others. In other worse, receiving social feedback
might simply lead to more active "profile management" than to
more weight loss. To test this alternative explanation, we computed
the number of badge updates (every change in the badge informa-
tion) for users in the treatment and control groups. Afterwards, we
ran a permutation test to check if the two groups' badge updating
Figure 6: Standardized difference of means for each confounding
variable (Group 2). Note that after the matching all the values are
below 0.1, thus the groups are balanced.
behaviors were similar. The groups presented a mean number of
updates of 1.75 ± 3.93 (treatment) and 1.60 ± 2.70 (control), but
this difference was not statistically significant, (p=0.16). As the
two groups' badge updating behaviors are similar and it does not
seem to effect our analysis.
We also experimented with different definitions for the treatment
cutoff to see if there is an effect of "diminishing returns": receiv-
ing at least one comment (vs. none) could have a bigger impact
than receiving 10 (vs. 9 or less). Figure 7 presents the effect size
for different treatment definitions, although we can not guarantee
the balance property for all the cutoffs, these results show that as
expected when we increase the cutoff the effect size drops.
Figure 7: Effect size for different treatment definitions.
Mediation test
After estimating the causal effect of receiving social support on
weight loss, we focus on checking if certain variables that were not
included in the set of covariates could act as a mediator, explaining
part of the observed effect of social support on weight loss. Con-
ceptually and based on prior work, receiving social feedback could
cause the effected user to (i) show a higher activity level in the
community, and (ii) remain longer in the community. Therefore we
first check if, indeed, receiving a comment on a user's first post has
an effect on these variables and, if yes, if this effect mediates the
observed effect on the reported weight loss.
Figure 5 shows that receiving social support also has an effect
over the users' lifespan (i.e., the difference in days between the
date of their last and first activity observed in the community) and
the of number activities (i.e., the sum of the number of comments
and posts). The effect size for lifeSpan is 6% (see Figure 5; blue
bar), but this effect was not statistically significant, for the number
of activities the effect size was 43% (see Figure 5; yellow bar).
Since the observed effect on the lifespan is small, we estimated
if the social support has an effect on the users' weight loss rate
(i.e., the weight loss in lb divided by the lifespan). As the rate
is an unstable estimate for users who are only active for one or
two days in the community, we chose to look at the median rather
than the average effect. Concretely, we computed the median of
the individual paired ratios of (weight loss rate treated individual
/ weight loss rate control individual). We then use the median of
these medians as an estimate of the effect size. As expected there is
an effect on the weight loss rate, where users that received at least
4 comments (treatment) lose weight roughly 35% faster than the
ones that did not received (0.48 lb/day vs. 0.35 lb/day).
Finally, we applied a Sobel test to verify if lifespan and number
of activities act as mediator in the relationship of the social support
and weight loss, i.e., if they explain a significant part of the causal
effect of social support on weight loss. The results of the Sobel
test showed that the proportion of the effect of social support over
weight loss due to lifespan and the number of activity is small –
5.6% and 3.4% respectively. However, these results were not sta-
tistically significant even at p = 0.1. Surprisingly, among the users
that return to post again, the difference in achieved weight loss does
not seem to be linked to either lifespan or engagement in the com-
munity. Rather, the rate of weight loss seems to be effected for
those users returning to the community.
6. DISCUSSION
Does weight loss equal success? Our analysis crucially assumes
that members of the loseit community want to lose weight. If that
was not the case then talking about "weight loss success" would be
meaningless. However, results from a recent survey of the loseit
community [12] indicate that 91% of the respondents were cur-
rently trying to lose weight, with another 7% trying to maintain
their weight. Therefore, it seems adequate to consider a higher
level of weight loss as a desirable outcome.
Qualitative evidence. Though our analysis is deliberately using
quantitative methods, there is also qualitative evidence to further
support the claim that social support received in the community ef-
fects weight loss. The aforementioned community survey [12] in-
cludes the question "What do you like about /r/loseit?". The topics
most emphasized by the survey participants were related to terms
such as "community", "people", "supportive" and "support". Sim-
ilarly, one can easily find posts explicitly acknowledging the per-
ceived importance of the social support such as: "I have visited
this page almost daily over the past 15 months, and it was really
helpful in keeping my motivation. I hope this may provide similar
motivation to those just starting! " .
Designs implications. Our findings suggest that whether or not
a user receives feedback on their initial post affects (i) their proba-
bility to return to the community, and (ii) given that they return, the
amount of weight loss they report. Therefore mechanisms that in-
crease the likelihood to receive a "warm welcome" are expected to
lead to more engagement with the community and to better health
outcomes. Fortunately, the vast majority of initial posts (96%) al-
ready receive at least one comment. It could be worth considering
a mechanism where posts that do not are brought to the modera-
tors' attention so that they can provide an adequate reply. It could
also be worthwhile to construct a "positivity bot" which provides
non-generic positive feedback on posts overlooked by the commu-
nity[42]. Other researchers are exploring the creation of a frame-
work to allow formal testing of theories of different moderation
styles.8 Our research contributes by providing a theory to test.
Ethical considerations. For our study, we used only publicly
available data that users chose to post online. All analysis is done
in aggregate and we do not post results for any individual. How-
ever, as is often the case with such data collection, users might not
be aware of the fact that they are being studied by researchers. To at
least partly alleviate such concerns, we reached out the moderators
to inform them about our study. Their reaction was very positive
("Wow, I'm really looking forward to it") and they also pointed
us to the community survey [12] that we had previously been un-
aware of. Once finalized, we will share our findings with the loseit
community to encourage a positive atmosphere and, in particular,
ensure a warm welcome of new members.
What type of social support matters? One could also try and
extract the topics or tone from the comments on a given post to see
if particular types of comments have a larger effect on the reported
weight loss. This, however, comes with endogeneity problems as
the type of comments received is likely correlate with the subject
matter of the post. Given large enough data sets one could hope to
correct for this using our matching framework where the treatment
is no longer binary – receiving a comment or not – but is multi-
variate. We chose not to explore this route due to sparsity concerns.
We did, however, experiment with using another type of social
feedback based on votes: Reddit has a voting system with up- and
down-votes and an aggregate "score" combining these two types
of votes, positive - negative, can be obtained via the API. In our
data set, this score was never negative. Using the same matching
setup (see Section 4), this gave an effect size of 16% to users to
return to the community and 45% to weight loss (p < 0.01) . The
balance condition also held for this experiment. Though most of
the limitations discussed below also apply to this setup, the fact
that a "similar" effect is observed for a different definition of social
feedback indicates that our results might hold more general.
Who benefits most from social support? All of our results are
aggregates indicating that, on average, users seem to benefit from
receiving social support in the form of comments. For future work
it would be interesting to look into what type of users are most
or least likely to benefit from such support, for example looking for
gender-specific effects. Though gender is not an attribute of a user's
profile, it can sometimes be inferred from their posts ("I'm a mother
of two ...") or from shared progress pictures. In some cases a user's
chosen screen name such as "john123" or "mary456" also provide
hints. Similarly, one could look for cases of users indicating their
starting weight, rather than just the weight loss, to study whether
the effect of social support is tied to a user's initial weight.
Impact of pruning on effect size. We started our analysis with
the assumption that, as we had previously observed for the effect
on return-to-post probability [10], pruning via matching would lead
to a lower estimate of the effect of social feedback on weight loss
when compared to the unmatched analysis. Intuitively, matching,
and hence pruning, should reduce the effect of confounding user
variables such as "positive outlook on life" which might affect writ-
https://civic.mit.edu/blog/natematias/
8See
reddit-moderators-lets-test-theories-of-moderation-together
for
thoughts by Nathan Matias' and https://np.reddit.com/r/
TheoryOfReddit/comments/456503/want_to_test_your_theories_
of_moderation_lets/ for a subreddit on the topic.
ing style and have a positive effect on both return-to-post behavior
as well as on weight loss success. However, we observed the oppo-
site: the raw effect size for the unmatched data was 22% (treatment
cutoff of 4 comments) whereas it was 26% for the matched analysis
(treatment cutoff of 4 comments and similarity threshold of 0.955).
In particular, users who were treated and who, eventually, lost less
than the median weight loss were pruned more often (27%) than
their treated counter-parts who lost a lot of weight (23%). At the
same time for the untreated users the differences in pruning rates
for less-than-median (28%) and more-than-median (28%) weight
loss were small. Though this is surprising, it actually helps to make
the overall claim, i.e., that social feedback supports weight loss in
an online community, more robust.
7. LIMITATIONS
Limitations of using badges to track weight loss. To infer a
user's weight loss success or failure we are currently relying on
the badges used in the loseit community. These badges only cap-
ture self-reported weight loss progress. The first issue imposes an
important limitation as, one could imagine, receiving social feed-
back leads to a heightened sense of self-awareness and a feeling
of "being watched" in the community. Though this could lead to
positive peer pressure, it could also increase the probability of over-
reporting weight loss progress. Badges are also always visibly dis-
played next to a user's screen name, increasing the likelihood of
social signaling effecting their use. One solution to this issue could
be to perform a similar analysis using auto-generated weight up-
dates from smart scales as used by Wang et al. [44]. Such data
sources are less likely to be prone to misreporting errors.
To avoid at least some of the limitations introduced by using the
badges to infer a user's weight loss, we also performed analysis on a
different, smaller set of users who explicitly report their weight loss
progress in their posts. This can be either by using the community
conventions of "SW/CW/GW" for starting/current/goal weight, or
through posting things such as "I've lost 10lbs". In this analysis
the treatment group had 1,421 users and the control group 36 users.
Due to data sparsity, we only applied the threshold of 0.7. Though
prone to other limitations, this alternative way of inferring weight
loss led to qualitatively similar effect sizes of 9.5%.
Limitations to determining the start date of weight loss jour-
ney. Our analysis, especially that related to the rate of weight loss
(Section 5), assumes that a user's weight loss journey starts the day
they first announce themselves to the community in the form of a
post. However, in practice, users might well first observe the com-
munity before deciding to post. This means that the actual rate
of weight loss is likely to be lower, as the time period over which
the weight loss is achieved is longer. A more subtle issue related
to this passive use of the support community is that it could af-
fect the writing style. Put simply, users who have been following
the community for a while might (i) have a "head start" as far as
weight loss is concerned, and (ii) they might write in a style more in
tune with the community which, in turn, could lead to more social
feedback. If these stylistic differences are not represented in the
extracted covariates, this could lead to an overestimate of the effect
size. Though we cannot completely rule out this possibility, we be-
lieve that the effect sizes are large enough to make it unlikely that
they are fully explained by this hidden adaption to the community.
Limitations of our matching approach. When applying a match-
ing approach, there are a number of choice one needs to make such
as (i) the selection of covariates, (ii) how to normalize and poten-
tially weight different covariates, (iii) which distance metric to use
and whether to use "blocking", and (iv) which similarity thresh-
old to choose. Of these, any choices for (ii), (iii) and (iv) should
asymptotically converge to the same result as the matched pairs be-
come more and more similar, being identical on all the covariates
in the limiting case. We therefore did not include experiments with
higher similarity thresholds because of issues of data sparsity.
Concerning the covariates used, we believe our statistical method
is a reasonable choice. Introducing too many additional covariates
can lead to problems of high dimensionality when attempting to
match similar posts along, say, hundreds of dimensions. In such
settings it becomes difficult to balance all the covariates considered.
Furthermore, many other potential covariates should be balanced
at least "on average", if they are correlated with the covariates in
the final model. Still, the exclusion of unknown but potentially
crucial covariates is always a concern when applying a matching
methodology. We hope that other researchers will validate – or
invalidate – our analysis using their own set of covariates.
Limitations of observability of returning users. Our main
analysis relies on users returning to the loseit community to post
or comment again after their initial post. Assuming the user also
has badge information, then this second data point provides an esti-
mate of both the absolute weight loss (in the badge) and the weight
loss rate (in the difference of time stamps). This means that we
cannot make any statements concerning weight loss for users who
do return to the community for a second, public activity. Though
our main results are conditional on users returning, we also observe
social feedback leading to an increase in return probability (see Fig-
ure 5). However, the issue of predicting who will or will not return
to an online community has been studied before [10, 9] and so we
did not analyze this further.
8. CONCLUSIONS
We presented an analysis of the effect of receiving social feed-
back in the form of comments on the reported weight loss in the
/r/loseit community on Reddit. Correcting for confounding fac-
tors through a matching methodology, users who receive at least 4
comments on their first post in the community were (i) 66% more
likely to return for a future activity in the community, and (ii) con-
ditional on the user returning, those who had previously received
feedback end up reporting on average 9 lb more in weight loss. For
these returning users, this effect is not mediated by neither (i) an
increased level of activity in the community, nor by (ii) a longer
lifespan in the community. Though observational studies have in-
herent limitations on causal inference, our work helps to illustrate
the importance of receiving feedback in online support forums, in
particular for users new to the community.
9. REFERENCES
[1] P. C. Austin. An introduction to propensity score methods for
reducing the effects of confounding in observational studies.
Multivariate behavioral research, 46(3):399–424, 2011.
[2] L. Backstrom, R. Kumar, C. Marlow, J. Novak, and
A. Tomkins. Preferential behavior in online groups. In
Proceedings of the 2008 International Conference on Web
Search and Data Mining, pages 117–128. ACM, 2008.
[3] P. Ballantine and R. Stephenson. Help me, I'm fat! Social
support in online weight loss networks. J. of Consumer
Behaviour, 2011.
[4] L. Black, J. Bute, and L. Russell. Cases on Online
Discussion and Interaction: Experiences and Outcomes,
chapter "The Secret Is Out!": Supporting Weight Loss
through Online Interaction. 2010.
[5] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet
allocation. J. Mach. Learn. Res., 3, 2003.
[6] B. Boone. Mediation analysis: Expanding from one mediator
to multiple mediators. 2012.
[7] M. Burke, C. Marlow, and T. Lento. Feed me: Motivating
newcomer contribution in social network sites. In CHI, 2009.
[8] J. Cheng, C. Danescu-Niculescu-Mizil, and J. Leskovec.
How community feedback shapes user behavior. arXiv
preprint arXiv:1405.1429, 2014.
[9] M. D. Choudhury and S. De. Mental health discourse on
reddit: Self-disclosure, social support, and anonymity. In
ICWSM, 2014.
[10] T. Cunha, I. Weber, and et al. The effect of social feedback in
a reddit weight loss community. In DigitalHealth, 2016.
[11] M. De Choudhury, E. Kiciman, and et al. Discovering shifts
to suicidal ideation from mental health content in social
media. In CHI, 2016.
[12] denovosibi. [results] winter/spring 2016 user survey, 2016.
https://www.reddit.com/r/loseit/comments/4acxxn/results_
winterspring_2016_user_survey/.
[13] V. L. Dos Reis and A. Culotta. Using matched samples to
estimate the effects of exercise on mental health from twitter.
In Proceedings of the Twenty-Ninth AAAI Conference on
Artificial Intelligence, pages 182–188, 2015.
[14] J. Eschler, Z. Dehlawi, and W. Pratt. Self-characterized
illness phase and information needs of participants in an
online cancer forum. In ICWSM, 2015.
[15] A. F. Fontana, R. D. Kerns, and et al. Support, stress, and
recovery from coronary heart disease: a longitudinal causal
model. Health Psychol, 8(2):175–193, 1989.
[16] S. Grav, O. Hellzèn, and et al. Association between social
support and depression in the general population: the hunt
study, a cross-sectional survey. J. of clinical nursing, 2012.
[17] T. Hesterberg, D. S. Moore, S. Monaghan, A. Clipson, and
R. Epstein. Bootstrap methods and permutation tests.
Introduction to the Practice of Statistics, 5:1–70, 2005.
[18] J. M. Hutchesson, Y. C. Tan, and et al. Enhancement of
self-monitoring in a web-based weight loss program by extra
individualized feedback and reminders: Randomized trial. J
Med Internet Res, 18(4):e82, Apr 2016.
[19] C. J. Hutto and E. Gilbert. VADER: A parsimonious
rule-based model for sentiment analysis of social media text.
In ICWSM, 2014.
[20] K. O. Hwang, A. J. Ottenbacher, and et al. Social support in
an internet weight loss community. International journal of
medical informatics, 79(1):5–13, 2010.
[21] K. Imai, G. King, and E. A. Stuart. Misunderstandings
between experimentalists and observationalists about causal
inference. Journal of the royal statistical society, 2008.
[22] G. J. Johnson and P. J. Ambrose. Neo-tribes: The power and
potential of online communities in health care.
Communications of the ACM, 49(1):107–113, 2006.
[23] G. King, C. Lucas, and R. Nielsen. The balance-sample size
frontier in matching methods for causal inference. PS:
Political Science and Politics, 42:S11–S22, 2014.
[24] G. King and R. Nielsen. Why propensity scores should not
be used for matching. http://j.mp/1sexgVw, 2015.
[25] H. Lett, J. Blumenthal, and et al. Social support and coronary
heart disease: epidemiologic evidence and implications for
treatment. Psychosomatic medicine, 2005.
[26] R. Mermelstein, S. Cohen, and et al. Social support and
smoking cessation and maintenance. Journal of consulting
and clinical psychology, 54(4):447, 1986.
[27] D. Mimno, H. M. Wallach, E. Talley, M. Leenders, and
A. McCallum. Optimizing semantic coherence in topic
models. In Proceedings of the Conference on Empirical
Methods in Natural Language Processing, 2011.
[28] A. Olteanu, O. Varol, and E. Kıcıman. Towards an
open-domain framework for distilling the outcomes of
personal experiences from social media timelines. In
ICWSM, 2016.
[29] K. Park, I. Weber, and et al. Persistent sharing of fitness app
status on twitter. In CSCW, pages 184–194, 2016.
[30] K. Patrick, K. Calfas, and et al. Outcomes of a 12-month
web-based intervention for overweight and obese men. Ann
Behav Med, 2011.
[31] D. Rubin and E. Stuart. Affinely invariant matching methods
with discriminant mixtures of proportional ellipsoidally
symmetric distributions. Statistics, 2006.
[32] D. B. Rubin. Multivariate matching methods that are equal
percent bias reducing, i: Some examples. Biometrics, 1976.
[33] M. E. Sobel. Some new results on indirect effects and their
standard errors in covariance structure models. Sociological
methodology, 16:159–186, 1986.
[34] J. Song and K. Chung. Observational studies: cohort and
case-control studies. Plastic and reconstructive surgery,
2010.
[35] E. A. Stuart. Matching methods for causal inference: A
review and a look forward. Statistical science: a review
journal of the Institute of Mathematical Statistics, 2010.
[36] C. F. Sullivan. Gendered cybersupport: A thematic analysis
of two online cancer support groups. Journal of health
psychology, 8(1):83–104, 2003.
[37] A. Tamersoy, M. De Choudhury, and D. H. Chau.
Characterizing smoking and drinking abstinence from social
media. In Hypertext, 2015.
[38] P. J. Teixeira, E. V. Carraça, and et al. Successful behavior
change in obesity interventions in adults: a systematic review
of self-regulation mediators. BMC medicine, 13(1):1, 2015.
[39] M. Thiese, G. Moffitt, R. Hanowski, and et al. Commercial
Driver Medical Examinations: Prevalence of Obesity,
Comorbidities, and Certification Outcomes. J. Occup.
Environ. Med., 2015.
[40] F. Tsapeli and M. Musolesi. Investigating causality in human
behavior from smartphone sensor data: a quasi-experimental
approach. EPJ Data Science, 4(1):1–15, 2015.
[41] G. M. Turner-McGrievy and D. F. Tate. Weight loss social
support in 140 characters or less: use of an online social
network in a remotely delivered weight loss intervention.
Translational Behavioral Medicine, 3(3):287–294, 2013.
[42] J. van der Zwaan, V. Dignum, and et al. A conversation
model enabling intelligent agents to give emotional support.
In Modern Advances in Intelligent Systems and Tools. 2012.
[43] M. Wang, L. Pbert, and S. Lemon. Influence of family, friend
and coworker social support and social undermining on
weight gain prevention among adults. Obesity, 2014.
[44] Y. Wang, I. Weber, and P. Mitra. Quantified self meets social
media: Sharing of weight updates on twitter. In DH, 2016.
|
1904.05327 | 1 | 1904 | 2019-03-25T13:03:14 | Endogenous Coalition Formation in Policy Debates | [
"cs.SI",
"stat.AP"
] | Political actors form coalitions around their joint policy beliefs in order to influence the policy process on contentious issues such as climate change or population aging. The present article explains the formation and maintenance of coalitions by focusing on the ways that actors adopt policy beliefs from other actors. A policy debate is a complex system that exhibits network dependencies both in cross-sectional and longitudinal ways when actors contribute ideological statements to the debate. In such a temporal network, learning of policy beliefs matters in three complementary ways: positive reciprocity through bonding relationships within coalitions, innovation across coalitions through bridging relationships, and negative reciprocity through repulsion, or polarization, of adversarial coalitions by reinforcement of conflictual relationships. We test this theory of endogenous coalition formation in policy debates using a novel inferential technique combining network and event history analysis and find systematic evidence for the interplay of the three coalition formation mechanisms. | cs.SI | cs |
Endogenous Coalition Formation in Policy Debates
Philip Leifeld∗1 and Laurence Brandenberger2
1Department of Government, University of Essex, UK
2Chair of Systems Design, ETH Zurich, Switzerland
Abstract
Political actors form coalitions around their joint policy beliefs in order to influ-
ence the policy process on contentious issues such as climate change or population
aging. The present article explains the formation and maintenance of coalitions by
focusing on the ways that actors adopt policy beliefs from other actors. A policy
debate is a complex system that exhibits network dependencies both in cross-
sectional and longitudinal ways when actors contribute ideological statements
to the debate.
In such a temporal network, learning of policy beliefs matters
in three complementary ways: positive reciprocity through bonding relationships
within coalitions, innovation across coalitions through bridging relationships, and
negative reciprocity through repulsion, or polarization, of adversarial coalitions
by reinforcement of conflictual relationships. We test this theory of endogenous
coalition formation in policy debates using a novel inferential technique combining
network and event history analysis and find systematic evidence for the interplay
of the three coalition formation mechanisms.
∗Corresponding author at Department of Government, University of Essex, Wivenhoe Park, Colch-
ester CO4 3SQ, UK. E-mail address: [email protected]
1
Introduction
Policy process theory suggests that political actors form coalitions around their joint be-
liefs in order to influence the policy process (Sabatier and Jenkins-Smith 1993; Sabatier
and Weible 2014; Hajer 1995; Henry, Lubell and McCoy 2011; Weible, Sabatier and
McQueen 2009; Leifeld and Haunss 2012; Leifeld 2013, 2016, 2017; Fisher, Leifeld and
Iwaki 2013). Despite a plethora of contributions on the existence and significance of
"advocacy coalitions" and "discourse coalitions," little systematic evidence has yet been
gathered on how coalitions are formed and maintained around joint policy beliefs. The
existing literature argues that learning plays a key role for the formation and main-
tenance of coalitions (Sabatier and Jenkins-Smith 1993), but how exactly learning is
causally connected to coalition structure largely remains a black box. Instead, recent
work focused on belief coalitions as an independent variable and coordination between
actors as an explanandum (e. g., Henry, Lubell and McCoy 2011). While this develop-
ment helps explaining the structure of policy networks as a function of actors' policy
beliefs, the original puzzle of belief formation and thereby coalition formation around
shared beliefs persists. Therefore we unpack the notion of learning in advocacy or dis-
course coalitions and explain coalition formation and maintenance in policy debates as
a complex network phenomenon.
Our contribution explains the formation and maintenance of coalitions by focusing
on the ways that actors adopt policy beliefs from other actors in a policy process. We
argue that learning within and across coalitions matters in three different ways.
First, as actors in a complex policy process face substantial uncertainty and risk,
they learn from other actors by utilizing bonding relationships (Berardo and Scholz
2010; Berardo 2014; Berardo and Lubell 2016). Coalitions are formed and maintained
by learning policy beliefs from actors who demonstrated a very similar profile of policy
beliefs in the past. This extends the "risk hypothesis" from the literature on collabora-
1
tive governance (Berardo and Scholz 2010; Berardo 2014; Berardo and Lubell 2016) to
the case of belief formation and coalition formation. Actors infer their adjacent coalition
members by observing the policy debate and learn from actors with strongly similar
beliefs. We call this mechanism positive reciprocity and provide micro-level evidence
for its strong role in shaping coalition formation.
Second, in addition to these strong belief ties, actors learn beliefs through weak ties.
For this to happen, two conditions must be satisfied:
if an actor observes that many
other actors expressed a certain policy belief and if many of these other actors had at
least a minimal degree of belief congruence with the focal actor around other issues,
this signals to the actor that the policy belief in question is ideologically compatible
and worth adopting. Thus, actors not only seek bonding relationships through positive
reciprocity; actors also actively seek to adopt innovative beliefs that are compatible with
their remaining preference profile through bridging relationships (Berardo and Scholz
2010). Coalition formation therefore builds on trust in familiar actors on the one hand
and on trust in the congruence of their own belief system coupled with the transitivity
of other actors' belief systems on the other hand. However, bridging across coalitions
is contingent on minimizing the risk of adopting incompatible policy beliefs by only
considering actors with a minimal level of trust through previous belief congruence.
We call this second mechanism innovation learning.
Third, learning entails drawing experiences from negative examples. Actors consider
with whom they had substantive conflicts in the past, and they tend to oppose the
current policy beliefs of these actors. This reinforcement of conflictual relationships
leads to a repulsion between different coalitions and therefore complements positive
reciprocity, which serves to increase the congruence within coalitions. We call this
mechanism negative reciprocity.
2
The three mechanisms together are complementary. They serve to increase congru-
ence within coalitions through mutual reinforcement of positive relationships, learning
of belief innovations across coalitions, and repulsion between coalitions through rein-
forcement of conflictual relationships. We test this theory of coalition formation and
belief learning using state-of-the-art dynamic network analysis and an empirical policy
process over the course of nine years at a daily time resolution and find compelling
micro-level evidence that supports our three-pronged theory of endogenous coalition
formation.
2 Policy Debates as Networks
Politics is about "who gets what, when, how" (Lasswell 1950). This extends far beyond
institutional arenas like Congress or the executive. How political issues are understood
and why some solutions to political problems make it onto the parliamentary and ex-
ecutive agendas while others are weeded out during public debate is at least of equal
importance, but lacks any systematic understanding (Downs 1972). Research on these
early stages of the policy process (Sabatier and Weible 2014) has been struggling to
provide convincing answers to one of the most pressing questions on agenda setting:
how do political actors, such as interest groups or legislators, decide to contribute nor-
mative statements about their desired policy outcomes to the public debate? In other
words, how do policy debates operate at the micro-level?
Most newspaper articles on the politics of the day are full of quotes by political
actors advocating or rejecting certain policies or policy instruments. Often they are in
direct support or contradiction of previous statements by other political actors. Lay
readers, journalists, and political analysts try to make sense of these statements by
inferring "camps," "advocacy coalitions," or "discourse coalitions" from a policy debate
3
(Sabatier and Jenkins-Smith 1993; Hajer 1995). In many cases, the cleavage lines seem
clear either because interest groups have vested interests or because policies appeal in
obvious ways to partisan ideologies of actors who run for office or a seat. More often,
however, it is unclear why an actor adopts a specific issue stance and why this happens
at the specific time it is observed.
Indeed, the prevailing view in the literature is
that policy preferences are fixed and allow only for minor modifications through policy
learning (Sabatier and Jenkins-Smith 1993; Hajer 1995). Yet, the mechanisms through
which learning occurs are opaque and need to be unpacked and tested.
Students of political processes are often content with describing macro-level varia-
tion, such as the presence of multiple advocacy or discourse coalitions in policy processes
(as an example of variation across actors and within a time unit), or issue attention
cycles with varying levels of salience of issues over time (as an example of temporal
variation without any cross-sectional differentiation). We argue that such macro-level
phenomena can be traced back to micro-level mechanisms in a theoretically meaningful
way. These mechanisms can be disentangled by considering and explaining individual
statements of political actors and their timing.
However, individual statements about actors' policy beliefs or stances are rarely
independent of each other. Actors do not argue in isolation. The very essence of a po-
litical debate is that actors interact with each other in order to "influence the political
discourse of their day" (Hall 1993), both collaboratively and in conflict. To see this,
consider the counterfactual that no political discussion would be going on among polit-
ical actors if it were impossible to influence other actors by raising one's voice through
the media and other outlets -- possibly by altering public opinion ("issue campaigning")
or convincing other actors more directly ("policy learning"). Hence, while useful for
some purposes, we must overcome the prevailing view that policy preferences are fixed
and instead devise empirical strategies to analyze how learning takes place. We need
4
to understand how these interdependencies shape the complex topology of political
debates that ultimately leads to the emergence of coalitions in the policy process.
Our contribution therefore proposes a set of theoretical mechanisms at the micro-
level that lead endogenously to the formation and maintenance of coalitions in policy
debates. We introduce a new statistical modeling framework that allows us to test the
significance of these learning mechanisms in an empirical case study of a policy debate
observed over the course of nine years. We cast the debate as a signed bipartite graph
of actors and policy beliefs with date-stamped edges and apply our methodological
innovation. Due to their inherent dependencies, policy debates can (and should) be
modeled as networks.
One way to do so is to model a specific discourse, such as the debate on climate
change or the debate on population aging, by assuming that elements from a set of
actor vertices A = {a, i1, . . . , im−1} (where a denotes the focal actor and i1, . . . , im−1
denote other actors) is connected to elements from a set of policy belief vertices B =
{b, j1, . . . , jn−1} (where b is the focal belief and j1, . . . , jn−1 are other policy beliefs) by
positive or negative edges γ±
t (a, b) (where t is the focal time point, the first element
in parentheses is the incident actor vertex and the second element in parentheses the
t ∈ Γ has a value of 1 if the actor states the
incident policy belief vertex). An edge γ±
t ) or negative
belief at time point t and 0 otherwise. Each edge has either positive (γ+
(γ−
belief (γ−
t ) valence, indicating that an actor supports a policy belief (γ+
t ). γ±
t denotes either of the two.
t ) or rejects a policy
A includes various interest groups, legislators, and other actors who have a potential
interest in expressing their opinion on the policy topic of the debate. B includes concrete
policy instruments or proposals. For example, in the policy debate on climate change,
policy beliefs can be the various policy proposals used in the debate, such as "cap and
trade," "carbon tax," or "voluntary reduction of emissions," among others. They are
5
specific and cannot be reduced to more fine-grained sub-beliefs other than on an ordinal
scale, as in more or less of a specific instrument.
At any point in time t, any actor can observe the network of actors and beliefs he
or she is embedded in up to time t − 1. This is called the network of past events,
Gt = (A; B; Γt).
From the perspective of actors at the current time point t, an edge weight w±
t
(1)
is a
function that is applied to each event γ before time t and that reflects how long ago a
statement was made. It resembles the event's loss in signal strength between the time
point the event happened and the current time point, or the decay in memory, when
an actor considers the network of past events in making decisions about whether and
what to contribute to a policy debate. More formally, and in line with Lerner et al.
(2013) and Brandes, Lerner and Snijders (2009), the temporally sensitive edge weight
of any statement in the network, in relation to the current time point t, is
w±
t (i, j) =
te(i, j) · e
γ±
−(t−te)·
ln(2)
T1/2
(cid:88)
te<t
(cid:18)
(cid:19)
· ln(2)
T1/2
,
(2)
where te is a prior time point in the network of past events, e is Euler's number, and
T1/2 represents a so-called half-life parameter. The half-life parameter specifies at which
rate the weight of past events should diminish.
A theoretical model about coalition formation in policy debates (Leifeld 2014) sug-
gested a number of potentially suitable micro-level mechanisms that might play a role
in coalition formation, simulated policy debates over time, and compared the resulting
topologies to stylized facts from empirical studies. While this approach reveals which
mechanisms lead to which topologies per se, an agent-based simulation model alone
cannot ascertain whether a theoretically and numerically plausible theory is indeed
6
causally related to the real-world topologies because other theories or combinations of
mechanisms could potentially explain coalition formation equally well. Fitting a the-
ory on coalition formation to a policy debate at the micro level in a temporal analysis,
rather than comparing it with stylized facts at the macro level, will permit a more cred-
ible analysis of coalition formation in policy debates that moves the state of knowledge
closer to a causal understanding. Therefore the present research fits an endogenous
theory on coalition formation to an empirical policy debate at the micro-level using
new techniques in inferential network analysis.
3 Coalitions in the Policy Process
"Coalitions" are a central element in theories of the policy process (Sabatier and Weible
2014). The Advocacy Coalition Framework (ACF) attributes a central role to clusters
of actors with congruent policy beliefs (Sabatier and Jenkins-Smith 1993). According to
proponents of the ACF, there are usually between two and five coalitions in any given
policy process. Advocacy coalitions emerge because of overlapping functional roles
of actors (Zafonte and Sabatier 1998) and, primarily, because of mutually reinforcing
policy learning within coalitions (Sabatier and Jenkins-Smith 1993), thus leading to a
remarkable stability of coalitions over multiple decades. In a policy network of various
actors with partly compatible and partly incompatible policy preferences, actors with
similar institutional roles will stick together and mutually reinforce and complement
each other's position. For example, in an environmental -- industrial conflict, two envi-
ronmental NGOs may hold only partly congruent policy beliefs initially, but they are
more likely to adopt each other's policy instrument claims than their political oppo-
nents' claims in order to gain or maintain a powerful position in the policy network
through the operation of a cohesive coalition with coherent policy beliefs.
7
However, coalitions need not rely on institutional cues for policy instrument learn-
ing. Coalitions can also emerge as the result of previous states of the network, as in
a Markov process. For example, if actors A and B demonstrated relatively congruent
policy preferences in the recent past, and actor C demonstrated a relatively incon-
gruent preference profile, then policy beliefs may diffuse from A to B or vice-versa.
Such a diffusion of policy beliefs among actors is the result of perceived joint coalition
membership -- without the actual need for a formal shared institutional role. Learning
is rather the result of each actor's observation of the other actors' stated beliefs. This
leads to increasing homogeneity of policy beliefs within coalitions over time (Leifeld
2014). We call coalition formation dynamics that do not involve exogenous covariates,
such as an actor's institutional role, endogenous mechanisms of coalition formation.
Both types of coalition formation, endogenous and exogenous, can interact in a single
policy debate.
The literature on opinion dynamics has explored similar dynamics of endogenous
coalition formation (e. g., Altafini 2012; Antal, Krapivsky and Redner 2005; Marvel
et al. 2011; Quattrociocchi, Caldarelli and Scala 2014), where nodes in a network strive
for a structural balance in opinions in their local network environment (Cartwright and
Harary 1956). An actor with friends who hold similar opinions as the focal actor will
be reinforced in his or her views while different opinions in the network neighborhood
may lead to a tipping of the actor's opinion. The extreme outcome of a completely
balanced system, in which the network breaks apart into two entirely separate but
internally homogenous coalitions, is known as a monotone dynamical system (Altafini
2012). Empirical networks, however, usually feature a mix of balanced and unbalanced
triads because the endogenous coalition formation mechanism through learning and
reinforcement within coalitions is complemented by other theoretical mechanisms.
8
The popular notion of "discourse coalitions" in the literature on argumentative
discourse analysis (Hajer 1995) captures essentially the same dynamic as posited by the
ACF. The basic premise is that actors try to manipulate other actors' view of reality
through the articulation of arguments in a policy debate. The success of a discourse
coalition in manipulating a debate is a function of the coherence of the coalition's set
of arguments (Leifeld and Haunss 2012). Therefore, like in the Advocacy Coalition
Framework, actors with already similar positions have an incentive to further mutually
reinforce and adopt each other's statements in a policy debate in order to appear more
convincing and exercise greater power.
In other words, actors learn from other actors in a policy debate, and the outcome of
these learning processes are coalitions. This learning of policy beliefs can occur through
multiple plausible mechanisms. In the following paragraphs, we seek to unpack these
mechanisms, which contribute to the formation and maintenance of coalitions in a policy
debate: positive reciprocity, innovation learning, and negative reciprocity.
3.1 Positive Reciprocity
First, we operationalize mutual learning and reinforcement through the notion of pos-
itive reciprocity in a signed bipartite graph. Positive reciprocity means that an actor
tends to make statements in a policy debate that are compatible with the recently ob-
served statements of other actors in the policy debate if the actor identifies these other
actors as compatible in terms of their policy beliefs.
In line with the risk hypothesis, which explains policy network formation (Berardo
and Scholz 2010; Berardo 2014; Berardo and Lubell 2016), actors face uncertainty and
risk when they reveal their policy beliefs to other actors. They reduce this risk by
bonding, which is the act of learning predominantly from those actors who already share
very similar revealed policy belief profiles with the focal actor. Learning from these
9
actors serves to minimize uncertainty and risk by relying on trustworthy information.
The odds of being criticized strongly are low if other actors with a similar coalition
position advanced similar claims in the past. This strong bonding behavior is not just
a building block of policy network formation; it also explains belief system formation
and coalitions.
In network terms, positive reciprocity is operationalized through balanced four-
cycles: in a signed bipartite graph, an actor a will tend to make a positive statement
about policy belief b if other actors i also referred to b in a positive way and these other
actors already shared other positive beliefs j with a (first panel of Figure 1). Similarly,
a will tend to make a negative statement b if a had negative shared statements j with
other actors i in the past and if these other actors i also refer to b in a negative way
(second panel of Figure 1). Positive reciprocity can also mean that a makes a positive
statement b if a had congruent negative statements together with many i and actors i
made a positive statement about b (third panel of Figure 1) or that a makes a negative
statement b if a had congruent positive statements together with many i and actors i
made a negative statement about b (fourth panel of Figure 1). All of these cases reflect
the tendency that an actor adopts a policy belief from other actors who are proximate
with regard to their policy beliefs.
[Figure 1 about here.]
At the same time, it matters for policy learning within coalitions when these prior
statements were observed by focal actor a. If they all occurred in the recent past, the
mutual support and learning is stronger because the focal actor has a good memory
of the structure of the debate and these earlier statements therefore act as a stronger
signal to a. Conversely, trigger statements in the distant past, say, five years ago, may
have a weak influence on a's discursive activity.
10
Therefore, the extent to which actor a has an incentive to contribute policy belief b
to the debate at any point in time can be expressed by a positive reciprocity network
statistic, which sums the first four cases of Figure 1 over the past network of events
and weights the statements by their temporal distance:
positive reciprocity
±(Gt, a, b) = 3
(cid:115) (cid:88)
(cid:115) (cid:88)
i∈A,j∈B
+ 3
i∈A,j∈B
t (a, j) · w±
w+
t (i, b) · w+
t (i, j)
t (a, j) · w±
w−
t (i, b) · w−
t (i, j)
(3)
We posit that positive reciprocity is a foundational element of endogenous coalition
formation in policy debates, i. e., actors adopt beliefs from congruent other actors in
their effort to exercise discursive power via coalition building. We expect that this
mechanism plays a role in actors' decisions to contribute statements to a debate:
Hypothesis 1 The stronger positive reciprocity is from the perspective of actor a at
time t with regard to policy belief b, the more likely a will adopt b at time t.
3.2 Innovation Learning
Positive reciprocity alone, however, would lead to a compartmentalization of the net-
work over time, where two coalitions with one distinct policy belief each would prevail
(Leifeld 2014; Altafini 2012). Reality is more complex: coalitions are composed of more
than one policy belief; more than two coalitions can exist empirically; and there can
be actors who do not associate perfectly with one coalition or another (Leifeld 2013,
2016).
Moreover, positive reciprocity, while useful and plausible, does not discriminate
between cases where many other actors stated the same few policy beliefs in the same
11
way in the past (i. e., many actors, few beliefs) and cases where few other actors stated
many beliefs in the same way in the past (i. e., few actors, many beliefs).
For example, an actor a may be particularly inclined to learn belief concept b from
another actor i1 if the two actors exhibited congruent policy beliefs before. This would
indicate a strong case of bonding and trust between these two actors (Berardo and
Scholz 2010; Berardo 2014; Berardo and Lubell 2016; Henry, Lubell and McCoy 2011),
as hypothesized in the previous case. The first two panels of Figure 2 provide an
illustration of this bonding strategy. At the same time, however, an actor a may be
inclined to learn a policy belief concept not just because of strong incentives by imitating
an ideologically very close other actor i1, but also by observing that many other actors
i -- even if otherwise not particularly close -- stated another policy belief j1 with the same
stance as the focal actor a and if they are all congruent in their use of the focal belief
b. This corresponds to bridging behavior in policy networks (Berardo and Scholz 2010;
Berardo 2014; Berardo and Lubell 2016; Henry, Lubell and McCoy 2011): when the
risk of adopting information from other actors is low -- as ascertained by counting how
many minimally compatible actors have stated a policy belief before -- , actors reach
out and adopt information from ideologically relatively remote peers. The third and
fourth panel of Figure 2 illustrate this bridging strategy.
[Figure 2 about here.]
The positive reciprocity statistic captures both, bonding and bridging. Therefore
we need to control for this bridging behavior in order to be able to interpret the positive
reciprocity statistic as the tendency for learning through bonding. Hence we need to
devise a separate test, which captures specifically the many-actors -- few-beliefs case of
bridging. We call this case innovation learning.
Innovation learning is an important building block of coalition formation and main-
tenance because it introduces innovation into coalitions. The ACF argues that learning
12
takes place predominantly within coalitions, but to a certain extent also between coali-
tions, in order to ensure that coalitions adjust to innovative information. For example,
if an external event, such as a scientific report or a natural catastrophe, leads to some
new beliefs among a number of actors, the innovation learning mechanism serves to
diffuse these innovations to other actors. However, actors will only adopt these policy
beliefs if they are held by credible sources. Actors only adopt policy beliefs from other
actors if these other actors have a minimum degree of belief congruence with the focal
actor. The innovation learning mechanism tests precisely for this kind of innovative
learning from minimally congruent source actors by counting how many other actors
stated a focal belief in the same way in the past, conditional on these other actors
sharing at least one other policy belief with the focal actor, thus closing a balanced
four-cycle.
Innovation learning can be formalized as follows. First, count how many other actors
i have previously mentioned b. Let
ζ±(a, b) :=
(cid:34) t−1(cid:88)
(cid:88)
i∈A\{a}
k=1
(cid:35)
γ±
k (i, b) > 0
.
(4)
Then, define η± as the number of actors who have previously mentioned b -- unless the
count is 0, in which case η± = 1, in order to avoid division by 0 in the statistic. Let
ζ±(a, b)
1
η±(a, b) :=
if ζ±(a, b) > 0
otherwise.
(5)
This enables us to define the innovation learning statistic, which is the temporally
weighted share of other actors i who referred to policy belief b and who had at least
13
one other positively or negatively congruent belief j with the focal actor a:
innovation learning
3
(cid:113)(cid:80)
i∈A\{a}(cid:80)
(cid:113)(cid:80)
i∈A\{a}(cid:80)
3
=
+
j∈B\{b}
j∈B\{b}
k=1 γ+
±(Gt, a, b)
(cid:2)(cid:80)t−1
(cid:2)(cid:80)t−1
k=1 γ−
k (a, j) > 0(cid:3) · w±
k (a, j) > 0(cid:3) · w±
t (i, b) ·(cid:2)(cid:80)t−1
t (i, b) ·(cid:2)(cid:80)t−1
η+
k=1 γ+
k=1 γ−
k (i, j) > 0(cid:3)
k (i, j) > 0(cid:3)
,
η−
(6)
where square brackets denote an indicator function that yields 1 if the condition con-
tained in the brackets is true and 0 otherwise. We expect that the innovation learning
mechanism contributes strongly to the topology of the policy debate:
Hypothesis 2 The stronger innovation learning is from the perspective of actor a at
time t with regard to policy belief b, the more likely a will adopt b at time t.
3.3 Negative Reciprocity
Coalitions, or groups more generally, form not just by learning and reinforcement, but
also by repulsion between different coalitions or groups (Skvoretz 2013). For example,
the literature on advocacy coalitions stresses how members of coalitions distrust op-
ponents in policy processes (Fischer et al. 2016). Once coalitions become entrenched
through positive reciprocity, they stress dissimilarities with other coalitions.
At the micro level, what we call negative reciprocity is an important factor in the
repulsion between coalitions. Negative reciprocity means that existing disagreement
between two actors is reinforced by the perception of being in different coalitions. If
actors a and i had previous disagreements over policy beliefs j, then it is likely that
these conflicts are carried forward through new disagreements over other policy beliefs.
For example, if actor a stated policy belief j1 in a positive way while actor i1 stated
j1 in a negative way and if i1 stated belief b in a negative way as well, then a will tend
14
to reinforce the interpersonal or interorganizational conflict by stating b in a positive
way (fifth panel in Figure 1). If i1 stated b in a positive way, a will state b in a negative
way, given their prior conflict (eighth panel in Figure 1). Alternatively, if a stated j1 in
a negative way and i1 stated it in a positive way, a and i1 will also disagree over b one
way or the other (panels six and seven in Figure 1). These cases are all summarized
in a negative reciprocity network statistic over the network of past events, from the
perspective of actor a when considering policy belief b, summed over all previous four-
cycles, and taking into account the timing of events:
negative reciprocity
±(Gt, a, b) = 3
(cid:115) (cid:88)
(cid:115) (cid:88)
i∈A,j∈B
+ 3
i∈A,j∈B
t (a, j) · w±
w+
t (i, b) · w−
t (i, j)
t (a, j) · w±
w−
t (i, b) · w+
t (i, j)
(7)
Negative reciprocity can be interpreted from an actor perspective or from an issue
conflict perspective. In the former view, actors learn from past conflicts and extend
their existing conflicts to other issues. In the latter view, there can be fundamental
differences between sets of issues; for instance, policies j1 and j2 may be intrinsically
linked because they belong to some coherent ideology I1, and, similarly, policies j3 and
j4 may be linked by some other overarching ideology I2.
In that case, it is natural
for actors adhering to ideology I1 to support j1 and j2 but to reject j3 and j4. In this
view, negative reciprocity is a function of what the Advocacy Coalition Framework calls
"deep core beliefs" (Sabatier and Jenkins-Smith 1993).
However, both perspectives can be reconciled: even if these fundamental predeter-
mined cleavage lines exist across coalitions of actors, actors will still learn from the past
behavior of their opponents as well as their overall position in the network what their
stance on policy belief b should be, given the overarching ideologies. For example, if a
knows their positive view on j1 and recognizes i1's opposing, negative position on j1,
15
then a can learn from i1's negative recent mention of b that j1 and b are in the same
compatible ideological package and that they should mention it in a positive way to
maintain ideological congruence, thereby distancing themselves further from i1.
In line with these considerations along the lines of structural balance and learning,
we expect negative reciprocity to play a strong role in shaping the topology of the policy
debate through repulsion between coalitions:
Hypothesis 3 The stronger negative reciprocity is from the perspective of actor a at
time t with regard to policy belief b, the more likely will a adopt b at time t.
4 Data and Methods
4.1 Data
We test our theory of endogenous coalition formation in policy debates in an empirical
case study. Using the software Discourse Network Analyzer (Leifeld 2016), we content-
analyzed 1,842 newspaper articles from Frankfurter Allgemeine Zeitung, a German
news outlet with center -- right news coverage of politics, about the policy debate on
the German pension system. Articles were selected using a general search phrase, and
false positives were manually weeded out. 6,704 statements of 245 political actors over
nine years (1993 -- 2001) were coded by two expert coders, and intercoder reliability
was checked post-hoc by two separate coders and was found to be consistently high.
The coding scheme consisted of four variables: the person who made a statement,
the organization the person belonged to, the policy belief stated by the person or
organization, and a dummy variable indicating support or rejection of the belief by
the actor.
In the analysis, organizations were used as actors, in line with previous
analyses of policy networks (Laumann and Knoke 1987; Berardo and Scholz 2010). A
total of 69 beliefs were coded. These were policy instruments that reflected normative
16
stances on what to do about the imminent financing problem of the pension system.
Examples include "install fertility incentives to create more contributors," "incentivize
private savings to complement the state pension," or "increase pension age," among
many others.
In May 2001, a major policy reform introduced privatization measures; thus this
marks the end of the observation period. The start of the observation period was
January 1993. We use the first 657 statements from January 1993 to March 1996
to calibrate the endogenous network statistics. The number of excluded events in an
ordinal event sequence depends on the number of days on which a statement was made
and the specified half-life parameter in Equation 2. The 657 statements were issued over
the course of 200 event days. With a chosen half-life parameter of 20 event days, the
network of past events Gt is sufficiently large for all events issued after March 1996 to
ensure unbiased statistics. Therefore we define March 1996 as the start of the analysis
period. This time period also covers the national election at the end of September 1998
and the election campaign that started in March 1998. The pension debate was one of
the key topics in the election campaign. Figure 3 shows the frequency of statements
per week over the analysis period with the shaded area representing the duration of the
election campaign.
[Figure 3 about here.]
The policy debate on the German pension system in the wake of population aging is
an ideal case study for several reasons. First, Germany does not have a journalistic norm
of balanced reporting as, for example, in the U.S., which would bias the measurement
of coalition formation through newspaper data (Boykoff and Boykoff 2004). We do
acknowledge that the process by which an actor gets to speak in the newspaper is
still affected by agenda setting through the media, but actors have a high degree of
17
autonomy in what they say, and we can control for activity and popularity effects in
the statistical model. Second, the debate featured a high amount of uncertainty among
actors over how to solve the policy problem. The debate is situated in a historical setting
where population aging was for the first time put on the national political agenda. This
ensures a lively debate, where a number of very different arguments and positions are
exchanged. Third, the topic of public pensions is broad enough that the debate is
multi-dimensional rather than two-dimensional and that more than two coalitions can
be observed at some time points (Leifeld 2013, 2016).
4.2 Methodology
We estimate two statistical models to test our theory on endogenous coalition forma-
tion. The first model is a stratified Cox proportional hazard model estimated through
conditional logit maximum likelihood estimation. This models the incidence of a state-
ment of a specific actor a about a specific policy belief b. The risk set is defined as the
set of statements that have not yet been issued but would eventually come to pass.
Alternatively, the risk set could have been defined to include all possible combi-
nations of actors, beliefs, and stances for every event day. However, this specification
would result in an event sequence containing 38,678,640 (245 actors × 69 beliefs × 2
stances × 1144 unique event days) true and null events. Due to the computational
burden of such an event sequence, we chose to define the risk set in accordance with
conditional logistic regression models, resulting in 883,855 events in the event sequence.
Hence, each day on which at least one statement is made forms a stratum and is filled
with statements that are made on this day (treatment or true events, = 1) as well as all
potential statements that could have been issued but were not (control or null events,
= 0). Where statements from the same actors and with the same stance are issued
18
repeatedly over the course of the debate, these statements are repeatedly at risk until
the combination is issued for the last time.
The use of sufficient network statistics to capture dependencies between observations
in a survival model is known as a relational event model and was first proposed by Butts
(2008). Here, we extend this idea to accommodate custom network statistics formed
over a two-mode network. The network statistics are calculated for both true events as
well as null events.
The second model is a logistic regression model. The dependent variable is the sign
of an actor -- belief statement (support or rejection; + or −) conditional on the existence
of the statement and the past network of events (de Nooy and Kleinnijenhuis 2013;
Lerner et al. 2013). While the survival model explains the timing and existence of
statements, this second model explains the stance of the statement as a function of
prior interactions (similar to de Nooy and Kleinnijenhuis 2013).
Lerner et al. (2013), Lerner (2016), and Brandes, Lerner and Snijders (2009) show
that the likelihood of both models can be added to form the overall likelihood of the
temporal topology of the policy debate. We extend the combined approach of Lerner
et al. (2013) by applying their relational event model for signed graphs to the bipartite
case using custom network statistics. The statistics we employ to operationalize our
theory are identical across the two models we estimate, including the use of positive
and negative signs on the dyads and the half-life parameter of 20 for Equation 2.
4.3 Control Variables
We include further control variables as sufficient statistics. Section ?? in the SI Online
contains further information on the specification of these model terms.
We include an interaction between each of the three main terms and a dummy
variable indicating whether the focal actor a is a government actor, such as a federal
19
ministry or agency. We expect these actors to behave differently and act in a neutral
way because they have an official mandate. The interaction should have a negative sign
as policy belief learning should be less pronounced in government actors than in other
types of actors. The main effect for this dummy variable should be positive because
government actors are often in charge of issuing statements about policy making and
should therefore have a relative high statement density.
Furthermore, a model term called inertia controls for the repetition of statements
by the same actor. Actor activity serves a similar purpose as a random effect in cross-
sectional analyses; it controls for the propensity of each actor to make statements in the
debate. Belief concept popularity controls for issue attention cycles, i. e., swings in the
number of times a specific belief was recently stated. We control for a seasonal effect
of the week day Monday. News usually accumulate over the weekend, so more activity
can be expected on Mondays.
Section ?? of the SI Online contains specifications with additional control variables
for the logistic model. We control for actor type homophily, which is the tendency of
actors to agree with another actor on the stance of a policy belief if both actors are of the
same type (e. g., both are trade unions or social interest groups). This operationalizes
functional interdependencies as posited by Zafonte and Sabatier (1998). We also control
for expected conflict lines between trade unions/social interest groups on the one hand
and liberal actors/employers' associations and financial market actors, such as banks
and insurance companies, on the other hand. These heterophily model terms control for
exogenously defined cleavage lines. The inclusion of both the homophily and heterophily
terms does not change the substantive results.
20
5 Results
Table 1 shows the results of the survival model (the so-called rate function), and Table 2
shows the results of the logistic regression model (the so-called type function). Section
?? in the SI Online presents details on the standardization of the endogenous network
variables.
[Table 1 about here.]
[Table 2 about here.]
The results in Table 1 show strongly positive regression coefficients for all three
types of policy belief learning: positive reciprocity has a coefficient of 0.39, which
means that a one-unit increase in this statistic corresponds to an increase in the odds
of event occurrence by 48 percent for all non-governmental actors. All endogenous
network statistics are standardized. A one-unit increase in the statistic corresponds to
one standard deviation of positive reciprocity (sd = 0.065, min = 0, max = 0.584).
This increase represents approximately 11 additional shared beliefs between focal actor
a and i1, with a using j three days ago, i1 using j ten days ago, and i1 using b one day
ago (see Table ?? in the SI Online for additional scenarios on what an increase in one
standard deviation entails in network event terms). The effect of positive reciprocity is
significantly smaller for governmental actors.
An increase of the innovation learning statistic by one standard deviation increases
the odds that non-governmental actor a makes statement b at time t by 22 percent. For
the innovation learning statistic to increase by one standard deviation, a would have to
share two policy beliefs j with each actor i that stated b eight days ago (as one possible
scenario). Here, too, government actors have a lower propensity to pick up policy belief
concepts that were used by minimally congruent other actors than non-government
actors.
21
There is a strong positive effect for negative reciprocity, with an increase in the
odds of a statement by 19 percent. The standard deviation for negative reciprocity
represents, for instance, an additional joint usage of three beliefs j in the recent past
(i1 stated b one day ago, a stated j three days ago, and i1 stated j ten days ago). As
such, this effect is more than three times as powerful as positive reciprocity (with one
standard deviation increase amounting to 11 additional shared beliefs j, given i1 stated
b one day ago, a stated j three days ago, and i1 stated j ten days ago). Actors have
a strong tendency to reject statements made by actors i with whom they disagreed
over other beliefs in the past. Both government and non-government actors exhibit this
behavior, i. e., the interaction effect is not significant.
Substantively, this lends strong support to hypotheses 1 -- 3. In line with our model
of endogenous coalition formation, actors adopt policy beliefs from structurally proxi-
mate actors in an act of bonding, leading to cohesive coalitions ("positive reciprocity");
they reinforce past experiences by learning which policy beliefs not to adopt as a func-
tion of past disagreements with actors, leading to a repulsion of coalitions ("negative
reciprocity"); and they learn from structurally more distant actors across coalitions,
provided that there is at least minimal agreement with those other actors and that
these minimally trusted other actors agree with each other on the policy belief concept
to be learned ("innovation learning"). Together, these mechanisms shape a topology
of the policy debate in which there are multiple cohesive advocacy or discourse coali-
tions which are, however, not completely separated due to the bridging aspect of policy
learning (in line with theoretical predictions by Leifeld 2014).
Figure 4 shows the values of the three statistics of main interest over time vis-`a-vis
the null events. Null events for each time point t include all statements that were
issued after t and, as such, were at risk of being issued at the focal time t. At each
point in time, the null events represent all future events that have not yet been issued.
22
They form the control group to the group of statements that were issued at time t.
The conditional logistic model then evaluates which factors increase the probability of
an event occurring now, given it has not occurred before. The 95 percent confidence
interval around the blue curves indicates consistent significance at all time points. The
shape of the blue curves also indicates a change in the data-generating process. Ad-
ditional model specifications with a temporal dummy variable for the election period
and interactions with the variables of interest were tested and did not change the main
results significantly.
[Figure 4 about here.]
Model 2 is a variant of Model 1 that demonstrates that the substantive results
do not change when the interaction effects between the main variables of interest and
government activity are omitted. As for the control variables, actors show a tendency to
repeat themselves and jump on the bandwagon of recently widely-stated policy beliefs.
There is a small effect of statement occurrence on Mondays, and government actors are
more active than other actor types. The explained variance (according to McFadden
1978) is moderate at 0.14.
Table 2 demonstrates similar effects for the type function. While the rate function
models the rate of the occurrence of a statement by actor a on belief b, the type function
explains the stance of the statement, conditional on the fact that the statement occurs
and conditional on the past network. In this model, a positive statement of the belief
concept is modeled as 1 and negative use as 0. Due to the nature of the dependent
variable, the statistics of primary interest need to be subdivided into their constituent
parts for positive and negative (i1, b) relations (panels 1 and 3 in Figure 1 and panels 2
and 4 go together, respectively, for positive reciprocity and panels 6 and 8 and panels
5 and 7, respectively, for negative reciprocity).
23
The results indicate that, as expected, positive reciprocity holds such that balanced
open four-cycles with a positive (i1, b) relation tend to be closed by a positive (a, b)
statement (the odds of a positive statement increase by 225 percent) and that balanced
open four-cycles with a negative (i1, b) relation prompt a negative (a, b) statement (the
odds of a positive statement decrease by 67 percent). This indicates that bonding
increases the incentives for further structural balance. The increase of one standard
deviation in positive reciprocity for positively (or negatively) stated policy beliefs b by
a represents an additional 13 (or seven) events actors a and i1 shared in the recent past
(a stated j three days ago, i1 stated j ten days ago, and i1 stated b one day ago) (see
Table ?? in the SI Online).
Conversely, as expected, negative reciprocity yields a reverse pattern. Past conflicts
are carried forward such that a positive statement on b by i1 prompts a negative one
by a and vice-versa if previous discursive alignments were conflictual. The odds of a
positive statement are increased by 129 percent if a has disagreed with another actor
i1 on three more beliefs j in the past (a stated j three days ago, and i1 stated j ten
days ago) and i1 opposed policy belief b one day ago. Similarly, the odds of a positive
statement decrease by 61 percent if a previous actor i1 agreed with policy belief b one
day ago and a and i1 contradicted each other on seven more beliefs in the past (a stated
j three days ago, and i1 stated j ten days ago).
There are mixed results for innovation learning in the type function, with one coeffi-
cient significant and the other one insignificant. If we interpret this result together with
the significant coefficient for innovation learning in the rate function, actors do learn
policy beliefs from minimally congruent actors (e. g., across coalitions), but this does
not generally mean that actors also agree on the issue stances (e. g., across coalitions)
once they have adopted a belief. They rather learn the policy belief concept, but not
the stance.
24
In the type model, one does not need to control for actor activity because whether
an actor supports or rejects a belief is not theoretically linked to how often the actor
made statements in the past. However, one can see that past positive statements of
policy beliefs increases the odds of current positive use of the same belief concepts,
and the same is true for negative uses of these policy belief concepts, as indicated by
the belief concept popularity coefficients. Moreover, if an actor stated a specific belief
predominantly in a positive (negative) way in the recent past, the actor tends to state
the policy belief concept in the same way now, as shown by the inertia coefficients.
Figures 5 and 6 assess the goodness of fit of the rate model using simulations.
Figure 5 shows that our theory has some predictive value and greatly improves upon the
prediction of a random null model, for different difficulty levels of prediction. Only exact
time matches are counted as positive predictions in Figure 5. Since exact time matches
impose too strict a test on temporal predictions of events, we report the differences in
the timing of simulated versus random events vis-`a-vis true events in Figure 6. The
simulated sequence based on the fitted model predicts the timing of true events much
better than a random null model, i. e., the mean temporal prediction error is much
smaller. On average, the time difference between simulated and true event is 27 days
(sd = 28.9, min = 0, max = 188, median = 23), whereas the average time difference
between random and true events is 194 days (sd = 156.5, min = 0, max = 523, median
= 167).
[Figure 5 about here.]
[Figure 6 about here.]
25
6 Conclusion
Overall, these results provide overwhelming empirical evidence for the three mechanisms
of learning that lead to endogenous coalition formation and maintenance. The evidence
is robust at two levels: the waiting time or probability per time unit that a statement by
a specific actor about a specific policy belief is made, and the stance of the statement.
This provides us with an understanding of how and why advocacy or discourse coalitions
are formed and maintained and, more broadly, how policy debates operate.
An assessment of the model fit also showed that there is room left for theoretical
improvement for the explanation of this complex dynamical system. However, it should
be noted that similarly complex dynamical systems, such as militarized interstate dis-
putes, regularly yield levels of explained variance below ten percent. While the poor
theoretical understanding of other systems by no means improves the value of our the-
oretical explanation in the present case, this indicates more generally that the social
sciences have a long way to go if we are to understand complex and often erratic social
behavior to a satisfactory degree.
The research presented here is an important step in this direction as we have pre-
sented innovative evidence for the structure and dynamics of how policy debates oper-
ate. We first presented a theory of coalition formation, maintenance, and repulsion in
policy processes based on policy beliefs and learning. This theory provides an innova-
tive understanding of the micro-level dynamics that underpin advocacy and discourse
coalitions and makes a contribution to this vast literature, which is all too often fo-
cused on the empirical identification, rather than explanation, of topological features
like coalitions.
More generally, we have laid the foundation for a theoretical as well as empirical
understanding of how policy debates work. Previous research on policy debates tended
to be more descriptive and one-dimensional. Our approach fully acknowledges the
26
multi-dimensional nature of policy debates as complex dynamical systems and offers a
theoretically informed lens that can be readily operationalized through the empirical
toolbox of inferential network analysis.
Work in this direction may ultimately enable us to forecast how policy debates will
develop, at least at a short range like a weather forecast. Such results can then be
used to evaluate scenarios for devising more efficient media campaigning strategies by
interest groups or political parties, or they could be employed for comparing styles of
deliberation across countries, or they could be used for the benefit of humanity, e. g.,
by avoiding polarization and political stalemate when the prediction points into this
direction. The work in this contribution is an important step into this direction, but
much more work needs to be done. Several research areas can be readily identified.
First, data collection needs to be made more efficient. Recent developments in natural
language processing and machine learning may soon help us to identify given policy be-
liefs in unstructured newspaper articles and connect them with the actors who sponsor
them, as identified through named entity recognition. Right now, the level of detail
required for a meaningful analysis of this kind still makes manual annotation of text
materials necessary, but important research is underway in several disciplines. Second,
a much better understanding needs to be developed about dynamic network models
for complex data structures, such as the relational event models for signed bipartite
graphs with a rate and type function and temporal decay used here. Little is known
about possible extensions; there are no simulation results that would verify the validity
of these extensions; there is no systematic way to ascertain that the sufficient statistics
are really sufficient etc. Right now, we are avoiding some of these potential problems by
verifying our results through evidence of predictive fit, but a better theoretical under-
standing of these kinds of network models would be important for their widespread use.
Third, a better understanding of how temporal dynamics should be modeled would be
27
important. For example, we employed a half-life parameter of 20 days in our models and
verified the robustness of this parameter through simulations. Yet, in principle, arbi-
trary combinations of different half-life parameters could be used for the different model
terms, and inclusion of these parameters in the likelihood function might potentially
cause statistical identification problems. Future research therefore needs to establish
best practices or at least a larger set of experiences to draw from when parameterizing
network dynamics.
Finally, we would like to point out that the policy debate analyzed here was selected
carefully, but may deviate from policy debates in other political systems, arenas, data
sources, policy domains, or contexts more generally. This opens the door to an excit-
ing research area where debates in different contexts can be compared to the baseline
findings established here.
References
Altafini, Claudio. 2012. "Dynamics of Opinion Forming in Structurally Balanced Social
Networks." PLOS ONE 7(6):e38135.
URL: http://dx.doi.org/10.1371/journal.pone.0038135
Antal, Tibor, Paul L. Krapivsky and Sidney Redner. 2005. "Dynamics of Social Balance
on Networks." Physical Review E 72(3):036121.
Berardo, Ramiro. 2014. "Bridging and Bonding Capital in Two-Mode Collaboration
Networks." Policy Studies Journal 42(2):197 -- 225.
Berardo, Ramiro and John T. Scholz. 2010. "Self-Organizing Policy Networks: Risk,
Partner Selection, and Cooperation in Estuaries." American Journal of Political Sci-
ence 54(3):632 -- 649.
28
Berardo, Ramiro and Mark Lubell. 2016. "Understanding What Shapes a Polycentric
Governance System." Public Administration Review 76(5):738 -- 751.
Boykoff, Maxwell T. and Jules M. Boykoff. 2004. "Balance as Bias: Global Warming
and the US Prestige Press." Global Environmental Change 14(2):125 -- 136.
Brandes, Ulrik, Jurgen Lerner and Tom A. B. Snijders. 2009. Networks Evolving Step by
Step: Statistical Analysis of Dyadic Event Data. In Social Network Analysis and Min-
ing, ASONAM'09. International Conference on Advances in Social Network Analysis
and Mining. IEEE pp. 200 -- 205.
Butts, Carter T. 2008. "A Relational Event Framework for Social Action." Sociological
Methodology 38(1):155 -- 200.
Cartwright, Dorwin and Frank Harary. 1956. "Structural Balance: A Generalization of
Heider's Theory." Psychological Review 63(5):277 -- 293.
de Nooy, Wouter and Jan Kleinnijenhuis. 2013. "Polarization in the Media During
an Election Campaign: A Dynamic Network Model Predicting Support and Attack
among Political Actors." Political Communication 30(1):117 -- 138.
Downs, Anthony. 1972. "Up and Down with Ecology: The Issue Attention Cycle."
Public Interest 28(1):38 -- 50.
Fischer, Manuel, Karin Ingold, Pascal Sciarini and Fr´ed´eric Varone. 2016. "Dealing
with Bad Guys: Actor- and Process-level Determinants of the 'Devil Shift' in Policy
Making." Journal of Public Policy 36(2):309 -- 334.
Fisher, Dana R., Philip Leifeld and Yoko Iwaki. 2013. "Mapping the Ideological Net-
works of American Climate Politics." Climatic Change 116(3):523 -- 545.
29
Hajer, Maarten A. 1995. The Politics of Environmental Discourse: Ecological Modern-
ization and the Policy Process. Oxford: Clarendon Press.
Hall, Peter A. 1993. "Policy Paradigms, Social Learning, and the State: The Case of
Economic Policymaking in Britain." Comparative Politics 25(3):275 -- 296.
Henry, Adam Douglas, Mark Lubell and Michael McCoy. 2011. "Belief Systems and So-
cial Capital as Drivers of Policy Network Structure: The Case of California Regional
Planning." Journal of Public Administration Research and Theory 21(3):419 -- 444.
Lasswell, Harold Dwight. 1950. Politics: Who Gets What, When, How. New York:
P. Smith.
Laumann, Edward O. and David Knoke. 1987. The Organizational State: Social Choice
in National Policy Domains. Madison: University of Wisconsin Press.
Leifeld, Philip. 2013. "Reconceptualizing Major Policy Change in the Advocacy Coali-
tion Framework: A Discourse Network Analysis of German Pension Politics." Policy
Studies Journal 41(1):169 -- 198.
Leifeld, Philip. 2014. "Polarization of Coalitions in an Agent-Based Model of Political
Discourse." Computational Social Networks 1(1):7.
URL: http://dx.doi.org/10.1186/s40649-014-0007-y
Leifeld, Philip. 2016. Policy Debates as Dynamic Networks: German Pension Politics
and Privatization Discourse. Frankfurt am Main: Campus. Distributed through the
University of Chicago Press.
Leifeld, Philip. 2017. Discourse Network Analysis: Policy Debates as Dynamic Net-
works. In Oxford Handbook of Political Networks, ed. Jennifer Nicoll Victor, Alexan-
30
der H. Montgomery and Mark N. Lubell. chapter 25.
URL: http://dx.doi.org/10.1093/oxfordhb/9780190228217.013.25
Leifeld, Philip and Sebastian Haunss. 2012. "Political Discourse Networks and the
Conflict over Software Patents in Europe." European Journal of Political Research
51(3):382 -- 409.
Lerner, Jurgen. 2016. "Structural Balance in Signed Networks: Separating the Proba-
bility to Interact from the Tendency to Fight." Social Networks 45:66 -- 77.
Lerner, Jurgen, Margit Bussmann, Tom A. B. Snijders and Ulrik Brandes. 2013. "Mod-
eling Frequency and Type of Interaction in Event Networks." Corvinus Journal of
Sociology and Social Policy (1):3 -- 32.
Marvel, Seth A., Jon Kleinberg, Robert D. Kleinberg and Steven H. Strogatz. 2011.
"Continuous-time Model of Structural Balance." Proceedings of the National Academy
of Sciences 108(5):1771 -- 1776.
McFadden, Daniel. 1978. Quantitative Methods for Analysing Travel Behaviour of Indi-
viduals: Some Recent Developments. In Behavioural Travel Modelling, ed. David A.
Hensher and Peter R. Stopher. London: Groom Helm chapter 13, pp. 279 -- 318.
Quattrociocchi, Walter, Guido Caldarelli and Antonio Scala. 2014. "Opinion Dynamics
on Interacting Networks: Media Competition and Social Influence." Scientific Reports
4(4938).
Sabatier, Paul A. and Christopher Weible. 2014. Theories of the Policy Process. Boul-
der, CO: Westview Press.
Sabatier, Paul A. and Hank C. Jenkins-Smith. 1993. Policy Change and Learning: An
Advocacy Coalition Approach. Boulder, CO: Westview Press.
31
Skvoretz, John. 2013. "Diversity, Integration, and Social Ties: Attraction versus Repul-
sion as Drivers of Intra- and Intergroup Relations." American Journal of Sociology
119(2):486 -- 517.
Weible, Christopher M., Paul A. Sabatier and Kelly McQueen. 2009. "Themes and
Variations: Taking Stock of the Advocacy Coalition Framework." Policy Studies
Journal 37(1):121 -- 140.
Zafonte, Matthew and Paul A. Sabatier. 1998. "Shared Beliefs and Imposed Interde-
pendencies as Determinants of Ally Networks in Overlapping Subsystems." Journal
of Theoretical Politics 10(4):473 -- 505.
32
a
i1
a
i1
b
j1
b
j1
a
i1
a
i1
pro
con
b
j1
b
j1
a
i1
a
i1
b
j1
b
j1
a
i1
a
i1
b
j1
b
j1
Figure 1: Positive reciprocity (first row) and negative reciprocity (second row).
33
a
i1
a
i1
b
j1
j2
j3
b
j1
j2
j3
a
i1
i2
i3
pro
con
b
j1
b
j1
a
i1
i2
i3
Figure 2: Bonding (first and second panel) and bridging (third and fourth panel).
34
Figure 3: Frequency of statements per week.
35
0255075100199619971998199920002001number of statements per weekFigure 4: Value of the positive reciprocity, innovation learning, and negative reciprocity
statistics over time (blue curves from top to bottom) vis-`a-vis the null events (green
curves). The results are significant at all time points.
36
Negative reciprocityInnovation learningPositive reciprocity1996199719981999200020011996199719981999200020011996199719981999200020010.000.050.100.150.200.000.050.100.000.040.080.12null eventstrue eventsFigure 5: Goodness-of-fit assessment through prediction. The barchart shows how
much the rate model improves the prediction of actors, beliefs, stances, or combinations
of these variables vis-`a-vis a null model. Only exact timing matches are counted.
Predictions were made within-sample over 50 event days between September 28, 1998
and December 16, 1998 (with a total of 391 statements). The risk set includes all
statements issued after September 28, 1998 (excluding duplicates). Standard errors are
based on 13 simulated sequences.
37
correct eventcorrect actorand policy beliefcorrect policy beliefand stancecorrect policy beliefcorrect actor0%10%20%30%40%percentage of correctly predicted events (+se)simulationrandomFigure 6: Goodness-of-fit assessment through prediction. The two histograms show the
timing error of the simulated or random events. Predictions were made within-sample
over 50 event days between September 28, 1998 and December 16, 1998 (with a total
of 391 statements). The histograms are based on one of the thirteen simulated and
random sequences each. Horizontal dashed lines represent the mean difference between
the timing of simulated (or random) and true events (i. e., the temporal prediction
error).
38
02040600200400time between simulated and true event daysimulationrandom(1)
(2)
Main hypotheses
0.39 (0.03)
Positive reciprocity
−0.12 (0.03)
Positive reciprocity × government org.
0.20 (0.03)
Innovation learning
−0.10 (0.03)
Innovation learning × government org.
0.17 (0.02)
Negative reciprocity
Negative reciprocity × government org. −0.01 (0.03)
Control
Inertia
Actor activity
Belief concept popularity
Monday (dummy)
Government (dummy)
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
0.13 (0.01)
−0.01 (0.02)
0.11 (0.01)
0.07 (0.04)
0.70 (0.04)
∗∗∗
∗∗∗
AIC
McFadden pseudo-R2
Num. events
Num. obs.
∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05; Coefficients are reported as log-odds.
54032.32
0.14
6044
883855
0.31 (0.01)
∗∗∗
0.11 (0.01)
∗∗∗
0.18 (0.01)
∗∗∗
∗∗∗
0.12 (0.01)
−0.02 (0.02)
∗∗∗
0.12 (0.01)
∗
0.08 (0.04)
∗∗∗
0.47 (0.04)
54113.86
0.13
6044
883855
Table 1: Results of the conditional logistic regression on the event rate.
39
Main hypotheses
Pos. reciprocity (γ+(i1, b))
Pos. reciprocity (γ−(i1, b))
Innovation learning (γ+(i1, b))
Innovation learning (γ−(i1, b))
Neg. reciprocity (γ+(i1, b))
Neg. reciprocity (γ−(i1, b))
Control
Inertia (γ+(a, b))
Inertia (γ−(a, b))
Popularity (γ+(i, b))
Popularity (γ−(i, b))
Intercept
(3)
∗∗∗
∗∗∗
1.18 (0.14)
−1.12 (0.11)
−0.03 (0.08)
−0.16 (0.07)
∗
−0.96 (0.12)
∗∗∗
∗∗∗
0.83 (0.10)
1.48 (0.11)
−1.51 (0.11)
0.60 (0.08)
−0.68 (0.06)
1.09 (0.06)
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
BIC
McFadden pseudo-R2
Num. obs.
∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05; Coefficients are reported as log-odds.
4850.22
0.37
6044
Table 2: Logistic regression on agreement with a given policy belief.
40
|
1612.05760 | 1 | 1612 | 2016-12-17T13:41:56 | Kleinberg's Grid Reloaded | [
"cs.SI",
"physics.soc-ph"
] | One of the key features of small-worlds is the ability to route messages with few hops only using local knowledge of the topology. In 2000, Kleinberg proposed a model based on an augmented grid that asymptotically exhibits such property. In this paper, we propose to revisit the original model from a simulation-based perspective. Our approach is fueled by a new algorithm that uses dynamic rejection sampling to draw augmenting links. The speed gain offered by the algorithm enables a detailed numerical evaluation. We show for example that in practice, the augmented scheme proposed by Kleinberg is more robust than predicted by the asymptotic behavior, even for very large finite grids. We also propose tighter bounds on the performance of Kleinberg's routing algorithm. At last, we show that fed with realistic parameters, the model gives results in line with real-life experiments. | cs.SI | cs |
Kleinberg's Grid Reloaded
Fabien Mathieu1
1 Nokia Bell Labs, route de Villejust, 91620 Nozay
[email protected]
Abstract
One of the key features of small-worlds is the ability to route messages with few hops only using
local knowledge of the topology. In 2000, Kleinberg proposed a model based on an augmented
grid that asymptotically exhibits such property.
In this paper, we propose to revisit the original model from a simulation-based perspective.
Our approach is fueled by a new algorithm that uses dynamic rejection sampling to draw aug-
menting links. The speed gain offered by the algorithm enables a detailed numerical evaluation.
We show for example that in practice, the augmented scheme proposed by Kleinberg is more ro-
bust than predicted by the asymptotic behavior, even for very large finite grids. We also propose
tighter bounds on the performance of Kleinberg's routing algorithm. At last, we show that fed
with realistic parameters, the model gives results in line with real-life experiments.
1998 ACM Subject Classification C.2.2 Routing Protocols; C.2.4 Distributed Systems
Keywords and phrases Small-World Routing; Kleinberg's Grid; Simulation; Rejection Sampling
Digital Object Identifier 10.4230/LIPIcs.OPODIS.2016.21
1
Introduction
In a prescient 1929 novel called Láncszemek (in English, Chains), Karinthy imagines that
any two people can be connected by a small chain of personal links, using no more than five
intermediaries [10].
Years later, Milgram validates the concept by conducting real-life experiments. He asks
volunteers to transmit a letter to an acquaintance with the objective to reach a target
destination across the United States [17, 20]. While not all messages arrive, successful
attempts reach destination after six hops in average, popularizing the notion of six degrees
of separation.
Yet, for a long time, no theoretical model could explain why and how this kind of small-
world routing works. One of the first and most famous attempts to provide such a model is
due to Jon Kleinberg [12]. He proposes to abstract the social network by a grid augmented
with shortcuts. If the shortcuts follow a heavy tail distribution with a specific exponent,
then a simple greedy routing can reach any destination in a short time (O(log2(n)) hops).
On the other hand, if the exponent is wrong, then the time to reach destination becomes
Ω(nα) for some α. This seminal work has led to multiple studies from both the theoretical
and empirical social systems communities.
Contribution
In this paper, we propose a new way to numerically benchmark the greedy routing algorithm
in the original model introduced by Kleinberg. Our approach uses dynamic rejection sam-
pling, which gives a substantial speed improvement compared to previous attempts, without
© Fabien Mathieu;
licensed under Creative Commons License CC-BY
20th International Conference on Principles of Distributed Systems (OPODIS 2016).
Editors: Panagiota Fatourou, Ernesto Jiménez and Fernando Pedone; Article No. 21; pp. 21:1 -- 21:16
Leibniz International Proceedings in Informatics
Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany
21:2
Kleinberg's Grid Reloaded
making any concession about the assumptions made in the original model, which is kept
untouched.
Fueled by the capacity to obtain quick and accurate results even for very large grids,
we give a fresh look on Kleinberg's grid, through three independent small studies. First,
we show that the model is in practice more robust than expected: for grids of given size
there is quite a large range of exponents that grant short routing paths. Then we observe
that the lower bounds proposed by Kleinberg in [12] are not tight and suggest new bounds.
Finally, we compare Kleinberg's grid to Milgram's experiment, and observe that when the
grid parameters are correctly tuned, the performance of greedy routing is consistent with
the six degrees of separation phenomenon.
Roadmap
Section 2 presents the original augmented grid model introduced by Kleinberg and the greedy
routing algorithm. A brief overview of the main existing theoretical and experimental studies
is provided, with a strong emphasis on the techniques that can be used for the numerical
evaluation of Kleinberg's model.
In Section 3, we give our algorithm for estimating the performance of greedy routing.
We explain the principle of dynamic rejection sampling and detail why it allows to perfectly
emulate Kleinberg's grid with the same speed that can be achieved by toroidal approxima-
tions. We also give a performance evaluation of the simulator based on our solution. For
readers interested in looking under the hood, a fully working code (written in Julia) is given
in Appendix A.
To show the algorithm benefits, we propose in Section 4 three small studies that investi-
gate Kleinberg's model from three distinct perspectives: robustness of greedy routing with
respect to the shortcut distribution (Section 4.1); tightness of the existing theoretical bounds
(Section 4.2); emulation of Milgram's experiment within Kleinberg's model (Section 4.3).
2 Model and Related Work
We present here the model and notation introduced by Kleinberg in [12, 11], some key results,
and a brief overview of the subsequent work on the matter.
2.1 Kleinberg's Grid
In [12], Kleinberg considers a model of directed random graph G(n, r, p, q), where n, p, q
are positive integers and r is a non-negative real number. A graph instance is built from
a square lattice of n × n nodes with Manhattan distance d:
if u = (i, j) and v = (k, l),
then d(u, v) = i − j + k − l. d represents some natural proximity (geographic, social, . . . )
between nodes. Each node has some local neighbors and q long range neighbors. The local
neighbors of a node u are the nodes v such that d(u, v) ≤ p. The q long range neighbors of
u, also called shortcuts, are drawn independently and identically as follows: the probability
that a given long edge starting from u arrives in v is proportional to (d(u, v))−r.
The problem of decentralized routing in a G(n, r, p, q) instance consists in delivering a
message from node u to node v in a hop-by-hop basis. At each step, the message bearer
needs to choose the next hop among its neighbors. The decision can only use the lattice
coordinates of the neighbors and destination. The main example of decentralized algorithm
is the greedy routing, where at each step, the current node chooses the neighbor that is
closest to destination based on d (in case of ties, an arbitrary breaking rule is used).
Fabien Mathieu
21:3
The main metric to analyze the performance of a decentralized algorithm is the expected
delivery time, which is the expected number of hops to transmit a message between two
nodes chosen uniformly at random in the graph.
This paper focuses on studying the performance of the greedy algorithm. Unless stated
otherwise, we assume p = q = 1 (each node has up to four local neighbors and one shortcut).
Let er(n) be the expected delivery time of the greedy algorithm in G(n, r, 1, 1).
2.2 Theoretical Results
The main theoretical results for the genuine model are provided in the original papers [11, 12],
where Kleinberg proves the following:
e2(n) = O(log2(n));
for 0 ≤ r < 2, the expected delivery time of any decentralized algorithm is Ω(n(2−r)/3);
for r > 2, the expected delivery time of any decentralized algorithm is Ω(n(r−2)/(r−1)).
Kleinberg's results are often interpreted as follows: short paths are easy to find only in the
case r = 2. The fact that only one value of r asymptotically works is sometimes seen as the
sign that Kleinberg's model is not robust enough to explain the small-world routing proposed
by Karinthy and experimented by Milgram. However, as briefly discussed by Kleinberg in
[5], there is in fact some margin if one considers a grid of given n. This tolerance will be
investigated in more details in Section 4.1.
While we focus here on the original model, let us give a brief, non-exhaustive, overview
of the subsequent extensions that have been proposed since. Most proposals refine the
model by considering other graph models or other decentralized routing algorithms. New
graph models are for example variants of the original model (studying grid dimension or the
number of shortcuts per node [2, 5, 9]), graphs inspired by peer-to-peer overlay networks [14],
or arbitrary graphs augmented with shortcuts [6, 8]. Other proposals of routing algorithms
usually try to enhance the performance of the greedy one by granting the current node
additional knowledge of the topology [7, 14, 15].
A large part of the work above aims at improving the O(log2(n)) bound of the greedy
routing. For example, in the small-world percolation model, a variant of Kleinberg's grid
with O(log(n)) shortcuts per node, greedy routing performs in O(log(n)) [14].
2.3 Experimental Studies
Many empirical studies have been made to study how routing works in real-life social net-
works and the possible relation with Kleinberg's model (see for example [13, 5] and the
references within). On the other hand, numerical evaluations of the theoretical models are
more limited to the best of our knowledge. Such evaluations are usually performed by
averaging R runs of the routing algorithm considered.
In [11], Kleinberg computes er(n) for n = 20, 000 and r ∈ [0, 2.5], using 1,000 runs per
estimate. However, he uses a torus instead of a regular grid (this will be discussed later in
the paper). In [14], networks of size up to 224 (corresponding to n = 212 in the grid) are
investigated using 150 runs per estimate.
Closer to our work, Athanassopoulos et al. propose a study centered on numerical
evaluation that looks on Kleinberg's model and some variants [1]. For the former, they
differ from the original model by having fixed source and destination nodes. They compute
er(n) for values of n up to 3,000 and r ∈ {0, 1, 2, 3}, using 900 runs per estimate.
To compare with, in the present paper, we consider values of n up to 224 ≈ 16, 000, 000
and r ∈ [0, 3], with at least 10,000 runs per estimate. To explain such a gain, we first need
O P O D I S 2 0 1 6
21:4
Kleinberg's Grid Reloaded
to introduce the issue of shortcuts computation.
2.3.1 Drawing shortcuts
As stated in [1], the main computational bottleneck for simulating Kleinberg's model comes
from the shortcuts.
There are n2 shortcuts in the grid (assuming q = 1);
When one wants to a shortcut, any of the n2 − 1 other nodes can be chosen with non-null
probability. This can be made by inverse transform sampling, with a cost Ω(n2);
The shortcut distribution depends on the node u considered, even if one uses relative
coordinates. For example, a corner node will have i + 1 neighbors at distance i for
1 ≤ i < n, against 4i neighbors for inner nodes (as long as the ball of radius i stays
inside the grid). This means that, up to symmetry, each node has a unique shortcut
distribution1. This prevents from mutualising shortcuts drawings between nodes.
In the end, building shortcuts as described above for each of the R runs has a time
complexity Ω(Rn4), which is unacceptable if one wants to evaluate er(n) on large grids.
The first issue is easy to address: as observed in [12, 14, 1], we can use the Principle
of deferred decision [18] and compute the shortcuts on-the-fly as the path is built, because
they are drawn independently and a node is never used twice in a given path. This reduces
the complexity to Ω(Rn2er(n)).
2.3.2 Torus approximation
To lower the complexity even more, one can approximate the grid by the torus. This is the
approach adopted in [11, 14]. The toroidal topology brings two major features compared to
a flat grid:
The distribution of the relative position of the shortcut does not depend on the originat-
ing node. This enables to draw shortcuts in advance (in bulk);
There is a strong radial symmetry, allowing to draw a "radius" and an "angle" separately.
To illustrate the gain of using a torus instead of a grid, consider the drawing of k shortcuts
from k distinct nodes. In a grid, if one uses inverse transform sampling for each corresponding
distribution, the cost is Ω(n2k).
In the torus, one can compute the probabilities to be
at distance i for i between 1 and n (the maximal distance in the torus), draw k radii,
then choose for each drawn radius i a node uniformly chosen among those at distance
i. Assuming drawing a float uniformly distributed over [0, 1) can be made in O(1), the
main bottleneck is the drawing of radii. Using bulk inverse transform sampling, it can
be performed in O(n + k log(k)), by sorting k random floats, matching then against the
cumulative distribution of radii and reverse sorting the result.
3
Fast Estimation of Expected Delivery Time
We now describe our approach for computing er(n) in the flat grid with the same complexity
than for the torus approximation.
1 To take advantage of symmetry, one can consider the isometric group of a square grid, which can be
built with the quarter-turn and flip operations. However, its size is 8, so even using symmetry, there
2
are at least n
8 distinct (non-isomorphic) distributions.
Fabien Mathieu
21:5
#3
#1
u
#2
Figure 1 Main idea of the dynamic rejection sampling approach (n = 4).
3.1 Dynamic rejection sampling for drawing shortcuts
In order to keep low computational complexity without making any approximation of the
model, we propose to draw a shortcut of a node u as follows:
1. We embed the actual grid G (we use here G to refer to the lattice nodes of G(n, r, p, q))
in a virtual lattice Bu made of points inside a ball of radius 2(n − 1). Note that the
radius chosen ensures that G is included in Bu no matter the location of u.
2. We draw a node inside Bu such that the probability to pick up a node v is proportional
to (d(u, v))−r. This can be done in two steps (radius and angle):
For the radius, we notice that the probability to draw a node at distance i is propor-
tional to i1−r, so we pick an integer between 1 and 2(n − 1) such that the probability
to draw i is to i1−r/ P2(n−2)
For the angle, pick an integer uniformly chosen between 1 and 4i
k1−r.
k=1
3. This determines a unique point v among the 4i points at distance i from u in the virtual
lattice, chosen with a probability proportional to (d(u, v))−r. If v belongs to the actual
grid, it becomes the shortcut, otherwise we try again (back to step #2).
This technique, illustrated in Figure 1, is inspired by the rejection sampling method [21].
By construction, it gives the correct distribution: the node v that it eventually returns is in
the actual grid and has been drawn with a probability proportional to (d(u, v))−r.
We call this dynamic rejection sampling because the sampled distribution changes with
the current node u. Considering u as a relative center, the actual grid G moves with u and
acts like an acceptance mask. On the other hand, the distribution over the virtual lattice
Bu remains constant. This enables to draw batches of relative shortcuts that can be used
over multiple runs, exactly like for the torus approximation.
The only possible drawback of this approach is the number of attempts required to draw
a correct shortcut. Luckily, this number is contained.
O P O D I S 2 0 1 6
✗
✗
✓
21:6
Kleinberg's Grid Reloaded
u
u
u
G
Gc
Hu
Figure 2 Graphical representation of G, Gc and Hu (n = 4). The sub-lattices used to built a
bijection between G and Gc (cf proof of Lemma 1) are represented with distinct shapes and gray
levels.
◮ Lemma 1. The probability that a node drawn in Bu belongs to G is at least 1
8 .
Proof. We will prove that
Pv∈G\{u}
Pv∈Bu\{u}
(d(u, v))−r
(d(u, v))−r >
1
8
.
We use the fact that the probability decreases with the distance combined with some
geometric arguments. Let Gc be a n × n lattice that has u as one of its corner. Let Hu the
(2n − 1) × (2n − 1) lattice centered in u.
In terms of probability of drawing a node in G \ {u}, the worst case is when u is at some
corner: there is a bijection f from G to Gc such that for all v ∈ G \ {u}, d(u, f (v)) ≥ d(u, v).
Such a bijection can be obtained by splitting G into G ∩ Gc and three other sub-lattices that
are flipped over G ∩ Gc (see Figure 2). This gives
X
(d(u, v))−r ≥ X
(d(u, f (v)))−r = X
(d(u, v))−r.
v∈G\{u}
v∈G\{u}
v∈Gc\{u}
Then we observe that the four possible lattices Gc obtained depending on the corner
occupied by u fully cover Hu. In fact, axis nodes are covered redundantly. This gives
X
(d(u, v))−r < 4 X
(d(u, v))−r.
v∈Hu\{u}
v∈Gc\{u}
Lastly, if one folds Bu \ Hu back into Hu like the corners of a sheet of paper, we get
a strict injection g from Bu \ Hu to Hu \ {u} (the diagonal nodes of Hu are not covered).
Moreover, for all v ∈ Bu \ Hu, d(u, v) ≥ d(u, h(v)). This gives
X
(d(u, v))−r ≤ X
(d(u, h(v)))−r < X
(d(u, v))−r.
v∈Bu\Hu
v∈Bu\Hu
v∈Hu\{u}
This concludes the proof, as we get
Pv∈G\{u}
Pv∈Bu\{u}
(d(u, v))−r
(d(u, v))−r ≥
(d(u, v))−r
Pv∈Gc\{u}
(d(u, v))−r + Pv∈Bu\Hu
(d(u, v))−r >
1
8
.
Pv∈Hu\{u}
◭
Fabien Mathieu
21:7
r = 2.5
r = 1
r = 2
)
s
d
n
o
c
e
s
(
e
m
i
t
g
n
i
n
n
u
R
101
100
10−1
103
104
105
106
107
n
Figure 3 Computing er(n) using R = 10, 000 runs
Remarks
n2−1
4(n−1)(2n−1) −→
n→+∞
When r = 0 (uniform shortcut distribution), the bound 1
8 is asymptotically tight: the
success probability is exactly the ratio between the number of nodes in G \ {u} and
1
8 . On the other hand, as r grows, the probability
Bu \ {u}, which is
mass gets more and more concentrated around u (hence in G), so we should expect better
performance (cf Section 3.2).
The dynamic rejection sampling approach can be used in other variants of Kleinberg's
model, like for other dimensions or when the number of shortcuts per node is a random
variable (like in [9]). The only requirement is the existence of some root distribution
(like the distribution over Bu here) that can be carved to match any of the possible
distributions with a simple acceptance test.
Only the nodes from Hu may belong to G, so nodes from Bu \ G are always sampled
for nothing. For example, in Figure 1, this represents 36 nodes over 84. By drawing
shortcuts in Hu \ {u} instead of Bu \ {u}, we could increase the success rate lower bound
to 1/4. However, this would make the algorithm implementation more complex (the
number of nodes at distance i is not always 4i), which is in practice not worth the factor
2 improvement of the lower bound. This may not be true for a higher dimension β.
Adapting the proof from Lemma 1, we observe that using a ball of radius β(n − 1) will
lead to a bound β!(2β)−β, while a grid of side 2n − 1 will lead to 2−β. The two bounds
are asymptotically tight for r = 0. In that case the grid approach is ββ
β! more efficient
than the ball approach (this grows exponentially with β).
3.2 Performance Evaluation
We implemented our algorithm in Julia 0.4.5. A working code example is provided in
Appendix A. Simulations were executed on a low end device (a Dell tablet with 4 Gb RAM
and Intel M-5Y10 processor), which was largely sufficient for getting fast and accurate results
on very large grids, thanks to the dynamic rejection sampling.
Unless said otherwise, er(n) is obtained by averaging R = 10, 000 runs. For n, we mainly
O P O D I S 2 0 1 6
21:8
Kleinberg's Grid Reloaded
1
0.8
0.6
0.4
0.2
e
t
a
r
s
s
e
c
c
u
S
0
0
0.5
1
1.5
r
2
2.5
3
Figure 4 Frequency of shortcuts drawn in Bu that belongs to G observed during a computation
of er(n) (n = 214)
consider powers of two ranging from 27 (about 16,000 nodes) to 224 (about 280 trillions
nodes). We focus on r ∈ [0, 3].
Regarding the choice of the bulk size k (we assume here the use of bulk inverse transform
sampling), the average number of shortcuts to draw over the R runs is Rer(n). This leads to
an average total cost for drawing shortcuts in O(⌈ Rer (n)
⌉(n+k log(n))). k can be optimized if
er(n) is known, but this requires bootstrapping the estimation of er(n). Yet, we can remark
that for n fixed and R large enough, we should choose k of the same order of magnitude
than n, which ensures an average cost per shortcut in O(log(n)). This is the choice we made
in our code, which gives a complexity in O(max(Rer(n), n) log(n)). This is not efficient for
n ≫ Rer(n) (the bulk is then over-sized, so lot of unused shortcuts are drawn), but this
seldom happens with our settings.
k
Figure 3 presents the time needed to compute er(n) as a function of n for r ∈ {1, 2, 5
2 }.
We observe running times ranging from seconds to a few minutes. To compare with, in [1],
which is to the best of our knowledge the only work disclosing computation times, one single
run takes about 4 seconds for n = 400. With a similar time budget, our implementation
averages 10,000 runs for n = 217 ≈ 130, 000 (r = 1 or r = 2.5), or up to n = 224 ≈ 16, 000, 000
for the optimal exponent r = 2. In other words, we are several orders of magnitude faster.
We also looked at the cost of the dynamic rejection sampling approach in terms of
shortcuts drawn outside of G. Figure 4 shows the success frequency of the sampling as a
function of r for n = 214 (the actual value of n has no significant impact as long as it is
large enough). We verify Lemma 1: the success rate is always at least 1/8 = 0.125, which
is a tight bound for r = 0. For r = 1, the rate is about 0.29, and it climbs to 0.86 for r = 2.
Failed shortcuts become negligible (rate greater than 0.99) for r ≥ 2.5. Overall, Figure 4
shows that the cost of drawing some shortcuts outside G is a small compared to the benefits
offered by drawing shortcuts from a unique distribution.
Fabien Mathieu
21:9
103
)
0
0
0
,
0
2
(
r
e
102
0
0.5
1
1.5
r
2
2.5
3
Figure 5 Expected delivery time for n = 20, 000
Remark
In terms of success rate, Figure 4 shows that r = 2.5 is much more efficient than r = 1, but
running times tend to be slightly longer for r = 2.5 (cf Figure 3). The reason is that e1(n)
is lower than e2.5(n), which overcompensates the success rate difference.
4
Applications
Given the tremendous amount of strong theoretical results on small-world routing, one can
question the interest of proposing a simulator (even a fast one!).
In this Section, we prove the interest of numerical evaluation through three (almost)
independent small studies.
4.1 Efficient enough exponents
In [11], Kleinberg gives an estimation of er(20, 000) using a torus approximation (cf Section
2.3.2). A few years later, he discussed in more details the results, observing that [5]:
er(n) stays quite similar for r ∈ [1.5, 2];
the best value of r is actually slightly lower than 2.
We believe that these observations are very important as they show that routing in
Kleinberg's grid is more robust than predicted by theory: it is efficient as long as r is close
enough to 2.
Using our simulator, we can perform the same experiment. As shown by Figure 5, the
results are quite similar to the ones observed in [11].
Yet, there is a small but essential difference between the two experiments: Kleinberg
approximated his grid by a torus while we stay true to the original model. Why do we
use the word essential? Both shapes have the same asymptotic behavior (proofs in [11] are
straightforward to adapt), so why should we care? It seems to us that practical robustness is
an essential feature if one wants to accept Kleinberg's grid as a reasonable model for routing
in social networks. To the best of our knowledge, no theoretical work gives quantitative
O P O D I S 2 0 1 6
21:10
Kleinberg's Grid Reloaded
2.5
2
1.5
r
1
0.5
0
rmax(2e2(n))
ropt(n)
rmin(e2(n))
rmin(2e2(n))
103
104
105
106
107
n
Figure 6 Reasonable values of r
results on this robustness, so we need to rely on numerical evaluation. But when Kleinberg
uses a torus approximation, we can not rule out that the observed robustness is a by-side
effect of the toroidal topology. The observation of a similar phenomenon on a flat grid
discards this hypothesis.
In fact, it suggests (without proving) that the robustness with
respect to the exponent for grids of finite size may be a general phenomenon.
We propose now to investigate this robustness in deeper details. We have evaluated
the following values, which outline, for a given n, the values of r that can be considered
reasonable for performing greedy routing:
The value of r that minimizes er(n), denoted ropt;
The smallest value of r such that er(n) ≤ e2(n), denoted rmin(e2(n));
The smallest and largest values of r such that er(n) ≤ 2e2(n), denoted rmin(2e2(n)) and
rmax(2e2(n)) respectively.
The results are displayed in Figure 6. All values but ropt are computed by bisection.
For ropt, we use a Golden section search [19]. Finding a minimum requires more accuracy,
so the search of ropt is set to use R = 1, 000, 000 runs per estimation. Luckily, as the
computation operates by design through near-optimal values, we can increase the accuracy
with reasonable running times.
Besides confirming that r = 2 is asymptotically the optimal value, Figure 6 shows that
the range of reasonable values for finite grids is quite comfortable. For example, considering
the range of values where er(n) is less than twice e2(n), we observe that:
For n ≤ 211 (less than four million nodes), any r between 0 and 2.35 works;
For n ≤ 214 (less than 270 million nodes), the range is between 0.85 and 2.26.
Even for n = 224 (about 280 trillions nodes), all values of r between 1.58 and 2.16 can
still be considered efficient enough.
4.2 Asymptotic Behavior
Our simulator can be used to verify the theoretical bounds proposed in [12]. For example,
Figure 7 shows er(n) for r equal to 1, 2, and 5
2 .
Fabien Mathieu
21:11
r = 1
r = 2
r = 5
2
103
102
102.5
102
101.5
e1(n)
2√n
104
103
102
e2(n)
log2(n)−10
2
e2.5(n)
7√n
103
105
n
107
103
105
n
107
103
105
n
107
Figure 7 Expected delivery time for different values of r
α1
α2
2−r
3−r
r − 2
Lower bound ([12])
1
0.8
0.6
0.4
0.2
α
0
0
0.5
1
1.5
2.5
3
3.5
4
2
r
Figure 8 Estimates of the exponent α
As predicted, er(n) seems to behave like log2(n) for r = 2 and like nα for the two other
cases. Yet, the exponents found differ from the ones proposed in [12]. For both r = 1 and
r = 2.5, we observe α = 1
3 . Intrigued by the difference, we want
to compute α as a function of r.
2 , while the lower bound is 1
However, we see in Figure 7 that a log2(n) curve appears to have a positive slope in a
logarithmic scale, even for large values of n. This may distort our estimations. To control
the possible impact of this distortion, we estimate the exponent at two distinct scales:
n ∈ [215, 220], using the estimation α1 := log2(er (220))−log2(er (215))
n ∈ [220, 224], using the estimation α2 := log2(er (224))−log2(er (220))
5
4
;
.
The Results are displayed in Figure 8. The range of r was extended to [0, 4] due to the
observation of a new transition for r = 3
As feared, our estimations do not indicate 0 for r = 2, but the fact that α2 is closer to
0 than α1 confirms that this is likely caused by the log2(n) factor. Moreover, we observe
that α1 and α2 only differ for r ≈ 2 and r ≈ 3, suggesting that both estimates should be
accurate except for these critical values.
Based on Figures 7 and 8, it seems that the bounds proposed by Kleinberg in [12] are
only tight for r = 0 and r = 2. Formally proving more accurate bounds is beyond the scope
O P O D I S 2 0 1 6
21:12
Kleinberg's Grid Reloaded
and spirit of this paper, but we can conjecture new bounds hinted by our simulations:
3−r );
For 0 ≤ r < 2, we have er(n) = Θ(n
For 2 < r < 3, we have er(n) = Θ(nr−2);
For r > 3, we have er(n) = Θ(n).
2−r
This conjectured bounds are consistent with the one proposed in [2], where it is proved
that for the 1-dimensional ring, we have:
1−r
2−r );
For 0 ≤ r < 1, er(n) = Ω(n
For r = 1, er(n) = Θ(log2(n))
For 1 < r < 2, er(n) = O(nr−1);
For r = 2, er(n) = O(n log(log(n))
For r > 2, er(n) = O(n).
log(n)
)
It is likely that the proofs in [2] can be adapted to the 2-dimensional grid, but some
additional work may be necessary to demonstrate the bounds' tightness. Moreover, our
estimates may have missed some slower-than-polynomial variations. For example, the log-
arithms in the bounds for r = 2 in [2] may have a counterpart in the grid for r = 3. This
would explain why the estimates are not sharp around that critical value (like for the case
r = 2 and the term in log2(n)).
Remark
For r ≥ 3.5, we have observed that er(n) ≈ 2
3 n, which is the expected delivery path in
absence of shortcuts: for these high values of r, almost all shortcuts link to an immediate
neighbor of the current node, which make them useless, and the rare exceptions are so short
that they make no noticeable difference.
4.3 Six degrees of separation
What makes Milgram's experiments [17, 20] so famous is the surprising observation that
only a few hops are required to transmit messages in social networks, a phenomenon called
six degrees of separation in popular culture.
Yet, the values of er(n) observed until now are quite far for the magic number six. For
example, in Figure 5, the lowest value is 140. In addition to the asymptotic lack of robustness
with respect to the exponent (discussed in Section 4.1), this may partially motivate the
amount of work accomplished to increase the realism of the model and the performance of
the routing algorithm.
In our opinion, a good model should be as simple as possible while being able to accurately
predict the phenomenon that needs to be explained. We propose here to answer a simple
question: is the genuine model of greedy routing in G(n, r, p, q) a good model? Sure, it is
quite simple. To discuss its accuracy, we need to tune the four parameters n, r, p and q to
fit the conditions of Milgram's experiments as honestly as we can.
Size The experiments of Milgram were conducted in the United States, with a population of
about 200,000,000 at the late sixties. All inhabitants were not susceptible to participate
to the experiments: under-aged, undergraduate or disadvantaged people may be con-
sidered as de facto excluded from the experiments. Taking that into consideration, the
correct n is probably somewhere in the range [5000, 14000]. We propose to set n = 8, 500,
which corresponds to about 72,000,000 potential subjects.
Fabien Mathieu
21:13
20
15
10
5
)
0
0
5
,
8
=
n
(
i
e
m
T
y
r
e
v
i
l
e
D
d
e
t
c
e
p
x
E
p = 1, q = 600
p = 10, q = 380
p = 15, q = 120
0
0
0.5
1
1.5
r
2
2.5
3
Figure 9 Performance of greedy routing for parameters inspired by Milgram's experiments.
Exponent In [5], Kleinberg investigates how to relate the r-harmonic distribution with real-
life observations. He surveys multiple social experiments and discusses the correspon-
dence with the exponent of his model, which gives estimates of r between 1.75 and 2.2.
Neighborhood The default value p = q = 1 means that there are no more than five "ac-
quaintances" per node. This is quite small compared to what is observed in real-life
social networks. For example, the famous Dunbar's number, which estimates the num-
ber of active relationships, is 150 [4]. More recent studies seem to indicate that the
average number of acquaintances is larger, ranging from 250 to 1500 (see [3, 16, 22] and
references within). We propose to set p and q so that the neighborhood size 2p(p + 1) + q
is about 600, the value reported in [16]. Regarding the partition between local links (p)
and shortcuts (q), we consider three typical scenarios:
p = 1, q = 600 (shortcut scenario: the neighborhood is almost exclusively made of
shortcuts, and local links are only here to ensure the termination of greedy routing).
p = 10, q = 380 (balanced scenario).
p = 15, q = 120 (local scenario, with a value of q not too far from Dunbar's number).
Having set all parameters, we can evaluate the performance of greedy routing. The
results are displayed in Figure 9. We observe that the expected delivery time roughly stands
between five and six for a wide range of exponents.
r ∈ [1.4, 2.3] for the shortcut scenario.
r ∈ [1.3, 2.3] for the balanced scenario.
r ∈ [1.3, 2] for the local scenario.
Except for the local scenario, which leads to slightly higher routing times for r > 2, the six
degrees of separation are achieved for all values of r that are consistent with the observa-
tions surveyed in [5]. This allows to answer our question: the augmented grid proposed by
Kleinberg is indeed a good model to explain the six degrees of separation phenomenon.
O P O D I S 2 0 1 6
21:14
Kleinberg's Grid Reloaded
5
Conclusion
We proposed an algorithm to evaluate the performance of greedy routing in Kleinberg's grid.
Fueled by a dynamic rejection sampling approach, the simulator based on our solution per-
forms several orders of magnitude faster than previous attempts. It allowed us to investigate
greedy routing under multiple perspective.
We noted that the performance of greedy routing is less sensitive to the choice of the
exponent r than predicted by the asymptotic behavior, even for very large grids.
We observed that the bounds proposed in [12] are not tight except for r = 0 and r =
2. We conjectured that the tight bounds are the 2-dimensional equivalent of bounds
proposed in [2] for the 1-dimensional ring.
We claimed that the model proposed by Kleinberg in [12, 11] is a good model for the six
degrees of separation, in the sense that it is very simple and accurate.
Our simulator is intended as a tool to suggest and evaluate theoretical results, and
possibly to build another bridge between theoretical and empirical study of social systems.
We hope that it will be useful for researchers from both communities. In a future work,
we plan to make our simulator more generic so it can handle other types of graph and
augmenting schemes.
References
1
2
3
Stavros Athanassopoulos, Christos Kaklamanis, Ilias Laftsidis, and Evi Papaioannou. An
experimental study of greedy routing algorithms.
In High Performance Computing and
Simulation (HPCS), 2010 International Conference on, pages 150 -- 156, June 2010.
Lali Barrière, Pierre Fraigniaud, Evangelos Kranakis, and Danny Krizanc. Efficient routing
in networks with long range contacts. In Proceedings of the 15th International Conference
on Distributed Computing, DISC '01, pages 270 -- 284, London, UK, 2001.
Ithiel de Sola Pool and Manfred Kochen. Contacts and influence. Social Networks, 1:5 -- 51,
1978.
4 R. I. M. Dunbar. Neocortex size as a constraint on group size in primates. Journal of
Human Evolution, 22(6):469 -- 493, June 1992.
8
5 David Easley and Jon Kleinberg. The small-world phenomenon. In Networks, Crowds, and
Markets: Reasoning About a Highly Connected World, chapter 20, pages 611 -- 644. Cam-
bridge University Press, 2010.
Pierre Fraigniaud, Cyril Gavoille, Adrian Kosowski, Emmanuelle Lebhar, and Zvi Lotker.
Universal Augmentation Schemes for Network Navigability: Overcoming the p(n)-Barrier.
Theoretical Computer Science, 410(21-23):1970 -- 1981, 2009.
Pierre Fraigniaud, Cyril Gavoille, and Christophe Paul. Eclecticism shrinks even small
worlds. Distributed Computing, 18(4):279 -- 291, 2006.
Pierre Fraigniaud and George Giakkoupis. On the searchability of small-world networks
with arbitrary underlying structure. In Proceedings of the 42nd ACM Symposium on Theory
of Computing (STOC), pages 389 -- 398, June 6 -- 8 2010.
Pierre Fraigniaud and George Giakkoupis. Greedy routing in small-world networks with
power-law degrees. Distributed Computing, 27(4):231 -- 253, 2014.
Frigyes Karinthy. Láncszemek, 1929.
Jon Kleinberg. Navigation in a small world. Nature, August 2000.
Jon Kleinberg. The small-world phenomenon: An algorithmic perspective. In in Proceedings
of the 32nd ACM Symposium on Theory of Computing, pages 163 -- 170, 2000.
9
6
7
10
11
12
Fabien Mathieu
21:15
13 David Liben-Nowell, Jasmine Novak, Ravi Kumar, Prabhakar Raghavan, and Andrew
Tomkins. Geographic routing in social networks. Proceedings of the National Academy
of Sciences of the United States of America, 102(33):11623 -- 11628, 2005.
14 Gurmeet Singh Manku, Moni Naor, and Udi Wieder. Know thy neighbor's neighbor: The
power of lookahead in randomized P2P networks. In Proceedings of the Thirty-sixth Annual
ACM Symposium on Theory of Computing (STOC), pages 54 -- 63. ACM, 2004.
15 Chip Martel and Van Nguyen. Analyzing kleinberg's (and other) small-world models. In
Proceedings of the Twenty-third Annual ACM Symposium on Principles of Distributed Com-
puting, PODC '04, pages 179 -- 188, New York, NY, USA, 2004. ACM.
16 Tyler H. McCormick, Matthew J. Salganik, and Tian Zheng. How many people do you
know?: Efficiently estimating personal network size. Journal of the American Statistical
Association, 105(489):59 -- 70, 2010.
Stanley Milgram. The small world problem. Psychology Today, 67(1):61 -- 67, 1967.
17
18 Michael Mitzenmacher and Eli Upfal. Probability and Computing: Randomized Algorithms
and Probabilistic Analysis. Cambridge University Press, New York, NY, USA, 2005.
19 William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Min-
imization or maximization of functions.
In Numerical Recipes 3rd Edition: The Art of
Scientific Computing, chapter 10. Cambridge University Press, New York, NY, USA, 3
edition, 2007.
Jeffrey Travers and Stanley Milgram. An experimental study of the small world problem.
Sociometry, 32:425 -- 443, 1969.
John von Neumann. Various techniques used in connection with random digits. Nat. Bureau
Standards, 12:36 -- 38, 1951.
21
20
22 Barry Wellman. Is Dunbar's number up? British Journal of Psychology, 2011.
O P O D I S 2 0 1 6
21:16
Kleinberg's Grid Reloaded
A
Code for Expected Delivery Time (tested on Julia Version 0.4.5)
using S t a t s B a s e # For u s i n g J u l i a b u i l t −i n sample f u n c t i o n
function s h o r t c u t s _ b u l k ( n , probas , b u l k _ s i z e )
r a d i i = sample ( 1 : ( 2 ∗ n −2) , probas , b u l k _ s i z e )
s h o r t c u t s = Tuple { Int ,
f o r i = 1 : b u l k _ s i z e
r a d i u s = r a d i i [ i ]
a n g l e = f l o o r (4∗ r a d i u s ∗ rand ()) −2∗ r a d i u s
push ! ( s h o r t c u t s ,
( ( r a d i u s −abs ( a n g l e ) ) ,
I n t } [ ]
( s i g n ( a n g l e ) ∗ ( r a d i u s −abs ( r a d i u s −abs ( a n g l e ) ) ) ) ) )
end
return s h o r t c u t s
end
r , p , q , R)
the Expected D e l i v e r y Time f o r G( n ,
# E s t i m a t e s
function edt ( n ,
b u l k _ s i z e = n
probas = w e i g h t s ( 1 . / ( 1 : ( 2 ∗ n − 2 ) ) . ^ ( r −1))
s h o r t c u t s = s h o r t c u t s _ b u l k ( n , probas , b u l k _ s i z e )
s t e p s = 0
f o r i = 1 :R
r , p , q ) o v e r R runs
s t a r t / c u r r e n t node ; a :
# s :
s_x , s_y , a_x , a_y = t u p l e ( rand ( 0 : ( n −1) , 4 ) . . . )
d = abs ( s_x − a_x ) + abs ( s_y − a_y )
while d>0
t a r g e t node ; d : d i s t a n c e t o t a r g e t
sh_y = −1, −1 # sh w i l l be b e s t
sh_x ,
d_s = 2∗n # d_s w i l l be d i s t a n c e from sh t o a
f o r j = 1 : q # Draw q s h o r t c u t s
s h o r t c u t node
ch_x , ch_y = −1, −1 # ch w i l l be c u r r e n t
c_s = 2∗n # c_s w i l l be d i s t a n c e from ch t o a
# Dynamic r e j e c t i o n s ampling
while ( ch_x < 0 ch_x >= n ch_y < 0 ch_y >= n )
s h o r t c u t
r_x , r_y = pop ! ( s h o r t c u t s )
ch_x , ch_y = s_x + r_x ,
i f
is empty ( s h o r t c u t s )
s_y + r_y
s h o r t c u t s = s h o r t c u t s _ b u l k ( n , probas , b u l k _ s i z e )
end
end
c_s = abs ( a_x − ch_x ) + abs ( a_y − ch_y )
i f c_s < d_s # maintain b e s t
s h o r t c u t found
d_s = c_s
sh_x ,
sh_y = ch_x , ch_y
end
end
i f d_s < d−p # Follow s h o r t c u t
i f
e f f i c i e n t
s_y = sh_x , sh_y
s_x ,
d = d_s
e l s e # Follow l o c a l
l i n k s
d = d − p
delta_x = min ( p , abs ( a_x − s_x ) )
delta_y = p − delta_x
s_x += delta_x ∗ s i g n ( a_x − s_x )
s_y += delta_y ∗ s i g n ( a_y − s_y )
end
s t e p s += 1
end
end
s t e p s /= R
return s t e p s
end
|
1207.0017 | 1 | 1207 | 2012-06-29T20:42:21 | Identifying Topical Twitter Communities via User List Aggregation | [
"cs.SI",
"physics.soc-ph"
] | A particular challenge in the area of social media analysis is how to find communities within a larger network of social interactions. Here a community may be a group of microblogging users who post content on a coherent topic, or who are associated with a specific event or news story. Twitter provides the ability to curate users into lists, corresponding to meaningful topics or themes. Here we describe an approach for crowdsourcing the list building efforts of many different Twitter users, in order to identify topical communities. This approach involves the use of ensemble community finding to produce stable groupings of user lists, and by extension, individual Twitter users. We examine this approach in the context of a case study surrounding the detection of communities on Twitter relating to the London 2012 Olympics. | cs.SI | cs |
Identifying Topical Twitter Communities
via User List Aggregation
Derek Greene, Derek O'Callaghan, P´adraig Cunningham
School of Computer Science & Informatics, University College Dublin
{derek.greene,derek.ocallaghan,padraig.cunningham}@ucd.ie
Abstract. A particular challenge in the area of social media analysis is
how to find communities within a larger network of social interactions.
Here a community may be a group of microblogging users who post con-
tent on a coherent topic, or who are associated with a specific event or
news story. Twitter provides the ability to curate users into lists, corre-
sponding to meaningful topics or themes. Here we describe an approach
for crowdsourcing the list building efforts of many different Twitter users,
in order to identify topical communities. This approach involves the use
of ensemble community finding to produce stable groupings of user lists,
and by extension, individual Twitter users. We examine this approach
in the context of a case study surrounding the detection of communities
on Twitter relating to the London 2012 Olympics.
1
Introduction
A wide variety of community finding techniques have been proposed in the liter-
ature, with recent research focusing on the challenge of identifying overlapping
communities [1]. In the case of microblogging data, researchers have been in-
terested in the identification of communities of users on Twitter, who produce
tweets on a common topic, who belong to the same demographic, or who share
a common ideological viewpoint [2]. These approaches have generally relied on
explicit views of the Twitter network, such as follower relations or retweets.
Twitter users can organise the accounts that they follow into Twitter user
lists, as shown in Fig. 1. These lists are used in a variety of ways. In some cases
they may correspond to personal lists of a given user's friends and families, but
frequently lists are employed to group together Twitter accounts based on a
common topic or theme. In this way, every Twitter user can effectively become
a community curator. Notably, journalists from news organisations such as The
Telegraph and Storyful curate lists relevant to a given news story or event,
as a means of monitoring breaking news. Recently, Kim et al. and Garc´ıa-Silva
et al. [3, 4] both discussed the potential of user lists to provide latent annotations
for Twitter user profiles, while Wu et al. [5] suggested user lists as a means of
harnessing the "wisdom of the crowds" on Twitter.
Our primary goal here is to demonstrate that topical communities can be
identified by harnessing the "crowd-sourced" list building efforts of a large base
of Twitter users. In Section 3, we show that this can be done by constructing
Fig. 1. User list, curated by The Telegraph, covering athletes, journalists, and organi-
sations involved in the London 2012 Summer Olympics.
a graph based on the similarity of user list memberships, and then using an
ensemble community finding approach to find robust, overlapping groups of lists
within this graph, from which user communities can be derived. We use stabil-
ity information derived from the ensemble as a proxy for the reliability of the
communities. In Section 4, we evaluate the proposed techniques on a case study
relating to coverage of the London 2012 Olympics on Twitter.
2 Related Work
2.1 Microblogging Analysis
Many researchers have become interested in exploring the network structure
within the Twitter network, given the potential for Twitter to facilitate the
rapid spread of information. Java et al. [2] provided an initial analysis of the
early growth of the network, and also performed a small-scale evaluation that
indicated the presence of distinct Twitter user communities, where the mem-
bers share common interests as reflected by the terms appearing in their tweets.
Kwak et al. [6] performed an evaluation based on a sample of 41.7 million users
and 106 million tweets from a network mining perspective. The authors studied
aspects such as: identifying influential users, information diffusion, and trending
topics. Shamma et al. [7] performed an analysis on microblogging activity dur-
ing the 2008 US presidential debates. The authors demonstrated that frequent
terms reflected the topics being discussed, but the use of informal vocabulary
complicated topic identification.
Typically researchers have focused either on Twitter users from the perspec-
tive of the content that they produce, or in terms of explicit network representa-
tions based on follower relations or retweeting activity [6]. However, preliminary
work by Kim et al. [3] suggested that latent groups and relations in Twitter
data could be extracted by examining user list data. Wu et al. [5] suggested
that user list memberships could be used to organise users into a pre-defined
set of categories: celebrities, media, organisations, and blogs. Having classified
the users, important or "elite" users within each category were identified based
on the number of lists to which each user was assigned. Garc´ıa-Silva et al. [4]
described approaches for extracting semantic relations from user lists, by con-
structing relations between co-occurring keywords taken from list names. In the
context of list curation, Greene et al. [8] showed that co-listed links could be used
as one potential way to recommend users who may belong to the "community"
surrounding a breaking news story.
2.2 Community Finding
Many different algorithms have been proposed to identify communities in graphs,
based on different combinations of objective functions and search strategies [1].
Recently, considerable focus has been given to identifying communities in highly-
overlapping, weighted networks. A widely-employed algorithm in this area is
OSLOM (Order Statistics Local Optimization Method), introduced by Lan-
cichinetti et al. [9]. Kwak et al. [10] observed that many community detection
algorithms can produce inconsistent results, due to stochastic elements in their
optimisation process. Lancichinetti & Fortunato [11] demonstrated that this also
applied to OSLOM, and proposed an ensemble approach to generate stable re-
sults out of a set of multiple partitions.
In the more general cluster analysis literature, ensemble clustering methods
have been previously developed to address such issues. These methods typically
involve generating a diverse set of "base clusterings", which are then aggregated
to produce a consensus solution [12 -- 14]. The most popular aggregation strategy
has been to use information derived from different clusterings to determine the
level of association between each pair of items in a dataset [12, 13]. This strategy
was motivated by the observation that pairwise co-assignments, averaged over
a sufficiently large number of clusterings, may be used to induce a new, more
robust measure of similarity on the data.
3 Methods
In this section, we introduce an approach that aggregates user list information
to generate communities. Firstly, we describe the construction of a graph repre-
sentation of user lists, based on their membership overlaps. Then in Section 3.2
we describe an ensemble approach to identify overlapping groups of user lists.
The stability of these groups is assessed as described in Section 3.3, and the
selection of community labels is discussed in Section 3.4. Finally, the derivation
of corresponding communities for individual users is discussed in Section 3.5.
3.1 User List Graph Construction
We construct a graph G of l nodes, where each node represents a distinct Twitter
user list Lx. A weighted edge exists between a pair of lists if they share users in
common. Rather than using the raw intersection size between a pair, we make
allowance for the significance of the intersection size relative to the size of the
two lists, and the total number of users assigned to lists n. For a pair (Lx, Ly),
we compute a p-value to indicate the significance of the probability of observing
at least Lx ∩ Ly users from Lx within another list of size Ly:
(cid:0)Lx
(cid:1)(cid:0)n−Lx
(cid:1)
(cid:0) nLy
(cid:1)
Lx∩Ly−1(cid:88)
P V (Lx, Ly) = 1 −
j=0
j
Ly−j
(1)
To improve interpretability, we compute the associated log p-value:
LP V (Lx, Ly) = −log (P V (Lx, Ly))
(2)
where a larger value is more significant. We consider Eqn. 2 as a measure of the
similarity between a pair of user lists, corrected for chance. To further increase
the sparseness of the graph, we remove edges with weights LP V < ρ for a weight
threshold ρ. Increasing the value of ρ will result in an increasingly sparse graph.
3.2 Combining Overlapping Communities
We will naturally expect that different topical communities will potentially over-
lap with one another. To identify communities of lists, we apply the OSLOM
algorithm which has been shown to out-perform other community finding ap-
proaches [9]. However, as noted in [11], OSLOM can produce unstable results.
Following the CSPA ensemble aggregation approach [13], and the method for
combining network partitions [11], we now describe an approach for generating
and combining an ensemble of overlapping community sets. Given an initial
user list graph G, we construct a symmetric l × l consensus matrix M. For the
purpose of generating a collection of r base community sets, we apply the OSLOM
algorithm [9] using a different initial random seed for each run. Motivated by
the notion an ensemble of weak clusterings [14], we use the "fast" configuration
of OSLOM, which uses a minimal number of optimisation iterations.
After generating a base community set, for each unique pair of nodes (Lx, Ly)
in network, we compute the Jaccard similarity between the sets of community
labels assigned to those nodes by OSLOM. If the pair are not both co-assigned to
any community, the score is 0. If the pair are present in all communities together,
the score is 1. However, unlike the binary approach of [11], if the pair are present
in some but not all communities together, the Jaccard score will reflect this. See
Fig. 2 for examples. In the case of non-overlapping partitions, the score will
reduce to the binary scoring used in [11]. After computing all Jaccard scores,
we increment the corresponding matrix entries in M. Note that, by definition,
singleton communities are ignored during this aggregation process.
Fig. 2. Four different cases of computing the Jaccard similarity between the sets of
community labels assigned to two nodes Lx and Ly. The Jaccard scores respectively
are: (a) 0.0, (b) 1.0, (c) 1.0, (d) 0.5.
Once all r base community sets have been generated, M is normalised by
1/r to give a matrix with entries ∈ [0, 1]. To find the consensus communities, we
follow a similar approach to that used by [11]. We construct a new undirected
weighted graph such that, for every unique pair of nodes (Lx, Ly), we create an
edge with weight Mxy if Mxy ≥ τ . The threshold parameter τ ∈ [0, 1] controls the
sparsity of the graph. We then apply OSLOM to this graph for a large number
of iterations (≈ 50) to produce a final grouping of the user lists in G.
3.3 Evaluating Community Stability
When applying community detection, often we may wish to examine the most
reliable or robust communities with the strongest signals in the network. Here,
we rank the consensus communities generated as described in Section 3.2, based
on the cohesion of their members with respect to the consensus matrix M. A
more stable consensus community will consist of user lists which were frequently
co-assigned to one or more communities across all r base community sets.
For a given consensus community C of size c, we compute the mean of the
values Mxy for all unique pairs (Lx, Ly) assigned to C; this value has the range
∈ [0, 1]. We then compute the mean expected value for a community of size c as
follows: randomly select c unique nodes from G, and compute their mean pairwise
score from the corresponding entries in M. This process is repeated over a large
number of randomised runs, yielding an approximation of the expected stability
value. We then employ the widely-used adjustment technique introduced by [15]
to correct stability for chance agreement:
CorrectedStability(C) =
Stability(C) − ExpectedStability(C)
1 − ExpectedStability(C)
(3)
A value close to 1 indicates a highly-stable community, while a value closer to 0
is indicative of a weak community that appeared intermittently over the r runs.
We rank all consensus communities based on their values for Eqn. 3.
(a)(b)(c)(d)LxLyLxLyLyLxLxLy3.4 Selecting Community Labels
To summarise the content of a consensus community, we aggregate the meta-
information associated with all lists assigned to that community. Specifically, we
construct a bag-of-words model, where each user list is represented by unigrams
and bigrams tokenised from the list's name and description. Single stop-words are
removed, and terms are weighted using log-based TF-IDF. For each community,
we then compute the centroid vector corresponding to the mean vector of all lists
assigned to that community. To generate descriptive labels for the community, we
subtract the mean vector of all user list vectors from the community centroid
vector, and rank terms in descending order based on the resulting weights. The
top ranked terms are used as community labels.
3.5 Deriving User Memberships
The consensus communities generated using the method proposed in Section 3.2
can potentially provide us with an insight into the overall topics in a Twitter
corpus. However, it will often be useful to assign community memberships to
individual users. We can readily produce this by using the list groupings in
conjunction with the original user list membership information.
For a given consensus community C of size c, we examine the memberships of
all lists in the community. We consider the assignment of a user ui to each Lx ∈ C
as being a vote with weight 1/c for ui belonging to the overall community. The
total membership weight for ui is therefore given by the fraction of lists Lx ∈ C
containing ui. Membership weights for all communities are computed in this way.
We can also rank the importance of users in a given community by sorting users
by weight in descending order. To produce a final set of user communities, we
only include a user in a community for which the user has a membership weight
≥ µ, based on a membership threshold µ ∈ [0, 1].
4 Evaluation
4.1 Data Collection
To evaluate the proposed community finding methods, we constructed a dataset
based on a list of 499 users curated by The Telegraph, which covers athletes,
journalists, and organisations involved in the London 2012 Summer Olympics1.
Initially, for each user we retrieved up to their 200 most recent user list assign-
ments. From this initial pool of lists, we then retrieved list memberships for
10,000 randomly selected lists of size ≥ 5 and containing at least 2 core list
users. This yielded a dataset containing a total of 44,484 individual list mem-
bership records, where the average number of lists per user was 89. The most
frequently-listed user was @andy murray, assigned to 1,931 different lists.
1 http://twitter.com/#!/Telegraph2012/london2012
4.2 Community Detection
Using the approach described in Section 3.1, we constructed a user list graph
based on membership information for the 499 users. To limit the density of the
graph, we use a weight significance threshold of ρ = 6 (i.e. user list overlaps
are considered as significant for LP ≤ 1−6). This resulted in a graph containing
4,948 nodes representing user lists, with 749,062 weighted edges between them.
To generate an ensemble of base community sets, we apply OSLOM as de-
scribed in Section 3.2 for 100 random runs, selecting the lowest level of the
hierarchy as the solution for each run. The average number of non-singleton
communities in each run was 157. Combining the base community sets yielded
a consensus matrix containing ≈ 11.8m non-zero values. We examined a range
of threshold values τ ∈ [0.1, 0.5], and selected a threshold τ = 0.2 to generate
consensus communities in order to maximise coverage over user lists, while also
reducing the density of the consensus graph. Applying OSLOM to the sparse
graph of ≈ 1.5m values produced a total of 94 consensus communities, consid-
erably lower than the average base community count. Finally, user communities
were derived using a low membership threshold µ = 0.1 to maximise the number
of core users assigned to communities. In total, 416 core users were assigned to
at least one community, representing 83% of the overall total. Of these, 362 users
were assigned to multiple communities.
Table 1 shows the top 15 communities, arranged in descending order by their
stability score, as defined in Eqn. 3. The table shows the size of each community
(in terms of both number of lists and users assigned), the top text labels selected
Table 1. Top 15 user list communities, arranged in descending order by stability score.
Score Lists Users Top Labels
1.00
17
1.00
5
14
5
badminton, badminton players,
badders
bmx, bmx racing, bmx atleti
1.00
1.00
1.00
1.00
1.00
0.98
0.98
0.97
0.96
0.96
32
19
6
5
22
5
48
14
36
12
0.93
5
0.92
0.87
27
6
11
sailing, sailors, olympic
24
5
fencing, fencers, individuele scherm-
ers
triathlon, machines, swim run
21
scots, red sky, 2014
4
wielrennen, ciclismo, cycling
7
19
track, field, track field
rowing, rowers, gb rowing
22
diving, tuffi, olympic diving
Top Users
@Jennywallwork, @Nath Robertson,
@ChrisAdcock1
@ShanazeReade, @liamPHILLIPS65,
@bloomy181
@SkandiaTeamGBR, @AinslieBen,
@matchracegirls
@britishfencing, @CBennettGBR,
@LaurenceHalsted
@AliBrownleetri, @jodieswallow,
@MarkCavendish
@mj88live, @RobbieRenwick,
@Euan Burton
@GeraintThomas86, @UCI cycling,
@MarkCavendish
@allysonfelix, @TysonLGay, @tiffofili
@andrewthodge, @ZacPurchase,
@MarkHunterGB
@PeterWaterfield, @matthew mitcham,
@toniacouch
44
21
5
13
7
hockey, hockey players, field hockey @AlexDanson15, @RichM6, @jfair25
canoe, canoeing, canoe slalom
actors athletes, internet stars,
athletes tmz
judo, judo clubs, judo related
runners, hardlopen, runners world @Mo Farah, @paulajradcliffe,
@GBcanoeing, @PlanetCanoe,
@edmckeever
@usainbolt, @ShawnJohnson,
@MichaelPhelps
@BritishJudo, @USAJudo, @IntJudoFed
@KenenisaBekele
for each community, and the three highest-weighted users. We observe that the
most stable communities generally correspond to communities of users involved
in specific, "niche" sports (e.g. badminton, BMX racing, fencing). In these cases,
the top-weighted users correspond to either British Olympic athletes competing
in these sports, or accounts of the official British organisations for these sports.
Interestingly, we also see some unexpected communities with high stability -
a community around the Glasgow 2014 Commonwealth Games, and a commu-
nity of celebrities which includes "elite" user accounts with hundreds of thou-
sands of followers (e.g. @usainbolt, @MichaelPhelps). As stability decreases, we
observed that communities become less homogeneous, covering highly-popular
sports (e.g. football, basketball), or containing users and lists related to several
sports. This suggests that the proposed stability provides a useful measure of
the homogeneity of topical content for Twitter communities.
Many of the top labels selected for communities are multi-lingual. For in-
stance, the label for the "cycling" community in Table 1 contains terms in
Dutch, Italian, and English. Unlike in certain textual analyses of tweets, the
use of list membership information allows us to identify groups of users in a
language-agnostic manner.
4.3 External Validation
To validate the consensus user communities that were identified by aggregating
list information, we use a set of fine-grained Olympics lists also produced by
The Telegraph2, consisting of Twitter users associated with individual sports
(e.g. "archery", "equestrianism"). This provided us with 18 external "ground
truth" categories, covering 423 of the 499 users in the dataset.
We computed precision, recall, and F1 scores for all communities, and sub-
sequently matched categories to communities based on precision. Table 2 shows
Table 2. Validation scores achieved relative to 18 "ground truth" categories.
Category Name
judo
basketball
rowing
athletics
cycling
hockey
diving
equestrianism
fencing
sailing
gymnastics
canoeing
beach-volleyball
boxing
swimming-syncrho
weightlifting
archery
waterpolo
Category Size Precision Recall
20
26
44
50
28
47
23
18
23
16
24
22
12
22
16
6
17
22
1.00
1.00
1.00
1.00
1.00
0.98
0.95
0.94
0.88
0.82
0.77
0.76
0.55
0.55
0.33
0.20
0.20
0.05
0.65
0.50
0.43
0.22
0.14
0.91
0.91
0.83
0.91
0.56
0.42
0.73
1.00
0.55
0.13
0.17
0.06
0.05
F1
0.79
0.67
0.60
0.36
0.25
0.95
0.93
0.88
0.89
0.67
0.54
0.74
0.71
0.55
0.18
0.18
0.09
0.05
2 http://twitter.com/#!/Telegraph2012/lists
the resulting scores for all categories, arranged in descending order by precision.
Communities produced by user list aggregation allowed us to identify eight cat-
egories with precision ≥ 0.9, while generally maintaining high recall. Only in
the case of four categories did the proposed approach lead to precision and re-
call scores of both ≤ 0.5. Subsequent examination of the data suggests that list
information was relatively sparse for these categories, and that the users were
generally assigned to more generic lists (e.g. "aquatics" for "waterpolo"). In the
case of the "cycling" category, which received high precision but low recall, we
note that many of the lists we collected related to road racing, whereas many of
the users in the category are associated with Olympic velodrome racing.
5 Conclusions
In this paper, we have presented initial work on the idea of identifying topical
communities on Twitter by aggregating the "wisdom of the crowds", as encoded
in the form of user lists. We show that this information can be mined to detect
and label coherent overlapping clusters of both lists and users.
While the evaluation in this paper used a fixed network of users, a similar
approach could be applied to identify topical sub-communities around trending
terms or hashtags, by compiling a network of users frequently mentioning these
terms. Also, in some cases, not all users will have been assigned to any user
lists. We suggest that a classification process, using an alternative network view
(e.g. follower links) could be used to assign such users to communities.
Acknowledgements. This research was supported by Science Foundation Ireland
Grant 08/SRC/I1407 (Clique: Graph and Network Analysis Cluster).
References
1. Fortunato, S.: Community detection in graphs. Phy. Rep. 486(3-5) (2010) 75 -- 174
2. Java, A., Song, X., Finin, T., Tseng, B.: Why we Twitter: understanding mi-
croblogging usage and communities. In: Proc. 9th WebKDD and 1st SNA-KDD
Workshop on Web Mining and Social Network Analysis. (2007) 56 -- 65
3. Kim, D., Jo, Y., Moon, I.C., Oh, A.: Analysis of Twitter lists as a potential source
for discovering latent characteristics of users. In: Workshop on Microblogging at
the ACM Conference on Human Factors in Computer Systems (CHI'10). (2010)
4. Garc´ıa-Silva, A., Kang, J., Lerman, K., Corcho, O.: Characterising emergent se-
mantics in Twitter lists. The Semantic Web: Research and Applications (2012)
530 -- 544
5. Wu, S., Hofman, J., Mason, W., Watts, D.: Who says what to whom on Twitter.
In: Proc. 20th International Conference on World Wide Web, ACM (2011) 705 -- 714
6. Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a
news media? In: Proc. 19th Int. Conf. on World Wide Web. (2010) 591 -- 600
7. Shamma, D., Kennedy, L., Churchill, E.: Tweet the debates: Understanding com-
In: Proc. 1st SIGMM Workshop on
munity annotation of uncollected sources.
Social media, ACM (2009) 3 -- 10
8. Greene, D., Reid, F., Sheridan, G., Cunningham, P.: Supporting the curation of
In: 2nd Workshop on Computational Social Science and the
twitter user lists.
Wisdom of Crowds at NIPS 2011. (2011)
9. Lancichinetti, A., Radicchi, F., Ramasco, J., Fortunato, S., Ben-Jacob, E.: Finding
statistically significant communities in networks. PLoS ONE 6(4) (2011) e18961
10. Kwak, H., Eom, Y.H., Choi, Y., Jeong, H., Moon, S.: Consistent Community
Identification in Complex Networks. ArXiv e-prints (October 2009)
11. Lancichinetti, A., Fortunato, S.: Consensus clustering in complex networks. Sci.
Rep. 2 (03 2012)
12. Fred, A.: Finding consistent clusters in data partitions. In: Proc. 2nd Interna-
tional Workshop on Multiple Classifier Systems (MCS'01). Volume 2096., Springer
(January 2001) 309 -- 318
13. Strehl, A., Ghosh, J.: Cluster ensembles - a knowledge reuse framework for com-
In: Proc. Conference on Artificial Intelligence (AAAI'02),
bining partitionings.
AAAI/MIT Press (2002) 93 -- 98
14. Topchy, A., Jain, A., Punch, W.: Combining multiple weak clusterings. In: Proc.
3rd IEEE International Conference on Data Mining (ICDM'03). (2003) 331 -- 338
15. Hubert, L., Arabie, P.: Comparing partitions. J. Classification (1985) 193 -- 218
|
1608.04862 | 2 | 1608 | 2016-08-29T20:25:15 | Feature Driven and Point Process Approaches for Popularity Prediction | [
"cs.SI",
"physics.soc-ph"
] | Predicting popularity, or the total volume of information outbreaks, is an important subproblem for understanding collective behavior in networks. Each of the two main types of recent approaches to the problem, feature-driven and generative models, have desired qualities and clear limitations. This paper bridges the gap between these solutions with a new hybrid approach and a new performance benchmark. We model each social cascade with a marked Hawkes self-exciting point process, and estimate the content virality, memory decay, and user influence. We then learn a predictive layer for popularity prediction using a collection of cascade history. To our surprise, Hawkes process with a predictive overlay outperform recent feature-driven and generative approaches on existing tweet data [43] and a new public benchmark on news tweets. We also found that a basic set of user features and event time summary statistics performs competitively in both classification and regression tasks, and that adding point process information to the feature set further improves predictions. From these observations, we argue that future work on popularity prediction should compare across feature-driven and generative modeling approaches in both classification and regression tasks. | cs.SI | cs | Feature Driven and Point Process Approaches for
Popularity Prediction
Swapnil Mishra
Marian-Andrei Rizoiu
Lexing Xie
The Australian National University, Data 61, CSIRO, Australia
{swapnil.mishra,marian-andrei.rizoiu,lexing.xie}@anu.edu.au
6
1
0
2
g
u
A
9
2
]
I
S
.
s
c
[
2
v
2
6
8
4
0
.
8
0
6
1
:
v
i
X
r
a
ABSTRACT
Predicting popularity, or the total volume of information
outbreaks, is an important subproblem for understanding
collective behavior in networks. Each of the two main types
of recent approaches to the problem, feature-driven and gen-
erative models, have desired qualities and clear limitations.
This paper bridges the gap between these solutions with a
new hybrid approach and a new performance benchmark.
We model each social cascade with a marked Hawkes self-
exciting point process, and estimate the content virality,
memory decay, and user influence. We then learn a pre-
dictive layer for popularity prediction using a collection of
cascade history. To our surprise, Hawkes process with a
predictive overlay outperform recent feature-driven and gen-
erative approaches on existing tweet data [44] and a new
public benchmark on news tweets. We also found that a
basic set of user features and event time summary statistics
performs competitively in both classification and regression
tasks, and that adding point process information to the fea-
ture set further improves predictions. From these observa-
tions, we argue that future work on popularity prediction
should compare across feature-driven and generative model-
ing approaches in both classification and regression tasks.
Keywords social media; self-exciting point process; infor-
mation diffusion; cascade prediction.
1.
INTRODUCTION
Popularity prediction, especially in the context of online
media, has seen increased attention, as successful solutions
would help both content consumers to cope with informa-
tion overload, and content producers to disseminate infor-
mation within limited resources. Accurate models will help
producers to identify the trends, discover useful content and
decimate it faster to improve the content delivery of the
network. Furthermore, this would provide with more in-
sights into understanding collective behaviour by compiling
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
CIKM'16 , October 24-28, 2016, Indianapolis, IN, USA
c(cid:13) 2016 ACM. ISBN 978-1-4503-4073-1/16/10. . . $15.00
DOI: http://dx.doi.org/10.1145/2983323.2983812
seemingly incoherent individual responses to a single piece
of information.
When presented with the task of predicting popularity,
a clear gap appears between the two main classes of ap-
proaches: the feature-driven approaches and the generative
approaches. Feature-driven approaches [3, 7, 25, 29] sum-
marize network, user, and event history information into
an extensive set of features, and they use machine learning
approaches to predict future popularity. Generative meth-
ods [12, 34, 43, 44] leverage fine-grained timing information
in the event series, however they make stronger assump-
tions about the diffusion process. A thorough understanding
of strengths and weaknesses of the two classes is currently
missing, especially since the generative methods are usually
designed for explaining the mechanisms that generate atten-
tion, and not optimized for prediction. Another gap arises
between the different problem settings. Prior work has ad-
dress problems like predicting the volume of attention [34,
44], predicting if a cascade will double in size [7], whether
an item will have 10 million views [33], or be among the top
5% most popular [42]. However, the understanding of how
the different approaches and the different features generalize
over the various problem settings is incomplete. In addition,
a practical bottleneck is the availability of certain types of
these features, such as network data and corresponding fea-
tures – for example the number of users exposed in the dif-
fusion up to a time t or potential number of reachable users.
A third gap in the current available work is the consensus
and understanding about which features are informative for
feature-driven models and the lack of benchmark datasets
on which new methods can be devised.
In this paper, we address the above challenges in the con-
text of predicting the final size of retweet cascades. We build
two predictive approaches, one generative and one feature-
driven, and we show how to combine them into a hybrid
predictor to further increase performances. The genera-
tive method is a two-layered approach, built on the intu-
itive Hawkes self-exciting process [15] model. Self-exciting
point processes are a class of stochastic processes, in which
the occurrence of past events makes the occurrence of fu-
ture events more probable. Three key factors in information
diffusion are built into the proposed model: the social influ-
ence of users, the length of "social memory" and the inherent
tweet quality. We use a predictive layer on top of the gen-
erative model to make final predictions. This helps us to
take into account other cascades and mitigate limitations
of model assumptions and parameter estimation. Our sec-
ond proposed approach, the feature-based method, uses only
(feature-based vs. generative) and the generalization of
the features across feature-driven approaches.
• Comparative understanding of feature-driven and
generative models: we propose a generative method,
based on Hawkes self-exciting processes, which features
the advantages of generative methods – e.g. interpretable
results – and which is adapted for predicting the final cas-
cade popularity by using an additional predictive layer;
we compare approaches to popularity prediction from the
two main classes, i.e. feature-based and generative, and
we show that combining them into a hybrid approach
increases performances.
• Dataset: we identify a set of features that generalize
over different settings and can be constructed with only
message content and basic user features; we curate a
large, domain-specific dataset of retweet diffusion cas-
cades, which can be used by both feature-driven and gen-
erative models for prediction. Dataset along with code
is publicly available for download.1 This new dataset al-
lows comprehensive performance benchmarks on features
about users and temporal activity.
The rest of this paper is structured as follows. Sec. 2
presents related work. Sec. 3 details the proposed genera-
tive model and fitting methods, while Sec. 4 presents how
the popularity prediction is performed, based on the fitted
model parameters. The dataset and feature construction for
the feature-driven approach are detailed in Sec. 5 and the
experiments are outlined in Sec. 6. We conclude in Sec. 7.
2. RELATED WORK
We structure the discussion of related work onto the two
broad previously mentioned categories:
feature-driven ap-
proaches and generative approaches. For generative models,
being somewhat recent, we discuss their application in pop-
ularity prediction as well as their use in other social media
settings.
Predicting popularity with feature-driven models.
Data-driven approaches [11, 19] treat popularity as a non-
decomposable process and take a bottom-up approach. They
rely on machine learning algorithms to make the connection
between item popularity and an extensive set of features.
Most often the main contributions of such approaches are
collecting large-scale datasets and constructing informative
features. Bakshy et al. [4] and later Martin et al. [25] pre-
dict tweet popularity, defined as the total size of its retweet
cascade. Both studies construct features relating to the user
having posted the tweet and posted content. User features,
particularly past user success – the ability of a user to start
large cascades – are shown more informative, however pre-
diction performances are limited. Martin et al. make the
hypothesis of an inherent popularity randomness, which sets
limits to its predictability. The situation is different when
part of the diffusion cascade is observable, as early activ-
ity has been shown predictive for total popularity [29, 37].
When predicting whether a Facebook cascade will double
in size, Cheng et al. [7] found that temporal features – like
the resharing rate or the acquired volume of views – are
the most informative features. Prediction performances are
further improved when adding features which account for
specific contexts of the information diffusion. For exam-
ple, Li et al. [22] add propagation network measurements,
1Download data and code here: https://git.io/v6rIN.
Figure 1: Two retweet cascades announcing the death of
"Mr. Spock". The underlying diffusion processes of tw1 and
tw2 are very different: tw1 lasts for 2.5 hours. It attracts
the attention of highly influential users, especially music re-
lated channels, however the generative kernel of tw2 ampli-
fies more than that of tw1. tw2 diffuses faster and ends in
just 12 minutes, but the final sizes for the two cascades are
similar (224 retweets for tw1 and 219 for tw2). We model
and interpret these cascades using our generative model in
Sec. 3.4. x-axis: time in seconds; y-axis: number of follow-
ers each tweet can reach; φm(τ ): memory kernel of Eq. (2)
plotted with m = 1000.
features which can be computed on data containing solely
the message content and basic user profiles, and which were
highlighted as most predictive by recent studies: user re-
lated features [25] and temporal activity features [7]. This
results in a competitive feature-based predictor, which con-
sistently outperforms the current state-of-the-art popularity
prediction model [44] – reducing the mean absolute relative
error by more than 200% when compared to the latter, after
observing the retweet series for 10 minutes. We show that
the same set of features can be employed in both regression
and classification tasks. We further experiment with a hy-
brid predictor, which uses both data features and measures
issued from the generative model, and we show additional
performance improvement. We conduct experiments on a
large dataset, containing 49.7 million tweets containing links
to top 10 news sites in English, gathered using the public
API over a period of 4 months, in 2015. Fig. 1 illustrates two
of the retweet cascades in this dataset, relating the passing
of the actor for "Mr. Spock". Even though the two cascades
achieve similar popularities, our generative model is capa-
ble of differentiating between their very different diffusion
dynamics. For example, the memory kernel φm(τ ) of tw2 –
i.e. the contribution of each event to the spawning of future
events – amplifies more (shown by a larger area under the
φm(τ )), but is forgotten faster (the entire diffusion ends in
just 12 minutes).
There are three main contributions of this paper:
• Bridging the popularity prediction problem space:
we address three types of gaps: problem settings and
task (e.g. regression vs. classification), type of approach
tw1●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●User Influence101102103104105●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●0s60s120s180s240s300s360s420s480s540s600s660s720s780s840s900s●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●User Influence100100.5101101.5102102.5●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●0s60s120s180s240s300s360s420s480s540s600s660s720s780s840s900stw2Memory kernelφm(τ)over time00.511.522.530s100s200s300s400s500sRetweet count over time0501001502000s150s330s510s690s870s1080s1290s1500stw2tw1tw2end oftw1tw2Chang et al. [6] add sophisticated features relating to audi-
ence behavior when predicting the popularity of serials and
Vallet et al. [38] construct features relating to two social
networks: Youtube and Twitter. Many proposed features
cannot be used outside of the proposed context, being ei-
ther data-source specific or relying on information that is
not publicly accessible. The feature-driven methods that we
propose use only the best-performing features shown in pre-
vious studies and which can be extracted from public data.
Generative models in social media. Generative mod-
els start by modeling a set of phenomena into a paramet-
ric model and fitting the parameters of the model to ob-
served data. Such approaches have been successfully used
in neuro-biology to model neuronal spiking activity [20], in
economics to model the evolution of stock prices [14], in
physics to model earthquake aftershocks occurrence [35, 17,
36] and in criminology to model crime patterns [27]. In social
media such approaches have been used extensively [18, 30,
31], mainly due to their capability to model phenomena like
user interactions and diffusion susceptibility. Hidden net-
work properties, such as connexions between individuals [23,
24] or the evolution of the diffusion network topology [13],
have been uncovered using generative methods, such as self-
exciting point processes. The main difficulty with such ap-
proaches is scalability, since each social phenomenon must
be accounted manually in the model.
Modeling and predicting popularity using genera-
tive models. Popularity modeling [9, 12, 43] and predic-
tion [34, 44] has been a particularly fertile field for point-
process based generative models.
In their seminal work,
Crane and Sornette [9] showed how a Hawkes point-process
can account for popularity bursts and decays. Afterwards,
more sophisticated models have been proposed to model and
simulate popularity in microblogs [43] and videos [12]. These
approaches successfully account for the social phenomena
which modulate online diffusion: the "rich-get-richer" phe-
nomenon and social contagion. Certain models can output
an estimate for the total size of a retweet cascade. Shen et
al. [34] employ reinforced Poisson processes, modeling three
phenomena: fitness of an item, a temporal relaxation func-
tion and a reinforcement mechanism. Zhao et al. [44] pro-
pose SEISMIC, which employs a double stochastic process,
one accounting for infectiousness and the other one for the
arrival time of events. It is the current state of the art in
popularity prediction and, throughout this paper, we com-
pare against it. Our proposed generative model uses the
same information as SEISMIC – tweet timestamps and the
number of followers of the user posting the tweet –, but uses
a simpler, more intuitive modeling of the diffusion cascade.
Generative models are typically designed to explain popu-
larity, not predict it. Most of the methods presented earlier
introduce multiple regularization and correction factors in
order to make meaningful predictions. This is sub-optimal
both for prediction and for interpretation. By contrast, our
Hawkes predictive model separates modeling from prediction
accounting directly for the most important three factors at
individual cascade level: user influence, decaying social at-
tention and content quality, followed by a predictive layer
tuned from historical data.
3. RETWEETING AS A POINT PROCESS
We first introduce the Hawkes self-exciting point process,
a stochastic event model for describing retweeting cascades.
We then describe a procedure for maximum-likelihood esti-
mation of model parameters from an observed cascade. We
present observations of the Hawkes model on individual and
collections cascades, illustrating the interplay of individual
memory kernel and user influence in diffusion dynamics.
3.1 A self-exciting point processes
In self-exciting processes the occurrences of past events
make future events more probable. In particular, we model
each retweet as a stochastic event, and model three key in-
tuitions in a social network: magnitude of influence, tweets
by users with many followers tend to get retweeted more;
memory over time, that most retweeting happens when the
content is fresh [41]; and content quality.
The marked Hawkes process [15] is a well-known self-
Its event
exciting process that captures these properties.
rate is written as:
λ(t) =(cid:88)ti<t
φmi (t − ti) ,
(1)
where λ(t) is the arrival rate of new events.
It depends
on each previously occurred event (mi, ti) of magnitude mi
at time ti through the triggering kernel φm(τ ). For the
problem of estimating the size of a retweet cascade, there
are no exogenously generated events (as in a general Hawkes
process [16]) apart from the initial tweet, which is accounted
for with magnitude m0 at time t0 = 0. The effects of mi
and ti are separable in our triggering kernel:
φm(τ ) = κmβ(τ + c)−(1+θ) .
(2)
κ describes the virality – or quality – of the tweet content and
it scales the subsequent retweet rate; β introduces a warping
effect for the user influence and it is related to the observed
long-tail distribution of user influence in social networks;
and 1 + θ (θ > 0) is the power-law exponent, describing how
fast an event is forgotten, parameter c > 0 is a temporal
shift term to keep φm(τ ) bounded when τ (cid:39) 0 ; Here κmβ
accounts for the magnitude of influence, and the power-law
kernel (τ + c)−(1+θ) models the memory over time. We ap-
proximate user influence m using the number of followers
obtained from Twitter API. Table 1 summarizes the param-
eters of the model, along with their interpretations.
Throughout literature, three families of functions have
been mainly used to model temporal decay with Hawkes
point-processes [32]: power-law functions φp(τ ) = (τ +c)−(1+θ),
used in geophysics [17] and social networks [9] ; exponential
functions φe(τ ) = e−θτ , used in financial data [14]; Reyleigh
functions φr(τ ) = e− 1
, used in epidemiology [40]. We ex-
perimented with all three kernels with the setting in Sec. 6,
and found that the power-law kernel consistently outper-
form the other two. Consequently, we only discuss detailed
results from the power law kernel in the rest of this paper.
3.2 The branching factor
2 θτ 2
One of the key quantities that describe a Hawkes process
is the branching factor n∗, defined as the expected number
of children events directly spawned by an event. Note that
the total number of expected events from one initial event
is the sum of a geometric series(cid:80)∞k=1(n∗)k. For n∗ < 1, the
process in a subcritical regime: the total number of retweets
is bounded, the event rate λ(t) decays to zero over time and
the retweet cascade dies out. When n∗ > 1, the process
is in a so-called supercritical regime with the total number
Table 1: Summary of notations. Top: Quantities for esti-
mating popularity using point processes. Bottom: Parame-
ters of the marked Hawkes process.
Notation
Interpretation
mi
ti
λ(t)
φm(τ )
n∗
T
n
N∞
Nreal
ω
N∞
event magnitude. Social influence of the user emit-
ting the tweet.
event time. Tweet timestamp.
conditional intensity – or event rate – of a non-
homogeneous Poisson Process.
triggering kernel. Contribution of event the (m, t)
to the total event rate, calculated at time t + τ .
branching factor, mean number of children events
spawned by a parent event. For n∗ < 1 the cascade
dies out (subcritical regime), for n∗ > 1 the cas-
cade explodes exponentially (supercritical regime).
time extent of the observed series of events in the
beginning of a retweet cascade. T = max(ti).
number of events in the observed series of events
in the beginning of a retweet cascade. n = max(i).
expected total number of events in a given retweet
cascade, derived from the generative model.
the real number of events in a given retweet cas-
cade, or total popularity.
predictive factor learned using a Random Forest
regressor.
total popularity prediction made using the output
of the predictive layer.
Parameter
Interpretation
θ
κ
c
β
α
the power-law exponent, describing how fast an
event is forgotten. θ > 0.
tweet quality. High quality tweets are more likely
to generate more retweets. κ > 0.
temporal shift cutoff term so that φm(τ ) stays
bounded when τ (cid:39) 0. c > 0.
user influence power-law warping effect in b(m).
β > 0. 0 < β < α − 1 for having a defined branch-
ing factor n∗.
exponent of the user influence power-law distri-
bution. Fitted to the #followers distribution:
α = 2.016.
of retweets being unbounded. We compute the branching
factor by integrating over time and event magnitudes.
n∗ =(cid:90) ∞
1 (cid:90) ∞
0
P (m)φm(τ )dτ dm .
(3)
Here we assume mi are i.i.d. samples from a power law dis-
tribution of social influence [21]: P (m) = (α− 1) m−α. Here
α is an exponent which controls the heavy tail of the distri-
bution. We extract the number of followers m for a large
sample of users from our dataset described in Sec. 5.1 and fit
it to a power-law distribution following the method detailed
in [8]. We obtain α = 2.016 and we use it throughout the
experiments. Substituting Eq. (2) and P (m) into (3), we
obtain the closed-form expression of the branching factor:
n∗ = κ
α − 1
α − β − 1
1
θcθ , for β < α − 1 and θ > 0 .
(4)
Not only the branching factor n∗ is an intuitive descriptor
of the virality of a cascade, it is also used for predicting
the total popularity in Sec 4 and as a constraint in model
estimation in Sec 3.3.
3.3 Estimating the Hawkes process
The log-likelihood function. Our marked Hawkes pro-
cess is completely defined by the four parameters {κ, β, c, θ}.
We now describe a maximum-likelihood estimation proce-
dure of the model from a set of observed events, consisting
of {(mi, ti), i = 0, . . . , n} for time t < T . The log-likelihood
function of a point-process described by Eq. (1) and (2) is
written as ([10], Ch. 7.2):
L(κ, β, c, θ) = log P ({(mi, ti), i = 1, . . . , n})
λ(τ )dτ
=
n(cid:88)i=1
n(cid:88)i=2
− κ
0
log (λ (ti)) −(cid:90) T
log(cid:88)tj <ti
n(cid:88)i=2
(mi)β(cid:34) 1
θcθ −
log κ +
n(cid:88)i=1
(mj)β
(ti − tj + c)1+θ
(cid:35) . (5)
(T + c − ti)−θ
θ
cf. (1)&(2) =
The first two terms in Eq. 5 are from the likelihood com-
puted using the event rate λ(t), the last term is a normalizing
factor from integrating the event rate over the observation
window [0, T ].
Finding the maximum-likelihood solution. Eq. 5 is
a non-linear objective that we optimize to find the set of
parameters that maximizes data likelihood. Directly max-
imizing this objective is more efficient than expectation-
maximization approaches [12] that try to estimate the branch-
ing structure (of which event triggers which) and that have a
quadratic number of latent variables. There are a few natu-
ral constraints for each of model parameter, namely: θ > 0,
κ > 0, c > 0, and 0 < β < α − 1 for the branching factor to
be meaningful (and positive). Furthermore, while the super-
critical regimes n∗ > 1 are mathematically valid, they will
not lead to a finite cascade size prediction. We note that in
reality no retweet cascade can grow indefinitely, due to finite
network sizes. We further incorporate n∗ < 1 as a non-linear
constraint for the maximum likelihood estimation. We use
the Ipopt [39], the large-scale interior point solver that han-
dles both non-linear objectives and non-linear constraints,
with pre-programmed gradient functions to find the solu-
tion. Details of the gradient computation and optimization
can be found in an online supplement [1].
3.4
Interpreting the generative model
Individual cascades:
fast vs slow. We first exam-
ine the model parameters for the two cascades illustrated in
Fig. 1. These two cascades are about the same event and
have similar observed popularities (224 vs. 219) through
very different diffusion speeds at a complex interplay be-
tween power-law memory (τ + c)−(1+θ) and user influences.
For tw1, the maximum-likelihood estimate of parameters are
{κ = 0.75, β = 0.27, c = 58.46, θ = 0.64} with a correspond-
ing n∗ = 0.12; for tw2, {κ = 1, β = 0.42, c = 27.77, θ =
0.77}, and n∗ = 0.16 (also shown in Fig. 2). The two dif-
fusions unfold in different ways: tw1 has lower value of κ
and higher waiting time c, hence its memory kernel φ(τ )
has lower values than that of tw2 and a slower decay. How-
ever, tw1 attracts the attention of some very well-followed
music accounts. The original poster (@screencrushnews)
has 12,122 followers, and among the retweeters @TasteOf-
Country (country music) has 193,081 followers, @Loudwire
(a)
(b)
Figure 2: Density distribution of model parameters κ (a)
and θ (b), on a sample of 17,146 cascades from the News
dataset. The dashed vertical lines show fitted parameter
values for the two retweet cascades illustrated in Fig. 1: tw1
in red and tw2 in blue. We note that Seismic [44] uses a fixed
value of θ = 0.242 for all cascades (denoted in green). The
distributions for c, β and n∗ are shown in the supplement [1].
(rock) had 110,824 followers, @UltClassicRock (classic rock)
has 99,074 followers and @PopCrush (pop music) has 114,050
followers. The resulting cascade reached 1/4 its size after
half an hour, and the final tweet was sent after 4 days. In
contrast, tw2's memory kernel has higher values, but faster
decay. The most influential user in tw2 has 412 followers,
and the entire diffusion lasted for only 12.5 minutes.
Interpreting a collection of cascades. We construct
a large subset of 17,146 cascades of the News dataset, de-
scribed in Sec. 5.1. For each cascade we fit the parameters
of its generative model {κ, β, c, θ}. Fig. 2 shows the density
distribution of parameters θ and κ. As one would expect,
most cascades have a low value of κ, and reflect the long-
tailed distribution of content quality. n∗ – descriptor of the
virality of a cascade – is distributed very similarly to κ, with
most cascades showing low n∗ values (shown in the supple-
ment [1]). Parameter θ – which controls for the speed of
the decay of the memory kernel φm(τ ) – has a more surpris-
ing distribution. Recent work [44] on point processes with
power-law kernels argued that a unique value of θ = 0.242 is
sufficient to explain the general behavior cascades. We find
θ to vary in the interval (0, 2.8] and showing two maxima at
0.01 and 0.34. This observation indicates that learning indi-
vidual memory exponents θ allows us to better describe the
diffusion dynamics of each cascade. The distributions of the
other parameters are shown in the supplement: c follows a
long-tail distribution; β shows a maximum of density around
0.08 and a smaller peak around β ∼ α − 1 resulting from
the optimizer terminating at the boundary of the non-linear
constraint n∗ = 1.
4. PREDICTING POPULARITY
In this section, we first derive the number of expected
future events in a cascade, we then describe a predictive
layer tuned for estimating the total size, using information
from other cascades in history.
4.1 The expected number of future events
Having observed a retweet cascade until time T and fit-
ted the parameters of the point process, one can simulate
a possible continuation of the cascade, until it dies out –
assuming n∗ < 1. In this section, we derive the expected
number of events in the cascade, over all possible continu-
ations. We group events based on the generation of their
parents (i.e. the preceding event they are triggered by), and
Figure 3: Illustration of the rationale behind popularity pre-
diction. The model parameters are estimated starting from
a series of observed events (mi, ti). Part of one possible
unfolding of the diffusion cascade is simulated, using the
event rate defined by Eq. (2) and simulated by thinning [28].
The event generations are shown: events in Generation1 are
shown in red color, Generation2 in green and Generationk
in blue. Note there is no theoretical limit to the number of
generations or to the extent of time until the cascade dies
out. Some of the parent-child relations between events in
consecutive generations are shown.
estimate the number of events in each generation. We de-
note as Generation1 the set of simulated events spawned
by the observed events (shown in red in Fig. 3). Similarly,
Generation2 (in green in Fig. 3) groups events spawned by
events in Generation1, and so on. Let Ai be the expected
number of events in Generationi. The expected number of
total events in the cascade, N∞, is defined as:
N∞ = n +
Ai ,
(6)
∞(cid:88)i=1
where n is the number of observed events. For generations
after the first one, the best estimate about Ai, i ≥ 2 is con-
structed using the average number of children events n∗
and the number of events in the previous generation, i.e.
Ai = Ai−1n∗. Assuming A1 known, we derive:
Ai = Ai−1 n∗ = Ai−2 (n∗)2 = . . . = A1 (n∗)i−1 , i > 1 (7)
Therefore, the second term in (6) is the sum of a converging
geometric progression (assuming n∗ < 1):
∞(cid:88)i=1
Ai =
A1
1 − n∗
where n∗ < 1
(8)
A1 could also be calculated in a fashion similar to Eq. (7).
However, a more precise estimation can be obtained, given
that magnitudes of the observed events – parents for events
in Generation1 – are known:
φmi (t − ti) dt
(9)
β
T
mi
= κ
λ(τ )dτ =(cid:90) ∞
A1 =(cid:90) ∞
T (cid:88)t>ti
n(cid:88)i=1
θ (T + c − ti)θ
(1 − n∗)(cid:32) n(cid:88)i=1
κ
N∞ = n +
We obtain the estimate of the total number of events in the
cascade by introducing (9) and (8) into (6):
β
mi
θ (T + c − ti)θ(cid:33) , n∗ < 1
(10)
0.00.20.40.60.81.0051015202530Density distribution for κDensity0.7561.000.00.51.01.52.02.50.00.51.01.52.0Density distribution for θDensity0.6420.7750.242tt1t2t3tim1m2m3miGeneration1Generation2GenerationkObservedPredictedT..................the ARE prediction error, measured as detailed in Sec. 6.1.
Fig 4 illustrates this reduction on a subset of the cascades in
the News dataset – described in Sec. 5.1 – and its relation
with A1 and n∗. The length of the arrows is proportional
with the error reduction. The range the errors made without
the predictive layer increases linearly with A1. Consequently
the error reduction when using N∞ is generally higher when
A1 is higher (Fig. 4a). The relation between n∗ and the
prediction error is non-linear, therefore in Fig. 4b the hori-
zontal axis shows the percentile values of n∗. The variation
of the error reduction has two maxima, one around 40%
and another one around 95%. Fig. 4 can be summarized as
follows: the error reduction increases linearly with the ex-
pected number of events in Generation1, but exhibits two
maxima in relation with the expected number of events in
Generationi, i ≥ 2. Another interesting observation is that
N∞ tends to over-estimate cascade sizes, in other words cas-
cades tend to achieve less popularity than expected when
observed in isolation. This aligns with the hypothesis that
content items compete with each other for a finite amount
of human attention [26].
5. DATA AND FEATURES FOR PREDICTION
In this section we describe the two datasets, Tweet-1Mo
and News, used in our experiments. Next, we describe the
set of features constructed for our feature-driven approach.
5.1 Datasets
Tweet-1Mo: Zhao et al. [44] made publicly available the
dataset they used to predict retweet cascade sizes. It con-
tains a sample of all tweets during a month (i.e. using the
firehose Twitter API restricted access), further filtered so
that the length of each cascade is greater than 50. For each
cascade, the dataset contains information about the origi-
nal tweet id and start time and, for each of the retweets in
the cascade, the time offset of the retweet and the number
of followers of the user posting the retweet. We randomly
sample the cascades in the original dataset and we construct
Tweet-1Mo to contain 30,463 cascades of length between
50 and 5000. The resulting dataset has a mean cascade
length of 160 and a median of 95.
News: We construct a domain specific dataset of tweets
dealing with news articles, by collecting data using the free
Twitter Streaming API2, over a period of four moths from
April 2015 to July 2015. We track the official twitter handles
of ten popular news outlets, namely NewYork Times, Asso-
ciated Press, CNN, Washington Post, Reuters, Yahoo News,
The Guardian, BBC, Huffington Post and Google News. We
also capture all tweets containing either i) user mentions of
the above users or ii) a commonly used shortened url to-
wards any of the ten news websites. This leads to a collec-
tion of 49,735,271 tweets. Most of the cascades in the News
dataset are of length one or two and, for compatibility with
the Tweet-1Mo, we present the statistics for cascades of
length over 50: 110,954 cascades, mean cascade length is
158 and median length is 90.
Difference between datasets. The News dataset con-
tains several additional information, when compared to Tweet-
1Mo: for each user in a retweet cascade, we record her num-
ber of friends, number of posted statuses and the account
creation time (these information are recorded in every tweet
2https://dev.twitter.com/streaming/overview
(a)
(b)
Figure 4: Reduction of prediction error for a subset of cas-
cades. For each cascade, the error made when predicting
final popularity using the theoretical N∞ is shown using red
circles, and with blue squares the error made when using the
predictive layer N∞. Each gray arrow shows the reduction
of error for a single cascade, and pairs together a red circle
with a blue square. The error reduction is show in relation
to A1 (a) and n∗ (b).
4.2 Predicting total popularity
Using generative models for prediction is often sub-optimal,
often due to simplifying assumptions of the generative pro-
cess. Point processes in general, are optimized for explain-
ing observed event history and not optimized for prediction.
Zhao et al. [44], for example, recently deployed a number of
heuristic correction factors to discount the initial burst and
account for a long-term decay. We consider that the Hawkes
point process can benefit from systematically learning a pre-
dictor, to better account for data noise and limiting model
assumptions. First, it is well know that using the number
of followers as user influences mi is at best an approxima-
tion [5] and often does not scale with retweeting propensity.
Second, the network in which cascades happen can be inho-
mogenous over the lifetime of the diffusion, e.g. users who
respond early may have a inherently shorter memory than
those responding late. Last, point processes cannot gener-
ate a meaningful prediction for supercritical cascades, and
the model estimation can be prone to local minima. In this
section, we leverage a collection of previously observed cas-
cade histories to fine tune popularity prediction. This pre-
dictive layer accounts for the limitations above, and places
point process estimates in a comparable framework as the
feature-driven approaches.
Prediction setup. Each retweet cascade is described
using four features {c, θ, A1, n∗}. These four features were
found to be the most correlated with = (Nreal − N∞)2, the
error made when predicting popularity using N∞. Further-
more, n∗ and θ are expressed as percentiles over the range
observed in the training set, to account for their non-linear
relation with . Note that parameters κ and β are not used:
the information in κ is already included in A1, whereas β
was found non-correlated with .
In the classification task detailed in Sec. 6.3, the Random
Forest is trained to output the selected class. In the popular-
ity prediction task – Sec. 6.1 and 6.2 – we train the Random
Forest to output a scaling factor ω for the expected num-
ber of future events in a given retweet cascade. The final
corrected popularity prediction is computed as:
N∞ = n + ω(cid:18) A1
1 − n∗(cid:19) .
(11)
Effects of the predictive layer. The immediate ef-
fect of introducing the predictive layer is the reduction of
0200400600800020406080100Prediction error reduction vs. A1A1Prediction error●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●HawkesHawkes + RF0.00.20.40.60.81.0020406080100Prediction error reduction vs. n*●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●HawkesHawkes + RFn*percentilewe capture through the API). This additional information
is required by the feature-driven method described in Sec-
tion 5.2, therefore in the experiments in Sec. 6, feature-based
methods cannot run on Tweet-1Mo.
An open-access, domain-specific dataset. Many of
the datasets used by prior work for popularity prediction
were not made public because of user agreement terms and
they are difficult to replicate. The barriers for having an
open benchmark include proprietary insider information (e.g.
complete Facebook network measurements [7]), privileged
API access (e.g., Twitter firehose [44]) or contain restricted
data from non-English sources [12, 43]. Furthermore, we
argue that predicting popularity on a topic- or domain- spe-
cific dataset is as relevant as that on the firehose feed – con-
tent producers and consumers are often interested in content
within a source (e.g. NYTimes) or a topic (e.g. technology).
Therefore, we chose to construct News, our domain-specific
dataset, using only free access APIs. We present a strong
basis for future benchmarking by combining the descrip-
tive power of Feature-Driven and modeling capabilities
of Hawkes in Sec. 6.
5.2 Features for popularity prediction
Our feature-driven predictor describes each cascade us-
ing four types of features: a) basic user features, b) tem-
poral features, c) volume features and d) past user success.
They are chosen as being the most informative in recent
literature [4, 7, 25, 29, 37] and require only free access to
the Twitter data source.
In particular, Martin et al. [25]
compare a wide range of features, including user, content
and user-content interplay features, and they show that ba-
sic user features together with past user success features
account for 87% of the prediction performance. Cheng et
al. [7] showed that temporal features relating to the unfold-
ing of the observed part of the diffusion account for the bulk
of the total classification performances. They report only
0.025 additional accuracy when using all the other features
combined in addition to temporal features. Lastly, Szabo et
al. [37] and later Pinto et al. [29] show that early popularity
is predictive for total popularity.
Basic User Features [4, 7, 25]. Basic user statistics
capture the social influence of a user. When observing the
prefix of a cascade, we use the five point summary (min,
median, max, 25-th and 75-th percentile) to represent the
distribution for a feature:
• Number of Followers: count of user followers;
• Number of Friends: count of friends for a user;
• Number of Status: count of statuses posted by user;
• User Time: Time when user account was created.
Temporal Features [7]. We capture the temporal dy-
namics of a cascade using the following features:
during the first half of the observed cascade;
during the second half of the observed cascade;
• First Half Rate: mean waiting time between retweets,
• Second Half Rate: mean waiting time between retweets,
• Waiting Time Distribution: five point summary of wait-
ing times between retweets, in the observed cascade;
• Exposure Distribution: five point summary of the dis-
tribution of number of followers for all users before the
last retweet, in the observed cascade. Used only in the
classification task in Sec. 6.3.
Figure 5: Distribution of Absolute Relative Error (ARE) on
the Tweet-1Mo dataset (top row) and on the News (bot-
tom row), for Seismic and Hawkes. A part of the diffusion
cascade is observed before making the predictions: 5 min
(left column), 10 min (middle column) and 1 hour (right
column). The red line and the numeric annotations denotes
the median values of the distributions.
Volume [29, 37]. Number of retweets in the observed
part of the cascade, which captures early popularity.
Past User Success [4, 25]. Average size of the cascades
started by a given user in past. For an observed cascade, we
use the five point summary of the distribution of past user
success for all previously known users who participate in the
cascade. This feature requires a large volume of historical
data and can be computed only for users that have started
cascades in the past. We detail its construction in Sec. 6.1.
6. EXPERIMENTS
We first present in Sec. 6.1 a thorough comparison be-
tween the Hawkes model and Seismic, the state-of-the-art
generative model on popularity prediction, using two datasets.
In Sec. 6.2 and Sec. 6.3 we compare the feature-driven clas-
sifier to generative approaches. Sec. 6.1 and Sec. 6.2 tackle
regression tasks, i.e., predicting total cascade size after ob-
serving it for a certain time, while Sec. 6.3 tackles classifica-
tion tasks, i.e., whether or not the cascade size will double
from what has been observed.
6.1 Cascade size: two generative methods
We compare our point processes model, Hawkes, with
Seismic on two datasets, Tweet-1Mo and News. Note
that Tweet-1Mo is the dataset on which Zhao et al. [44]
reported results, while News dataset supports extracting a
richer set of features that is not available in Tweet-1Mo. In
addition, Zhao et al. [44] showed that Seismic compared fa-
vorably against a number of baselines: from auto-regressive
and generative models such as dynamic Poisson model [2, 9]
and reinforced Poisson model [34], to linear regression and
it's variants [37].
Experimental setup. We run our experiments on the
Tweet-1Mo dataset and a subset of News: 20,093 cas-
cades from the month of July, which have the total length of
at least 50. Both algorithms observe the initial part of each
cascade for a limited extent of time and predict its final pop-
ularity. We estimate separate sets of parameters for Hawkes
and Seismic after observing the cascades for 5 minutes, 10
minutes and 1 hour, respectively. After the fitting is finished,
we train the Random Forest regressor in the predictive layer
of the Hawkes model. Performance of this regression layer
SEISMICHawkes0.20.71.21.72.22.73.23.7ARE0.750.215 MinutesSEISMICHawkes0.00.20.40.60.81.01.21.4ARE0.350.2010 MinutesSEISMICHawkes0.00.20.40.60.81.01.2ARE0.250.181 HourSEISMICHawkes02468101214ARE1.190.195 MinutesSEISMICHawkes0.00.20.40.60.81.01.21.41.6ARE0.410.1710 MinutesSEISMICHawkes0.00.20.40.60.81.0ARE0.240.131 HourTable 2: (left hand side) Mean Average Relative Error (ARE) ± standard deviation obtained using Hawkes and Seismic on
the Tweet-1Mo and News datasets. (right hand side) Number of cascades for which prediction failed.
Dataset
Approach
Tweet-1Mo
News
Seismic
Hawkes
Seismic
Hawkes
Prediction error: different time lengths
5 minutes
1 hour
2.61 ±55.80
0.36 ±0.52
11.13 ±282.96
0.42 ±6.83
10 minutes
0.70 ±15.58
0.33 ±0.41
0.84 ±11.77
0.25 ±0.60
0.51 ±10.81
0.30 ±0.38
0.33 ±0.92
0.22 ±1.16
Number of failed cascades
5 minutes
10 minutes
1 hour
507
302
1022
149
164
105
155
45
71
58
123
37
Table 3: Mean ARE ± standard deviation for Seismic,
Hawkes, Feature-Driven and Hybrid models for the
News July'15 dataset.
Approach
5 minutes
Seismic
Feat.-Driven
Hawkes
Hybrid
15.16 ±375.08
0.25 ±0.18
0.27 ±1.83
0.17 ±0.16
10 minutes
0.71 ±4.89
0.22 ±0.17
0.22 ±0.80
0.15 ±0.14
1 hour
0.32 ±0.40
0.17 ±0.14
0.17 ±0.36
0.11 ±0.12
is reported using ten fold cross-validation. 40% of cascades
are used for training, 60% for testing. All experimental pro-
tocol choices – minimum cascade length threshold, random
training/testing split and length of time prefixes – are made
to mimic closely the original experimental setup [44].
We use the Absolute Relative Error (ARE) to measure
prediction performance on a given cascade w:
AREw = (cid:12)(cid:12)(cid:12) N w
∞ − N w
N w
real
real(cid:12)(cid:12)(cid:12)
,
where N∞ and Nreal are the predicted and observed popu-
larities of cascade w.
Results. The prediction results are summarized in Fig. 5
as boxplots of ARE for each combination (dataset, approach,
observed time), while Table 2 shows the mean ARE ± stan-
dard deviation. Note that generative models do not output
a prediction for all cascades. For example, when branching
factor n∗ ≥ 1 for Hawkes the estimate for cascade size is
infinite, similar failures also occur with Seismic when the in-
fectiousness parameter p ≥ 1
n∗ ([44] Eq(7)). Here we report
the number of "failed" cascades in Table 2, and only report
the average ARE on cascades that both approach produce
a prediction. As shown in right hand side of the Table 2,
we observe that Hawkes is able to produce meaningful pre-
dictions for more cascades than Seismic. For example, on
News data with 5 minutes, we output prediction for 873 (or
0.7%) more cascades than Seismic.
We can see that Hawkes consistently outperforms Seis-
mic, as it achieves lower average ARE on both datasets.
Mean ARE for Hawkes is at least 40% better than Seismic
on Tweet-1Mo and 33% on News. We observe that News
dataset after 5 minutes of observation seems the most dif-
ficult to predict: Hawkes produces a mean ARE of 0.42,
while the mean ARE for Seismic is 11.13. Fig. 5 (top row)
shows that the median of Hawkes is at least 25% better
than Seismic for any time prefix, suggesting that our ap-
proach predicts better for most of the cascades in Tweet-
1Mo. Similar conclusions can be drawn from the bottom
(a)
(b)
Figure 6: Distribution of ARE on the News dataset, split in
time for July, for Seismic, Feature-Driven, Hawkes and
Hybrid, after observing 10 minutes (a) and 1 hour (b). The
red line and the numeric annotations denote median value.
row of Fig. 5 (News data): the median ARE of Hawkes is
at most 0.19 at 5 minutes, while the best of Seismic models
is a median ARE of .24 at 1 hour.
We are glad to see that the Hawkes model achieves bet-
ter predictive performance than Seismic, by exploiting full
flexibility in its non-linear parameters, and a predictive layer
that systematically optimizes for future prediction using in-
formation from other cascades.
6.2 Cascade size: generative vs. feature-driven
In this section we compare the performances of feature-
driven and generative approaches on the News dataset only,
as the Tweet-1Mo does not contain the necessary data to
construct the features detailed in Sec. 5.2.
Experimental setup. Similar to the setup in the previ-
ous Sec 6.1, we observe cascades for 5 minutes, 10 minutes
and 1 hour and fit the Hawkes and Seismic models for each
cascade. The train-test split is different, in order to repli-
cate closer the experimental setup in Martin et al. [25]: the
data from first half of July (1-15) is used for training and
the data from second half of July (16-31) for testing. We
use the News historical data from April to June to con-
struct the past user success feature for the feature-driven
approach. We consider only those users who initiated at
least 2 cascades in the past as active users. Non-active users
have a past user success of 0. We also construct a Hybrid
approach, which leverages the features of the Hawkes model
– i.e. {c, θ, A1, n∗} – together with the features detailed in
Sec. 5.2. We use a Random Forest regressor for predict-
ing the final volume size after tuning the predictor on the
training set with 10 fold cross-validation.
Results. Similar to the previous subsection, we report in
Table 3 the mean ARE ± standard deviation and in Fig. 6
the box plots of ARE for 10 minutes and 1 hour. In accord-
ing with the results of Sec. 6.1, Hawkes surpasses Seismic
SEISMICFDHawkesHybrid0.10.40.71.01.31.6ARE0.4080.1920.1290.11010 MinutesSEISMICFDHawkesHybrid0.00.20.40.60.81.0ARE0.2420.1250.0990.0721 HourFigure 7: ARE distribution over popularity percentiles, on News dataset, after observing cascades for 10 minutes. The blue
line denotes the overall median ARE shown in Figure 6a. Note that the y-axes are not on the same scale for all three graphs.
Table 4: Accuracy ± standard deviation when predicting
whether a cascade will double its size or not.
Approach
25 tweets
50 tweets
0.52
Random Guess
0.66 ±0.013
HawkesC
Feature-Driven 0.79 ±0.009
0.79 ±0.008
Hybrid
0.53
0.70 ±0.009
0.81 ±0.011
0.82 ±0.013
for all considered setups. Note that these results are numer-
ically different from those in Sec 6.1, because the underlying
test dataset consist only the subset from second half (16-
31) of July 2015. Surprisingly, even the Feature-Driven
model outperforms Seismic for all time prefixes, by at least
40%. In both cases, the differences are statistically signif-
icant (p − val < 0.001) for 10 minutes and 1 hour. The
Hawkes model exhibits similar mean ARE as Feature-
Driven and higher standard deviation. However, its box-
plot in Fig. 6 shows lower median and quartiles. This in-
dicates that Hawkes predict better than Feature-Driven
for most cascades, but the error distribution of Hawkes is
skewed by outliers. Hybrid performs the best, with similar
boxplot summarization as Hawkes, but with a 42% better
mean APE – 0.17 to 0.11 for 1 hour. The differences between
Hybrid and all the other approaches are statistically signif-
icant (details in the supplement [1]). This result shows that
Hawkes and Feature-Driven approaches are complimen-
tary, likely because they summarize the cascade information
differently, and the errors are uncorrelated.
ARE distribution over cascade popularity. Fig-
ure 7 presents the ARE distribution over cascade popularity
as boxplots for each popularity decile. Both Hawkes and
Feature-Driven predict better for most of the cascades
with the middle popularity. For the extreme ends, perfor-
mance is affected, because for lower popularity percentiles
even a small error is amplified to a large ARE and cascades
in higher popularity bins are inherently more difficult to pre-
dict. The prediction performance of Seismic seems consis-
tent across popularity bins, but always worse than Hawkes
or Feature-Driven, as already showed by the aggregated
results in Fig. 6a. We also tried to explain prediction per-
formance breaking down by News sources, but we did not
see any notable patterns.
6.3 Will this cascade double
The learning problem in this section is to classify whether
an observed cascade will double its volume or not. The ex-
perimental setup follows that of Cheng et al. [7], in which
cascades are observed for a fixed number of retweets, instead
of for a fixed extend of time in Sec. 6.1 and 6.2. The pro-
posed Hawkes model outputs directly the total popularity
as a cascade size and uses the predictive layer to correct the
theoretical estimate. As a consequence, it cannot be used
in a classification setup. Instead, we construct a classifier
HawkesC, in which a Random Forest Classifier is trained
on the same features as the predictive layer of Hawkes and
used to output a binary decision.
Experimental setup. We use the July subset of the
News dataset, filtering to only cascades of length greater
than or equal to 25. We observe the cascades for two 25
retweets and 50 retweets, and we predict whether they will
reach 50 and 100 retweets, respectively. We perform a 40%-
60% stratified train-test split. Feature-Driven approach
uses the features mentioned in Section 5.2, except for volume
which is constant for all cascades. Hybrid approach com-
bines features from both Hawkes and Feature-Driven.
The random train-test split is repeated 10 times and we re-
port mean accuracy and standard deviation.
Results. Table 4 summarizes the classification perfor-
mances. A random guess (majority class) would output an
accuracy of 52% and 53% for an observed length of 25 and 50
respectively. The generative-based classifier HawkesC im-
proves substantially over the baseline of random guess, how-
ever Feature-Driven has the best prediction accuracy. In-
terestingly, combining the generative features with the data-
driven features did not lead to a significant improvement,
likely due to Feature-Driven already has stronger results
than HawkesC. Admittedly, predicting whether a cascade
will double in size is an easier problem than forecasting its
final volume. Overall, the results suggests that the predic-
tions are robust, and the performance are comparable to
earlier results reported by Cheng et al. [7] (0.81 accuracy
after seeing the first 50 shares).
7. CONCLUSION
This paper establishes a common benchmark that allows
researchers and practitioners to compare feature-driven and
generative approaches on different variants of popularity
prediction problems. Existing feature-based approaches em-
ploy either proprietary insider information, or global net-
work information that is impossible to retrieve with the lim-
ited access that are openly available. In this work, we bridge
the problem space by first selecting a small set of features
which can be obtained by using only free access services
and constructing the Feature-Driven method. We fur-
ther propose a Hawkes self-exciting model, which intuitively
aligns with the social factors responsible for diffusion of cas-
cades: social influence of users, social memory and inherent
content quality. We systematically construct a predictive
layer, which helps optimize predict from other cascades. We
perform extensive evaluation on two large datasets: a bench-
mark dataset constructed by Zhao et al. [44] and a domain-
102030405060708090100%0.00.20.40.60.81.01.21.41.6ARE0.360.430.430.410.420.400.370.420.380.35SEISMIC102030405060708090100%0.00.20.40.60.80.360.300.230.160.120.100.130.170.200.26Feature Driven102030405060708090100%0.00.20.40.60.80.250.220.150.120.090.070.090.100.140.17HAWKESspecific dataset curated on news tweets. We compare the
feature-driven approaches and generative approaches in two
tasks: i) predicting the total size of retweeting cascades and
ii) predicting whether cascades will double their size. Both
our proposed generative Hawkes method and our Feature-
Driven method outperform the current state of the art pre-
dictor. Performances are further improved when combin-
ing both approaches into Hybrid, which makes us argue
that popularity modeling should leverage the best that both
worlds have to provide.
We plan to extend this work by including additional fac-
tors such as, different network behaviour for particular types
of content, user influence distributions that are varying over
time, and explicit modeling of the interplay between the un-
folding of related cascades.
Acknowledgments This material is based on research sponsored
by the Air Force Research Laboratory, under agreement number
FA2386-15-1-4018. We thank the National Computational Infras-
tructure (NCI) for providing computational resources, supported
by the Australian Government.
8. REFERENCES
[1] Supplemental material – feature driven and point process
approaches for popularity prediction, 2016.
http://arxiv.org/pdf/1608.04862.pdf#page=11.
[2] D. Agarwal, B.-C. Chen, and P. Elango. Spatio-temporal
models for estimating click-through rate. In WWW '09, pages
21–30, 2009.
[3] S. Asur and B. A. Huberman. Predicting the future with social
media. In WI-IAT '10, volume 1, pages 492–499, 2010.
[4] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts.
Everyone's an influencer. In WSDM '11, page 65, feb 2011.
[5] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi.
Measuring user influence in twitter: The million follower
fallacy. In ICWSM '10, May 2010.
[6] B. Chang, H. Zhu, Y. Ge, E. Chen, H. Xiong, and C. Tan.
Predicting the Popularity of Online Serials with Autoregressive
Models. In CIKM '14, pages 1339–1348, nov 2014.
[7] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and
J. Leskovec. Can cascades be predicted? In WWW '14, pages
925–936, 2014.
[8] A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-Law
Distributions in Empirical Data. SIAM Review, 51(4):661–703,
nov 2009.
[9] R. Crane and D. Sornette. Robust dynamic classes revealed by
measuring the response function of a social system. PNAS '08,
105(41):15649–15653, oct 2008.
[10] D. J. Daley and D. Vere-Jones. An introduction to the theory
of point processes. Vol. I, volume I. 2008.
[11] F. Davletov, A. S. Aydin, and A. Cakmak. High Impact
Academic Paper Prediction Using Temporal and Topological
Features. In CIKM '14, pages 491–498, nov 2014.
[12] W. Ding, Y. Shang, L. Guo, X. Hu, R. Yan, and T. He. Video
Popularity Prediction by Sentiment Propagation via Implicit
Network. In CIKM '15, pages 1621–1630, oct 2015.
[13] M. Farajtabar, Y. Wang, M. Rodriguez, S. Li, H. Zha, and
L. Song. Coevolve: A joint point process model for information
diffusion and network co-evolution. In NIPS '15, pages
1945–1953, 2015.
[14] V. Filimonov and D. Sornette. Apparent criticality and
calibration issues in the Hawkes self-excited point process
model: application to high-frequency financial data. arXiv
preprint, aug 2013.
[15] A. G. Hawkes. Spectra of some self-exciting and mutually
exciting point processes. Biometrika, 58(1):83–90, apr 1971.
[16] A. G. Hawkes and D. Oakes. A Cluster Process Representation
of a Self-Exciting Process. J. Appl. Probab. '74, 11(3):493, sep
1974.
[17] A. Helmstetter and D. Sornette. Subcritical and supercritical
regimes in epidemic models of earthquake aftershocks. J
GEOPHYS RES-SOL EA '02, 107(B10):ESE 10–1--ESE
10–21, 2002.
[18] A. Johansen and D. Sornette. Download relaxation dynamics
on the WWW following newspaper publication of URL.
PhysA '00, 276(1-2):338–345, 2000.
[19] K. Y. Kamath and J. Caverlee. Spatio-temporal meme
prediction. In CIKM '13, pages 1341–1350, oct 2013.
[20] S. Kim, D. Putrino, S. Ghosh, and E. N. Brown. A Granger
causality measure for point process models of ensemble neural
spiking activity. PLoS Comput. Biol. '11, 7(3):e1001110, mar
2011.
[21] H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a
social network or a news media? In WWW '10, pages 591–600,
2010.
[22] H. Li, X. Ma, F. Wang, J. Liu, and K. Xu. On popularity
prediction of videos shared in online social networks. In
CIKM '13, pages 169–178, oct 2013.
[23] L. Li and H. Zha. Dyadic event attribution in social networks
with mixtures of Hawkes processes. In CIKM '13, pages
1667–1672, 2013.
[24] L. Li and H. Zha. Learning parametric models for social
infectivity in multi-dimensional hawkes processes. In AAAI '14,
2014.
[25] T. Martin, J. M. Hofman, A. Sharma, A. Anderson, and D. J.
Watts. Exploring limits to prediction in complex social systems.
In WWW '16, pages 683–694, 2016.
[26] G. Miritello, R. Lara, M. Cebrian, and E. Moro. Limited
communication capacity unveils strategies for human
interaction. Sci. Rep. '13, 3, 2013.
[27] G. O. Mohler, M. B. Short, P. J. Brantingham, F. P.
Schoenberg, and G. E. Tita. Self-Exciting Point Process
Modeling of Crime. J. Amer. Statist. Assoc. '11,
106(493):100–108, mar 2011.
[28] Y. Ogata. Seismicity Analysis through Point-process Modeling:
A Review. PURE APPL GEOPHYS '99, 155(2-4):471–507,
1999.
[29] H. Pinto, J. M. Almeida, and M. A. Gon¸calves. Using early
view patterns to predict the popularity of youtube videos. In
WSDM '13, page 365. ACM Press, feb 2013.
[30] J. C. L. Pinto, T. Chahed, and E. Altman. Trend detection in
social networks using hawkes processes. In ASONAM '15,
pages 1441–1448, 2015.
[31] V. Raghavan, G. V. Steeg, A. Galstyan, and A. G. Tartakovsky.
Modeling temporal activity patterns in dynamic social
networks. IEEE CSS '14, 1(1):89–107, 2014.
[32] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf. Uncovering
the Temporal Dynamics of Diffusion Networks. In ICML'11,
pages 561–568, 2011.
[33] D. A. Shamma, J. Yew, L. Kennedy, and E. F. Churchill. Viral
actions: Predicting video view counts using synchronous
sharing behaviors. In ICWSM '11, 2011.
[34] H.-W. Shen, D. Wang, C. Song, and A.-L. Barab´asi. Modeling
and Predicting Popularity Dynamics via Reinforced Poisson
Processes. In AAAI '14, pages 291–297, Canada, 2014.
[35] A. Sornette and D. Sornette. Renormalization of earthquake
aftershocks. Geophys. Res. Lett. '99, 26(13):1981–1984, 1999.
[36] D. Sornette and A. Helmstetter. Endogenous versus exogenous
shocks in systems with memory. PhysA'03, 318(3-4):577–591,
2003.
[37] G. Szabo and B. A. Huberman. Predicting the popularity of
online content. Communicat. of the ACM, 53(8):80–88, 2010.
[38] D. Vallet, S. Berkovsky, S. Ardon, A. Mahanti, and M. A.
Kafaar. Characterizing and Predicting Viral-and-Popular Video
Content. In CIKM '15, pages 1591–1600, oct 2015.
[39] A. Wachter and L. T. Biegler. On the implementation of a
primal-dual interior point filter line search algorithm for
large-scale nonlinear programming. Mathematical
Programming, 106(1):25–57, 2006.
[40] J. Wallinga and P. Teunis. Different epidemic curves for severe
acute respiratory syndrome reveal similar impacts of control
measures. Am J Epidemiol '04, 160(6):509–16, sep 2004.
[41] F. Wu and B. A. Huberman. Novelty and collective attention.
PNAS '07, 104(45):17599–601, nov 2007.
[42] H. Yu, L. Xie, and S. Sanner. Twitter-driven youtube views:
Beyond individual influencers. In MM '14, pages 869–872, 2014.
[43] L. Yu, P. Cui, F. Wang, C. Song, and S. Yang. Uncovering and
predicting the dynamic process of information cascades with
survival model. Know. and Inf. Syst., page 10, 2016.
[44] Q. Zhao, M. A. Erdogdu, H. Y. He, A. Rajaraman, and
J. Leskovec. SEISMIC: A Self-Exciting Point Process Model for
Predicting Tweet Popularity. In KDD '15, 2015.
ii"CIKM2016SI"-2016/8/30-5:56-page1-#1iiiiiiSupportingInformation"FeatureDrivenandPointProcessApproachesforPopularityPrediction"SwapnilMishra,Marian-AndreiRizoiuandLexingXieDOI:http://dx.doi.org/10.1145/2983323.2983812Contents1Technicaldetailsabouttheoptimizationproce-dure11.1Derivationoflog-likelihoodfortheHawkespro-cess........................11.2Computationofpartialderivativesforopti-mization......................12Additionaldensitydistributiongraphics23GoodnessofFit24MoreResults31Technicaldetailsabouttheoptimizationprocedure1.1Derivationoflog-likelihoodfortheHawkesprocess.Wedetailthederivationofthelog-likelihoodinEq.[5]inthemaintext:L(κ,β,c,θ)=logP({(mi,ti),i=1,...,n})=nXi=1log(λ(ti))−ZT0λ(τ)dτ[13]WestartbycomputingtheintegralontherighthandsideofEq.[13],denotedbyΛ:Λ=ZT0λ(τ)dτcf.[1]=Zt10=0z}{0Xt=0φmi(t−ti)dt+Zt2t1φm0(t−t0)dt+Zt2t1φm1(t−t1)dt+Zt3t2φm0(t−t0)dt+Zt3t2φm1(t−t1)dt+Zt3t2φm2(t−t2)dt+...⇒Λ=nXi=1ZTtiφmi(t−ti)dt[14]IntroducingEq.[2]intoEq.[14],weobtain:Λ=nXi=1ZTtiκ(mi)β1(t−ti+c)1+θdt=nXi=1−κ(mi)β(t+c−ti)−θθ(cid:12)(cid:12)(cid:12)(cid:12)Tti⇒Λ=κnXi=1(mi)β"1θcθ−(T+c−ti)−θθ#[15]HenceEquation[13]canbewrittenas,L(κ,β,c,θ)=1z}{nXi=2logκ+2z}{nXi=2logXti>tj(mj)β(ti−tj+c)1+θ−−κnXi=1(mi)β"1θcθ−(T+c−ti)−θθ#{z}3[16]1.2Computationofpartialderivativesforoptimization.WepresentthepartialderivativescalculationforEquation16,usedbytheIpoptfunctionoptimizationprocedureforfittingtheparametersoftheHawkesself-excitingmodeltoagivencascade.DifferentiatingEq.[16]w.r.tκweobtain:∂L∂κ=n−1κ−nXi=1(mi)β"1θcθ−1(T+c−ti)θθ#[17]FordifferentiatingL(κ,β,c,θ)w.r.tβ,candθ,wefirstcon-siderthe2ndsecondtermintherighthandsideofEq.[16]:nXi=2logXti>tj(mj)β(ti−tj+c)1+θ=nXi=2logh(mi−1)β(ti−ti−1+c)−(1+θ)+...+(m1)β(ti−t1+c)−(1+θ)i[18]UsingthelogarithmicderivationruleandEq.[18]inEq[16],weobtainthepartialderivativew.r.tβ:∂L∂β=nXi=2Pti>tj(ti−tj+c)−(1+θ)(mj)βlog(mj)Pti>tj(ti−tj+c)−(1+θ)(mj)β−κnXi=1(mi)βlog(mi)"1θcθ−1(T+c−ti)θθ#[19]Similarly,wecomputethepartialderivativesw.r.tcandθ:∂L∂c=nXi=2Pti>tj−(1+θ)(mj)β(ti−tj+c)−(2+θ)Pti>tj(ti−tj+c)−(1+θ)(mj)β−κnXi=1(mi)β"1(T+c−ti)1+θ−1c1+θ#[20]Supportinginformation1–4ii"CIKM2016SI"-2016/8/30-5:56-page2-#2iiiiii0.00.20.40.60.81.00.00.51.01.52.02.5Density distribution for βDensity0.430.279(a)0.00.20.40.60.801234Density distribution for n*Density0.170.12(b)2e+035e+031e+042e+045e+041e+052e+055e+051e+061e−241e−181e−121e−061e+00Density distribution for cDensity(c)2e+035e+031e+042e+045e+041e+052e+055e+051e+064.74.84.95.05.15.2Cumulative density distribution for cDensity(d)Figure8:Distributionofparameterβ(a),n∗(b),cinlog-logscale(c)andcumulativedistributionofcinlog-log(d),onasampleof17,146cascadesfromtheNewsdataset.ThedashedverticallinesshowfittedparametervaluesforthetworetweetcascadesillustratedinthemaintextFig.1:tw1inredandtw2inblue.∂L∂θ=nXi=2Pti>tj−log(ti−tj+c)(ti−tj+c)−(1+θ)(mj)βPti>tj(ti−tj+c)−(1+θ)(mj)β−κnXi=1(mi)βθ2h(θlog(T+c−ti)+1)(T+c−ti)−θ−(θlog(c)+1)c−θi[21]2AdditionaldensitydistributiongraphicsFigure8showsthedensitydistributionofparametersβandc,alongwithbranchingfactorn∗.Thedensityofβshowstwolocalmaxima:amaximumofdensityaround0.079andasmallerpeakaroundβ∼α−1resultingfromtheoptimizerter-minatingattheboundaryofthenon-linearconstraintn∗=1.Parametern∗representstheexpectednumberofeventsspawnedbyasingleeventintheHawkesprocess.Itsdis-tributionshowsamaximumaroundn=0.022andasmallerlocalmaximumaround1,resultedfromthesameprocessin-volvingthenon-linearconstraintn∗=1.Thelowvalueofn∗Table5:MeanandMedianvaluesoflog-likelihoodofunseendataonasubsampleofNewsdatasetwith100cascadesforSeismicandunconstrainedversionofHawkes.ApproachMeanMedianSeismic-6.620-4.3964Hawkes-7.050-6.620pointtowardsafastdecayingself-excitingprocess,resultinginsmallcascadeswithshortlifespans.Parametercisacutoffparameter,itspurposeistokeepthekernelfunctionφm(τ)boundedwhenτ∼0.Itcontrolsthereactivityoftheinitialdiffusion:smallvaluesleadtothefirstretweetsbeingpostedearlyaftertheinitialtweet;largevaluesintroducelongwaitingtimesbetweenthefirsttweetandsubsequentretweets.Fig.8(c)showsitslong-taildensitydistributioninlog-logscaleandFig8(d)showsitscumulativedensitydistribution.Thelargemajorityofcascadesareveryreactive,withamedianvalueofc=111seconds.3GoodnessofFitAswehaveagenerativemodelthatpredictsfinalsizeofacascadebetterthanthecurrentstateoftheart[1],weset2Mishraet.al.ii"CIKM2016SI"-2016/8/30-5:56-page3-#3iiiiiioutthetasktoevaluatehowgoodourmodelfitstheunseendata.InordertoachievethiswefirstfitamodeltoalldataseentillsometimetNforacascadeandthenestimatethelog-likelihoodoftheunseendatatillit'sendtimetM.Wecangetthelog-likelihoodoftheunseendatabysub-tractingthelog-likelihoodoftheseencascadefromthelog-likelihoodofthewholecascadeafterfittingtheparametersontheseenpart,itisdefinedasfollows,L({(mi,ti),i=N+1,...,M})=L({(mi,ti),i=1,...,M})−L({(mi,ti),i=1,...,N})[22]ForHawkeswecaneasilycalculatethevalueinEquation22byusingEquation16forbothseenandfullcascade.ButforSeismictheevaluationisnotpossible,astheydonotderivethelog-likelihoodoftheirmodelexplicitly.ForSeismicthederivationoflog-likelihoodofunseendatacanbewrittenasfollows,L({(mi,ti),i=N+1,...,M})=Az}{MXi=N+1log(λ(ti))−ZtMtNλ(τ)dτ{z}B[23]NowwecancalculatethepartAofEquation23byusingEquation1in[1]andassumingthatinfectiousnessonceesti-matedattNremainsconstant,asfollows,A=MXi=N+1log(PtN)+MXi=N+1log iXj=1njφ(ti−tj)![24]NowforPartBinEquation23byusingEquation1in[1],wehave,B=ZtMtNPtNXti6τ(φ(τ−ti)nidτ)[25]NowusingthetrickusedinEquation14andkeepinginmindthefactthattihastwoparts,i∈[1,N]andi∈[N+1,M],wecanwriteEquation25as,B=PtN"NXi=1niZtMtNφ(τ−ti)dτ+MXi=N+1niZtMtiφ(τ−ti)dτ#[26]UsingEquation24andEquation26wecancalculatethedesiredlog-likelihoodoftheunseendataforSeismic.TopresentresultsforgoodnessoffitweuseunconstrainedoptimizationofparametersforHawkesandcompareitagainstSeismiconasubsampleofNewsdatasetwith100cascades.TheresultsarelaiddowninTable5.Asseenfromthetable,SeismicfitsslightlybettertotheunseendataHawkes,eventhoughthepredictivepowerofHawkesisbet-terasdemonstratedinmaintext.4MoreResultsInthissectionwepresenttheanalysisonstatisticalsignifi-canceofourresultspresentedinSection6.2ofmaintext.ResultsarepresentedinTable6forSeismic,Hawkes,Feature-DrivenandHybridmodelsfortheNewsdataset,weuseastrictcut-offp-value,0.01,asoursamplesizeisinorderofthousands.AsseenfromTable6Hybridmodelshowsstatisticalsignificantimprovementoverallotherapproachesalmosteverytime.TheresultsforHawkesandFeature-DrivenareingeneralbetterthanSeismic,butstatisticallyinsignificantamongeachother.Table6:StatisticaltestingresultsforSeismic,Hawkes,Feature-DrivenandHybridmodelsfortheNewsdataset,indicatingthealgorithmwithstatisticalsignificantbetterre-sults.Winisdecidedwhenanalgorithmhasmajorityoflowererrorvaluesthanthecompetingalgorithmandp-valuecon-firmstheresultsasstatisticallysignificant,elsewemarkitadrawincaseofnostatisticaldifference.Approach5minutes10minutes1hourSeismic-Feat.-DrivenDrawFeat.-DrivenFeat.-DrivenSeismic-HawkesDrawHawkesHawkesSeismic-HybridDrawHybridHybridFeat.-Driven-HawkesDrawDrawDrawFeat.-Driven-HybridHybridHybridHybridHawkes-HybridHybridHybridHybrid1.Q.Zhao,M.A.Erdogdu,H.Y.He,A.Rajaraman,andJ.Leskovec.SEISMIC:ASelf-ExcitingPointProcessModelforPredictingTweetPopularity.InKDD'15,2015.Mishraet.al.Supportinginformation3 |
1312.2159 | 2 | 1312 | 2013-12-19T21:24:28 | Learning about social learning in MOOCs: From statistical analysis to generative model | [
"cs.SI"
] | We study user behavior in the courses offered by a major Massive Online Open Course (MOOC) provider during the summer of 2013. Since social learning is a key element of scalable education in MOOCs and is done via online discussion forums, our main focus is in understanding forum activities. Two salient features of MOOC forum activities drive our research: 1. High decline rate: for all courses studied, the volume of discussions in the forum declines continuously throughout the duration of the course. 2. High-volume, noisy discussions: at least 30% of the courses produce new discussion threads at rates that are infeasible for students or teaching staff to read through. Furthermore, a substantial portion of the discussions are not directly course-related.
We investigate factors that correlate with the decline of activity in the online discussion forums and find effective strategies to classify threads and rank their relevance. Specifically, we use linear regression models to analyze the time series of the count data for the forum activities and make a number of observations, e.g., the teaching staff's active participation in the discussion increases the discussion volume but does not slow down the decline rate. We then propose a unified generative model for the discussion threads, which allows us both to choose efficient thread classifiers and design an effective algorithm for ranking thread relevance. Our ranking algorithm is further compared against two baseline algorithms, using human evaluation from Amazon Mechanical Turk.
The authors on this paper are listed in alphabetical order. For media and press coverage, please refer to us collectively, as "researchers from the EDGE Lab at Princeton University, together with collaborators at Boston University and Microsoft Corporation." | cs.SI | cs |
Learning about social learning in MOOCs:
From statistical analysis to generative model
Christopher G. Brinton
Princeton University
Princeton, NJ
[email protected]
Mung Chiang
Princeton University
Princeton, NJ
[email protected]
Shaili Jain
Microsoft
Bellevue, WA
Henry Lam
Boston University
[email protected]
Boston, MA
Zhenming Liu
Princeton University
Princeton, NJ
[email protected]
Felix Ming Fai Wong
Princeton University
Princeton, NJ
[email protected]
[email protected]
ABSTRACT
We study user behavior in the courses offered by a ma-
jor Massive Online Open Course (MOOC) provider during
the summer of 2013. Since social learning is a key element of
scalable education in MOOCs and is done via online discus-
sion forums, our main focus is in understanding forum activ-
ities. Two salient features of MOOC forum activities drive
our research: 1. High decline rate: for all courses studied,
the volume of discussions in the forum declines continuously
throughout the duration of the course. 2. High-volume,
noisy discussions: at least 30% of the courses produce new
discussion threads at rates that are infeasible for students or
teaching staff to read through. Furthermore, a substantial
portion of the discussions are not directly course-related.
We investigate factors that correlate with the decline
of activity in the online discussion forums and find effec-
tive strategies to classify threads and rank their relevance.
Specifically, we use linear regression models to analyze the
time series of the count data for the forum activities and
make a number of observations, e.g., the teaching staff's
active participation in the discussion increases the discus-
sion volume but does not slow down the decline rate. We
then propose a unified generative model for the discussion
threads, which allows us both to choose efficient thread clas-
sifiers and design an effective algorithm for ranking thread
relevance. Our ranking algorithm is further compared against
two baseline algorithms, using human evaluation from Ama-
zon Mechanical Turk.
The authors on this paper are listed in alphabetical
order. For media and press coverage, please refer to
us collectively, as "researchers from the EDGE Lab
at Princeton University, together with collaborators
at Boston University and Microsoft Corporation."
Categories and Subject Descriptors
G.1.6 [Mathematics of Computing]: Least squares meth-
ods; I.2.6 [Computing Methodologies]: Concept Learn-
ing
1.
INTRODUCTION
The recent rapid development of massive online open
courses (MOOCs) offered through websites such as Cours-
era, edX, and Udacity demonstrates the potential of using
the Internet to scale higher education. Besides business
models and potential impact, pedagogy is an often-debated
subject as MOOCs try to make higher education available
to a broader base. Low completion rates have often been
cited to highlight a scale -- efficacy tradeoff [25, 18, 5, 26].
Social learning is a key part of MOOC platforms.
It
holds the promise of scalable peer-based learning and is often
the dominant channel of teacher-student interactions. As
MOOCs proliferate in 2013, a natural question is: How can
we better understand MOOC forum activities through the
large-scale, extensive data emerging in the recent months?
It has been observed that such forums suffered from the
following major problems [17, 23]:
• Sharp decline rate: The amount of interaction in
forums rapidly drops soon after a course is launched.
• Information overload: As courses reach a larger au-
dience, often the forum is flooded by discussions from
many students; thus it quickly becomes infeasible for
anyone to navigate the discussions to find relevant in-
formation.
This paper studies both problems through a comprehen-
sive dataset we crawled from the Coursera discussion forums.
By examining the online discussion forums of all courses
that were offered during the summer of 2013, we quickly
discovered that both problems are ubiquitous in Coursera
(see Fig. 1 and 2). Thus, we believe it is natural to ask the
following two questions:
Question 1. How rapidly does the participation rate in the
online discussion forums decline over time, and what behav-
ioral factors maintain a robust participation rate?
Question 2. Is there a way to codify the generative process of
forum discussions into a simple model, and if so, can we also
leverage our model to better facilitate users' navigation?
Motivation of these questions.
The goal of study-
ing Q1 is twofold. First, because online discussion forums
are the main venue for teacher-student interaction and the
only venue for student-student peer help, understanding the
dynamics of the online discussion forums is crucial in under-
standing the quality of students' online learning experience.
Second, we believe students' participation in online forums
is also linked to the fundamental problem of having high
dropout rates in online education [8]. Exactly when (and
why) the students drop out of a course is not publicly acces-
sible information. In fact, due to privacy concerns, this type
(a) Number of posts per day
(b) Difference in post counts between two consecutive days
Figure 1: The decline of forum activities. Top: We randomly chose 5 courses out of the 73 courses we crawled and plot the
number of posts over the days. A regression line with regressor on time is added. Bottom: Q-Q plot on the differences in
counts between two consecutive days after removing 6% outliers (See Section 3).
of information may not be available in the near future. Fur-
thermore, given the demographics of MOOC students and
the nature of distance learning, it is unlikely for a student to
pass a course without any participation in the online forum
discussion. The activeness of a course's online forum closely
correlates with the volume of students that drop out of the
course.
Crystalizing the formation of discussion threads into a
simple model as asked in Q2 allows us to address the infor-
mation overload problem and hence improve students' online
learning experience. Addressing information overload prob-
lems traditionally falls into the area of information retrieval
(IR). The primary goal here, however, is to highlight the
unique characteristics of the dynamics of MOOCs' forums
that are not seen in other online forums such as Yahoo! Q&A
and Stackoverflow (or other social media such as Twitter and
Facebook). The generative model we develop in Section 4
guides us in choosing classifiers to filter out "noise" in discus-
sions and in designing ranking algorithms to find the most
course-relevant discussions.
Our goals in answering Q1 and Q2 are both to sustain
forum activities and identify valuable discussions for indi-
viduals.
Our methodology. Our analysis consists of the following
components.
(1a) Statistical analysis. To address Q1, we carry out an in-
depth analysis to understand the factors that are associated
with students' participation in the online forums. Specifi-
cally, we first use regression models to understand what vari-
ables are significantly associated with the number of posts
(or number of users) that appeared in the forum in each
day for each course. One of the interesting discoveries, for
example, is that the teaching staff's active participation in
the discussion on average increases the discussion volume
but does not slow down the decline rate. We also apply a
standard t-test procedure to understand whether seeing too
many new threads in a short time will reduce the depth of
discussion in each thread. Along the way we also present
some basic statistics of Coursera, such as the total number
of students that participate in the forums, the distribution
on the number of posts for each student, and the distribution
on thread lengths.
(1b) Identifying the information overflow problem. Based on
the statistical analysis, one can see that users have different
needs in different stages of the course.
• In the first few days, the forum is often flooded with
small-talk, such as self-introductions. The primary goal
here is to classify these small-talk threads and filter
them out.
• After that, the small-talk often starts to drop. At this
point, most of the threads are valuable, so it is impor-
tant to be able to give a relevance rank of new threads
over time.
Thus, we need both a classifier for discussions and a relevance-
ranking algorithm. But we would like to understand a more
fundamental question described in Q2: Is there a principled
and unified way to consider the design of both the classi-
fiers and the ranking algorithms. This question is addressed
next.
(2) Generative models. We propose a unified generative
model for thread discussions that simultaneously guides the
(i) choice of classifiers, (ii) design of algorithms for extracting
important topics in each forum, (iii) design of a relevance
ranking algorithm based on the topic extraction algorithm
from (ii). Our ranking algorithm is also compared with a
number of baseline algorithms through human evaluation.
Our simple model explains all the key experimental results
we see.
Related work. There has been a great deal of research in
the areas of online social interaction and forum dynamics as
well as a great deal of research devoted to online education.
Here, we highlight a number of recent key works in these
areas.
MOOCs. Piech et al. [22] designed algorithms for a peer
grading system to scale up evaluation of students. We are
considering a different aspect of MOOC efficacy: attempt-
020406080100050100150200250Useful GeneticsPosts020406080050100150Drug Discoveries DevelopmentPosts0102030405050100150Audio and Music EngineeringPosts0102030405060700100200300Functional ProgrammingPosts01020304050600100030005000Sustainability of Food SystemsPosts−2−1012−50050100Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−400204060Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−400204060Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−150−50050Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−600−2000200Normal Q−Q PlotTheoretical QuantilesSample Quantiles(a) Sampled
portion
small-talk by categories
of
(b) Moving averages on the portion of small-talk by categories. Left: Vocational; Mid: (Ap-
plied) Sciences; Right: Humanities and Social Sciences .
Figure 2: Statistics of small-talk by categories. Vocation: vocational courses. (Appl) Sci: Sciences and Applied Sciences.
social-sci: Humanities and Social Sciences (Section 2).
ing to foster engagement in discussion forums. Along these
lines, Ahn et al. [2] used a longitudinal fixed-effects model
to identify the influencing factors of student participation
in peer-to-peer learning in a MOOC-type platform. Kizil-
cec et al. [15] argued that student engagement in MOOCs
should not be based solely on regular coursework comple-
tion. Cheng et al. [7] designed tools to predict a student's
risk of dropping out of the course.
Compared to the above works, our study is different in
that: (1) It is based on a much more comprehensive dataset,
73 courses (almost all of the courses in Coursera during the
summer 2013) versus at most 7 in previous work, (2) We
identify new factors influencing engagement, and (3) it crys-
tallizes the discussion dynamics via a generative model.
Studies on forums. There are two main lines of research
on the dynamics of online forums: (1) finding high-quality
information or high-quality users in question-and-answer fo-
rums (see [27, 14, 1, 10, 3] and references therein), and (2)
understanding social interactions in forums (e.g.,
[20, 6,
24]). On the theoretical side, Jain et al. [12] and Ghosh
and Kleinberg [9] took a game-theoretic approach in under-
standing user behavior in online forums. The work of Ghosh
and Kleinberg is perhaps more relevant to our work, because
they are interested in the optimal rate of instructor partici-
pation that encourages student participation.
The online discussion forums in MOOCs differ from
other social media studied in the following ways: 1. Both
social and technical discussions are encouraged. For exam-
ple, in Stackoverflow [3], administrators aggressively remove
low-quality threads, and in Twitter [6], very few technical
discussions occur. 2. Each forum focuses on one course.
Each course has one forum and only students in the course
participate in the forum. A large portion of the students
are also first-time users. While Yahoo! Q&A [1, 20] has
both social and technical discussions, MOOC forums have
weaker social interaction and more focused technical dis-
cussions (and thus the techniques developed in [20] are not
directly applicable).
2. PRELIMINARIES
Collecting the dataset. We focused on all 80 courses
that were available in the middle of July and that ended be-
fore August 10, 2013. Seven of these 80 courses became in-
accessible while we were crawling or coding the data. Thus,
we have complete records on 73 courses in total, which we
used for our data analysis. For developing the generative
model, it is less important to have a complete forum data
set, thus, we added four more courses that ended shortly af-
ter August 10, 2013. The dataset consists of approximately
830K posts (Section 3 presents more details). The full paper
gives the entire list of courses.
We first manually calculated various course properties,
such as the video length. Then, we crawled the forum con-
tent, at a rate of 1 to 3 pages per second, from the Coursera
server with Python and the Selenium library. Finally, we
used Beautifulsoup to parse the data.
Categorizing the courses. For the purpose of compari-
son across course types in this paper, we categorize a course
as quantitative or non-quantitative, and vocational or non-
vocational. We adopt the following definitions: if a substan-
tial portion of a course requires the students to carry out
mathematical or statistical analysis, or to write computer
programs, the course is a quantitative course. If a course's
material is directly relevant to jobs that require high school
or college degrees, or it is plausible to see the course offered
in a typical university's continuing education division, then
the course is considered a vocational course. Among these
73 courses, 37 of them are quantitative and 8 of them are
vocational. There are 6 courses that are both quantitative
and vocational. We partition the data in the following way
for data summarization purposes: a course could be (1) vo-
cational, (2) science or applied science (i.e., quantitative
but not vocational) or (3) humanities and social sciences
(neither quantitative nor vocational).
In a course forum, the
The structure of the forum.
students may create a new thread or add new content to an
existing thread. Each thread consists of one or more "posts,"
sorted in chronological order. The first post is always writ-
ten by the creator of the thread. A user may respond to a
thread (i.e., adding a new post) or respond to a post (i.e.,
adding a new comment).
In our analysis, we do not dis-
tinguish between posts and comments for the following two
reasons: (1) There is only a small portion of comments in
the forum. (2) The UI of the forums could be confusing like
other forums, i.e., the student could be unaware whether
he/she is making a comment or adding a post.
Topics in a forum.
The discussion threads can be
roughly categorized into the following groups: (1) Small-talk
conversations that are not course specific, such as a self-
introduction or requests to form study groups. (2) Course
logistics such as when to submit the homework, how to
download the video lectures, etc.(3) Course-specific ques-
vocation(app) scisocial−sci0.00.20.40.6020006000100000.00.40.8posts sorted by timeweighted moving average0500015000250000.00.40.8posts sorted by timeweighted moving average0200004000060000800000.00.40.8posts sorted by timeweighted moving averagetions that could be either very specific or open-ended.
Among these three categories, the last one is the most
valuable to the students' learning process. The second cate-
gory could be quite relevant, especially if a substantial por-
tion of the threads are about homework and exams. The
first one, however, can be quite disruptive to many students
when the number of new threads is already excessive. Thus,
we want to understand how many small-talk posts there are
for each course and whether the portion of small-talk we see
changes over time.
We answer the first question with the help of Amazon
Mechanical Turk (MTurk). Specifically, we randomly choose
30 threads from each course and hire workers from MTurk
to label the threads. Each thread is labeled by 3 people and
we take a majority vote to determine the labels. Figure 2a
shows the distributions of the small-talk by category. We
can see that a substantial portion of the courses have more
than 10% of small-talk in the online discussion forums. Fur-
thermore, the humanities and social sciences courses have a
higher portion of small-talk.
Temporal dynamics of small-talk. Now we study how
the portion of small-talk changes over time. Since it is in-
feasible (in time and cost) to label a significant portion of
the threads, we use a machine learning approach (specifi-
cally, a support vector machine, see Section 4) to classify the
threads by using the training data labeled through MTurk.
We put all threads under the same category together. Then
we sort the threads by the time elapsed between the begin-
ning of the course and the creation of the thread. Here we
focus on only the threads created within 35 days after the
class started. Then we compute the "moving average" as
let h1, h2, ..., hm be the sorted threads within the
follows:
same course and ηi be an indicator variable that sets to 1 if
and only if hi is classified as small-talk. Then we define our
(cid:80)
(cid:80)
1≤i≤t ηiαt−i
1≤i≤t αi
moving average at time t as: st =
. Figure 2
(α = .99) shows the results. We can see that at the be-
ginning, the percentage of small-talk is high across different
categories, and then it drops over time. However, for hu-
manities and social sciences courses, on average more than
30% of the threads are classified as small-talk even long after
a course is launched.
We remark that these plots give just estimates on the
volume of small-talk. There are two types of noise presented
in these plots: (1) We are aggregating all the threads in
the same category, so course-level information could be lost.
(2) The support vector machine could have classification er-
rors.
Nevertheless, we may conclude that small-talk is a ma-
jor source of information overload in the forums.
Why the existing infrastructure is insufficient. We
notice that the Coursera platform allows the instructors to
categorize the threads. However these categories are cus-
tomized by the teaching staff. Some categorizations are
more effective than others. And there is no effective mech-
anism to force the students to respect the categorization
consistently.
It would be infeasible for the staff to manu-
ally correct the labels when the new threads flood into the
forum.
3. STATISTICAL ANALYSIS
This section examines the following two subquestions of
Q1: (1a) What factors are associated with the decline rate
of the online forum participation? (1b) Will having more
discussion threads in a short period of time dilute students'
attention?
We use linear regression to answer 1a and student's t-
test to answer 1b.
3.1 Analysis of forum activity decline
This section studies what factors are associated with
the decline rate of forum activities. Here, our dependent
variables are yi,t and zi,t, where yi,t refers to the number of
posts at the t-th day in the i-th course, and zi,t refers to the
number of distinct users that participate in the discussion in
the t-th day in the i-th course. Both variables are important
to the students' online, social learning experience.
The following variables could be relevant to yi,t and zi,t:
Quantitative (Qi) is an indicator (boolean) variable that
sets to 1 if and only if the i-th course is a quantitative course.
Vocational (Vi) is an indicator variable that sets to 1 if
and only if the i-th course is a vocational one.
Total length of the videos (Li) is the sum of the length
of all lecture videos in the i-th course (in hours).
Total duration (Di) is the total length (in days) of the
i-th course.
Peer-graded (Pi) is an indicator variable that sets to 1
if and only if one or more assignments are reviewed/graded
by peer students.
Teaching staff 's activeness (Si) is the number of posts
the teaching staff make throughout the i-th course.
Graded homework (Hi) is the total number of homework
assignments that are graded by the teaching staff.
Intrinsic popularity (Mi, or M(cid:48)
i ) is the volume of forum
discussion in the beginning of the course, defined as Mi, the
median number of posts (if our dependent variables are yi,t),
or M(cid:48)
i , the number of distinct users (if our dependent vari-
ables are zi,t) in the first three days. Roughly speaking, this
variable captures the "intrinsic popularity" of each course,
e.g., it is likely that a course on public speaking is more
popular than a typical course in electrical engineering.
We start by walking through the behavior of the vari-
ables above before we present and analyze our model.
3.1.1
Statistics of Coursera
We now examine the key statistics for the 73 courses col-
lected in Coursera, starting with our "dependent variable,"
the behavior of the students.
Students in the forums.
In these 73 courses, there are
171,197 threads, 831,576 posts, and 115,922 distinct stu-
dents. Figure 3a shows the distribution of the number of
posts each student made (in log-log scale).
We may roughly classify the students in the forum as
"active" and "inactive." Active students refer to those who
make at least 2 posts in a course.1 Inactive students are ev-
eryone else. Figure 4 shows the distribution of the number
of students/active students across different courses by cate-
gory. Overall, the average number of students per course is
1835.0 (sd = 1975.4) but this number reduces to significantly
1069.7 (sd = 1217.7) for active students.
1Choosing 2 as the threshold is quite arbitrary. The goal
here is to show that many students make a small number of
posts.
(Intercept)
Qit
Vit
Lit
Dit
Pit
Sit
Hit
Mit (or M(cid:48)
i t)
Qi
Vi
Li
Di
Pi
Si
Hi
Mi (or M(cid:48)
i )
t
R2
Adj. R2
Num. obs.
On yi,t
On zi,t
70.252∗∗∗
18.276
0.847∗∗∗
1.511∗∗∗
1.463∗∗∗
3.328∗∗∗
−0.071∗∗∗ −0.024∗∗∗
0.034∗∗∗
0.025∗∗∗
−0.631∗∗ −0.375∗∗∗
−0.168∗∗ −0.067∗∗
0.000
−0.007∗∗∗ −0.005∗∗∗
−13.975
−135.567∗∗∗ −61.404∗∗∗ −0.153
On log(zi,t)
4.268∗∗∗
0.014∗∗∗
0.011∗∗
0.001∗∗∗
0.003
−0.001∗∗
−0.001
0.000∗∗
−23.737∗∗∗ −0.185∗∗
1.960∗∗ −0.049
−0.624∗∗∗ −0.010∗∗∗
−0.561
32.005∗∗∗
0.247∗∗∗
88.289∗∗∗
0.074∗∗∗
3.249∗∗∗
6.050∗∗
1.398∗∗
0.973∗∗∗
0.360∗∗∗
0.003∗∗∗
0.481∗∗∗
−1.864∗∗∗ −1.980∗∗∗ −0.071∗∗∗
0.555
0.554
0.467
0.465
0.530
0.526
5074
5074
1711
***p < 0.01, **p < 0.05, *p < 0.1
Table 1: Models of forum activities
Teaching staff activity.
On average, there are 366.9
posts in each course made by the teaching staff (sd = 446.1).
But there are two courses that have no posts from the teach-
ing staff.
j≤t N (µi, σi) = N (tµi,
i.e., yi,t =(cid:80)
Postulation of a model.
Based on the evidence pre-
sented above, we postulate the following linear model on
the post counts: let yi,t be the number of posts on the t-th
day in the i-th course. We assume yi,t+1 − yi,t ∼ N (µi, σi),
√
√
tσi). The mean term
grows linear in t while the "noise term" grows linear in
t.
When t is sufficiently large, the mean term dominates yi,t.
In other words, we may model yi,t = Ait + Bi + i,t, where
Ai and Bi only depend on the factors of the i-th course.
Note that while serial dependency can be present, we believe
this factor-adjusted, deterministic, linear trend is sufficient
to explain the pattern; this is confirmed by our subsequent
empirical results.
3.1.2 Regression model
We now present our linear model. More concretely, yi,t
is linearly related to the course factors, the variable t, and
the interacting terms between t and the factors, as
yi,t = At + B,
(1)
where A = β1Qi +β2Vi +β3Li +β4Di +β5Pi +β6Si +β7Hi +
β8Mi + β16 and B = β0 + β9Qi + β10Vi + β11Li + β12Di +
β13Pi + β14Si + β15Mi. Thus, we can view β1, ..., β8, and
β16 as influencing the decline rate of forum participation
whereas β0, β9, ..., β15 are influencing the initial participa-
tion volume.
The first column in Table 1 shows the results based
on ordinary least-squares regression. We make a number
of observations. First, it is evident that yi,t correlates well
with the intrinsic popularity Mi, but the magnitude of im-
pact of Mi on the decline rate in the long run appears very
light. The coefficients of Qi, Vi, Qit, and Vit suggest that
while being a quantitative/vocational course will initially re-
duce the volume of forum participation, in the long run the
course also experiences a lower decline rate (all the p-values
(a) # of posts per student.
(b) CDF of decline rate.
Figure 3: Distribution of student posts and decline rates.
Figure 4: Distribution of the number of students (left) and
active students (right) per course.
Distribution of decline rate. We next present how
yi,t and zi,t change over time for different courses. Fig-
ure 1a shows the variables {yi,t}t≥1 for five randomly se-
lected courses. We also fit linear models on each of these
datasets, where the regressors are the index of the day. All
the courses presented here experienced decline in participa-
tion. The rest of the courses also behaved similarly. Fig-
ure 3b shows the distribution of the decline rate for all the
courses (mean = −5.0 and sd = 8.7; 72 of 73 courses are
negative2). The variables {zi,t}t≥1 are qualitatively similar.
We next study the distribution on the count differences be-
tween two consecutive days in the same course.
It is not
uncommon to see outliers due to large fluctuations in dis-
cussions, especially in the beginning of the course or when
homework/exams are due. But after we remove the top
and bottom 3% outliers in each course, the count differences
follow a Gaussian distribution for most of the courses (see
Figure 1b for the Q-Q plots). These five courses all pass
Shapiro's normality test (p-values ≥ 0.01). Overall, 51 of 73
courses have ≥ 0.01 p-value in Shapiro's test.
Video length. Among these 73 courses, the mean video
length is 12.71 hours (sd = 7.85). The distribution fits quite
well with Gaussian. We do not see discrepancies in distri-
butions across categories.
Length of the courses. All the courses are between 4
and 14 weeks long. The mean is 58.8 days (sd = 15.3).
Homework assignments.
The mean number of staff-
graded assignments per course is 10.13 (sd = 10.88).Out of
the 73 courses, 6 of them do not have any staff-graded as-
signments. As for peer-graded assignments, there are a to-
tal number of 39 courses that have peer-graded homework.
Among them 5 courses are vocational, 11 courses are quan-
titative but not vocational, 23 of them are from the rest of
the courses.
2The only positive one also has a negative decline rate when
we count the # of distinct users.
155050011010010000Log−log Plotnumber of postsnumber of users−60−40−2000.00.20.40.60.81.0decline rateempirical cdfvocation(app) scisocial−sci20050020005000vocation(app) scisocial−sci1005002000≤ 10−6).
The coefficients associated with Si also look quite sur-
prising: while the teaching staff's active participation in the
forum correlates with the increased volume of discussion (the
addition of one post made by the teaching staff corresponds
to an increase of 6.05 posts per day), in the long run their
participation does not seem to reduce the decline rate. In
fact, there is evidence that an increase in staff participation
correlates with a higher decline rate (p-value = 0.021).
The variable Pi (whether the course has peer-reviewed
homework) behaves in a similar manner: while having peer-
reviewed homework adds 88.29 posts per day on average, it
also moderately increases the decline rate (p-value = 0.018).
Finally, the p-value of the model is 2.2 × 10−16 , sug-
gesting overall significance. We also diagnose the residuals,
which do not seem to elicit any heteroscedastic pattern. We
further check the differences between the slope of t, i.e.,
the quantity Ai, under our proposed regression model, and
the counterpart for regression only on t for each course; we
observe that these differences are also reasonably small in
magnitude.
We next move to the model for the variables zi,t. We
use the same set of regressors except that we substitute Mi
with M(cid:48)
i . Specifically, we use the following model:
zi,t = β0 + β1Qit + β2Vit + β3Lit + β4Dit + β5Pit
+β6Sit + β7Hit + β8M(cid:48)
+β12Di + β13Pi + β14Si + β15M(cid:48)
i + β16t.
i t + β9Qi + β10Vi + β11Li
Our results are shown in the second column of Table 1.
We can see that qualitatively, the variables correlate with
zi,t's in a similar manner: (1) Quantitative and vocational
courses attract a smaller volume of discussion in the begin-
ning but they also correlate with smaller decline rates (all
with p-value ≤ 10−6). (2) Si correlates with an increased
number of distinct users (p-value = 0.00994) but there is
evidence that it correlates with higher decline rates (p-value
= 0.038).
(3) Pi = 1 increases the total number of dis-
tinct users (p-value = 5.94 × 10−10) and it also correlates
with higher dropout rates (p-value = 0.0016). Finally, the
p-value of the model is 2.2×10−16, suggesting again an over-
all significance of the model, and the residuals do not show
any obvious pattern.
More robust linear model on a subset of courses.
While the linear regressions are in general quite robust against
noises, we would also like to restrict ourselves to those courses
that have "nice" behavior so that the residuals exhibit nor-
mality, and determine whether the conclusions are consis-
tent. Specifically, we choose those 51 courses whose count
differences in posts (after removing the top and bottom 3%
outliers) pass the Shapiro test (with p-value ≥ 0.01; see dis-
cussion in Section 2).
We fit the data from these 51 courses with the following
model:
log(zi,t) = β0 + β1Qit + β2Vit + β3Dit + β4Pit + β5Sit
(cid:48)
i t + β7Qi + β8Vi + β9Di + β10Pi
+β6M
+β11Si + β12M
(cid:48)
i + β13t.
The logarithmic transformation is performed because then
we observe a higher significance of the model (but this is not
strictly necessary and the result otherwise is similar). The
variables Li, Lit, Hi, and Hit are not statistically significant
(a) Log-log plot of thread
length distribution
(b) Threads' length by cat-
egory
Figure 5: Distribution of thread lengths.
so they are removed from the model. The third column of
Table 1 presents our results.
We also tested the normality of the residuals. The p-
value of the Shapiro test is 0.148, which indicates that our
model fits quite well for these 51 courses. The conclusions
we see here are mostly consistent with the conclusions made
from the above linear models.
3.2 Attention to each thread
Next, we investigate the following question: "Will hav-
ing more threads created at the same time reduce the aver-
age "attention" each thread receives on average?"
Distribution of the thread length. Let us start with
understanding the distribution of the length of the threads in
the discussion forum. The mean of the length of all threads
is 4.98 (median = 2 and sd = 8.65). Figure 5a gives the
distribution of thread length in log-log scale. Figure 5b also
gives the boxplots of the distribution of the threads' length
by categories.
Independent two-sample t-tests. We use a t-test to
understand whether having more newly created threads will
dilute the attention each thread receives. Let hi be a discus-
sion thread in the forum and let (cid:96)i be the length of the thread
(the total number of posts and comments in the thread).
Also, let f (hi, t) be the total number of other threads that
were created within t days before and after hi is created in
the same course. For example, if hi was created on July 2nd
3pm, then f (hi, 1) is the number of threads other than hi
that were created between July 1st 3pm and July 3rd 3pm.
Figure 6a shows the plot of (cid:96)i against f (hi, 1). We could
fit this data set with a linear model. But we find the linear
model's explanatory power is quite low (i.e., R2 is below
0.02). Thus, we resort to two-sample procedures to analyze
this group of data set. Specifically, we partition the threads
into two groups. The first group G1 contains all the threads
hi such that f (hi, 1) ≤ 140. The second group G2 contains
the rest of them. The threshold is chosen in a way that both
the size and (cid:96)i's variances are within a factor of 2 for both
groups (size of G1 is 44971, Varhi∈G1 ((cid:96)i) = 103.94; size of
G2 is 76890, Varhi∈G2 ((cid:96)i) = 62.14). We shall refer to G1 as
the small group and G2 as the large group. Our goal is to
test the following hypothesis:
H0: the small group's thread length is no greater than the
larger group's thread length.
H1: the small group's thread length is larger than the larger
group's thread length.
The comparison above is understood to be with respect
12510205020011010010000Log−log Plotlength of the threadscountvocation(app) scisocial−sci1252050200SVM (θ = −1.015)
SVM (θ = −0.995)
NB (aggregate)
NB (separate)
true positive rate
false positve rate
93.3%
86.7 %
96.7%
96.7%
17.3%
5.9%
35.9%
76.8%
Figure 7: Comparing the SVM and the NB classifier.
classifier per course and test the classifier to the testing data
in the same course. For SVM, we use the standard Kernel.
We use the open source code SVM Light [13] software, with
their default parameters.
Results. Figure 7 compares the performance between the
SVM and the NB classifiers. Here, it is more appropriate
to measure true and false positive rates instead of preci-
sion/recall (see [10] for a discussion). Both the true positive
and false positive rates are very high in NB classifiers while
SVM has a substantially better false positive rate when the
true positive rate is similar (the first row in Fig. 7), which
is further reduced when we allow the SVM to have a lower
true positive rate (2nd row in Fig. 7). We also remark that
an advantage of our classification process is that we do not
need to use too many features to obtain sufficiently good
results.
4.2 A unified topical model
We now present a generative model for the discussion
threads inspired by the above experimental results. Let C
be the set of n words appearing in the discussion threads.
Our model consists of the following distributions on C:
• The background distribution B that is not topical-dependent.
This refers to the set of commonly used words in the En-
glish language (but not too common that would appear
in the stopword list).
• The topical distribution for small-talk and logistics T0:
This models keywords that are more likely to appear in
small-talk or logistics discussions.
• The course-specific topical distribution Ti for the i-th
course. This models keywords that are more likely to
appear in the discussions that are relevant to the i-th
course.
Sampling a thread. A thread in the i-th course is sam-
pled in the following way:
• With probability pi that the thread is a logistic/smalltalk
• Otherwise the thread is a course-specific thread.
thread.
Here pi can be different for different courses. When a
thread is a logistic/smalltalk thread, the words are sampled
i.i.d. from D0(i), which is defined as: with probability (1 −
) the word is sampled from B and otherwise the word is
sampled from T0. Notice that D0(i)'s are the same for all
i's. Similarly, when a thread is a course-specific thread, the
words in the thread are i.i.d. samples from D1(i) defined as:
with probability (1 − ) the word is from B and otherwise
the word is from Ti.
Furthermore, for exposition purposes, let us make the
following assumptions (most of which can be relaxed):
• Near-uniformity in B: for any w ∈ C, PrDi(j)(w) =
Θ( 1
n ) for all i and j. Here, we shall imagine C represents
the words that are outside a stopword list but cover
important topics in different courses, e.g., the 200-th
to 2000-th most frequent words. This assumption is
justified by the heavy tail distribution of English words.
• Distinguishability of the topics: Let Supp(D) be
(a) Length of threads vs. #
of new threads
(b) Boxplots of two groups
(≤ 140 new threads and
otherwise)
Figure 6: The length of discussion threads vs. the number
of threads created around the same time.
to some central tendency measure. Figure 6b also gives the
boxplot of the log of thread lengths in both groups. Using
a t-test, we get a t-statistic of 40.3 and the p-value is ≤
2.2 × 10−16. We also carry out a Mann-Whitney U -test,
which also yields a p-value ≤ 2.2×10−16. Both tests indicate
that we can reject the null hypothesis with high confidence
(one with respect to the mean, the other w.r.t. the median)
and therefore, there is strong evidence that having more
threads created at the same time correlates with a reduction
in the attention each thread receives.
4. A GENERATIVE MODEL
Now that we have explored Q1, we move on to Q2.
Specifically, this section presents a generative model for thread
discussions. We start with a motivating example: evaluation
of standard classifier algorithms for filtering small-talk (re-
call that this is important in the initial stage of a course;
see Section 1). Specifically, it is well-known that both naive
Bayes (NB) and support vector machine (SVM) classifiers
are good in this type of classification problems. While the
SVM classifier shows reasonable performance, the NB clas-
sifier experiences excessively high false positive rates. We
may leverage the clues from this discrepancy in performance
to design a generative model. This generative model both
explains the discrepancy and guides us in designing topic
extraction and relevance-ranking algorithms (Section 5).
4.1 Understanding the classifiers.
Getting the data. We used MTurk to label the threads.
We randomly selected 30 threads for each course. We also
chose an arbitrary subset of 40 courses and labelled the first
30 even-numbered threads. This allowed us to get more
thread samples that fall into the small-talk category.
We next split the data set into a training set and a test
set:
for each randomly sampled thread, with probability
0.85, we assign it as a training data point and otherwise
a test data point. Since the test data set is smaller, the
authors also made an extra pass on the test set to further
reduce the errors in the labels. Also, the test size appears to
be sufficiently large so we do not use k-fold cross validation
here.
Training the classifiers.
The NB algorithm is imple-
mented based on [21, 11]. We took two approaches to train
the NB classifier: Approach 1: We train a single classifier
on all of the training data. Approach 2: We train the NB
01000200030004000050100150number of new threadslength of the threads121251050200group numberthe support of a distribution D. For any i and j, we
assume Supp(Ti) and Supp(Tj) do not overlap (but the
supports of D1(i) and D1(j) can still overlap). Further-
PrB(w) ≤ u, where
more, for any w ∈ Supp(Ti), (cid:96) ≤ PrD1(i)(w)
1 < (cid:96) < u are two constants.
We have the following theorem that explains the behav-
ior of the classifiers:
Theorem 4.1. Consider the generative model above. There
exist s, , p1, ..., pm, and a sequence b1, ..., bm, such that if
we get bi training samples for the i-th course, then
1. With constant probability over the training set, the NB
classifier will have poor performance for some courses
( i.e., whp the classifier errs at the negative threads) re-
gardless of whether the classifier is trained per course or
across all courses.
2. There exists a good separation plane for SVM so that
whp a discussion thread will be classified correctly.
Here we briefly sketch the intuition for the first part of
the theorem. The full paper presents the proof. We leverage
a quite straightforward intuition to construct the negative
examples: when we train the classifier per course, there is
insufficient training data (e.g., ≈ 30 in our case) and thus
with constant probability we overestimate the conditional
probability. On the other hand, when we train the classifier
against all the courses, the classifier cannot address the fact
that pi are different for different courses. Thus, the NB
classifier will use a wrong prior for some courses. In these
courses, the classifier could perform badly.
5. TOPIC EXTRACTION AND RANKING.
We now demonstrate how the generative model can be
used to extract forum keywords and design relevance ranking
algorithms. We shall start with a simple algorithm for ex-
tracting Supp(Ti), i.e., the topical words for the i-th course.
We first describe the need for this algorithm.
Motivation. Knowing Supp(Ti) gives a forum user knowl-
edge of the topics in the course. There are some other pos-
sible approaches to extract the keywords, such as using the
keywords in a course syllabus. We argue that these existing
approaches are not suitable solutions here.
First, while the keywords in the course syllabus appro-
priately summarize the course lectures, they do not always
summarize the course discussions. For instance, in a fresh-
man English writing course, the instructors may focus on
"high level" issues of writing, such as organizing essays or
delivering effective arguments. The discussions in the forum
may focus on "lower level" issues or other relevant questions,
such as the usage of punctuation. Second, when the same
course is offered multiple times, we expect the topics of the
forum discussion would be different and thus Ti also changes.
The topic extraction algorithm. Let i reference a par-
ticular course. Our algorithm uses the following two parts
of training data:
• The background training data consists of forum dis-
• The course-specific training data consists of forum
discussions in the i-th course in the first few days (ap-
proximately 10 days).
Let n be the total number of words we see in the back-
ground training data set, and let Dn be the empirical uni-
gram distribution associated with both the background and
cussions of k courses.
(cid:112)p D(w)n
p E (w)n
=
γ(w) =
√
n
(cid:112)p D(w)
p E (w)
course-specific training data. Let E be the empirical distri-
bution associated with the course-specific training data. Let
W = {w1, ..., w(cid:96)} be the support of E, and w be an arbitrary
word in W . Let p D(w) be the probability mass of w under
the distribution Dn; let p E (w) be the probability mass of w
under E. We define the "surprise weight" of w as
We next rank the words in W according to the γ(·)
function, e.g., the first word w has the highest γ(w). Our
summary of keywords is the top-k (ordered list of) words in
the ranking. We have the following Corollary.
Corollary 5.1. Under our generative model presented
and assuming pi = Θ(1) and k = Supp(Ti) is known, our
topical extraction algorithm will successfully identify Supp(Ti)
when the training data is sufficiently large.
Experiments. We now evaluate the efficacy of our topical
algorithm. Here, the main discovery is that we need only
approximately 10 days of course-specific training data for
the algorithm to accurately identify Ti.
We tested the algorithm on 10 random "large" courses.
Specifically, we first identify the set of courses that have
larger discussion volume: for each course, we count the num-
ber of days, in which 15 or more new threads are created.
Call this number di for the i-th course. We then find all
courses with di ≥ 25. There are a total number of 24 such
courses. Finally we randomly choose 10 courses for testing.
We then choose 50 courses among the remaining courses as
background training courses.
Figure 8 shows the results of our topical algorithm for
four courses (the rest of the results are in the full technical
report). We can see that the topical model is quite effective
in identifying the keywords across all test courses. We also
remark that the terms with the highest idf score are mostly
meaningless words.
We would also like to understand the convergence rate
of the algorithm. This corresponds with the time window for
"warming up" the algorithm. The sets of top-50 keywords
quickly stabilize for different courses (see full paper). Fig-
ure 9 presents the normalized Kendall tau distance for ranks
between two consecutive days for the same set of courses (the
normalized Kendall tau distance is defined by the Kendall
tau distance divided by the total number of distinct word
pairs). We can see that the Kendal tau distance also quickly
converges to below 2% after approximately 10 days.
Ranking. We next leverage our topic-extraction algorithm
to design a relevance-ranking algorithm.
To begin, let us walk through a hypothetical scenario
to set up the notation. Alice enrolled in a machine learning
course and she used the forum on the 12th day. Then on
the 15-th day, Alice logs in again. Here, our goal is to rank
the new threads that are created between the 12th and the
15th day. We shall refer to the first 12 days as the warming
period. The 12th - 15th days are the query period. Finally,
these 15 days are referred to as the window of interest for
the ranking algorithm.
We next describe our algorithm. Roughly speaking,
the algorithm puts more weight on the threads that contain
more keywords from Supp(Ti). More specifically, the algo-
rithm consists of two steps: Step 1. Assignment of weights.
Course name
Machine Learning
Health for All Through
Primary Health Care
Pattern-Oriented Software
Architectures
Latin American Culture
Keywords
theta octave regression gradient descent matrix ex1 alpha machine vector function linear computecost
gnuplot data
health phc care primary healthcare community ata alma perry henry medical clinics services public
communities
doug vanderbilt patterns dre schmidt posa concurrent concurrency gof middleware corba frameworks
pattern software singleton
latin america culture indigenous american cultures democracy spanish imposed political cultural
traditions countries democratic mexico
Figure 8: Results of our algorithm for extracting the keywords (top 15 keywords.)
Figure 9: Our algorithm's convergence rate for "Machine Learning", "Health for All Through Primary Health Care", "Pattern-Oriented
Software Architectures", "Latin American Culture" (from left to right).
Let w be an arbitrary keyword that appears in the thread.
Let r(w) be the rank of w in the output of our topical algo-
rithm. In case w is not in the top-50 most frequent keyword
set, then r(w) = ∞. The weight of w, η(w), is αr(w), where
α is a parameter between 0 and 1 (α = 0.96 in our experi-
ments). Step 2. Assigment of scores. The score of a thread
is simply the sum of the weight of each word (with repeti-
tion) that appeared in the thread.
While our algorithm is technically simple and shares
similar spirit with tf-idf based algorithms [19], we emphasize
the primary goal here is a proof-of-concept for the efficacy
of our generative model.
We next compare our algorithm with two natural base-
line algorithms, a term-based one (tf-idf) and a "random
walk" based one.
The tf-idf based algorithm.
In the tf-idf based algorithm,
we treat each thread as a document and the ranking simply
sorts the threads in descending order by the tf-idf scores.
One possible random
Kleinberg's HITS type algorithm.
walk-based algorithm is a variation of the HITS algorithm [16],
which is good at finding the "importance" of the nodes in a
network and works as follows. First, we construct a bipartite
graph: each node in the LHS represents a user and each node
in the RHS represents a thread. A user node is connected
with a thread node if and only if the user participates in that
thread. Then we interpret the thread nodes as "authorities"
and the user nodes as "hubs" and apply the standard HITS-
type updates (see the full technical report). Finally, we give
a rank on the threads by their authority scores.
Comparisons.
Before we present our experimental re-
sults, we highlight the differences between our algorithm and
the baseline ones.
Comparing with tf-idf. (1) Our algorithm considers all the
threads in a course while the tf-idf technique focuses on a
single thread. Thus, the tf-idf technique could possibly pick
up threads that contain low-frequency words which are ir-
relevant to the course, including discussion in non-English
languages, or students in a medical course soliciting a doc-
tor's opinion on his/her sick acquaintance or other similar
scenarios. (2) The tf-idf technique is incapable of finding
important keywords for the forums because the terms with
the highest idf scores are often those that appear exactly
once, most of which do not have much meaning. So it has
less "interpretability".
Comparing with HITS. While HITS can find the "popular"
threads, our goal here is to find the relevant ones. We do not
expect graph-based algorithms work well without looking
into discussions' content.
Evaluation. We now validate the above claims by experi-
ments. Specifically, our goal is to validate (1) the tf-idf based
algorithm would have a higher probability mis-weighting
the non-relevant threads, such as non-English discussions.
(2) The HITS-based algorithm will also give more irrelevant
threads because it ranks popularity instead of relevance.
Testing and training courses. We test on the same 10 "large
courses" as we did for the keyword extraction algorithm.
Choosing the windows of interest. We randomly choose 5
days from the 10th to the 30th day to form a set D. And
then we also add the 10th day to the set. For each d ∈ D,
we create a test case with d days of warming period and 2
days of query period.
Direct comparison. It is a major open problem to directly
assess the quality of multiple ranks in an efficient manner in
computational social choices (see [4] and references therein).
Thus, we focus on understanding the differences between our
algorithm and the baseline ones by comparing the number of
irrelevant threads that are recommended by the algorithms.
To do so, for each course and each window of interest,
we pull out the set of the first 15 threads recommended by
our algorithm S and the set of the first 15 threads recom-
mended by the baseline algorithm Sb. Then we find the
differences D1 = S − Sb and D2 = Sb − S. Next, we use
MTurk to label whether the threads in D1 and D2 are rele-
vant or not. This will give us difference in relevance counts
between algorithms.
Result 1. Comparing with tf-idf based algorithm.
Here, D1 = D2 = 253 for the 10 courses and 6 days we
examined. 64 were labeled as irrelevant in D1 and 104 were
irrelevant in D2.
Figure 10a shows the breakdown of the misclassified
threads by days (full report also presents the plot by courses).
The blue bar is the total size of the differences in each day for
0204060800.0000.0050.0100.0150.020daysnormalized kt distance0102030400.000.020.040.060.08daysnormalized kt distance02040600.000.010.020.030.04daysnormalized kt distance010203040500.000.020.040.06daysnormalized kt distance(a) Comparing wt tf-idf
(b) Comparing wt HITS
Figure 10: Evaluating our relevance-ranking algorithms.
all courses. The red bar represents the number of irrelevant
threads from our algorithm and the green bar represents
the number of irrelevant threads from the tf-idf one. We
can see that our algorithm is consistently better. While the
improvement is not significant, this validates our intuition
discussed above.
Result 2. Comparing with HITS. In this case D1 =
D2 = 522. 111 threads were irrelevant in D1 and 262
threads were irrelevant in D2. Figure 10b shows further
breakdown by days (the full paper has the plot by courses).
Our algorithm is again consistently better and the differ-
ence is more substantial than result 1. This validates that
the HITS-type algorithm is less effective in finding relevant
threads.
6. CONCLUSION
The larger goal behind our two main research questions
is to improve the quality of learning via the online discussion
forums, namely by (1) sustaining forum activities and (2)
enhancing the personalized learning experience. This paper
makes a step towards achieving these end-goals by relying
on an extensive empirical dataset that allows us to under-
stand current user behavior as well as factors that could
potentially change the current user behavior. We showed,
for example, that the teaching staff's active participation in
the discussion increases the discussion volume but does not
slow down the decline in participation. We also presented
two proof-of-concept algorithms for keyword extraction and
relevance-ranking to remedy the information overload prob-
lem, both of which are demonstrated to be effective. Devis-
ing effective strategies to reduce the decline of participation
in the online discussion forums is the main open problem to
be addressed next.
7. REFERENCES
[1] L. A. Adamic, J. Zhang, E. Bakshy, and M. S.
Ackerman. Knowledge sharing and yahoo answers:
everyone knows something. WWW '08. ACM, 2008.
[2] J. Ahn, C. Weng, and B. S. Butler. The dynamics of
open, peer-to-peer learning: What factors influence
participation in the p2p university? In Proceedings of
the 2013 46th Hawaii International Conference on
System Sciences. IEEE Computer Society, 2013.
[3] A. Anderson, D. Huttenlocher, J. Kleinberg, and
J. Leskovec. Discovering value from community
activity on focused question answering sites: a case
study of stack overflow. KDD '12. ACM, 2012.
[4] H. Azari Soufiani, D. C. Parkes, and L. Xia.
Preference Elicitation For General Random Utility
Models. In UAI-13, 2013.
[5] P. Bouchard. Some Factors to Consider when
Designing Semi-Autonomous Learning Environments.
Electronic Journal of e-Learning, 7(2):93 -- 100, 2009.
[6] M. Cha, H. Haddadi, F. Benevenuto, and K. P.
Gummadi. Measuring user influence in twitter: the
million follower fallacy. In ICWSM, 2010.
[7] J. Cheng, C. Kulkarni, and S. Klemmer. Tools for
predicting drop-off in large online classes. CSCW '13.
ACM, 2013.
[8] I. de Waard, A. Koutropoulos, N. Ozdamar Keskin,
S. C. Abajian, R. Hogue, O. C. Rodriquez, and M. S.
Gallagher. Exploring the MOOC format as a
pedagogical approach for mLearning. In 10th World
Conference on Mobile and Contextual Learning,
Beijing China, 2011.
[9] A. Ghosh and J. Kleinberg. Incentivizing participation
in online forums for education. EC '13. ACM.
[10] F. M. Harper, D. Moy, and J. A. Konstan. Facts or
friends?: distinguishing informational and
conversational questions in social q&a sites. In CHI,
pages 759 -- 768, 2009.
[11] P. Harrington. Machine Learning in Action. Manning
Publications Co., Greenwich, CT, USA, 2012.
[12] S. Jain, Y. Chen, and D. C. Parkes. Designing
incentives for online question and answer forums, 2012.
[13] T. Joachims. Advances in kernel methods. chapter
Making large-scale support vector machine learning
practical, pages 169 -- 184. MIT Press, Cambridge, MA,
USA, 1999.
[14] P. Jurczyk and E. Agichtein. Discovering authorities
in question answer communities by using link analysis.
CIKM '07, pages 919 -- 922. ACM, 2007.
[15] R. F. Kizilcec, C. Piech, and E. Schneider.
Deconstructing disengagement: analyzing learner
subpopulations in massive open online courses. LAK
'13. ACM, 2013.
[16] J. M. Kleinberg. Authoritative sources in a
hyperlinked environment. J. ACM, 46(5), Sept. 1999.
[17] R. Kop. The challenges to connectivist learning on
open online networks: Learning experiences during a
massive open online course. The International Review
of Research in Open and Distance Learning,
12(3):19 -- 38, 2011.
[18] G. D. Kuh. What Student Affairs Professionals Need
to Know About Student Engagement. Journal of
College Student Development, 50(6):683 -- 706, 2009.
[19] C. D. Manning, P. Raghavan, and H. Schutze.
Introduction to Information Retrieval. 2008.
[20] E. Mendes Rodrigues and N. Milic-Frayling.
Socializing or knowledge sharing?: characterizing
social intent in community question answering. In
Proceedings of the 18th ACM conference on
Information and knowledge management, 2009.
[21] T. M. Mitchell. Machine Learning. McGraw-Hill, Inc.,
New York, NY, USA, 1 edition, 1997.
[22] C. Piech, J. Huang, Z. Chen, C. Do, A. Ng, and
D. Koller. Tuned Models of Peer Assessment in
MOOCs, July 2013.
[23] M. Qiu, J. Hewitt, and C. Brett. Online class size,
note reading, note writing and collaborative discourse.
I. J. Computer-Supported Collaborative Learning,
0
20
40
60
10th
19th
20th
23rd
28th
30th
total
topical
4--‐idf
0
50
100
10th
19th
20th
23rd
28th
30th
total
topical
HITS
7(3):423 -- 442, 2012.
[24] T. Sun, W. Chen, Z. Liu, Y. Wang, X. Sun, M. Zhang,
and C.-Y. Lin. Participation maximization based on
social influence in online discussion forums. In
ICWSM, 2011.
[25] K. Swan. Building Learning Communities in Online
Courses: the importance of interaction. Education,
Communication & Information, 2(1):23 -- 49, 2002.
[26] T. Valjataga, H. Poldoja, and M. Laanpere. Open
online courses: Responding to design challenges. In
Proceedings of the NBE, 2011.
[27] J. Zhang, M. S. Ackerman, and L. Adamic. Expertise
networks in online communities: structure and
algorithms. WWW '07. ACM, 2007.
|
1609.05719 | 1 | 1609 | 2016-09-19T13:31:48 | Straightness of rectilinear vs. radio-concentric networks: modeling simulation and comparison | [
"cs.SI",
"physics.soc-ph"
] | This paper proposes a comparison between rectilinear and radio-concentric networks. Indeed, those networks are often observed in urban areas, in several cities all over the world. One of the interesting properties of such networks is described by the \textit{straightness} measure from graph theory, which assesses how much moving from one node to another along the network links departs from the network-independent straightforward path. We study this property in both rectilinear and radio-concentric networks, first by analyzing mathematically routes from the center to peripheral locations in a theoretical framework with perfect topology, then using simulations for multiple origin-destination paths. We show that in most of the cases, radio-concentric networks have a better straightness than rectilinear ones. How may this property be used in the future for urban networks? | cs.SI | cs |
Straightness of rectilinear vs. radio-concentric networks:
modeling, simulation and comparison
Didier Josselin∗1,2, Vincent Labatut†2 and Dieter Mitsche‡3
1UMR ESPACE 7300, CNRS, Universit´e d'Avignon, France
2Laboratoire Informatique d'Avignon EA 4128, Universit´e d'Avignon, France
3Laboratoire de Math´ematiques Dieudonn´e, Universit´e de Nice, France
Abstract
This paper proposes a comparison between rec-
tilinear and radio-concentric networks.
Indeed,
those networks are often observed in urban ar-
eas, in several cities all over the world. One of
the interesting properties of such networks is de-
scribed by the straightness measure from graph
theory, which assesses how much moving from
one node to another along the network links de-
parts from the network-independent straightfor-
ward path. We study this property in both recti-
linear and radio-concentric networks, first by ana-
lyzing mathematically routes from the center to pe-
ripheral locations in a theoretical framework with
perfect topology, then using simulations for multi-
ple origin-destination paths. We show that in most
of the cases, radio-concentric networks have a bet-
ter straightness than rectilinear ones. How may this
property be used in the future for urban networks?
1 Introduction
We propose to study and to compare the straight-
ness of two very common networks:
rectilinear
and radio-concentric networks. This measure, also
∗[email protected]
†[email protected]
‡[email protected]
called directness, is related to another index called
efficiency [24], and is the reciprocal of the tortu-
osity (a.k.a. circuity) [14] – see section 2.1 for a
formal definition.
In a general meaning, a high
straightness reflects the capacity of a network to
enable the shortest routes. It is somehow an acces-
sibility assessment: the higher the straightness, the
shorter the distance (or moving time) on the net-
work, due to reduced detours.
First, we show a few pictures of old and current
networks observed in the real-world, to highlight
their peculiar structures [17]. Hippodamian or rec-
tilinear (also called Manhattan) networks are made
of rectangular polygons, while radio-concentric
networks show a center location and a series of ra-
dial and circular links.
Second, we model theoretical rectilinear and
radio-concentric networks. We introduce the math-
ematical formula of the straightness for center-to-
periphery routes, and we demonstrate that in most
of the cases, even with a low number of rays, radio-
concentric networks provide straighter paths.
Third, we empirically process the straightness of
all routes (any node to any node) using Dijkstra's
shortest path algorithm [6]. The results confirm
that for any type of routes, radio-concentric struc-
ture has higher straightness.
1
1.1 Some Rectilinear Networks
Rectilinear networks are very common all over the
world. They are also called Hippodamian maps
due to the Greek architect Hippodamos. These
networks are characterized by road sections cross-
ing at right angles. Built according to land reg-
istry and road construction efficiency in a process
of urban sprawl, they look like pure theoretical
shapes: a grid of squares of identical surface and
side length. Figure 1 shows an example of an old
hippodamian urban structure in the antique Egyp-
tian city of Kahun (pyramid of Sesostris).
Figure 2: Chicago (USA) in 1848; Wikipedia.
Figure 1: The antique Egyptian city of Kahun
(pyramid of Sesostris); Wikipedia.
More recent rectilinear networks are illustrated
by the American cities of Chicago in 1848 (Fig-
ure 2), New-York with Manhattan (Figure 3),
Sacramento (Figure 4) and also the Asian city of
Ho Chi Minh in Vietnam (Figure 5).
Figure 3: The famous rectilinear network of Man-
hattan (USA); Google Maps.
1.2 Radio-concentric
Shapes
Networks
and
The second type of network we study is also very
common. It is very different in its shape, although
it presents basic polygonal entities of various sizes,
due to the radial structure.
In these networks,
the center is somehow a fuzzy location, that of-
ten refers to the old part of the town. From this
supposed center, radial roads are drawn, crossing
a series of perpendicular ring roads, depending on
the surface of the city.
These shapes were already visible in old maps
such as medieval Avignon (cf. Figure 6), espe-
cially in its intramuros part, which is surrounded
by battlements. In more recent urbanization, many
urban areas reveal concentric shapes. Figures 7, 8,
9, 10, 11 and 12 are good examples of how much
geometrical these shapes are. Indeed, as with rec-
tilinear networks, there exist many degrees of spa-
tial regularity in radio-concentric networks, from
very symmetric structures like amphitheaters (Fig-
ures 11 and 12, representing the European Parlia-
ment and the antique theater of Orange, respec-
2
Figure 4: The very regular road network of Sacra-
mento (USA); Google Maps.
Figure 6: Medieval map of intramuros Avignon
(France).
Figure 7: Amsterdam (The Netherlands); Google
Maps.
Figure 8: Paris (France); Google Maps.
Figure 5: Road network of Ho Chi Minh (Viet-
nam); Google Maps.
tively) or circular cities (Figure 10, which de-
picts a series of connected perfectly circular vil-
lages constituting SunCity),
to more asymmet-
ric urban shapes (Figure 7, showing the one-side
radio-concentric shape of Amsterdam) or graphs
with a more relaxed or degraded geometry (Fig-
ures 8 and 9, presenting Paris and Sfax, respec-
tively).
3
Figure 9: Sfax (Tunisia); Google Maps.
Figure 10: Suncity in Arizona (USA); Google
Maps.
Figure 11: European Parliament in Strasbourg
(France); Photo-alsace.com.
1.3 Geographical Models of Rectilinear or
Radio-concentric Shapes
Networks are often studied in geography because
they depict the visible human mark of population
4
Figure 12: Ancient theater of Orange (France);
Avignon-et-provence.com.
life in their territories. Beyond monographs which
describe particular places, there exist a few typolo-
gies of urban networks and schemes generally ex-
plored and measured via topological structure or
functional dimensions of the cities [8, 9]. Concern-
ing the types of urban networks and graphs, Blan-
chard and Volchenkov [3] presented a simple-faced
classification of different types of route schemes,
including rectilinear networks (e.g. Manhattan),
organic towns (e.g. city of Bielefeld, North Rhine-
Westphalia in Germany), shapes of corals (e.g.
Amsterdam or Venice). In his book, Marshall elab-
orates different taxonomies of street patterns [18].
However, it is also possible to design very theo-
retical networks in order to study their properties,
other things being equal [22]. Nevertheless, there
is no consensual classification of the urban net-
works. Looking at the literature, it is interesting
to notice that the publications about network de-
sign are actually shared by different disciplines in-
volved in the field: (spatial) econometrics of trans-
portation [11], mathematical optimization [4], in-
formation and communication technologies [7] or
social networks [16]. These disciplines can be
advantageously complemented by the domain of
graph theory [2, 19, 1].
On the one hand, the main contribution of the
Manhattan networks in the domain of spatial mod-
eling and measuring is the rectilinear distance cal-
culation, which is related to the mathematical L1-
norm [10], compared to the Euclidian distance
based on the L2-norm [13]. On the other hand,
the radio-concentric framework generated several
outstanding models. In 1924, E. Burgess proposed
the concentric zone model to explain urban social
structures [20], followed by Hoyt in 1939, who de-
fined the sector model based on the urban devel-
opment along centrifugal networks [12]. In paral-
lel, W. Christaller [5] and A. Losch [15] designed
the central places theory to understand how cities
are organized in territory, according to the distri-
bution of goods and services to the population.
These models deal with access to facilities and are
based on network design and costs. In 1974, Per-
reur and Thisse defined the circum-radial distance
based on such structures [21]. Toblers law [23] and
the Newton gravity model also both indicate an in-
verse relation between the strength of a force Fij
and the distance dij separating two points i and j
in geographical space, giving to the center(s) a par-
ticular status in networks. All these spatial theo-
ries participate in defining and emphasizing radio-
concentric models and shapes; however they nei-
ther refute nor contradict rectilinear webs that can
also own centers in different ways.
in
2 Straightness
Theoreti-
and Radio-
cal Rectilinear
concentric Networks for Center-
to-Periphery Routes
In this section, we focus on the straightness of
center-to-periphery routes, for both rectilinear and
radio-concentric theoretical networks. The results
are purely analytic, i.e. no simulation is involved.
The networks are theoretical and perfectly regular,
with pure geometric shapes. The proposed meth-
ods are specifically designed for these types of net-
works.
We call radius an edge starting at the center of a
radio-concentric network. An edge connecting two
radii is called a side. Unlike the rectilinear net-
5
work, the radio-concentric network is controlled
by a parameter θ: the angle formed by two consec-
utive radii. The constraint on θ is that there must
exist an integer k such that k = 2π/θ. We suppose
that k > 2, because with k = 1 the sides are not
defined, and with k = 2, both radii are mingled.
We call angular sector the part of the unit circle
between two consecutive radii. A half-sector is the
part of the unit circle between a radius and a neigh-
boring bisector (cf. Figure 14).
2.1 Definition of the Straightness
For a pair of nodes, the Straightness is the ratio
of the spatial distance dS as the crow flies, to the
geodesic distance dG obtained by following the
shortest path on the network:
S =
dS
dG
(1)
This measures ranges from 0 to 1, a high value
indicating that the graph-based shortest path is
nearly straight, and contains few detours.
Coming from graph theory, this property is inter-
esting in network assessment, because it measures
a part (in a certain meaning) of the "accessibility"
capacity of a network. It is a kind of relative effi-
ciency to reach a point in a network. In our case,
edges have neither impedance, nor direction. We
do not consider any possible traffic jams in the flow
propagation. In our assumption, speed is the same
all over the graph and so time is proportional to
distance.
Let the center of the network be the origin of a
Cartesian coordinate system. In the rest of the doc-
ument, we characterize a center-to-periphery move
by an angle α, formed by the x axis and the seg-
ment going from the network center to the targeted
peripheral node. The angle vertex is the network
center, as represented in Figures 13 and 14. For
the rectilinear network, we consequently note the
straightness S(α) for the route of angle α. For
the rectilinear network, due to the presence of the
parameter θ (the angle between two consecutive
radii), we denote the straightness by Sθ(α).
2.2 Simplifying Properties of the Consid-
ered Networks
2.2.1 Rotation
Both networks have certain rotation-related prop-
erties, which allow some simplifications. As men-
tioned before, in a radio-concentric network, two
consecutive radial sections of the network are sep-
arated by an angle θ. In a rectilinear network (see
Figure 13), a cell is a square. The angle between
two consecutive edges originating from the net-
work center is therefore θ = π/2. So, we can dis-
tinguish k = 4 angular sectors, corresponding to
the quadrants of our Cartesian coordinate system.
Figure 13: A perfect rectilinear network, with θ =
π/2 and α in [0, π/4].
Both types of networks can be broken down to
k angular sectors, which are all similar modulo a
rotation centered at the network center. So, with-
out loss of generality, we can restrict our analy-
sis to the first angular sector, i.e.
to the interval
α ∈ [0; θ].
2.2.2 Homothety
An additional simplification comes from the ho-
mothetic nature of both studied networks. Indeed,
in these networks, a center-to-periphery route can
go either through the edges originating from the
network, or through those intersecting with these
6
Figure 14: A perfect radio-concentric network,
with θ separating two radial sections, and α in
[0, θ/2]..
edges, as represented in Figures 15 and 16. Let us
consider a move from p1 to p4. In both cases, h is
parallel to H, so we can deduce that:
l
L
=
d
D
=
h
H
d· H = D · h ;
l · H = L· h
Then we obtain:
l · D = L· d ;
We can set:
l · D + l · H = L · d + L · h
That is to say S is the same whether the destination
point is located on the closest or the farthest edge
to the network center, for both types of networks:
S =
l
d + h
=
L
D + H
(2)
Consequently, without any loss of generality, we
can therefore restrict our analysis to the first mesh
of the network, i.e. to the first square for the recti-
linear network and to the first triangle for the radio-
concentric network.
2.2.3 Symmetry
The last simplification comes from a symmetry
property present in both networks, as illustrated by
Figure 17 for radio-concentric networks. Observe
that when α is smaller than θ/2, the shortest paths
which corresponds to an angle α < θ/2. We
wish to calculate the shortest path to some other
point p(cid:48)
4, corresponding to an angle α(cid:48) > θ/2, and
such that the travelled distance is the same as for
p4. We know that [p1; p3] and [p1; p(cid:48)
3] have the
same length, so the distance to travel on the side
is the same for both routes, i.e. H = H(cid:48). More-
over, the angles formed by each radius and the side
it is β. Let us now
are equal by construction:
consider the triangles (p1, p3, p4) and (p1, p(cid:48)
3, p(cid:48)
4).
We have two pairs of equal consecutive sides and
the angles they form are equal; they are both β.
So, both triangles are congruent, and we have:
(cid:92)p3, p1, p4 = (cid:92)p(cid:48)
3, p1, p(cid:48)
4. By definition, (cid:92)p3, p1, p4 =
α and (cid:92)p(cid:48)
3, p1, p4 = θ − α(cid:48), so we get α = θ − α(cid:48),
and finally α(cid:48) = θ − α. For the same reason (con-
gruence), L = L(cid:48), meaning that the distances as
the crow flies are identical for p4 and p(cid:48)
4.
Since both distances (on and off the network) are
the same for p4 and p(cid:48)
4, their straightness are also
equal. In other words: Sθ(α) = Sθ(θ − α). We
can conclude that, without any loss of generality,
we can focus our study on the first half of the first
angular sector, i.e. the interval α ∈ [0; θ/2]. The
same proof can be applied to the rectilinear net-
work, which displays the same type of symmetry.
Consequently, the same simplification holds.
2.3 Analytic Expression of the Straight-
ness
In the previous section, we showed that, due to cer-
tain properties of rotation, homothety and symme-
try, we can restrict our analysis of the straightness
to only the interval α ∈ [0; θ/2] for both networks.
For the rectilinear network, note that θ = π/2.
So, in this specific case, we consider the interval
[0, π/4]. Let us now give the expression of the
straightness for each type of network.
For the rectilinear network, we have from Fig-
ure 15:
7
sin α =
h
l
;
cos α =
d
l
Figure 15: Geometry of a rectilinear network.
Figure 16: Geometry of a radio-concentric net-
work.
go through the first radius (p1p3), whereas as soon
as α exceeds this threshold, they go through the
second one (p1p(cid:48)
3). Also note that the line corre-
sponding to this angle θ/2 is the bisector of the
angle formed by both radii.
Figure 17: Basic paths followed on a radio-
concentric geometric network.
Let us now consider the shortest path to p4,
Then, from (2), we obtain:
2.4 Comparison of Networks
S(α) =
l
d + h
=
1
cos α + sin α
(3)
For the radio-concentric network, let us observe
Figure 17. Note that p2 is the projection of p4 onto
the first radius. We obtain two rectangular triangles
containing p2: (p1; p2; p4) and (p4; p2; p3). This
allows us to write the following equations:
cos α =
sin α =
tan α =
D
L
h
L
h
D
;
;
cos β =
sin β =
d
H
h
H
;
tan β =
h
d
By removing h we get
L · sin α = D · tan α = H · sin β = d · tan β,
and hence we obtain:
D =
d =
H =
L · sin α
tan α
L · sin α
tan β
L · sin α
sin β
We substitute these values into (1), then simplify
and obtain:
Sθ(α) =
=
L
D + d + H
1
cos α + sin α
tan π−θ
2
+ sin α
sin π−θ
2
(4)
(5)
Note that these formulas are valid only for the
interval α ∈ [0; θ/2]. The other values can be de-
duced by symmetry and/or rotation, as explained
earlier.
With the analytic expression of the straightness
for both types of networks, we can now compare
their performance for center-to-periphery routes.
Figure 18 represents the straightness obtained for
the different network types and parameter values.
The x- and y-axis represent the angle α and the
straightness S calculated using the different previ-
ous formula, respectively. The optimal straightness
value is represented by the black dotted horizontal
line f (α) = 1. The closer the graphical represen-
tation of a network is to this line, the better the
network is in terms of straightness.
Figure 18: Straightness S of different networks de-
pending on the angle α of motion: 1 rectilinear net-
work and 4 radio-concentric networks from 3 to 16
radii ; α ∈(cid:2)0; π
(cid:3).
4
For the radio-concentric network, we consider
several values of the parameter θ, corresponding to
k = 3, 4, 8, 16, represented in purple, blue, green,
and cyan, respectively. The rectilinear network is
represented in red. The x-axis ranges only from
α = 0 to π/4, which is enough, regarding the sim-
plifications we previously described: we know all
the plotted lines have a periodic behavior, which
directly depends on θ.
8
For all lines, we have S(0) = 1, which corre-
sponds to a straightforward move on the first ra-
dius (or horizontal edge, for the rectilinear net-
work). Then, the straightness decreases when α
gets larger, since the destination point gets farther
from this radius, and therefore from an optimal
route. This corresponds to the lower route, rep-
resented in red in Figure 17. The decrease stops
when α reaches θ/2 (i.e. the bisector): the straight-
ness then starts increasing again, until it reaches 1.
This is due to the fact that the shortest path is now
the upper route, represented in blue in Figure 17.
The maximal value is reached when α = θ, i.e.
when the destination point lays on a radius, allow-
ing for an optimal route. The same ripple pattern
is then repeated again, and appears k times.
As mentioned before, the periodicity directly de-
pends on θ: the smaller the angle, the larger the
number of radii, which means the number of rip-
ples increases while their size decreases. In other
words, and unsurprisingly, the straightness of a
radio-concentric network increases when its num-
ber of radii increases. More interesting is the fact
that most of the time, 8 (a very small number) radii
are sufficient to make radio-concentric networks
better than rectilinear ones.
2.5 Boundary Condition
Let us now consider a radio-concentric network
with infinitely small θ. From the definition of k, we
know this would result in an infinitely large num-
ber of radii:
lim
θ→0
k = lim
θ→0
= +∞
2π
θ
The radii of such a network would cover the
whole surface of a disk. Since we focus our study
on the first angular half-sector, α is itself bounded
from above by θ/2. So, if θ tends towards 0, α
does too. From (5), we consequently get:
lim
θ→0
Sθ(α) = lim
θ→0
1
cos α + sin α
tan π−θ
2
+ sin α
2 − θ
sin π
2(6)
We have:
cos α = 1
sin α = 0
lim
θ→0
cos α = lim
α→0
π − θ
= +∞
tan
lim
θ→0
lim
θ→0
sin α = lim
α→0
π − θ
= 1
sin
lim
θ→0
2
2
We finally obtain the boundary for the straight-
ness of a radio-concentric network with an infinite
number of radii:
lim
θ→0
Sθ(α) = 1
This result is obvious and consistent with the
case where the complete route goes along a radius.
Indeed, with an infinite number of radii, we can al-
ways find a radius to move directly from the center
to the destination. Figure 18 confirms this result:
increasing the number of radii reduces the period
and the amplitude of the ripples, eventually leading
to the optimal horizontal straight line of the equa-
tion S = 1.
Between the two extreme cases of 3 radii and
an infinite number of radii, we should remind
the reader that 8 radii are enough for the radio-
concentric network to become better than the rec-
tilinear one in terms of straightness of center-to-
periphery routes. Let us see now how it goes for
multi-directional moves.
3 Simulation
of
the Average
Straightness for All Routes
Studying analytically the straightness for all possi-
ble moves (other than center-to-periphery) would
be too time-consuming, so we switched to simu-
lation. We used the statistical software R to sim-
ulate the motions on both rectilinear and radio-
concentric networks. The shortest paths are pro-
cessed using Dijkstra's algorithm [6], for all pairs
of nodes (see Figures 19 and 20).
9
Figure 19: A perfect rectilinear graph.
Figure 21: Average straightness S (and standard
deviation) for a rectilinear network, as a function
of its size (expressed in number of squares by side).
Figure 20: A perfect radio-concentric graph.
make this observation: further inquiry will be nec-
essary to provide some explanations.
These results are very interesting and confirm
our theoretical findings, as well as our observations
regarding the good straightness of radio-concentric
networks, thrifty in number of radii, compared to
rectilinear networks. Figure 21 shows that, even
when increasing the granularity of the grid form-
ing a rectilinear network, the average straightness
is constant, at a value lower than 0.8. This is con-
sistent with our remark regarding the homothety
property of this network.
Regarding the radio-concentric network, Fig-
ure 22 shows that the average straightness over-
takes the rectilinear threshold (0.8) when the num-
ber of radii is about 8 or 10.
It is interesting to
notice that the number of sides does not affect the
straightness much. This was expected for center-
to-periphery routes, as for the rectilinear network.
However, the routes considered here are more gen-
eral, going from anywhere to anywhere, and more-
over, the radio-concentric network is not a tessel-
lation like the rectilinear one, so it is surprising to
Figure 22: Average straightness S (and standard
deviation) for a radio-concentric network, as a
function of its number of radii, and for different
number of sides (see colors).
10
4 Conclusion
References
In this paper, we first presented a few urban net-
works based on rectilinear versus radio-concentric
structures. Then, in a theoretical framework, we
showed the superiority of the radio-concentric net-
work compared to the rectilinear network, in terms
of straightness. It was first demonstrated analyti-
cally in the particular case of center-periphery mo-
tions and then simulated on paths with multiple
origins and destinations, using the statistical soft-
ware R. To our knowledge, these results are new
and original. They show that, straightness-wise,
whatever the density of rectilinear networks, those
cannot efficiently compete with radio-concentric
networks, because their straightness is bounded by
construction, at least within a theoretical frame-
work.
However, this exploratory study does not take
into account several factors that must be now stud-
ied to complete these first results. It will be inter-
esting to find exactly over which number of radii
a radio-concentric network has a better straight-
ness than a rectilinear one. Knowing this thresh-
old, we shall then be able to calculate the to-
tal length of both networks to fill an equivalent
average straightness on similar surfaces to drain.
What will be the most thrifty network in terms of
length of "cables"? On another aspect, these cal-
culations and simulations consider very theoreti-
cal networks. Geographers, architects and town
planners may be interested in understanding the
real straightness of urban, rectilinear versus radio-
concentric networks, in real conditions (popula-
tion mobility, congestion). This is also one of
the further researches developed in the U rbi&Orbi
project.
ACKNOWLEDGMENTS
We would like to thank the CNRS (PEPS MoMIS)
and the University of Avignon for supporting this
research.
[1] M. Barth´elemy. Spatial networks. Physics
Reports, 499(1-3):1–101, 2011.
[2] C. Berge. Th´eorie des graphes et ses appli-
cations. Donod, 1958.
[3] P. Blanchard and D. Volchenkov. Mathe-
matical Analysis of Urban Spatial Networks.
Springer, 2009.
[4] G. Buttazzo, A. Pratelli, S. Solimini, and
E. Stepanov. Optimal Urban Networks via
Mass Transportation. Springer, 2009.
[5] W. Christaller.
Die
Eine
Suddeutschland.
zentralen Orte
okonomisch-
in
geographische Untersuchung
die
Gesetzmassigkeit der Verbreitung und En-
twicklung der Siedlungen mit stadtischen
Funktionen. Gustav Fischer, 1933.
uber
[6] E. W Dijkstra. A short introduction to the art
of programming. Technical report, 1971.
[7] A. El Gamal and Y.-H. Kim. Network Infor-
mation Theory. Cambridge University Press,
2011.
[8] J.-C. Foltete, C. Genre-Grandpierre, and
Impacts of Road Networks on
D. Josselin.
Urban Mobility, in Modeling Urban Dynam-
ics, pages 103–128. ISTE Ltd and John Wiley
& Sons, 2010.
[9] C. Genre-Grandpierre. Forme et fonction-
nement des r´eseaux de transport : approche
fractale et r´eflexions sur l'am´enagement des
villes. Phd thesis, Universit´e de Franche-
Comt´e, 2000.
[10] S. L. Hakimi. Optimum locations of switch-
ing center and the absolute center and me-
dians of a graph. Operations Research, 12:
450–459, 1964.
11
[11] J. V. Henderson and J.-F. Thisse, editors.
Handbook of Regional Urban Economics,
volume 4 of Cities and Geography. Elsevier,
2004.
[12] H. Hoyt. The structure and growth of res-
idential neighborhoods in American cities.
Federal Housing Administration, Washing-
ton DC, 1939.
[13] D. Josselin and M. Ciligot-Travain. Revis-
iting the center optimal location. A spatial
thinking based on robustness, sensitivity and
influence analysis. Environment & Planning
B, 40:923–941, 2013.
[14] A. R. Kansal and S. Torquato. Globally and
locally minimal weight spanning tree net-
works. Physica A, 301(1-4):601–619, 2001.
[15] A. Losch.
Die raumliche Ordnung der
Wirtschaft. Eine Untersuchung uber Stan-
dort, Wirtschaftsgebiete und internationalen
Handel. Gustav Fischer, 1940.
[16] H. MacCarthy, P. Miller, and P. Skidmore.
Network logic. Who governs in an intercon-
nected world? Demos, 2004.
[17] D. Mangin.
Infrastructures et formes de
la ville contemporaine. La ville franchis´ee.
Number 157 in Dossiers du Certu. La doc-
umentation francaise, 2004.
[18] S. Marshall. Street patterns. Spon Press,
2005.
[19] P. Mathis. Graphs and Networks.
ISTE,
2007.
[20] R. E. Park, E. W. Burgess, and R. D. McKen-
zie. The City. The University of Chicago
Press, Chicago, Illinois, 1925.
[21] J. Perreur and J. Thisse. Central metrics and
optimal location. Journal of Regional Sci-
ence, 4(3):411–421, 1974.
[22] I. Thomas. Transportation Network and the
Optimal Location of Human Activities. A nu-
merical geography approach. Edward Elgar
Publishing ltd, 2002.
[23] W. Tobler. A computer movie simulating ur-
ban growth in the detroit region. Economic
Geography, 46(2):234–240, 1970.
[24] I. Vragovi, E. Louis, and A. Daz-Guilera. Ef-
ficiency of informational transfer in regular
and complex networks. Physical Review E,
71:036122, 2005.
12
|
1805.10712 | 2 | 1805 | 2018-05-29T06:52:33 | NetLSD: Hearing the Shape of a Graph | [
"cs.SI"
] | Comparison among graphs is ubiquitous in graph analytics. However, it is a hard task in terms of the expressiveness of the employed similarity measure and the efficiency of its computation. Ideally, graph comparison should be invariant to the order of nodes and the sizes of compared graphs, adaptive to the scale of graph patterns, and scalable. Unfortunately, these properties have not been addressed together. Graph comparisons still rely on direct approaches, graph kernels, or representation-based methods, which are all inefficient and impractical for large graph collections.
In this paper, we propose the Network Laplacian Spectral Descriptor (NetLSD): the first, to our knowledge, permutation- and size-invariant, scale-adaptive, and efficiently computable graph representation method that allows for straightforward comparisons of large graphs. NetLSD extracts a compact signature that inherits the formal properties of the Laplacian spectrum, specifically its heat or wave kernel; thus, it hears the shape of a graph. Our evaluation on a variety of real-world graphs demonstrates that it outperforms previous works in both expressiveness and efficiency. | cs.SI | cs | NetLSD: Hearing the Shape of a Graph
Anton Tsitsulin
Hasso Plattner Institute
[email protected]
Davide Mottin
Hasso Plattner Institute
[email protected]
Panagiotis Karras
Aarhus University
[email protected]
Alex Bronstein
Technion
[email protected]
8
1
0
2
y
a
M
9
2
]
I
S
.
s
c
[
2
v
2
1
7
0
1
.
5
0
8
1
:
v
i
X
r
a
ABSTRACT
Comparison among graphs is ubiquitous in graph analytics. How-
ever, it is a hard task in terms of the expressiveness of the employed
similarity measure and the efficiency of its computation. Ideally,
graph comparison should be invariant to the order of nodes and the
sizes of compared graphs, adaptive to the scale of graph patterns,
and scalable. Unfortunately, these properties have not been ad-
dressed together. Graph comparisons still rely on direct approaches,
graph kernels, or representation-based methods, which are all inef-
ficient and impractical for large graph collections.
In this paper, we propose the Network Laplacian Spectral De-
scriptor (NetLSD): the first, to our knowledge, permutation- and
size-invariant, scale-adaptive, and efficiently computable graph rep-
resentation method that allows for straightforward comparisons of
large graphs. NetLSD extracts a compact signature that inherits the
formal properties of the Laplacian spectrum, specifically its heat
or wave kernel; thus, it hears the shape of a graph. Our evaluation
on a variety of real-world graphs demonstrates that it outperforms
previous works in both expressiveness and efficiency.
ACM Reference Format:
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, Alex Bronstein, and Em-
manuel Müller. 2018. NetLSD: Hearing the Shape of a Graph. In KDD '18:
The 24th ACM SIGKDD International Conference on Knowledge Discovery &
Data Mining, August 19–23, 2018, London, United Kingdom. ACM, New York,
NY, USA, 10 pages. https://doi.org/10.1145/3219819.3219991
1 INTRODUCTION
Graphs are widely used for modeling complex structures such as
biological networks, chemical compounds, social interactions, and
knowledge bases. Such applications require the means to efficiently
and meaningfully compare one graph to others.
Arguably, an ideal means for graph comparison should fulfill
the following desiderata: First, it should be indifferent to the order
in which nodes are presented; we call this property permutation-
invariance. Second, it would enable graph comparisons both at a
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
KDD '18, August 19–23, 2018, London, United Kingdom
© 2018 Copyright held by the owner/author(s). Publication rights licensed to Associa-
tion for Computing Machinery.
ACM ISBN 978-1-4503-5552-0/18/08...$15.00
https://doi.org/10.1145/3219819.3219991
Emmanuel Müller
Hasso Plattner Institute
[email protected]
local level (expressing, e.g., atomic bond differences among chemi-
cal compounds) and at the global or community level (capturing,
e.g., the different topologies of social networks); we call this facil-
ity scale-adaptivity. Third, it would detect structural similarity
regardless of network magnitude (discerning, e.g., the similarity
of two criminal networks of different size); we call this aptitude
size-invariance. Unfortunately, no existing means for graph com-
parison satisfies all three of these requirements.
Apart from these qualitative requirements, a viable means for
graph comparison should be efficiently computable. Graph analytics
tasks often require pairwise graph comparisons within a large col-
lection of graphs, hence should be ideally done in constant time, after
preprocessing. Unfortunately, existing methods fare even worse
in this respect. A popular distance measure among graphs, graph
edit distance (GED) [39], defined as the minimum number of edit
operations required to turn one graph into another, is NP-hard and
APX-hard to compute [28]; intensive research efforts in GED-based
graph comparison [18, 27, 53–55] have not escaped this reality. Sim-
ilarly, graph kernel methods [8, 17, 25, 33, 40, 52] lack an explicit
graph representation and they do not scale well either.
In this paper, we develop a permutation- and size-invariant,
scale-adaptive, and scalable method for graph comparison. We
propose an expressive graph representation, NetLSD, grounded
on spectral graph theory (Sec. 4), that allows for constant-time
similarity computations at several scales; NetLSD extracts compact
graph signatures based on the heat or wave kernel of the Laplacian,
which inherit the formal properties of the Laplacian spectrum.
Figure 1 shows an example: at a small scale, a ring and a wheel are
similar, as each node is connected to predecessor(s) and successor(s);
at a large scale, they both appear as rings; at intermediate scales
their local structures differ.
(a) Ring
101
D
S
L
t
e
N
(b) Wheel
100
10−2
10−1
Figure 1: Comparison of similar graphs on multiple scales.
Ring
Wheel
101
102
100
scale
Properties
Complexity
Perm.-invariance
Scale-adaptivity
Size-Invariance
Precomputation
Method
GED [39]
DeltaCon [26]
FTD [4]
SP [8]
MLG [25]
NetSimile [6]
FGSD [47]
NetLSD
Table 1: Related work in terms of fulfilled (✔) and missing (✘) properties, complexity (n nodes, m edges, k eigenvalues).
Type
direct
direct
direct
kernel
kernel
statistical representation
statistical representation
spectral representation
O(km + k2n)
O(n log n)
O(n2)
O(km + k2n)
O(m)
O(n2)
O(n3)
O(k3)
O(1)
O(1)
O(1)
Comparison
NP-complete
O(1)
O(1)
O(1)
O(1)
✔
✘
✘
✔
✔
✔
✔
✔
✘
✘
✘
✘
✔
✘
✘
✔
✘
✘
✘
✘
✘
✔
✘
✔
2 RELATED WORK
We distinguish methods for graph comparison into three categories:
direct, kernel methods, and statistical representations. To the best of
our knowledge, this is the first work employing a spectral represen-
tation for graph comparison.
2.1 Direct Methods
Graph edit distance (GED) [39] is the minimal number of edit op-
erations needed to transform one graph into another; unfortu-
nately, its calculation is NP-hard [16] and even hard to approximate
(APX-hard) [28], as it implies determining a correspondence among
the compared graphs' nodes, a computationally hard task to be-
gin with [17, 25, 33, 40, 52]; some application-specific techniques
(e.g., anomaly detection in time evolving graphs) impose assump-
tions on that correspondence to alleviate the burden [4, 26, 35];
while GED admits heuristic approximation [14, 38] and indexing
schemes [27, 54, 56], it is not applicable for generic comparison
among large graph collections. Besides, GED treats all edit opera-
tions as equal, without discerning the extent to which they may
alter the graph topology. Thus, even if the computational obstacle
were surmounted, GED would still be unsatisfactory as a measure
for multi-scale and multi-size graph comparisons.
In an effort to overcome GED's shortcomings, past works have
resorted to more flexible distance definitions, based on vertex and
path similarities [35] or propagation models [26]. While such mea-
sures are less sensitive to local changes than GED, they usually
require node to be aligned in advance, hence are limited to specific
applications. An attempt to abandon this requirement relaxes the
permutation matrix required to define a full node correspondence
and considers a family of tractable distances (FTD) [4]. This relaxed
matrix preserves local properties and is easy to compute, yet the
ensuing measure is still sensitive to permutations.
2.2 Kernel Methods
Graph kernels [8, 17, 25, 33, 40, 52] are similarity functions among
graphs, which typically perform an implicit transformation of graph
structure to compare two graphs (e.g. Shortest-path (SP) kernel [40]).
While each kernel function has its own valuable properties, to our
knowledge, no extent graph kernel achieves both scale-adaptive
and size-invariant graph comparison. Besides, kernels require ex-
pensive on-demand computations at comparison time, hence are
inapplicable for large-scale graph comparisons.
Recently, Kondor and Pan proposed the Multi-scale Laplacian
Graph kernel (MLG) [25], which achieves scale-adaptivity by ex-
ploiting the propagation of information in the graph and summing
the information at each iteration. However, it also raises a compu-
tational overhead cubic in Laplacian matrix eigenvalues.
2.3 Statistical Representations
Representation-based methods generate an one-off graph signa-
ture vector, based on statistical properties, and use it in subsequent
inter-graph comparisons. Preliminary works in this area [6, 7, 9]
handcraft features by aggregating local graph properties such as
a node's and its neighbors' degrees. Such representations are easy
to compute, yet focus on local characteristics, and are oblivious to
global features. A more advanced approach, the Family of Spectral
Distances (FSGD), [47] produces a high-dimensional sparse repre-
sentation as a histogram on the dense biharmonic graph kernel;
however, FGSD does not capture graph features at different scales
of resolution or graph sizes, and is also inapplicable to reasonably
large graphs, due to its quadratic time complexity.
2.4 Spectral Representations
Spectral graph theory is effective in the comparison of 3D objects [9,
15, 34]. Bronstein et al. [10] proposed computing pairwise shape
similarities by finding the minimum-distortion embedding of one
shape into the other. This procedure is related to the computation
of the Gromov-Hausdorff distance [31], which is suitable for shape
comparison, yet hard to compute. Most relevant works consider
filtering functions corresponding to known diffusion models, in-
cluding heat [11, 42], wave [2] and commute time [11] distances.
While it is known that hitting and commute times degenerate to a
function of node degree on large graphs [49], it is unknown whether
other filters designed for three-dimensional manifolds maintain
their expressiveness on high-dimensional graphs.
While 3D objects have a precise low-dimensional shape, graphs
have no rigid form. Yet we can consider a graph as a geometrical
object. Günthard and Primas first asked to what extent a graph
(in general, a manifold) may be determined by its spectrum [19];
Kac expressed the same question eloquently: "Can one hear the
shape of a drum?" [21]. Since then, investigations have shown that
isospectral graphs tend to be isometric [51], and some graphs are
determined by their spectrum [45]. Thus, spectral graph theory
forms a solid ground for graph comparison. The Laplacian spectrum
is used in graph mining [1, 41], yet, to our knowledge, no previous
work has used it as a means for graph comparison.
2
3 PROBLEM STATEMENT
An undirected graph is a pair G = (V, E), where V = (v1, . . . , vn), n =
V is the set of vertices and E ⊆ (V ×V) the set of edges. We assume
the graph is unweighted even though our method readily applies to
the weighted case. A representation is a function σ : G → RN from
any graph G in a collection of graphs G to an infinitely dimensional
real-vector; the element j of the representation is denoted as σj(G).
A representation-based distance is a function dσ : RN×RN → R+
0 on
the representations of two graphs G1, G2 ∈ G that returns a positive
real number. We aim to devise a constant-time representation-based
distance among any pair of graphs G1, G2.
3.1 Expressive Graph Comparison
Our distance should support data mining tasks, such as clustering,
nearest neighbor classification, distance-based anomaly detection.
Therefore, we require our distance to be a pseudometric; namely, it
should fulfill the following properties.
• Symmetry, for any G1, G2 ∈ G:
dσ(σ(G1), σ(G2)) = dσ(σ(G2), σ(G1))
• Triangle inequality, for any G1, G2, G3 ∈ G:
dσ(σ(G1), σ(G3)) ≤ dσ(σ(G1), σ(G2)) + dσ(σ(G2), σ(G3))
These properties characterize a large family of distances, yet do
not reflect their expressiveness. We require expressive distances to
be permutation-invariant, scale-adaptive, and size-invariant.
Permutation-invariance implies that if two graphs' structure are
the same (i.e., if the two graphs are isomorphic) the distance of
their representations is zero. A graph G1 = (V1, E1) is isomorphic to
another graph G2 = (V2, E2), or G1 ≃ G2, if there exists a bijective
function µ : V1 → V2 such that (µ(u), µ(v))∈E2 for each (u, v)∈E1.
Property 1 (Permutation-invariance). A distance dσ on rep-
resentation σ is permutation-invariant iff:
∀G1, G2, G1 ≃ G2 ⇒ dσ(σ(G1), σ(G2)) = 0
Scale-adaptivity implies that a representation accounts for both
local (edge and node) and global (community) graph features. A
global feature cannot be captured by any combination of features
on nodes at distance r < D(G) − 1, where D(G) is the diameter
(longest shortest-path length) of G. Let the set of all subgraphs of
G be ξ(G) = {д ⊏ G : D(д) < D(G)}. We define scale-adaptivity
as the property of a representation σ having at least one local
feature (i.e., derived only from information encoded in subgraphs
ξ(G)), and at least one global feature (i.e., derived by strictly more
than the information encoded in any ξ(G)). Using local features
only, a similarity measure would deem two graphs sharing local
patterns to have near-zero distance although their global properties
(such a page-rank features) may differ, and, in reverse, relying
on global features only would miss local structures (such as edge
distributions). We aim for a representation adaptive to both local
and global structures on demand.
Property 2 (Scale-adaptivity). A representation σ is scale-
adaptive iff it contains both local features σi and global features
σj :
• Local Feature: ∀G ∃f (·) : σi = f (ξ(G))
• Global Feature: ∀G (cid:154)f (·) : σj = f (ξ(G))
3
Size-invariance is the capacity to discern that two graphs rep-
resent the same phenomenon at a different magnitudes (e.g., two
criminal circles of similar structures but different sizes should have
near-zero distance). We can think of a graph as a representation
of a metric space (a manifold in particular) with a small intrinsic
dimension. We would then like to abstract away the particular way
of sampling that space. Size-invariance postulates that if two graphs
originate from the sampling of the same domain M, they should
be deemed similar.
Property 3 (Size-invariance). A size-invariant distance dσ on
representation σ fulfills:
∀M : G1, G2 sampled from M ⇒ dσ(σ(G1), σ(G2)) = 0
An expressive means of graph comparison should employ a
representation fulfilling the above properties. NetLSD, presented
in the sequel, is a graph representation that allows for easy and
expressive graph comparison.
4 NETLSD: NETWORK LAPLACIAN
SPECTRAL DESCRIPTOR
Defining a representation fulfilling the requirements of permuta-
tion-, scale-, size- invariance, and efficiency is tough; in general,
structures are hard to compare. Thus, we transfer the problem to the
spectral domain. A useful metaphor is that of heating the graph's
nodes and observing the heat diffusion as time passes. Another
useful metaphor is that of a system of masses corresponding to the
graph's nodes and springs corresponding to its edges. The propa-
gation of mechanical waves through the graph is another way to
capture its structural invariants. In both cases, the overall process
describes the graph in a permutation-invariant manner, and em-
bodies more global information as time elapses. Our representation
employs a trace signature encoding such a heat diffusion or wave
propagation process over time. We compare two graphs via the L2
distance among trace signatures sampled at selected time scales.
− 1
2 AD
the degree of node i as entry Dii, i.e, Dii =n
4.1 Spectra as representations
The adjacency matrix of a graph G is a n×n matrix A having Aij =1
if (i, j) ∈ E and Aij =0 otherwise. A graph's normalized Laplacian is
− 1
the matrix L =I−D
2 , where D is the diagonal matrix with
j=1 Aij. Since the
Laplacian is a symmetric matrix, its eigenvectors ϕ1, . . . , ϕn, are real
and orthogonal to each other. Thus, it is factorized as L = ΦΛΦ⊤,
where Λ is a diagonal matrix on the sorted eigenvalues λ1 ≤ . . . ≤
λn of which ϕ1, . . . , ϕn are the corresponding eigenvectors, and Φ
is an orthogonal matrix obtained by stacking the eigenvectors in
columns Φ = [ϕ1ϕ2 . . . ϕn].
The set of eigenvalues {λ1, . . . , λn} is called the spectrum of a
graph. The Normalized Laplacian, as opposed to the unnormalized
version L = D−A, has a bounded spectrum, 0 ≤ λi ≤ 2.
Belkin and Niyogi [3] showed that eigenvectors of the normal-
ized Laplacian of a point cloud graph converge to the eigenfunction
of the Laplace-Beltrami operator [5] on the underlying Riemannian
manifold. In general, the normalized Laplacian has more attractive
theoretical properties than its unnormalized counterparts [48].
The Laplacian spectrum encodes important graph properties,
such as the normalized cut size [41] used in spectral clustering. Like-
wise, the normalized Laplacian spectrum can determine whether a
graph is bipartite, but not the number of its edges [13]. Rather than
using the Laplacian spectrum per se, we consider an associated heat
diffusion process on the graph, to obtain a more expressive repre-
sentation, in a manner reminiscent of random walk models [12].
The heat equation associated with the Laplacian is
= −Lut ,
∂ut
∂t
(1)
where ut are scalar values on vertices representing the heat of each
vertex at time t. The solution to the heat equation provides the heat
at each vertex at time t, when the initial heat u0 is initialized with a
fixed value on one of the vertices. Its closed-form solution is given
by the n × n heat kernel matrix:
−t L =
(2)
where (Ht)ij represents the amount of heat transferred from vertex
vi to vertex vj at time t. We can also compute the heat kernel matrix
directly by exponentiating the Laplacian eigenspectrum [13]:
−t λj ϕjϕ
n
Ht = e
⊤
j ,
j=1
e
−t ΛΦ
⊤
(3)
As the heat kernel involves pairs of nodes, it is not directly usable
to compare graphs. We rather consider the heat trace at time t:
Ht = Φe
ht = tr(Ht) =
−t λj
e
(4)
j
Then our NetLSD representation consists of a heat trace sig-
nature of graph G, i.e., a collection of heat traces at different time
scales, h(G) = {ht }t >0.
Alternative signatures. The heat kernel can be viewed as a family
of low-pass filters, F(λ) = e−λt , parametrized by the scale parameter
t, hence the heat trace signature contains low frequency (i.e., large-
scale) information at every scale. Other kernels deemphasize the
influence of low frequencies. For example, the wave equation,
(5)
which describes the amplitude ut of a wave propagating in a medium,
has, in its turn, a solution given by the wave kernel:
−it λj ϕjϕ
⊤
j
(6)
∂2ut
∂t2 = −Lut ,
n
wt = tr(Wt) =
−it L =
j=1
e
e
Wt = e
(note the complex exponential) and a corresponding wave trace
signature with t ∈ [0, 2π):
−it λj
(7)
j
4.2 Scaling to large graphs
The full eigendecomposition of the Laplacian L = ΦΛΦ⊤ takes
O(n3) time and Θ(n2) memory. This allows to compute signatures
of graphs with over a thousand nodes in less than a second on
commodity hardware, yet renders direct computation impossible for
larger graphs. Thus, we need to approximate heat trace signatures.
We propose two different methods to that end.
4
Our first proposal is to use a Taylor expansion; while this
mathematical tool provides a rather dubious approximation of a
matrix exponential, as its convergence rate depends on the largest
eigenvalue [32], it is useful on small time scales t, and allows for an
inexpensive computation of its first two terms,
≈ n − t tr(L) + t2
tr((−tL)k)
graphs, as tr(L) = n and tr(cid:0)L2(cid:1) =
These first two terms are easily computed, even for very large
2 since L is self-adjoint.
This way, we can compare two graphs locally in O(m).
2 tr(L2)
∞
ij Lij
ht =
k =0
(8)
k!
r
o
r
r
e
.
g
v
A
10−1
10−3
10−5
10−7
10−9
10−11
10−2
10−1
t
1 Taylor term
2 Taylor terms
100
Figure 2: Relative approximation error of normalized ht for
Erdős-Rényi random graphs, varying time scale t.
Figure 2 depicts the error in approximating the normalized heat
trace by a Taylor expansion for random graphs of varying sizes;
this error is independent of graph size, and stays low until time
scale 1. At larger time scales, the influence of high frequencies
(i.e., the higher part of the spectrum) on the heat trace decreases.
Thus, one can approximate the heat trace signature using the lower
part of the eigenspectrum, as in shape analysis [11, 29, 42, 46].
Thus, we may apply the low-order Taylor expansion for small t and
the truncated spectrum approximation for large t. However, this
approach misses out on the medium scale, as Figure 3 illustrates.
Besides, this technique does not lend itself to comparing graphs
with different numbers of computed eigenvalues, since the spectrum
discretization ratio is not normalized across the networks.
4,000
3,000
t
h
2,000
1,000
0
10−2
True ht
Taylor + 100 eig.
10−1
100
t
101
102
Figure 3: Heat trace approximation by two Taylor terms and
100 eigenvalues on a random blockmodel [22] graph.
(a) Small t (0.5)
Figure 4: The diagonal of Ht at different scales on the Karate club graph; at a large scale, the field reflects node centrality.
(b) Medium t (4.5)
(c) Large t (55,555)
vector used in spectral graph clustering [41], as it encodes global
connectivity. Thus, the heat kernel localizes around its diagonal,
and the degree of localization depends on the scale t; it can thereby
be tuned to produce both local and global features.
Figure 5 illustrates heat kernel locality, focusing on a single row
of Ht corresponding to the node marked with a red arrow; the
kernel is localized in the region marked with a dotted line.
Size-invariance. While the normalized Laplacian alleviates the
problem of different edge densities [13], the Taylor expansion in
Equation 8 manifests that h(G) contains information about the
number of nodes. Fortunately, we can employ neutral graphs for
normalization, namely the empty and the complete graph with n
nodes. Eigenvalues of the normalized Laplacian of an empty graph
¯Kn of size n are all zero; for a complete graph Kn, they are given by
a vector of one zero and n−1 ones. Thus, the heat traces of these
graphs are analytically computed as:
ht( ¯Kn) = 1
ht(Kn) = 1 + (n − 1)e
n
−t .
and their wave traces are:
wt( ¯Kn) = 1
wt(Kn) = 1 + (n − 1) cos(t).
n
Either option can be used to normalize the heat or wave trace
signatures. Such normalization can be interpreted as a modification
of the corresponding diffusivity tensor (for the heat trace) or the
elasticity tensor (for the wave trace). We provide more details in
Section 5.
4.4 Connection to computational geometry
Mémoli [30] suggests a spectral definition of the Gromov-Wasser-
stein distance between Riemannian manifolds based on matching
the heat kernels at all scales. The cost of matching a pair of points
(x, x′) on manifold M to a pair of points (y, y′) on manifold N at
scale t is given by
Γ(x, y, x
, t) = H
′) − H
(x, x
N
t (y, y
′).
M
t
′
′
, y
The distance between the manifolds is then defined in terms of the
infimal measure coupling
d(M,N) = inf
µ
−2(t +t−1) ∥Γ∥L2(µ×µ),
e
sup
t >0
Figure 5: Visualization of the diagonal in the heat kernel ma-
trix Ht for the pointed vertex at scale t =0.3
We conclude that the Taylor expansion is useful on very large
graphs, on which eigendecomposition is prohibitive. For manage-
able graph sizes, we adopt a more accurate strategy [32] based
on approximating the eigenvalue growth rate, as in [46]: we com-
pute k eigenvalues on both ends of the spectrum, and interpolate
a linear growth of the interloping eigenvalues. This strategy as-
sumes that on the medium scale the manifold defining the graph is
two-dimensional, as Weyl's law of asymptotic eigenvalue growth
suggests [50]. Since we only need to compute extreme eigenval-
ues, we use the block Krylov-Schur implementation in SLEPc [20].
Graph Laplacians always have a zero eigenvalue with eigenspace
dimension equal to the number of connected components; we de-
flate the search space for the eigensolver thanks to this property.
In our experimental study, we employ this interpolation technique;
In Section 5.1, we evaluate its approximation quality.
4.3 Properties of the heat trace
Here, we discuss how the heat trace signatures achieves our target
representation properties.
Permutation-invariance. The permutation invariance of h(G)
follows from the properties of the spectrum: isomorphic graphs are
isospectral, hence their respective heat trace signatures are equal.
Scale-adaptivity. The heat kernel can be seen as continuous-time
random walk propagation, and its diagonal (sometimes referred to
as the autodiffusivity function or the heat kernel signature) can be
seen as a continuous-time PageRank [12]. Figure 4 shows the heat
kernel signature with small (a), medium (b), and large (c) t; with
large t, the heat tends to focus on central nodes.
As t approaches zero, the Taylor expansion yields Ht ≃ I − Lt,
meaning the heat kernel depicts local connectivity. On the other
⊤, where ϕ2 is the Fiedler
hand, for large t, Ht ≃ I − e−λ2t ϕ2ϕ2
5
2
∥
)
G
2
(
∥
k
)
h
−
)
(
h
∥
G
G
(
h
∥
100
10−1
10−2
10−3
Bottom k, linear growth
Top and bottom k/2, linear growth
2
∥
)
G
2
(
∥
k
)
h
−
)
(
h
∥
G
G
(
h
∥
100
200
300
400
500
k
100
10−1
10−2
10−3
10−4
10−5
10−6
10−7
Bottom 300, linear growth
Top and bottom 150, linear growth
10−2
10−1
100
t
101
102
(a) Error vs. k
(b) Error vs. t
Figure 6: Relative error in spectrum computation of h(G), averaged across 2085 graphs.
where the infimum is sought over all measures on M ×N marginal-
izing to the standard measures on M and N. Mémoli [30] shows
that this distance can be lower bounded by
M
−2(t +t−1) h
t − h
N
t
d(M,N) ≥ sup
t >0
.
e
In other words, the lower bound is the scaled L∞ distance between
the heat trace signatures h(M) and h(N).
We effectively adopt this result mutatis mutandis to graphs, sub-
stituting the Laplace-Beltrami operator of the manifold with the
normalized graph Laplacian; we then sample the heat trace sig-
nature at a finite number of scales, rendering it a versatile vector
representation of a graph, as other works produce vector represen-
tations of graph vertices [37, 44]. This lower bound implies that, if
the distance between heat trace signatures is sufficiently large, the
compared graphs cannot be similar. Unlike the spectral Gromov-
Wasserstein distance, distances between heat trace signatures are
easily indexable; thus, the derived bound allows for efficiently prun-
ing of dissimilar graphs while working with the index alone, as with
any lower-bounding scheme for high-dimensional search [23, 43].
dataset
MUTAG
PTC
PROTEINS
NCI1
NCI109
ENZYMES
D&D
COLLAB
IMDB-B
IMDB-M
REDDIT-S
REDDIT-M
REDDIT-X
REDDIT-L
G
188
344
1113
4110
4127
600
1178
5000
1000
1500
9543
2000
2085
291
Y
2
2
2
2
2
6
2
3
2
3
2
2
-
2
vertices V
min
10
2
4
3
4
2
30
32
12
7
100
6
1001
4445
avg
17.93
25.56
39.06
29.87
29.68
32.63
284.3
74.49
19.77
13.00
337.8
429.6
1447.2
97491
max
28
109
620
111
111
126
5748
492
136
89
999
3782
5242
1632141
Table 2: Dataset properties.
5 EXPERIMENTAL EVALUATION
We evaluate1 NetLSD against NetSimile [6] and FGSD [47]. We run
the experiments on a 20-core Intel Xeon CPU E5-2640v4, 3.20GHz
1Source code and data are available at https://github.com/xgfs/NetLSD
6
machine with 256Gb RAM. Each method is assessed on the best
parameters through cross-validation. We require each method to
complete within one day, or else an early termination is issued. We
used graph-tool [36] for graph manipulation and synthetic graph
generation.
Benchmarks. We compare to the following comparison methods.
NetSimile [6]: a representation using handcrafted features ob-
tained by aggregating statistics on nodes and edges (e.g., average
degree, standard deviation of the degree of the neighbors). For each
graph, the resulting representation has 35 dimensions. As recom-
mended in [6], we use the Canberra2 distance for comparison.
FGSD [47]: a method that computes histograms on the biharmonic
kernel of the graph. Such histograms typically bear large dimen-
sionality (≥50.000) using the recommended bin-width 0.0001.
Parameter settings. Unless otherwise stated, we repeat each ex-
periment 100 times and report the average across all trials. NetLSD
is instantiated to both heat h(G) and wave w(G) trace signature
described Section 4.1. In addition, we evaluate our normalized ver-
sions: the normalization with empty graph h(G)/h( ¯K), w(G)/w( ¯K)
and the normalization with complete graph h(G)/h(K), w(G)/w(K).
To build NetLSD signature vectors, we need to sample a number of
traces, i.e., values of t. After experimentation, we settled for 250 val-
ues evenly spaced on the logarithmic scale in the range [10−2, 102];
we attested this to be a good choice in terms of the quality-size
tradeoff, hence use these settings in all experiments, with both
heat and wave signatures. With small graphs, we employ the full
eigendecomposition to produce the trace for each t value. With the
larger REDDIT-L graph, we use 300 eigenvalues, 150 from each side
of the eigenspectrum, by default, unless indicated otherwise; we
validate these choices in Section 5.1 (cf. Figure 6).
Datasets. We use six graph collections from bioinformatics [52]
and three social networks. COLLAB, and IMDB-(B/M) graph collec-
tions are obtained sampling neighborhoods of nodes in a collabora-
tion and movie network, respectively. REDDIT-S, REDDIT-M, and
REDDIT-L are selected among small (at most 1000 nodes), medium
(at most 4000 nodes) and large (> 4000 nodes) subreddits3, respec-
tively. We report their main characteristics in Table 2: number
of graphs G, number of labels for classification Y, minimum,
average, and maximum number of vertices.
2https://en.wikipedia.org/wiki/Canberra_distance
3https://dynamics.cs.washington.edu/data.html
dataset
MUTAG
PTC
PROTEINS
NCI1
NCI109
ENZYMES
COLLAB
IMDB-B
IMDB-M
dataset
MUTAG
PTC
PROTEINS
NCI1
NCI109
ENZYMES
D&D
COLLAB
IMDB-B
IMDB-M
REDDIT-M
REDDIT-S
h(G)
76.03
56.41
91.81
69.74
68.60
92.51
59.82
67.18
74.45
h(G)
86.47
55.30
64.89
66.49
65.89
31.99
69.86
68.00
68.04
40.51
43.12
83.67
h(G)/h( ¯K)
h(G)/h(K)
79.12
62.53
94.90
74.55
73.76
95.20
65.85
70.58
75.51
78.22
63.11
95.31
69.89
69.48
95.70
69.74
69.22
75.54
w(G)
78.18
58.55
93.04
70.54
70.75
94.03
69.01
75.26
77.99
w(G)/w( ¯K)
w(G)/w(K)
79.72
64.28
89.00
74.14
73.96
90.77
70.35
75.54
78.68
79.38
60.46
91.27
70.90
70.67
90.10
71.89
74.13
76.97
Table 3: ROC AUC in detecting whether a graph is real.
h(G)/h( ¯K)
h(G)/h(K)
85.32
52.76
65.73
67.44
66.93
33.31
68.38
69.42
70.17
40.34
40.62
81.77
84.66
51.16
65.36
64.82
64.78
37.19
67.09
69.70
69.45
40.10
39.08
83.73
w(G)
83.35
54.97
66.80
70.78
69.32
40.41
68.77
75.77
68.63
42.66
41.49
84.49
w(G)/w( ¯K)
w(G)/w(K)
81.72
54.53
65.58
67.67
67.08
35.78
65.39
77.24
69.33
42.00
38.65
70.47
82.22
53.40
62.27
62.19
63.53
28.75
65.12
67.37
61.67
39.71
41.24
79.46
Table 4: Accuracy in 1-NN Classification.
FGSD
77.79
54.75
60.11
64.08
64.28
53.93
55.18
56.23
56.31
FGSD
84.90
60.28
65.30
75.77
74.59
41.58
70.47
73.96
69.54
41.14
41.61
88.95
NetSimile
77.11
62.12
85.73
58.58
58.76
87.38
54.43
54.44
48.06
NetSimile
84.09
61.26
62.45
66.56
65.72
33.23
64.89
73.10
69.20
40.97
41.32
89.65
5.1 Approximation quality
First, we study the quality of the approximation technique of Sec-
tion 4.2. Figure 6 reports relative error results in terms of devia-
tion from the exact version, averaged over 2085 REDDIT-X graphs.
Specifically, Figure 6a shows the quality of the approximation vary-
ing the number of eigenvalues k, using only the k-smallest (blue
line) and the k/2-smallest and k/2-largest eigenvalues (green line).
Using eigenvalues from the two ends of the spectrum achieves
consistently better performance. Figure 6b shows the impact of
t in the approximation. The prediction is easier at large t, as the
spectrum converges to the constant value 1; at medium t values,
the approximation is harder. Still, the use of the lowest and largest
eigenvalues delivers almost an order of magnitude higher accuracy
than using only one side of the spectrum, vindicating our choice of
approximation.
5.2 Identifying real-world networks
We devise a binary classification task of detecting whether a graph
is real or synthetic. Such tasks are critical in anomaly detection
and detecting bots and trolls in social networks. To render the
task challenging enough, rather than generating purely random
graphs (which are easy to detect), we produce synthetic graphs by
rewiring real ones while preserving their degree distribution, using
10 iterations of shuffling all their edges via Metropolis-Hastings
sampling [36]. We consider a label indicating whether the graph
has been rewired. We label 80% of the dataset and test 20%, pre-
dicting a graph's label as that of its Nearest Neighbor (1-NN) by
each similarity measure, and report the average across 100 trials.
Table 3 shows our results, in terms of ROC AUC, for all datasets
and measures. These results confirm the effectiveness of NetLSD.
Method
h(G)
h(G)/h( ¯K)
h(G)/h(K)
w(G)
w(G)/w( ¯K)
w(G)/w(K)
Table 5: Accuracy in 1-NN Classification with REDDIT-L.
100
68.91
62.69
70.11
71.27
64.79
64.51
k
200
68.89
61.74
69.40
69.93
65.81
69.49
300
68.01
61.88
70.88
68.93
65.90
72.64
5.3 Graph classification
We now assess NetLSD on a traditional task of 1-NN graph clas-
sification, using labels as provided in the datasets in question and
splitting training and testing as in the previous experiments. Table 4
reports the quality in terms of ROC AUC, averaged over 1000 trials.
Again, NetLSD is on a par with other methods.
We additionally report in Table 5 the quality results for the
largest dataset at our disposal (REDDIT-L). NetSimile and FGSD
cannot scale to such large graphs and therefore we do not report on
them; on the other hand, NetLSD processes graphs with millions
of nodes and attains good overall quality.
7
5.4 Discerning community structures
Communities are set of vertices sharing common characteristics
in terms of connectivity and attributes. Community detection [24,
41] is one of the prototypical, yet only partially solved, tasks in
graphs. An expressive graph distance should discriminate graphs
with community structure from those without.
To evaluate the expressiveness of NetLSD in terms of communi-
ties, we devise a graph classification experiment: We generate some
graphs with community structure and some without, and the clas-
sifier's task is to predict whether test set graphs have community
structure. We employ a simple 1-NN classifier, as our goal is to test
the representation's expressiveness rather than the performance
of the classifier. We generate 1000 random graphs with Poisson
degree distribution P(λ) with mean degree λ = 10 and fixed size.
Then, we sample another 1000 graphs from the stochastic block
model (SBM) [22] with 10 communities, following the same degree
distribution. The stochastic block model produces graphs with clear
community structure as opposed to random ones. We use 80% of the
dataset for training, and 20% for testing, repeat the experiment with
different training and testing sets, and report the average across
trials. Table 6 reports the average quality for discerning SBM graphs
by 1-NN classification in terms of ROC-AUC, as we vary the graph
size in (64, 128, 256, 512, 1024). NetLSD significantly outperforms
the competitors and improves in quality on larger graphs. While
discriminating very small communities is intuitively harder than
distinguishing large ones, the performance of both FGSD and Net-
Simile drops with increasing size, suggesting that these methods
only capture local, small-scale variations. This result verifies the
capacity of NetLSD to capture global and local characteristics.
64
57.40
57.42
56.71
57.47
57.44
56.75
58.00
65.73
256
77.42
77.41
77.50
73.95
73.96
73.06
55.46
61.51
Number of nodes n
128
512
82.83
68.37
82.84
68.40
83.31
67.96
66.97
78.43
78.43
66.98
77.05
66.26
53.43
55.73
61.31
61.86
1024
Method
h(G)
84.63
h(G)/h( ¯K)
84.63
h(G)/h(K)
85.12
w(G)
80.26
w(G)/w( ¯K)
80.25
w(G)/w(K)
78.76
51.57
FGSD
61.58
NetSimile
Table 6: Accuracy in detecting graphs with communities.
In the second experiment we evaluate the size-invariance of
NetLSD: The task is to discriminate fixed-size communities in
graphs of increasing size. Therefore, we sample the number of
nodes n from a Poisson distribution P(λ = n) with variance λ, and
then generate a network with n nodes. Again, we repeat the process
1000 times with purely random generated graphs and 1000 with ran-
dom graphs with community structure, and perform a classification
experiment as before. Table 7 reports the results, for increasing λ.
Once again, NetLSD outperforms the competitors. This result con-
firms that the normalization proposed in Section 4.3 is effective in
detecting community structures in graphs of different size. Table 7
also indicates that, while both normalizations are similarly effective
with the wave kernel, the complete-graph normalization produces
worse, but still competitive, results with the heat kernel.
n ∼ P(λ)
64
54.39
54.53
54.37
56.23
55.51
56.69
55.44
59.55
128
59.01
62.27
60.93
63.77
63.85
64.92
54.99
56.57
Method
h(G)
h(G)/h( ¯K)
h(G)/h(K)
w(G)
w(G)/w( ¯K)
w(G)/w(K)
FGSD
NetSimile
Table 7: Accuracy in detecting graphs with communities,
Poisson distribution of graph size.
1024
53.80
78.40
65.23
70.34
79.39
77.50
50.92
60.58
512
57.99
76.45
68.24
71.66
77.59
75.91
52.74
66.23
256
60.82
70.83
66.86
69.57
72.12
71.81
53.86
59.41
Last, we assess the size-invariance of NetLSD in a tough regime:
discriminating communities in graphs with a number of nodes cho-
sen uniformly at random. We sample the number of nodes n from
the uniform distribution U(10, λ); other experimental settings re-
main the same. Table 8 reports the results with growing λ. NetLSD
outperforms the competitors once again, yet the results suggest that
this task is more challenging. Complete-graph normalization for
the wave kernel and empty-graph normalization for the heat kernel
perform best. We conclude that, for fully size-agnostic comparisons,
normalization should be chosen carefully.
n ∼ U(10, λ)
64
51.16
51.19
51.69
52.38
51.61
52.63
57.92
63.63
Method
h(G)
h(G)/h( ¯K)
h(G)/h(K)
w(G)
w(G)/w( ¯K)
w(G)/w(K)
FGSD
NetSimile
Table 8: Accuracy in detecting graphs with communities,
Uniform distribution of graph size.
512
51.05
59.10
55.29
61.18
60.06
67.95
52.74
54.34
1024
50.08
59.71
53.43
59.13
61.01
71.19
52.15
53.11
256
51.62
56.63
55.43
59.81
57.83
62.85
54.94
55.75
128
51.98
53.36
53.67
55.89
54.67
57.48
55.62
58.31
5.5 Case Study
Here, we visualize the discovery potential of using NetLSD as a
similarity measure. We run a furthest pair query on all graphs in
our collection bar those in the REDDIT-L dataset, which are harder
to visualize readably; thereby, we discover the two graphs of lowest
similarity, using the normalized heat kernel. Figure 7 shows those
two graphs: a protein interaction network from the D&D dataset and
an enzyme's tertiary structure from the ENZYMES dataset. These
two graphs are conspicuously different across multiple scales, from
local patterns to global structure. The interaction network in Fig-
ure 7a is a small-world graph with large clustering coefficient (0.425)
and small diameter (D = 9), whereas the tertiary structure in Fig-
ure 7b is a connected collection of paths of big length with negligible
clustering coefficient (0.006) and large (D = 32) diameter.
8
(a) Protein network. V = 190, E = 744, D = 9.
(b) Enzyme. V = 125, E = 141, D = 32.
Figure 7: Two most dissimilar graphs by h(G)/h( ¯K) across all small-size graphs in datasets used. Communities are colored.
103
)
s
(
e
m
i
t
102
101
104
105
106
n
Figure 8: Time to compute 300 eigenvalues on both ends of
the spectrum and the approximation of h(G).
5.6 Scalability
Last, we corroborate the scalability of NetLSD. Figure 8 shows the
time to compute 300 eigenvalues for the approximation of h(G) on
graphs of increasing size from the REDDIT dataset. Our method
computes the similarity on graphs of one million (106) nodes in
only 16 minutes, while previous methods could not complete the
process within one day. This result illustrates the fitness of NetLSD
a scalable comparison method among real-size graphs.
6 CONCLUSIONS
We proposed NetLSD, a representation for graph comparison rely-
ing neither on (i) graph alignment operations, nor on (ii) computa-
tionally-demanding kernel computations, nor on (iii) supervised
representation learning. NetLSD is a multi-scale heat trace sig-
nature of a graph Laplacian spectrum, which lower-bounds the
Gromov-Wasserstein distance as it incorporates heat traces cov-
ering all scales. We derived a novel approximation of heat traces,
rendering NetLSD efficiently computable, and a normalization
scheme, rendering it size-invariant. To our knowledge, this is the
first graph representation that achieves these properties and allows
for comparisons at multiple scales. Our experiments show that
NetLSD outperforms NetSimile and FGSD, two state-of-the-art
representation-based methods for graph comparison, on a variety of
graph collections on community detection and graph classification.
9
REFERENCES
[1] Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2010. Oddball: Spotting
anomalies in weighted graphs. In PAKDD. 410–421.
[2] Mathieu Aubry, Ulrich Schlickewei, and Daniel Cremers. 2011. The wave kernel
signature: A quantum mechanical approach to shape analysis. In ICCV Workshops.
IEEE, 1626–1633.
[3] Mikhail Belkin and Partha Niyogi. 2007. Convergence of Laplacian eigenmaps.
[4] Jose Bento and Stratis Ioannidis. 2018. A Family of Tractable Graph Distances.
[5] Marcel Berger. 2012. A panoramic view of Riemannian geometry. Springer Science
In NIPS. 129–136.
In SDM.
& Business Media.
[6] Michele Berlingerio, Danai Koutra, Tina Eliassi-Rad, and Christos Faloutsos. 2013.
Network similarity via multiple social theories. In ASONAM. 1439–1440.
[7] Stephen Bonner, John Brennan, Ibad Kureshi, G Theodoropoulos, and AS Mc-
Gough. 2016. Efficient Comparison of Massive Graphs Through The Use Of
Graph Fingerprints. In Twelfth Workshop on Mining and Learning with Graphs
(MLG) Workshop at KDD'16.
[8] Karsten M Borgwardt and Hans-Peter Kriegel. 2005. Shortest-path kernels on
graphs. In Data Mining, Fifth IEEE International Conference on. IEEE, 8–pp.
[9] Alexander M Bronstein, Michael M Bronstein, Leonidas J Guibas, and Maks
Ovsjanikov. 2011. Shape google: Geometric words and expressions for invariant
shape retrieval. TOG 30, 1 (2011), 1.
[10] Alexander M Bronstein, Michael M Bronstein, and Ron Kimmel. 2006. Efficient
computation of isometry-invariant distances between surfaces. SIAM Journal on
Scientific Computing 28, 5 (2006), 1812–1836.
[11] Michael M Bronstein and Alexander M Bronstein. 2011. Shape recognition with
spectral distances. IEEE Transactions on Pattern Analysis and Machine Intelligence
33, 5 (2011), 1065–1071.
[12] Fan Chung. 2007. The heat kernel as the pagerank of a graph. Proceedings of the
National Academy of Sciences 104, 50 (2007), 19735–19740.
[13] Fan RK Chung. 1997. Spectral graph theory. Number 92. American Mathematical
[14] Andreas Fischer, Ching Y Suen, Volkmar Frinken, Kaspar Riesen, and Horst
Bunke. 2015. Approximation of graph edit distance based on Hausdorff matching.
Pattern Recognition 48, 2 (2015), 331–343.
[15] Ran Gal, Ariel Shamir, and Daniel Cohen-Or. 2007. Pose-oblivious shape signature.
IEEE transactions on visualization and computer graphics 13, 2 (2007), 261–271.
[16] Michael R Garey and David S Johnson. 2002. Computers and intractability. Vol. 29.
wh freeman New York.
[17] Thomas Gärtner, Peter Flach, and Stefan Wrobel. 2003. On graph kernels: Hard-
ness results and efficient alternatives. In Learning Theory and Kernel Machines.
Springer, 129–143.
[18] Karam Gouda and Mosab Hassaan. 2016. CSI_GED: An efficient approach for
graph edit similarity computation. In ICDE. 265–276.
[19] Hans Heinrich Günthard and Hans Primas. 1956. Zusammenhang von Graphen-
theorie und MO-Theorie von Molekeln mit Systemen konjugierter Bindungen.
Helvetica Chimica Acta 39, 6 (1956), 1645–1653.
[20] Vicente Hernandez, Jose E. Roman, and Vicente Vidal. 2005. SLEPc: A scalable
and flexible toolkit for the solution of eigenvalue problems. ACM Trans. Math.
Software 31, 3 (2005), 351–362.
[21] Mark Kac. 1966. Can one hear the shape of a drum? The american mathematical
monthly 73, 4 (1966), 1–23.
Soc.
[22] Brian Karrer and Mark EJ Newman. 2011. Stochastic blockmodels and community
Cybernetics 13, 3 (1983), 353–362.
structure in networks. Physical review E 83 (2011).
[23] Shrikant Kashyap and Panagiotis Karras. 2011. Scalable kNN search on vertically
stored time series. In KDD. 1334–1342.
[24] Kyle Kloster and David F Gleich. 2014. Heat kernel based community detection.
[40] Nino Shervashidze, Pascal Schweitzer, Erik Jan van Leeuwen, Kurt Mehlhorn,
and Karsten M Borgwardt. 2011. Weisfeiler-lehman graph kernels. Journal of
Machine Learning Research 12, Sep (2011), 2539–2561.
[41] Jianbo Shi and Jitendra Malik. 2000. Normalized cuts and image segmentation.
In KDD. 1386–1395.
NIPS. 2990–2998.
[25] Risi Kondor and Horace Pan. 2016. The multiscale laplacian graph kernel. In
[26] Danai Koutra, Joshua T Vogelstein, and Christos Faloutsos. 2013. Deltacon: A
principled massive-graph similarity function. In SDM. 162–170.
[27] Yongjiang Liang and Peixiang Zhao. 2017. Similarity Search in Graph Databases:
A Multi-Layered Indexing Approach. In ICDE. 783–794.
[28] Chih-Long Lin. 1994. Hardness of Approximating Graph Transformation Problem.
In ISAAC. 74–82.
[29] Roee Litman and Alexander M. Bronstein. 2014. Learning Spectral Descriptors
for Deformable Shape Correspondence. IEEE Trans. Pattern Anal. Mach. Intell. 36,
1 (2014), 171–180.
[30] Facundo Mémoli. 2011. A spectral notion of Gromov–Wasserstein distance and
related methods. Applied and Computational Harmonic Analysis 30, 3 (2011),
363–401.
[31] Facundo Mémoli and Guillermo Sapiro. 2005. A theoretical and computational
framework for isometry invariant recognition of point cloud data. Foundations
of Computational Mathematics 5, 3 (2005), 313–347.
[32] Cleve Moler and Charles Van Loan. 2003. Nineteen dubious ways to compute the
exponential of a matrix, twenty-five years later. SIAM review 45, 1 (2003), 3–49.
[33] Giannis Nikolentzos, Polykarpos Meladianos, and Michalis Vazirgiannis. 2017.
Matching Node Embeddings for Graph Similarity.. In AAAI. 2429–2435.
[34] Robert Osada, Thomas Funkhouser, Bernard Chazelle, and David Dobkin. 2002.
Shape distributions. ACM Transactions on Graphics (TOG) 21, 4 (2002), 807–832.
[35] Panagiotis Papadimitriou, Ali Dasdan, and Hector Garcia-Molina. 2010. Web
graph similarity for anomaly detection. Journal of Internet Services and Applica-
tions (2010), 19–30.
[36] Tiago P. Peixoto. 2014. The graph-tool python library. figshare (2014). https:
//doi.org/10.6084/m9.figshare.1164194
[37] Leonardo Filipe Rodrigues Ribeiro, Pedro H. P. Saverese, and Daniel R. Figueiredo.
2017. struc2vec: Learning Node Representations from Structural Identity. In KDD.
385–394.
[38] Kaspar Riesen and Horst Bunke. 2009. Approximate graph edit distance compu-
tation by means of bipartite graph matching. Image and Vision computing 27, 7
(2009), 950–959.
[39] Alberto Sanfeliu and King-Sun Fu. 1983. A distance measure between attrib-
uted relational graphs for pattern recognition. IEEE Trans. Systems, Man, and
PAMI 22, 8 (2000), 888–905.
[42] Jian Sun, Maks Ovsjanikov, and Leonidas Guibas. 2009. A concise and provably
informative multi-scale signature based on heat diffusion. In Computer graphics
forum, Vol. 28. Wiley Online Library, 1383–1392.
[43] Yufei Tao, Ke Yi, Cheng Sheng, and Panos Kalnis. 2009. Quality and efficiency in
high dimensional nearest neighbor search. In SIGMOD. 563–576.
[44] Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller. 2018.
VERSE: Versatile Graph Embeddings from Similarity Measures. In the 2018 Web
Conference. 539–548.
[45] Edwin R. van Dam and Willem H. Haemers. 2003. Which graphs are determined
by their spectrum? Linear Algebra Appl. 373 (2003), 241 – 272.
[46] Amir Vaxman, Mirela Ben-Chen, and Craig Gotsman. 2010. A multi-resolution
approach to heat kernels on discrete surfaces. In TOG, Vol. 29. 121.
[47] Saurabh Verma and Zhi-Li Zhang. 2017. Hunt For The Unique, Stable, Sparse
And Fast Feature Learning On Graphs. In NIPS. 87–97.
[48] Ulrike Von Luxburg, Mikhail Belkin, and Olivier Bousquet. 2008. Consistency of
spectral clustering. The Annals of Statistics (2008), 555–586.
[49] Ulrike Von Luxburg, Agnes Radl, and Matthias Hein. 2010. Hitting and commute
times in large graphs are often misleading. arXiv preprint arXiv:1003.1266 (2010).
[50] Hermann Weyl. 1911. Über die asymptotische Verteilung der Eigenwerte.
Nachrichten von der Gesellschaft der Wissenschaften zu Göttingen, Mathematisch-
Physikalische Klasse (1911), 110–117.
[51] Richard C Wilson and Ping Zhu. 2008. A study of graph spectra for comparing
graphs and trees. Pattern Recognition 41, 9 (2008), 2833–2841.
[52] Pinar Yanardag and SVN Vishwanathan. 2015. Deep graph kernels. In KDD.
[53] Ye Yuan, Guoren Wang, Lei Chen, and Haixun Wang. 2015. Graph similarity
search on large uncertain graph databases. The VLDB Journal 24, 2 (2015), 271–
296.
[54] Zhiping Zeng, Anthony K. H. Tung, Jianyong Wang, Jianhua Feng, and Lizhu
Zhou. 2009. Comparing Stars: On Approximating Graph Edit Distance. PVLDB 2,
1 (2009), 25–36.
[55] Weiguo Zheng, Lei Zou, Xiang Lian, Dong Wang, and Dongyan Zhao. 2015.
Efficient graph similarity search over large graph databases. TKDE 27, 4 (2015),
964–978.
[56] Yuanyuan Zhu, Lu Qin, Jeffrey Xu Yu, and Hong Cheng. 2012. Finding top-k
similar graphs in graph databases. In EDBT. 456–467.
1365–1374.
10
|
1610.07090 | 1 | 1610 | 2016-10-22T19:41:44 | STEPS: Predicting place attributes via spatio-temporal analysis | [
"cs.SI"
] | In recent years, a vast amount of research has been conducted on learning people's interests from their actions. Yet their collective actions also allow us to learn something about the world, in particular, infer attributes of places people visit or interact with. Imagine classifying whether a hotel has a gym or a swimming pool, or whether a restaurant has a romantic atmosphere without ever asking its patrons. Algorithms we present can do just that.
Many web applications rely on knowing attributes of places, for instance, whether a particular restaurant has WiFi or offers outdoor seating. Such data can be used to support a range of user experiences, from explicit query-driven search to personalized place recommendations. However, obtaining these attributes is generally difficult, with existing approaches relying on crowdsourcing or parsing online reviews, both of which are noisy, biased, and have limited coverage. Here we present a novel approach to classifying place attributes, which learns from patrons' visit patterns based on anonymous observational data.
Our method, STEPS, learns from aggregated sequences of place visits. For example, if many people visit the restaurant on a Saturday evening, coming from a luxury hotel or theater, and stay for a long time, then this restaurant is more likely to have a romantic atmosphere. On the other hand, if most people visit the restaurant on weekdays, coming from work or a grocery store, then the restaurant is less likely to be romantic. We show that such transition features are highly predictive of place attributes. In an extensive empirical evaluation, STEPS nearly doubled the coverage of a state of the art approach thanks to learning from observational location data, which allowed our method to reason about many more places. | cs.SI | cs | STEPS: Predicting place attributes
via spatio-temporal analysis
∗
Shuxin Nie, Abhimanyu Das, Evgeniy Gabrilovich
,
Wei-Lwun Lu, Boris Mazniker, Chris Schilling
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043
{shnieabhidasgabrweilwunlumaznikercschill}@google.com
6
1
0
2
t
c
O
2
2
]
I
S
.
s
c
[
1
v
0
9
0
7
0
.
0
1
6
1
:
v
i
X
r
a
ABSTRACT
In recent years, a vast amount of research has been con-
ducted on learning people's interests from their actions. Yet
their collective actions also allow us to learn something about
the world, in particular, infer attributes of places people visit
or interact with. Imagine classifying whether a hotel has a
gym or a swimming pool without ever talking to the people
who stayed there. Or imagine predicting whether a restau-
rant has a happy hour or a romantic atmosphere without
asking its patrons. Algorithms we present can do just that.
Many web applications rely on knowing attributes of places,
for instance, whether a particular restaurant has WiFi or of-
fers outdoor seating. Such data can be used to support a
range of user experiences, from explicit query-driven search
to proactively recommending places the user might like. How-
ever, obtaining these attributes is generally difficult, with ex-
isting approaches relying on crowdsourcing or parsing online
reviews, both of which are noisy, biased, and have limited
coverage. Here we present a novel approach to classifying
place attributes, which learns from patrons' visit patterns
based on anonymous observational data.
Our method, STEPS, learns from aggregated sequences
of place visits. For example, if many people visit the restau-
rant on a Saturday evening, coming from a luxury hotel or
theater, and stay for a long time, then this restaurant is
more likely to have a romantic atmosphere. On the other
hand, if most people visit the restaurant on weekdays, com-
ing from work or a grocery store, then the restaurant is less
likely to be romantic. We show that such transition features
are highly predictive of place attributes. We also introduce
a variant of our method, STEPS-E, which builds a high-
dimensional embedding model trained on co-visitation data,
and completely eliminates the need for feature engineering.
In an extensive empirical evaluation, STEPS nearly doubled
the coverage of a state of the art approach thanks to learning
∗Corresponding author
ISBN X-XXXXX-XX-X/XX/XX.
DOI:
from observational location data, which allowed our method
to reason about many more places.
1.
INTRODUCTION
"You know my method. It is founded upon the
observation of trifles."
– Sherlock Holmes.
In recent years, numerous web services and applications
have been built to facilitate access to information about
brick-and-mortar businesses and places such as restaurants,
hotels, parks, or tourist sites. These include review sites
and recommendation apps (TripAdvisor, Yelp, Zagat), on-
line business directories (Urbanspoon, Yellowpages), map-
ping services (Google Maps), travel sites (Hotels.com, Ex-
pedia), and even web search. Many of these services rely
on knowing attributes of places to help users narrow down
their search. For example, recommendation web sites often
categorize restaurants using a variety of attributes, such as
whether a restaurant is a fine-dining or casual place, whether
it offers free WiFi or outdoor seating, whether it takes reser-
vations or offers take-out. Similarly, travel sites allow users
to search for hotels based on attributes such as whether the
hotel is frequented by business customers or leisure trav-
ellers, and whether it has amenities such as a gym or swim-
ming pool. Therefore, identifying these attributes is a criti-
cal component in many user-facing applications.
However, obtaining these attributes of places in a scalable
manner is challenging. Existing approaches have tradition-
ally taken one of two routes: (a) Crowdsourcing the task,
or (b) Inferring attributes from text analysis of online re-
views about the place. The former approach explicitly asks
visitors to manually specify attributes of the place. This
approach is hard to scale to a large number of places and
their attributes, because people are often unwilling to spend
time answering questions without any perceived near-term
gain. Furthermore, it is difficult to ensure high quality of
crowdsourced labels. More recently, several studies have fo-
cused on mining customer reviews to extract key attributes
of a place, along with customer opinions about these at-
tributes [14]. While this approach does not require manual
labor (beyond developing a classifier), it also suffers from a
number of weaknesses. Reviews are often noisy, verbose and
ambiguous, and it is difficult to reliably parse review text to
extract information about specific attributes. Reviews also
have a major coverage problem. New places have few or no
reviews, and even for older places the review text often cov-
ers only a few main attributes. For example, many restau-
rant reviews talk about the cuisine type, prices or ambience,
but only a few (if at all) may explicitly mention whether the
restaurant requires reservations, offers take-out, or has out-
door seating (see Table 2 for the long list of attributes we
predict). Finally, reviews are biased because only a handful
of people choose to write them, and usually they were either
extremely happy or unhappy with the service.
We take a fundamentally different approach, and study
the movement of people to infer attributes of places they
visit. As a motivating example, imagine you stumbled upon
a coffee shop you have never visited before. Over two dozen
people are waiting in line. The coffee must be good, you say
to yourself, because all those people waiting patiently must
know what they are doing. At that very moment you have
inferred an attribute of a physical place by observing how
people act around it. In this paper, we present algorithms
that do just that.
We introduce STEPS, Spacio-TEmporal analysis of Place
attributeS, which learns from trajectory patterns of patrons'
visits to the place. STEPS derives spatial and temporal
features from anonymous aggregated Location History data
that our users have proactively chosen to share with us.1
The data comes in the form of aggregated visit sequences
(before/after visiting a given place), along with place cate-
gories (e.g., restaurant or grocery store), binned arrival time,
and duration. Similar data is available in the form of place
check-ins on Foursquare, Facebook or Yelp, or geo-coded
tweets on Twitter. However, the anonymous visit data has
much higher coverage (as it does not require explicit check-
in) and temporal resolution (we can compute visit durations
and arrival times). It is also much less biased than reviews
because no effort is required from the visitor. In this paper,
we show how this micro-scale visit data allows us to learn
new macro-scale facts about the world (place attributes).
STEPS uses features based on sequences of other places
visited by patrons of a given place, which are often predictive
of place attributes. For example, if many people visit a
particular restaurant soon after visiting a park or a beach,
then the restaurant is more likely to have outdoor seating
because it appeals to patrons who like to be outdoors.
If
a restaurant is often visited for short periods of time in the
afternoon, after visiting another restaurant and before going
home, then it is likely to offer good desserts. On the other
hand, if many people go to a restaurant directly from home
or work and stay there for a long time, it is probably good
for meals rather than desserts. (See Section 5 for additional
examples of visit patterns we use as prediction signals.) One
might think that many of these patterns are only weakly
correlated with the attribute we are trying to predict. A
key insight of this paper is that when we aggregate multiple
weak signals over a large population, we can classify many
place attributes with high accuracy and coverage.
We formulate the problem of attribute classification in a
supervised learning setting, and use manually labeled train-
ing data. STEPS employs a semi-automatic approach to
feature generation, which constructs a large number of fea-
tures based on several simple (hand-chosen) properties of
co-visited places, for example, their categories (e.g., grocery
store or park) and the durations of visits. We then use these
features to train a binary classifier for each attribute.
1Users can switch it off at any time via My Account. This
is essentially the same data we use in Google Now to notify
users about the best time to visit their favorite museum. [3]
We also introduce a variant of STEPS called STEPS-E,
which completely automates feature construction and learn
features directly from the data. STEPS-E performs collab-
orative filtering on the co-visitation patterns of people and
places to create a high-dimensional embedding (hence "-E")
of each place in an underlying latent space. The dimen-
sions of the latent space are then treated as automatically-
constructed features for training binary classifiers for each
attribute. STEPS-E uses low-rank matrix factorization [8]
to automatically create 1000-dimensional feature vectors for
each place. The latent features in STEPS-E are much fewer
than the fine-grained features created in STEPS. However,
as evident from the experiments in Section 4, they are rich
enough to capture many of the spatio-temporal visit pat-
terns useful for attribute classification.
The contributions of this paper are threefold. First, we
proposed a novel approach to classifying attributes of a place
based on other places frequently visited by its patrons. Sec-
ond, we employed the richness of aggregated anonymous lo-
cation data to automatically construct features that char-
acterize nearby locations visited and the time spent there.
It should be emphasized that this data is entirely observa-
tional, hence no extra effort is required to collect it. Third,
we performed a comprehensive evaluation of our approach
using real world data spanning several dozen different at-
tributes of thousands of places (restaurants and hotels). We
compared our results to a state of the art baseline that mines
the text of online reviews to infer attributes. We showed
that our approach significantly increases the coverage of the
baseline method, while exhibiting competitive classification
accuracy. Since reviews are not always available and may
not mention all the relevant attributes, relying on reviews is
a major limitation, which our proposed approach alleviates
and nearly doubles the classifier coverage. We also note that
the nature of the location data is orthogonal to that of the
review text. As a result, when we combine features from
the two data sources (reviews + place visits), we observe a
further improvement in classification performance. Finally,
we present a qualitative study that explains in depth how
our method works on several attributes.
2. BACKGROUND
With the rapid increase in location-aware applications,
there has been a large body of work on location data min-
ing and its various use-cases. Several papers have focused
on collecting and modeling location data for personalized
Point-of-Interest (POI) recommendation. Ye et al. [19] mod-
eled users' check-in behavior in location based social net-
works, and proposed a collaborative POI recommendation
algorithm using Naive Bayes methods. Lian et al. [11] pro-
posed a matrix-factorization approach for POI recommenda-
tion, by jointly modeling users' geographic preferences and
their place-visit data from location based social networks.
Zheng et al. [21] mined a large scale GPS dataset to extract
correlations between user locations for personalized recom-
mendations. Zheng et al. [20] used GPS data along with user
text comments to create a location-activity matrix for col-
laborative location and activity recommendations. Cheng et
al. [1] considered temporal and sequence information to pre-
dict a user's next-POI by incorporating personalized Markov
Chain information during matrix factorization.
Another direction in location data mining deals with mod-
eling user trajectories and visit distribution patterns to pre-
dict a user's next destination or activity. Li et al. [10] pre-
dicted user trajectories using a probabilistic motion model
trained on anonymized GPS-snippets. Cheng et al. [2] used
check-in data from location based social networks, and learnt
a Hidden Markov Model to predict a user's activity and lo-
cation at the next step. Lichman et al. [13] modelled a user's
spatial distribution using a mixture of Kernel Density Es-
timates. Kirmse et al. [7] used location histories obtained
from GPS and WiFi signals to infer users' frequently visit
places and commute patterns. Laio et al. [12] modeled raw
GPS traces using relational Markov networks to simultane-
ously infer a user's significant locations and activities.
Somewhat related to our work is the recent paper by
Zhong et al [22] who used location check-in records to create
spatial and temporal location features of users for predicting
various user demographics such as age, gender, educational
background, etc. However, the focus of our paper is different
from [22] (and indeed, from most of the above papers on in-
ference using location data) in that we model location data
not to predict user attributes, but rather place attributes,
and hence our location features are aggregate, population
level features, instead of per-user features.
While we are not aware of prior work on using location
data for extracting place attributes, there has been a large
body of work on inferring attributes of products, places and
other entities from text mining of online content.
In par-
ticular, there exists a rich line of work in the area of opin-
ion mining [14], which performs text analysis of documents,
customer reviews or online discussion forums to identify at-
tributes of an entity and extract customer opinions and sen-
timents for these attributes. Several of these papers use a
notion of frequent noun phrases to identify important at-
tributes from reviews [9, 5, 4, 16, 15]. Another class of opin-
ion mining papers involves leveraging relationships between
potential attributes and sentiment-bearing words (usually
adjectives) to discover relevant attributes, and their senti-
ment scores. Hu et al. [5] extracted low-frequency attributes
by identifying the nearest noun phrases to sentiment-bearing
words. Qui et al. [17] used a double propogation method to
jointly extract attributes and sentiment words. Zhuang et
al. [23] mined relationships between attributes and senti-
ment words using a dependency grammer graph, and ex-
tracted valid attribute-sentiment pairs for movie reviews.
Jakob et al. [6] proposed a supervised CRF-based sequence
modeling approach to extract attributes, using features such
as the part of speech tags, string tokens, dependency-parse-
tree distances, and distance to sentiment words. Wang et
al. [18] addresssed the problem of teasing out users' latent
ratings on different topical attributes of hotel reviews from
users' overall review scores and their review text.
3. METHOD
In this section, we provide a detailed description of the
STEPS method, which learns from anonymous aggregated
observational data about people's place visits. STEPS con-
structs spatio-temporal features by mining historical data
about sequences of place visits corresponding to a large group
of people. Each place visit instance corresponds to a single
visit by an anonymous person to a place, and also includes
the category of the place (e.g., restaurant, hotel, or park),
and discretized arrival time and visit duration. We use a
taxonomy of several thousand place categories.
The key intuition here is that the sequence of places peo-
ple visited before and after a given place, can reveal patterns
that are correlated with attributes of the place. Admittedly,
this correlation might be quite weak for any individual pat-
tern. However, our experimental results suggest that aggre-
gating such patterns over a large population of place visitors
leads to surprisingly strong prediction of place attributes.
We construct a large set of spatio-temporal features us-
ing aggregated data for an entire population of visitors to a
place. The features can be logically grouped as follows.
• Duration features: These features capture the distribu-
tion of time people stay at a place. Intuitively, such features
are useful for predicting attributes of restaurants such as
availability of WiFi, or whether it has fast service. For ex-
ample, patrons may stay longer in a cafe with WiFi available,
and they may stay less in a fast-food restaurant.
• Arrival time features: These features capture the dis-
tribution of peoples' arrival times to a place. Specifically,
we create a set of real-valued features for each hour of the
week, where the feature value corresponds to the fraction
of people that visit the place at that hour. There are sev-
eral attributes for which this temporal signal is useful. For
example, if a restaurant is frequented by patrons in the af-
ternoon, it is more likely to offer good desserts. Similarly, if
a restaurant is popular on Sunday mornings, it is likely that
it serves a good brunch menu.
• Occupancy features: These features capture the occu-
pancy distribution of a place (measured in terms of the frac-
tion of people who visit the place at different hours of the
week). For example, a restaurant offering brunch menu may
be crowded between breakfast and lunch hours on Sundays.
Note that while the arrival and duration features character-
ize people's visits, the occupancy features characterize the
busyness of a place. Occupancy features essentially define
the occupancy histogram of a place, by the hour of the week.
• Transition features (previous visit) characterize places
visited before the current place. We compute the distribu-
tion of peoples' visits to other places within a time window
(1, 4, 8, 16 and 24 hours). To ensure that such features
generalize well, this distribution is computed not over the
specific places people visit, but over place categories (e.g.,
restaurant, grocery store, hotel). The value of each feature
reflects the fraction of people who visited that place cate-
gory in a given time window before the target place visit
(e.g., 2% of visitors to the given restaurant have visited a
grocery store in the previous hour). Several place attributes
can be predicted better using such features. For example,
if a cafe is frequented by people who visit another restau-
rant beforehand, then this cafe is more likely to offer good
desserts. If a restaurant is popular among patrons who visit
parks or beaches prior to it, then the restaurant is likely to
have outdoor seating (as it appeals to people who like to be
outdoors).
• Transition features (next visit): Analogous to the
previous-visit features described above, we also compute the
distribution of people's visits (to other places) after visiting
a given place, within a particular time window. For example,
if many people visit surf shops after a hotel, then the hotel
is likely to have beach access. If many people visit a cafe in
the morning after staying at a hotel, then it is likely that
the hotel does not provide breakfast.
The above groups of features are instantiated for different
place categories and time intervals, hence the total number
of features we generate for each place is quite large (about
∼ 100K). This process is semi-automatic, because the only
manual part is compiling the lexicon of place categories and
the choice of time intervals. Cf. Section 5 for examples of
features we use for predicting different attributes.
We use supervised learning to train models for predict-
ing individual place attributes. We have a multi-labeled
setting whereas each restaurant (or hotel) has multiple at-
tributes, and we predict each one independently by train-
ing a dedicated binary classifier. Note that our feature set
is comprehensive enough to be predictive of all attributes,
and is not specific to any particular attribute. We per-
form per-attribute feature selection (using a standard Mu-
tual Information-based method), and retain up to 10,000 fea-
tures per attribute. All the attributes we predict are binary,
hence we use binary classification models (however, STEPS
is applicable to predicting multi-class attributes too).
Specifically, for each attribute we collect a ground-truth
set of positive and negative labels corresponding to places
that have this attribute and places that do not have it.
The labels are obtained from third-party aggregator sites
as well as via crowdsourcing, as described in Section 4.1. In
the experiments described in Section 4, we used linear Sup-
port Vector Machines for classification, however, our STEPS
method can work with any binary classifier.
Automating feature generation with embeddings
The STEPS method described in the previous section re-
lies on human engineered features. We now propose a vari-
ant of STEPS called STEPS-E, which performs automated
feature generation for attribute classification, with only a
small penalty in accuracy compared to using manual fea-
ture engineering. At a high level, STEPS-E generates a
feature vector for each place using collaborative filtering on
the (anonymous) person-place visit data. We use low-rank
matrix factorization [8] on the person-place co-visit matrix
(normalized to factor out location bias [11], as described be-
low) to compute an embedding vector for each place in a
latent low-dimensional space. The dimensions of this vector
are then used as features for representing the place.
Specifically, we first construct a person-place matrix L
with rows representing people and columns representing pla-
ces. Note that the data in this matrix is completely anony-
mous. Every cell in the matrix contains a boolean value rep-
resenting whether the person has visited the place or not,
and has an associated weight corresponding to the number
of times the person visits the place, capped by a maximum
threshold. The weight represents a confidence score, and
captures the relative contribution of the cell to the matrix-
factorization objective function. A well-known issue in ge-
ographical matrix factorization (see [11]) is the tendency of
people to have location bias. For example, people are more
likely to visit restaurants in a small set of locations they
are familiar with, and less likely to visit restaurants in un-
familiar areas. Thus, not visiting a restaurant in a familiar
area should carry a stronger negative signal, and visiting a
restaurant in new areas should carry stronger positive rein-
forcement. Several approaches have been proposed to cor-
rect this location bias [11]. We used a simple yet effective
normalization heuristic, which divides the weight of each cell
in the matrix (counting the person's visits to a place) by the
number of other places this person has visited in a 2 km ra-
dius. Given this weighted co-visit matrix, we use standard
low-rank matrix factorization to compute a low dimensional
person embedding U and place embedding V, by optimizing
the following loss function (using Weighted Alternate Least
Squares [8]):
(cid:17)2
(cid:88)
(cid:88)
(cid:88)
(cid:16)
minU,V
Wij
Lij − U T
i Vj
+ λ(
Ui2 +
Vj2),
i,j
i
j
where W is the weighting matrix, and λ is the L2-norm
regularization constant.
Each place embedding is then used as a feature vector of
the place to train binary classifiers for various attributes,
as described in the previous section. Since we use low-rank
matrix factorization, the number of embedding dimensions
is small enough that we do not need to use feature selection.
4. EMPIRICAL EVALUATION
We describe the datasets and the baseline, and then re-
port the performance of our methods.We also present ab-
lation studies that explore the utility of the different fea-
ture groups. All the results were obtained via 10-fold cross-
validation. We evaluated the performance of place attribute
predictions using the area under the ROC curve (AUC).
4.1 Datasets
We evaluated our methodology on 2 large datasets with
labeled data about attributes of restaurants and hotels.
The restaurant dataset included 29 restaurant attributes
(all binary) listed in Table 1. Admittedly, these attributes
are somewhat subjective (e.g., whether the restaurant is in-
expensive), and are partly overlapping (e.g., cozy / quiet
/ romantic atmosphere). However, from a user perspective,
these attributes are deemed useful for making restaurant rec-
ommendations, and we had ample human-labeled data for
them, hence we used them to evaluate our method. Labeled
examples corresponded to actual restaurants that had or did
not have a given attribute (positive / negative, respectively).
The human labels were obtained from third-party aggrega-
tor sites, such that each label was confirmed by at least two
sites (there were no label contradictions, resulting in essen-
tially 100% inter-rater agreement). Owing to lack of space,
we do not show the exact numbers of examples for each at-
tribute, but the average number of positive examples per
attribute was 34K (median 24K) and the average number of
negative examples was 54K (median 34K). These examples
represent a sample of restaurants across several countries.
The second dataset included 16 binary hotel attributes
such as whether the hotel has a golf course, airport shuttle,
beach access, free breakfast, laundry service, fitness center
(the full list of attributes is given in the first column of Ta-
ble 3). Labeled examples corresponded to hotels that had or
did not have a given attribute. We obtained the labels from
an in-house crowdsourcing project, using at least two raters
per hotel. The average number of positive examples per at-
tribute was 68K (median 65K) and the average number of
negative examples was 91K (median 87K). These examples
represent a sample of hotels across several countries.
4.2 Baseline
We compared the performance of our method, STEPS,
with that of a baseline classifier trained on a corpus of text
reviews. The reviews were crawled from public Google+ web
pages for the respective restaurants and hotels. We pooled
Attribute
Wine
Takeout
Brunch
Happy hour
Upscale
Hip
WiFi
Romantic
Outdoor seating Features
Breakfast
Lunch
Dinner
Food
Attrib type Description
Good for wine
Notable
Meal type
Food takeout available
Serves brunch
Meal type
Has happy hour
Meal type
Formal attire
Formality
Attracts hip crowd
Crowd
Features
WiFi available
Romantic atmosphere
Atmosphere
Has outdoor seating
Serves breakfast
Serves lunch
Serves dinner
Mainly visited for food
(as opposed to drinks)
Main visit: drinks
Inexpensive
Cozy atmosphere
Lively atmosphere
Quiet atmosphere
Good for groups
Reserv. not required
Longer wait time
Meal type
Meal type
Meal type
Intent
Intent
Price
Atmosphere
Atmosphere
Atmosphere
Company
Drink
Low price
Cozy
Lively
Quiet
Groups
No reservations Ease of entry
Ease of entry
Usually a wait
Entertainment Has live music
Live music
Restaur. type
Fast food
Features
Delivery
Casual
Formality
Notable
Dessert
Notable
Tea
Food type
Healthy
Vegetarian
Food type
Serves fast food
Delivers food
Casual attire
Good for desserts
Good for tea
Serves healthy food
Good veg. selection
Table 1: Restaurant attributes.
together all the reviews posted for each business, and rep-
resented each training instance with a bag of words. We
did not use stemming, but removed stop words as well as
words that occurred in reviews of only one place. The aver-
age number of reviews per restaurant was 23.2 (median 5),
and the average review length was 65.1 words (median 43).
The average number of reviews per hotel was 112.4 (median
16), and the average review length was 74.8 words (median
59). We used linear SVM to build the baseline classifier.
The performance of the baseline classifier is reported in the
second column of Table 2 (restaurants) and Table 3 (hotels).
4.3 Main findings
We built the STEPS model using linear SVM over the
features introduced in Section 3. In addition to linear SVM,
we also experimented with a logistic regression classifier for
both STEPS and the baseline, and the results were substan-
tially similar (for both restaurants and hotels), hence we do
not show them here owing to lack of space.
Table 2 shows the performance of the review baseline,
our STEPS method, and the combination of both, for the
restaurant dataset (cf. Section 4.1). Each row in the table
shows classifier performance for one attribute, and the sum-
mary row reports overall performance macro-averaged over
all the attributes (i.e., averaging the AUC values from the
individual rows). We computed the gain in the summary
row by comparing the macro-averaged AUC values for the
method and the baseline.
As we can readily see, STEPS shows superior results on
average, and demonstrates slightly inferior performance for
only 6 out of 29 attributes.
However, the true importance of these results stems from
the dramatically increased classification coverage due
to our method. Of all the restaurants in our database, re-
views are only available for 30.4% of restaurants, but STEPS
features2 can be computed for 59.6% of restaurants - a
relative coverage gain of 95.8% ! This happens because
online reviews are not available for all businesses (especially
for the newer ones), and even when they are available, they
might not mention the attributes we are interested in. Peo-
ple often write reviews to express a strong opinion (positive
or negative) about the restaurant, but do not mention all the
numerous applicable attributes of the business. Therefore,
the coverage of the review-based (baseline) classifier is lim-
ited. However, simply using observational data about how
people get in and out of the restaurant, allows us to sub-
stantially increase the classification coverage, and reliably
predict attributes for almost twice as many restaurants.
As we see in Table 2 (column Reviews + STEPS), com-
bining the review-based and the STEPS features leads to
superior classification performance for all the attributes.
We assessed the statistical significance of our results using
the standard t-test. For all 23 attributes where STEPS
performance is higher than the baseline, the improvement is
significant (p < 0.01). For the remaining 6 attributes, only
4 losses are significant (except Delivery and Casual), and
all the losses are small in absolute terms. Importantly, the
improvements shown by Reviews+STEPS are significant for
all attributes (p < 0.01).
Similarly, Table 3 shows the classification performance of
our method for hotel attributes (due to space constraints, we
do not report individual, per-attribute results). We compare
the performance of STEPS with that of the review baseline,
as well as report the performance of their combination. Here,
STEPS shows slightly inferior results on average (with im-
provements for 3 out of 16 attributes). However, this is
more than compensated by substantial improvements
in coverage. Of all the hotels in our database, reviews
are only available for 43.3% of hotels, but STEPS features
can be computed for 80% of hotels - a relative cover-
age improvement of 94.8% ! If we combine both sources
of features (review-based and STEPS features), we observe
superior classification performance for all the attributes.
4.4 The effect of different groups of features
Our STEPS method uses several groups of spatio-temporal
features defined in Section 3. We now explore the relative
utility of these different groups (owing to lack of space, we
combined the previous-visit and next-visit features into one
group of transition features). We show the ablation results
in the four rightmost columns of Tables 2 and 3, where each
column corresponds to using a different group of features.
For restaurants (Table 2), each of the 3 temporal groups of
features performs fairly well by itself, resulting in 11%–12%
lower AUC than the full STEPS model. The combination
of the 3 groups of temporal features yields macro-averaged
AUC of 0.833 (6% lower than STEPS; not shown in the table
for lack of space). Interestingly, the spatial features alone
2To maintain the anonymous aggregated nature of the data,
we computed STEPS features only for restaurants (hotels)
that have been visited by at least 10 people.
Attribute
Reviews
STEPS Gain Reviews Gain
Ablation study:
+ STEPS
Individual STEPS feature groups
Duration Arrival Occupancy Transition
Wine
Takeout
Brunch
Happy hour
Upscale
Hip
WiFi
Romantic
Outdoor seating
Breakfast
Lunch
Dinner
Food
Drink
Low price
Cozy
Lively
Quiet
Groups
No reservations
Usually a wait
Live music
Fast food
Delivery
Casual
Dessert
Tea
Healthy
Vegetarian
Macro-average
0.941
0.831
0.875
0.928
0.916
0.921
0.812
0.79
0.846
0.909
0.849
0.904
0.884
0.916
0.968
0.75
0.737
0.755
0.728
0.917
0.702
0.723
0.918
0.891
0.844
0.818
0.896
0.764
0.852
0.848
0.945
0.916
0.887
0.891
0.95
0.869
0.923
0.891
0.845
0.961
0.906
0.953
0.928
0.946
0.969
0.805
0.733
0.817
0.817
0.946
0.734
0.863
0.945
0.888
0.839
0.912
0.938
0.801
0.861
0.885
0.4%
10.2%
1.4%
-4%
3.7%
-5.6%
13.7%
12.8%
-0.1%
5.7%
6.7%
5.4%
5%
3.3%
0.1%
7.3%
-0.5%
8.2%
12.2%
3.2%
4.6%
19.4%
2.9%
-0.3%
-0.6%
11.5%
4.7%
4.8%
1.1%
4.4%
0.968
0.929
0.921
0.943
0.963
0.939
0.931
0.892
0.912
0.972
0.926
0.967
0.946
0.967
0.992
0.84
0.796
0.855
0.841
0.968
0.798
0.902
0.976
0.93
0.89
0.942
0.959
0.837
0.914
0.918
2.9%
11.8%
5.3%
1.6%
5.1%
2%
14.7%
12.9%
7.8%
6.9%
9.1%
7%
7%
5.6%
2.5%
12%
8%
13.2%
15.5%
5.6%
13.7%
24.8%
6.3%
4.4%
5.5%
15.2%
7%
9.6%
7.3%
8.3%
0.876
0.842
0.771
0.774
0.826
0.747
0.86
0.816
0.725
0.889
0.829
0.87
0.81
0.838
0.951
0.7
0.632
0.696
0.757
0.918
0.623
0.639
0.945
0.726
0.648
0.892
0.891
0.644
0.661
0.786
0.841
0.773
0.8
0.83
0.835
0.728
0.823
0.759
0.69
0.958
0.863
0.918
0.86
0.863
0.896
0.678
0.644
0.722
0.737
0.861
0.629
0.714
0.856
0.717
0.628
0.867
0.897
0.662
0.681
0.784
0.846
0.801
0.776
0.81
0.815
0.724
0.834
0.785
0.697
0.948
0.863
0.916
0.84
0.853
0.918
0.684
0.643
0.715
0.747
0.887
0.621
0.696
0.851
0.712
0.587
0.854
0.904
0.648
0.662
0.781
0.909
0.893
0.827
0.847
0.898
0.852
0.905
0.855
0.832
0.921
0.832
0.899
0.886
0.923
0.965
0.777
0.702
0.793
0.791
0.915
0.691
0.798
0.962
0.856
0.803
0.907
0.917
0.751
0.787
0.852
Table 2: Classifying restaurant attributes. Performance is reported as Area Under the Curve (AUC). Note
that STEPS increases the coverage by 95.8% compared to only using Reviews (cf. Section 4.3).
Attribute
Reviews
STEPS Gain Reviews Gain
Ablation study:
+ STEPS
Individual STEPS feature groups
Duration Arrival Occupancy Transition
Air conditioned
All inclusive
Golf coures
Airport shuttle
Bar or lounge
Beach access
Business center
Fitness center
Free breakfast
Hot tub available
Laundry service
Restaurant
Room service
Spa available
Pets allowed
Smoke free
Macro-average
0.953
0.702
0.782
0.788
0.919
0.919
0.869
0.949
0.892
0.895
0.824
0.947
0.867
0.915
0.843
0.778
0.865
0.934
0.735
0.821
0.79
0.873
0.916
0.855
0.899
0.839
0.83
0.795
0.912
0.831
0.846
0.818
0.773
0.842
-2%
4.7%
5%
0.3%
-5%
-0.3%
-1.6%
-5.3%
-5.9%
-7.3%
-3.5%
-3.7%
-4.2%
-7.5%
-3%
-0.6%
-2.7%
0.956
0.756
0.848
0.82
0.92
0.935
0.879
0.954
0.896
0.9
0.829
0.95
0.871
0.92
0.864
0.79
0.881
0.3%
7.7%
8.4%
4.1%
0.1%
1.7%
1.2%
0.5%
0.4%
0.6%
0.6%
0.3%
0.5%
0.5%
2.5%
1.5%
1.8%
0.813
0.583
0.632
0.6
0.752
0.829
0.718
0.718
0.612
0.685
0.645
0.781
0.706
0.741
0.639
0.652
0.694
0.802
0.606
0.657
0.666
0.745
0.805
0.736
0.716
0.616
0.698
0.656
0.777
0.697
0.73
0.633
0.668
0.701
0.816
0.632
0.634
0.661
0.771
0.824
0.751
0.728
0.603
0.718
0.663
0.814
0.713
0.743
0.669
0.681
0.714
0.932
0.719
0.812
0.788
0.847
0.911
0.842
0.861
0.823
0.817
0.785
0.88
0.809
0.816
0.813
0.774
0.827
Table 3: Classifying hotel attributes. Performance is reported as Area Under the Curve (AUC). Note that
STEPS increases the coverage by 94.8% compared to only using Reviews (cf. Section 4.3).
(Transition) have strong predictive power, achieving AUC
that is only 4% lower than that of STEPS. We could not
show the full results for the two individual groups of tran-
sition features owing to lack of space. However, we found
the next-visit features to be slightly more predictive, as they
alone achieve macro-averaged AUC of 0.829, just 6% lower
than STEPS; the macro-averaged AUC of the previous-visit
features alone is 0.816 (8% lower than STEPS).
It is insightful to consider the performance of the dif-
ferent feature groups for several sample attributes. Dura-
tion features are highly informative for predicting low-price,
no-reservation, fast-food, and dessert restaurants, because
customers tend to spend less time in those (for these at-
tributes, the performance of duration features is within 5%
of STEPS). Similarly, both the Arrival time and Occupancy
groups of features are (individually) highly predictive of
breakfast, lunch, dinner, and tea attributes, because each
of these kinds of meals have characteristic hours.
Interestingly, for hotels (Table 3), the 3 groups of temporal
features are less powerful. Individually, each group exhibits
15%-18% lower performance than STEPS, and even taken
together their performance is 11% lower. Thus, most of the
STEPS performance is due to the spatial features (Transi-
tion), whose performance is on average within 2% of the full
STEPS feature set. We hypothesize this happens because
people stay much longer in hotels than in restaurants (on
the scale of days as opposed to hours), hence the variability
in their temporal patterns is greater, and it is more difficult
to find consistently predictive patterns. On the other hand,
there are stronger patterns in the kinds of places that are
co-visited with hotels, which explains the predictive power
of the Transition features. For example, if hotel guests visit
sports or recreational facilities (such as hiking trails or yoga
studios), then the hotel likely appeals to fitness enthusiasts
and therefore likely has a fitness center.
4.5 The evaluation of place embeddings
In this section, we report the performance of the embeddings-
based method, STEPS-E, introduced in Section 3. The re-
sults were computed using 1000 embedding dimensions (we
used grid search to determine the optimal number of dimen-
sions that maximized cross-validated performance). Due to
lack of space, we only report aggregate results across all the
restaurant attributes and do not show per-attribute results.
The classification performance of the embedding-based
STEPS-E method is 6.2% lower than the baseline, but com-
pletely eliminates the need for manual feature construction
required for STEPS. At the same time, the improvement
in classifier coverage of the STEPS-E method is 94.8%, the
same as for STEPS, as reported in Section 4.3. We be-
lieve that in most practical situations, sacrificing 6.2% in
prediction accuracy is a reasonable tradeoff for doubling the
coverage and eliminating the need to craft features manually.
5. QUALITATIVE STUDY
To get a more intuitive understanding of the classification
models obtained using STEPS, we now study the top pos-
itive and negative spatio-temporal features learned by the
trained STEPS model for some of the restaurant and ho-
tel attributes. We also plot the actual distribution of these
feature values for the positive and negative classes of the at-
tributes (owing to lack of space, we show distribution plots
for only some of the attributes).
For identifying "romantic" restaurants, the top positive
features are those corresponding to people's visiting the restau-
rant on weekends, arriving at the restaurant between 8–
10PM, staying for more than 90 minutes, and coming to the
restaurant from a luxury hotel, museum, or performing arts
theater. The top negative features correspond to people's
visiting the restaurant on Mondays and Tuesdays, staying
for less than 60 minutes, and arriving at the restaurant be-
fore or after visiting a grocery store or gas station. These
features capture our intuition about romantic restaurants as
places that people often go to for a long, leisurely meal on
a weekend, often preceded by a visit to a museum, theater
or concert (but presumably not often preceded by a grocery
store or gas station visit).
To understand these features better, in Figures 1(a) and
1(b) we show the distributions of visit time duration and
days of week of people's visits to romantic restaurants, and
to restaurants not labeled as "romantic". The duration time
distributions are clearly discriminative - the positive class
has a peak at 80 minutes, compared to the negative class
that peaks at around 60 minutes. The differences in the
day-of-week distribution between the positive and negative
classes are less pronounced, but one can still see that this
difference is largest on Saturdays(positive difference) and
Mondays (negative difference). These small differences in
the distributions are significant enough for the model to use
as discriminative features. Figure 1(c) plots the percentage
of restaurant patrons visiting the above mentioned charac-
teristic places before the restaurant, and confirms the utility
of transition features in the model. The figure clearly shows
that patrons of romantic restaurants are much more likely
to have previously visited museums, theaters and luxury ho-
tels, compared to gas stations and supermarkets.
For identifying restaurants offering "breakfast", temporal
features are, not surprisingly, the most informative features
in the classification model. The top positive features include
arriving at the restaurant between 8–11AM, and staying at
the restaurant (occupancy) from 9–11AM. The top negative
features include arrival times between 12–2PM, indicating
that the restaurant is more likely to be popular for lunch
than for breakfast. Figures 2(a) and 2(b) plot the distri-
bution of these features for the "breakfast" attribute, and
highlight the slightly earlier arrival and occupancy times for
the positive class that are picked up by the model.
For identifying restaurants or cafes that offer WiFi, the
top positive features correspond to people staying at the
place between 4–7PM or between 10–11PM, visiting the
place on weekdays, and visit duration times between 30 to
80 minutes. Other positive features include visiting a work
location shortly before or after the cafe. Indeed, these fea-
tures match our expectations of cafes that offer WiFi - they
are usually busy late afternoons and late evenings on week-
days, and are frequented by people who use WiFi to work
and therefore stay longer at the place. The top negative
features include those corresponding to people's visiting the
place on Fridays and Saturdays, and staying at the place for
less than 30 minutes.
For predicting restaurants that offer "takeout", the top
positive features are again related to duration - a large
fraction of people stay at such places for less than 20 min-
utes. However, some of the top features are not so obvious,
such as visiting a work location immediately before or after
(a) Duration Time Distribution
(a) Arrival Time Distribution
(b) Day of week distribution
(b) Occupancy distribution
Figure 2: Features for restaurants offering breakfast.
(c) Previous place visit transition features
Figure 1: Features for romantic restaurants.
Figure 3: Transition features for hotel beach access
the restaurant (positive feature), and visiting a shopping
center or bar after the restaurant (negative feature).
Another attribute where the predictive power of STEPS
is, at first glance, rather unexpected is "healthy" restau-
rants. The top positive features correspond to visiting the
restaurant in the middle of the week (Tuesdays, Wednes-
days and Thursdays) and going to work immediately after
the restaurant. The top negative features correspond to vis-
its on weekends, and visiting a bar immediately before or
after the restaurant. This hints at some interesting socio-
cultural trends; for example, people are more likely to fre-
quent healthier restaurants in the middle of the week than
during the weekend, and people visiting healthy restaurants
are less likely to visit bars before or afterwards.
We also observe interesting trends when studying the top
positive and negative features for some of the hotel attributes.
In contrast to predicting restaurant attributes, duration and
occupancy features are less important here than transition
features, which capture the types of places visited by the
hotel guests. For example, to identify hotels with "beach
access", the top features correspond to visits to surf shops,
swimwear stores and beaches, while the top negative features
include visits to water parks and ski resorts. Figure 3 shows
the proportion of hotel guests visiting these places from the
hotel. On average, guests at hotels with beach-access are 10
times more likely to visit surf shops, swimwear stores and
beaches, 3 times less likely to visit ski resorts, and 2 times
less likely to visit department stores.
6. CONCLUSIONS
Many online services recommend brick-and-mortar busi-
nesses such as restaurants or hotels based on their attributes.
These attributes are often difficult to obtain, and previous
approaches based on crowdsourcing and mining review text
were challenging to scale, and hence had limited coverage.
We presented an approach to predict numerous place at-
tributes using spatio-temporal features, which characterize
how large populations of people go in and out of these places.
Our method, STEPS, uses several groups of spatial and tem-
poral features, and its variant, STEPS-E, uses embeddings
to completely eliminate the need for manual feature con-
struction. The key idea is to derive signals from anonymous
aggregated observational data. This allows us to reliably
predict dozens of attributes of businesses without ever vis-
iting them or talking to people who did.
[15] Long, C., Zhang, J., and Zhut, X. A review
selection approach for accurate feature rating
estimation. In COLING (2010).
[16] Popescu, A.-M., and Etzioni, O. Extracting
product features and opinions from reviews. In
Natural language processing and text mining. Springer,
2007, pp. 9–28.
[17] Qiu, G., Liu, B., Bu, J., and Chen, C. Opinion
word expansion and target extraction through double
propagation. Comput. Linguist. 37, 1 (Mar. 2011).
[18] Wang, H., Lu, Y., and Zhai, C. Latent aspect
rating analysis on review text data: A rating
regression approach. In KDD (2010).
[19] Ye, M., Yin, P., Lee, W.-C., and Lee, D.-L.
Exploiting geographical influence for collaborative
point-of-interest recommendation. In SIGIR (2011).
[20] Zheng, V. W., Zheng, Y., Xie, X., and Yang, Q.
Collaborative location and activity recommendations
with gps history data. In WWW (2010).
[21] Zheng, Y., Zhang, L., Xie, X., and Ma, W.-Y.
Mining correlation between locations using human
location history. In GIS (2009).
[22] Zhong, Y., Yuan, N. J., Zhong, W., Zhang, F.,
and Xie, X. You are where you go: Inferring
demographic attributes from location check-ins. In
WSDM (2015).
[23] Zhuang, L., Jing, F., and Zhu, X.-Y. Movie review
mining and summarization. In CIKM (2006).
In an extensive empirical evaluation, we compared our
methods to a baseline that uses web reviews for restaurants
and hotels. Our STEPS method was able to reliably classify
numerous place attributes while nearly doubling the cov-
erage of the baseline (review-based) classifier, and offered
comparable or superior performance.
In our future work,
we plan to explore joint modeling of attributes, as well as
experiment with cross-products of STEPS features.
Acknowledgments
We would like to thank John Giannandrea and Chandu
Thota for making this work possible. We would also like to
thank Ravi Kumar, Bo Pang, Finnegan Southey, Mukund
Sundararajan, and Andrew Tomkins for stimulating discus-
sions that helped greatly improve this paper.
7. REFERENCES
[1] Cheng, C., Yang, H., Lyu, M. R., and King, I.
Where you like to go next: Successive point-of-interest
recommendation. In IJCAI (2013).
[2] Cheng, H., Ye, J., and Zhu, Z. What's your next
move: User activity prediction in location-based social
networks. In SIAM (2013).
[3] Eland, A. Tackling urban mobility with technology,
http://googlepolicyeurope.blogspot.com/2015/11/
tackling-urban-mobility-with-technology.html. Google
Europe Blog, 2015. Visited on January 29, 2016.
[4] Hu, M., and Liu, B. Mining and summarizing
customer reviews. In KDD (2004).
[5] Hu, M., and Liu, B. Mining opinion features in
customer reviews. In AAAI (2004).
[6] Jakob, N., and Gurevych, I. Extracting opinion
targets in a single-and cross-domain setting with
conditional random fields. In EMNLP (2010).
[7] Kirmse, A., Udeshi, T., Bellver, P., and Shuma,
J. Extracting patterns from location history. In GIS
(2011).
[8] Koren, Y., Bell, R., and Volinsky, C. Matrix
factorization techniques for recommender systems.
IEEE Computer 42, 8 (Aug. 2009), 30–37.
[9] Ku, L.-W., Liang, Y.-T., and Chen, H.-H. Opinion
extraction, summarization and tracking in news and
blog corpora. In AAAI Spring Symp.: Computational
Approaches to Analyzing Weblogs (2006).
[10] Li, M., Ahmed, A., and Smola, A. J. Inferring
movement trajectories from gps snippets. In WSDM
(2015).
[11] Lian, D., Zhao, C., Xie, X., Sun, G., Chen, E.,
and Rui, Y. GeoMF: Joint geographical modeling
and matrix factorization for point-of-interest
recommendation. In KDD (2014).
[12] Liao, L., Fox, D., and Kautz, H. Location-based
activity recognition. In NIPS (2005).
[13] Lichman, M., and Smyth, P. Modeling human
location data with mixtures of kernel densities. In
KDD (2014).
[14] Liu, B. Sentiment analysis and opinion mining, vol. 5
of Synthesis Lectures on Human Language
Technologies. Morgan & Claypool Publishers, 2012.
|
1910.01445 | 1 | 1910 | 2019-09-09T18:43:11 | Analyzing the Spotify Top 200 Through a Point Process Lens | [
"cs.SI",
"stat.AP"
] | Every generation throws a hero up the pop charts. For the current generation, one of the most relevant pop charts is the Spotify Top 200. Spotify is the world's largest music streaming service and the Top 200 is a daily list of the platform's 200 most streamed songs. In this paper, we analyze a data set collected from over 20 months of these rankings. Via exploratory data analysis, we investigate the popularity, rarity, and longevity of songs on the Top 200 and we construct a stochastic process model for the daily streaming counts that draws upon ideas from stochastic intensity point processes and marked point processes. Using the parameters of this model as estimated from the Top 200 data, we apply a clustering algorithm to identify songs with similar features and performance. | cs.SI | cs |
Analyzing the Spotify Top 200 Through a Point Process Lens
Michelangelo Harris, Brian Liu, Cean Park, Ravi Ramireddy,
Gloria Ren, Max Ren, Shangdi Yu, Andrew Daw, and Jamol Pender∗
School of Operations Research & Information Engineering
Cornell University, Ithaca, NY
October 4, 2019
Abstract
Every generation throws a hero up the pop charts. For the current generation, one of the
most relevant pop charts is the Spotify Top 200. Spotify is the world's largest music streaming
service and the Top 200 is a daily list of the platform's 200 most streamed songs. In this paper,
we analyze a data set collected from over 20 months of these rankings. Via exploratory data
analysis, we investigate the popularity, rarity, and longevity of songs on the Top 200 and we
construct a stochastic process model for the daily streaming counts that draws upon ideas from
stochastic intensity point processes and marked point processes. Using the parameters of this
model as estimated from the Top 200 data, we apply a clustering algorithm to identify songs
with similar features and performance.
Keywords: Spotify, Music Streaming, Data Analytics, Stochastic Processes, Generalized Pois-
son Processes, Marked Point Processes, Hawkes Process, k-Means Clustering
1
Introduction
Streaming music, or more accurately streaming audio, is a way of delivering sound without requir-
ing you to download files from the internet. Spotify is the world's largest music streaming service,
currently available as both desktop and mobile applications. Spotify provides free streaming of
music to its users, with an option for a paid premium membership with added benefits such as
no advertisements and the ability to listen to music offline. As of April 2019, Spotify had 217
million monthly active users worldwide, 100 million of which are paid subscribers [3]. On top of
Spotify itself growing, streaming has become increasingly central to the music industry. In 2018,
streaming accounted for 77% of all music consumption relative to 23% combined for physical
and digital sales, compared to 66.1% and 33.9%, respectively, in 2017 per the industry report
provided by BuzzAngle Music [8]. Streaming's music industry dominance is already influencing
the structure of new releases, such as in the influx of very short (e.g. ≤ 2.5 min.) singles [18, 15]
or in the recent popularity of extra long playing (e.g. ≥ 80 min.) albums [17]. As these trends
∗Correspondence: [email protected]; 228 Rhodes Hall, Cornell University, Ithaca, NY, 14853.
1
continue to manifest themselves throughout popular music, it is both increasingly relevant and
increasingly valuable to understand how music evolves through the streaming ecosystem.
This paper aims to begin that expedition through an analysis of the Spotify Top 200, a chart
of the 200 most frequently streamed songs each day on Spotify. This investigation is built on
a data set scraped from over 20 months of the United States based edition of these rankings,
spanning from 2017 to 2018. To put this time capsule in a pop music context, this is a particular
period of dominance for Drake that may eventually be viewed as his peak, at least commercially.
He has claim to 6 of the 32 number one songs in this data set and this includes the three highest
recorded daily play counts, each of which is over 4.5 million streams. Moreover, on the day
his 2018 album Scorpion was released, all 25 tracks were in the top 27 most streamed songs,
including places 1 through 23. Hip hop is known to be the most popular genre currently on
streaming services in the U.S. [8], and that fact is reflected throughout this data and the songs
discussed herein.
One key insight we make from this data is that a song's daily stream count can be modeled
as discrete observations of a non-stationary point process, specifically a marked or stochastic
intensity point process [22]. While this construction is entirely motivated from data, we can
note that there are conceptual similarities between music streaming services and the theoretical
details of several well-known point processes of this type. For example, an oft-recurring theme
of this data analysis is the influence that an external happenings can have on the streams a
particular song receives. As we will demonstrate, events like album releases, music video release,
and public performances can lead to significant surges in the song's stream count. This type
of exogenous excitement closely resembles the type of jumps in the stochastic intensities of Cox
processes [9]. Additionally, the fact that the Spotify Top 200 chart is also a playlist available to
all users on the service means that as a song climbs higher and higher in rank it becomes more
and more visible. Hence a song that is heavily streamed one day may be more likely to again be
heavily streamed again the next day, yielding a discrete time form of self-excitement, see [16, 21].
This also captures the social contagion of a song's popularity, and this epidemic-like information
sharing has recently been formally connected to self-exciting processes as well [19, 11]. Thus
we can see that streaming services should experience a combination of both externally driven
and self-excited behavior. Processes of this sort have been studied in the literature as dynamic
contagion processes [10]. Using the point process model for this streaming system, we will
uncover connections between songs through a clustering analysis, thus generating further insight
into the Top 200 data.
A quick look at the current pop charts shows that these dynamics are not unique to the
time of this data set. Rather, recent pop music storylines seem to indicate that public events
are becoming even more important for commercial success. Perhaps this is most obviously
championed by Lil Nas X and his masterful manipulation of publicity in the record-breaking 19
weeks "Old Town Road" spent atop the Billboard Hot 100 chart, all of which occurred after
this data set concludes. Beyond just catching lightning in a bottle, music critics have noted
that sustained success of "Old Town Road" can be at least partially traced to the expertly
timed sequence of remixes, videos, and even internet memes that maintained public interest
[7]. And while "Old Town Road" is of course the most dominant example of these strategies
so far, it is not the only one. For example, Billie Eilish buoyed her eventual number one hit
"bad guy" by releasing a remix featuring Justin Bieber. As an example of the effect of an
external event not directly controlled by the artist, consider Lizzo's Billboard topping song
"Truth Hurts." Originally released in 2017, the Minnesotan singer/rapper/flutist's sleeper hit
surged in popularity after being featured in the 2019 Netflix film Someone Great.
It is also
worth noting that both "Truth Hurts" and "Old Town Road" experienced an initial viral growth
through use in videos shared on the app TikTok, which then led to success on music streaming
2
platforms like Spotify. Based on observations like these, the goal of this paper is to explore, model,
and understand the dynamics of a pop song on streaming platforms, and this investigation is
centered around the Spotify Top 200 data set.
1.1 Description of Data
The data used in this paper is a daily record of the Top 200 playlist on Spotify, which contains
the top 200 most streamed songs on that day. As defined by Spotify, one day spans from 3:00
PM UTC through 2:59 PM UTC on the next. We have scraped this data set from the publicly
available Spotify Top 200 charts, specifically from the U.S. based rankings. The code to do so is
derived from open source code used to form a Kaggle data set containing the worldwide Top 200
rankings for all of 2017 [2]. We have collected the streaming data from this source over the date
range January 1, 2017 to September 12, 2018, but the code used to scrape the data can easily by
recompiled to acquire up to current records. The fields contained in this data are date, position
(rank), song name, artist, and the number of streams of that song on that date. Spotify counts
a "stream" for a song after a user has listened for 30 seconds [1]. The daily stream count is then
the total count of these events across the time period.
1.2 Contributions & Organization
The questions we have answered about this data set are focused around how stream counts vary
by position in the Top 200 and over time for particular songs. This data set motivates a point
process model of a song's jump and decay in streams, which in turn enables further model-based
analysis. This investigation is organized throughout the remainder of this paper as follows:
• In Section 2, we perform an exploratory data analysis for the Spotify Top 200. Our analysis
include the exclusivity of each ranking position, the duration of a song's time on the charts,
and close inspection of the behavior of songs at the highest and lowest positions of the
rankings.
• In Section 3, we take these findings as motivations to construct a stochastic model for
a song's daily streaming totals. This stochastic process model is a generalized Poisson
process, and we describe how to obtain its parameters from data via maximum likelihood
estimation. We also explain how to use linear regression to estimate the single parameter
in a special, parsimonious sub-case of the model.
• In Section 4, we use the model from Section 3 to obtain additional insights into the Top
200 data set. We inspect both the strengths and weaknesses of this model in representing
this data set. Based on these observations, we perform a clustering analysis on the songs
contained in this data set using only the estimated model parameters and an empirical
measure of their fit. This leads us to insights that appear to transcend both the model
parameters and the data itself, recognizing connections that were not obvious until after
the data's time range.
2 Exploratory Analysis of the Spotify Top 200
We begin our analysis by exploring this Spotify data set and examining the relationships between
streams, songs, and positions on the Top 200 chart. In Subsection 2.1 we take a position-based
perspective and investigate the popularity and the rarity associated with each spot on the Top
200 chart. These leads us to consider the lifespan of each song, and in Subsection 2.2 we measure
the frequency and duration of the songs that made it on this list. Then in the final two subsections
3
Figure 2.1: The average number of daily streams received at each position in the Spotify Top 200,
plus and minus one standard deviation.
we contrast the biggest hits with those that barely made the cut, with Subsection 2.3 devoted
to the number ones and Subsection 2.4 focused on the last place of the Top 200.
2.1 The Prestige and Intrigue of the Top 200
In viewing the Spotify Top 200 data set as a daily recording of a list of 200 tracks and their
associated play counts, it is natural to wonder how the places in these rankings compare to one
another as measured in terms of these songs and streams. For example, by definition the first-
placed song in the Top 200 is played more often than the second-placed song (or any other), but
how much more? In Figure 2.1, we plot the average across time of the number of daily streams
received in each of the 200 ranks. The shaded gray area represents a standard deviation above
and below the average (red) line.
One can observe that the decrease in the number of streams is most extreme for the top
positions, meaning that the difference in streams between the top song and the runner-up is
much larger than the difference between streams in the 199th and 200th positions. This effect
can perhaps be even more easily observed when comparing the difference between ranks 1 and
10 with the difference ranks 191 and 200. One can see that the top spot averages over 2 million
streams each day whereas the tenth spot receives approximately 900K listens, yet the change
from 191 to 200 is hardly noticeable. This observation can be formalized, as fitting a power law
curve of the form f (x) = ax−b to the data yields coefficients a = 2.3689 × 106 and b = 0.5426
with an R2 value of 0.9805. The power law tail of the average streams chart may point to
a connection between Spotify and other social platforms, since the power law distribution is
4
Figure 2.2: The number of unique songs observed in the data at each position in the Top 200.
closely associated with connectivity in human social networks, see e.g. Chapter 18 of Easley and
Kleinberg [12] for an overview. Furthermore, this power law structure confirms the observed
"diminishing returns" effect for song rank, since this function dictates that a song would need
exponentially more streams to move from rank 2 to 1 than from 200 to 199.
Reasoning about this chart leads us to two intuitive explanations for this behavior. First,
the prestige associated with the highest rankings naturally suggests that only the biggest hits
can achieve the massive number of daily streams needed to make it to the top of the list, as
it is certainly more impressive to be the #1 song than it is to be #10 song. By comparison,
the 191st ranking does not feel particularly more commendable than the 200th. Second, one can
also observe a natural intrigue associated with the top of the list:
listeners looking for a new
hit song may be much more likely to look at the top of the list than at the bottom. This yields
a self-excitement effect, as the Top 200 is both a reflection of popularity and a conductor of it.
That is, a song receiving a large number of streams suggests that it is likely to receive even more
as a consequence of its increased exposure on the Top 200 playlist. This power-law structure also
leads us to interesting observations on the behavior of the bottom end of the rankings. The slow
decay of streams between the lower ranked songs hints at the idea of the long tail first written
about in Anderson [5]. As songs decrease in the rank of their popularity their actual play-count
does not as noticeably taper offer. Anderson [5] predicted that this would be a hallmark of
the more niche-based entertainment offerings the internet could provide. Thus, as a potential
direction of future study given additional access to data, it would be interesting to see how this
extends beyond the inherent popular Top 200 into the worlds of independent and experimental
music.
In addition to considering the number of streams associated with each position in the Spotify
Top 200, we are also interested in the number of songs connected to each of these ranks. Hence,
in Figure 2.2 we plot the number of distinct songs observed at each rank in this chart over the
course of this data set, which spans 620 days from January 1, 2017 to September 12, 2018. As
one might expect based on the dramatic decrease in popularity at each position in Figure 2.1, we
can observe in Figure 2.2 that it is also increasingly rare to see a song achieve a higher and higher
rank. For example, less than 50 songs ever reached the top, whereas there were approximately
400 unique songs observed at each of the bottom 50 positions.
5
Figure 2.3: Histogram of the first duration of each song appeared in the data set.
The increased rarity of the top of these charts naturally leads one to wonder about the life
span of songs in this data set. In the next subsection, we will investigate both how long a song
stays on the Top 200 after it first appears and how this duration changes based on the position
the songs achieves.
2.2 15 Seconds of Fame? Quantifying the Duration of a Pop Hit
In order to obtain a better understanding of the life cycle of a song within the Spotify Top 200,
let us define the first life of a given song as the number of consecutive days from when a song first
entered the Top 200 until it no long appears on the charts. Before proceeding with the analysis,
it is important to note that by the nature of this data set some songs have longer first lives than
what we can calculate because they may have initially appeared in the charts before January 1,
2017. Nevertheless, this investigation still gives us an idea of the duration of a song on the Top
200. In Figure 2.3 we first plot the frequency histogram of the length of the first lives of all songs
in the data. That is, we define the first life of a given song as the number of consecutive days
from when a song first entered the Top 200 until it no long appears on the charts.
As can be observed, the largest collection is for the shortest duration: nearly 1,500 songs
have a duration of less than 25 days. Still, there are 9 songs that have durations for over 500
days in this 620 day data set. For reference, the titles of these songs and their recorded durations
are given below in Table 2.1. To further specify the observed duration of songs, we also provide
the percentage of songs in the data that lasted no more than a day, week, month, and year in
Table 2.2. As one can see, just less than a third of the songs that appeared on the Top 200 chart
only lasted a day and moreover more than two thirds of the songs did not stay on the chart
for more than a week after their first appearance. The existence and rarity of the tail of the
distribution in Figure 2.3 is also demonstrated in Table 2.2, as less than 16% of songs remained
6
in the Top 200 for over a month, and less than 0.8% lasted for over a year, yet from Table 2.1
we know that 5 songs appeared in well over 18 months of this data set. By comparison, the
mean first life duration is approximately three weeks. This shows a heavy-tailed phenomenon
appearing in these durations, as extreme outliers are known to occur.
Name of Song
First Life
Goosebumps
Congratulations
Location
Shape of You
Believer
XO TOUR Lif3
HUMBLE.
Young Dumb & Broke
LOVE. FEAT. ZACARI
617
617
616
603
585
535
528
519
512
Table 2.1: The 9 songs with first life duration longer than 500 days in this data set.
Percentage of Songs First Life Duration
31.80%
68.67%
84.04%
99.23%
≤ 1 day
≤ 1 week
≤ 1 month
≤ 1 year
Table 2.2: Percentage of songs that have durations bounded by a day, week, month, and year.
When considering the first life duration of a given song, it seems natural to wonder how this
is effected by the rank of the song. In Figure 2.4 we plot the empirical conditional expectation
of the duration of the song given the highest ranking it achieved in the chart. Additionally, this
plot contains an exponential decay curve fitted to the data. This figure shows what one might
reasonably expect: the more popular songs also last longer on the charts. In particular, we can
see that songs that achieved the top rank averaged a duration of nearly 250 days, whereas the
songs that never cracked 190 stay for a very brief time.
In the following two subsections we
further contrast the top and bottom ranks of the Top 200, beginning now with a closer look at
the biggest hits of all in Subsection 2.3.
2.3 Far From the Shallow Now: Examining #1 Ranked Songs
From Subsection 2.1, we know that it is very rare for a song to become the number one track on
the Spotify Top 200. Figure 2.2 showed us that only 32 songs ever reach the ultimate rank in the
620 days recorded in this data set. This matches with what he have seen in Subsection 2.2, as
Figure 2.4 revealed that top ranked songs have a significantly longer life span than the average
song does. In this subsection we will explore these 32 hits in more detail through Figure 2.5.
This plot shows the number of streams received by the number on song throughout the full time
range of the data. As the number one song changes, so does the color of the shaded curve.
We can make several interesting observations from Figure 2.5. First, we can see that in most
cases a change of the guard at the top of the Top 200 occurs when a new song jumps up to a
higher number of streams. This isn't exclusive, such as the more passive takeovers seen in August
7
Figure 2.4: Average first life durations given the highest position achieved in the Top 200.
2017, but it does seem to be the primary type of transition. We can also see that the number one
song's daily stream count primarily just decays after its debut at the top spot. A notable pattern
of exceptions to this are subsequent jumps in streams, such as what is seen in late April 2017.
Looking closer at this specific example can give us insight into the source of these dynamics. The
song occupying the number one spot for April and May 2017 is "HUMBLE." by Kendrick Lamar.
This hit was the advance single for Lamar's 2017 album DAMN. and was released to much fanfare
and attention along with its accompanying music video, which was released simultaneously on
March 30, 2017. As a single, "HUMBLE." catalyzed the feverish anticipation for Lamar's third
official studio recording. When the full album was then released two weeks later on April 14 the
song received even more listens, which is reflected in the approximately 2 million streams added
to its play count on this date.
A similar pattern can be seen in January and February 2018 for Drake's hit single "God's
Plan," which eventually appeared on his June 2019 album Scorpion. This song was first made
available to stream on January 19, 2018, at which point we can see that it jumps up to an
unprecedented height in the streaming data. There is then a second, smaller jump in streams
around a month later. Rather than being the eventual June album-release jump, this increase
in streams coincides with the release of the music video for "God's Plan," a viral visual in
which Drake gave away large amounts of cash to strangers in Miami, FL. These examples give
us intuition for the jump-and-decay dynamics seen in Figure 2.5. By the nature of streaming's
instant access, new songs or songs with new events can draw a rush of new listens, but this
attention can fade over time, possibly in favor of newer options.
2.4 Barely Famous: The 200th Song on the Top 200
By comparison to the number one song, we have seen that the 200th ranked track receives far
fewer streams (see Figure 2.1) and remains on the chart for much less time (see Figure 2.4).
However from Figure 2.1, we know that there isn't such a substantial difference in streams
between the 200th song and the other tracks on the tail of the Top 200. Thus, by inspecting
the behavior of the songs in the last ranked spot we can get an impression of songs that achieve
modest popularity on Spotify. From Figure 2.2, we also know that this represents a much larger
8
Figure 2.5: Top Spotify Songs from January 1 2017 to September 12 2018.
population of music than the top hits.
First, in Figure 2.6 we plot the number of streams received by the rank 200 song across
each of the 620 days in the data set. While there may be some mild long-term seasonality, the
most striking features are the short-term periodicity and the overall upward trend in streams.
Let us first discuss the latter. One can observe that at the beginning of 2017 the daily stream
count is oscillating around 140,000 plays while at the start of September 2018 the center is closer
to 200,000 streams. This appears to be a quite accurate reflection of the growth of the music
streaming in the U.S. as a whole, which is reported to have increased 42% from 2017 to 2018,
per the annual industry report from BuzzAngle Music [8]. Returning to short-term periodicity,
let us now look closer at the first month of daily stream data in Figure 2.7.
On this time scale, the pattern becomes evident: there is clearly a weekly structure to the
number of streams. Recalling that New Years Day fell on a Sunday in 2017, we can see that
the number of streams peaks each week on Saturday and mostly increases throughout the week
from Sunday onward. We can note multiple explanations for this. As a simple first observation,
it seems natural for the weekend to be a popular time to listen to music as a form of relaxation
outside of the work week. Furthermore, in a reasoning fundamentally based on the music industry,
since 2015 there has been a globally recognized standard of releasing new music on Fridays. As
noted in Flanagan [13], this was an eventual consequence of Beyonc´e's surprise release self-
titled album in 2013. Beyonc´e debuted online on a Friday without any advance notice, a then-
unprecedented concept for a major pop release, and was massively successful. In her own words,
Beyonc´e "changed the game with that digital drop."1 Previously, the weekly release date varied
by country and shaped each nation's weekly sales and streaming measurements accordingly. The
new global standard of a Friday release date is thought to be better catered to the culture of
instant music access foreshadowed Beyonc´e and now associated with online streaming platforms,
and Figure 2.7 shows how this has been manifested on Spotify. It is worth noting that despite
1From "Feeling Myself" by Nicki Minaj feat. Beyonc´e, see https://genius.com/4532100.
9
Figure 2.6: Number of daily streams received by the 200th ranked song across the full data set.
Figure 2.7: Number of daily streams received by the 200th ranked song in January 2017.
this influence her music has had, Beyonc´e the artist is almost entirely absent from our data
exploration. This is most likely due to the fact that at the time her most recently released album
Lemonade was only available on the competing platform TIDAL, of which she is a partial owner.
3 Modeling Streaming through Stochastic Processes
Following the observations we have made throughout our exploratory data analysis in Section 2,
we now propose a stochastic process model for the times that a given song is streamed. To
motivate our construction, we now plot sample paths of both the daily streams and chart positions
of 12 different songs in Figure 3.1. In a way that is similar to the plot of all top-ranked songs in
Figure 2.5, we can notice that two of the most striking features of these sample paths are jumps
upward and decay downward. While some songs also have periods of relatively gradual growth,
the increase of daily stream count appears to happen much more rapidly than the decrease does.
10
Figure 3.1: Sample paths for 12 example songs in the Spotify Top 200 data set.
When a song does lose listens from day to day, it appears to happen slowly. There do not appear
to be downward jumps like the surges in new listens that can be seen in some form in each of
the sample paths. We will thus take upward jumps and downward decay as the salient features
we want to capture in a model of a song's streams.
3.1 Defining the Point Process Model
Let us now define the model. For a given track, we let {N (t) t ≥ 0} be the point process for the
number of times the song has been played up to time t ≥ 0. Without loss of generality we will
suppose that the song debuts at time 0 and that there were no previous streams, i.e. N (0) = 0.
We will furthermore suppose that N (t) is a non-stationary Poisson process with rate λ(t) defined
λ(t) = λ + β0θ0e−β0t + β1θ1e−β1(t−a)1t≥a,
(3.1)
where λ ≥ 0, θ0 > 0, θ1 > 0, β0 > 0, β1 > 0, and a ≥ 0. For an introductory overview of
probability models of this type, see e.g. Section 5.4 of Ross [20]. This non-stationary arrival
rate is precisely how we replicate the jump-and-decay structure we see, which can be seen by
inspecting the parameters. First, λ can be thought of as a baseline streaming rate, meaning the
rate at which the song is played long into its life time once its hype has essentially ended. Then,
because λ(0) = λ + βθ0, β0θ0 is the jump in streaming rate that a song gets from the initial
excitement at its debut. As time progresses this jump size decays exponentially at rate β0, which
mimics the gradual decrease seen in Figure 3.1. Then, β1θ1 captures the size of the jump in
streams that are brought to the song due to some later, external event that occurs at time a, and
this affect then decays exponentially at rate β1. In Subsection 2.3 we saw that these subsequent
jumps could be caused by releases of the song's music video or of the album containing the single,
but these need not be the only reasons a song's stream count could jump. In fact, the song "Bad
and Boujee", shown in the second panel of Figure 3.1 is an excellent example of this, as it is
known to have jump up by 243% of its previous daily stream totals following mention of the song
by Donald Glover in his January 8, 2017 Golden Globes acceptance speech, per Weiner [25].
This affect was then further amplified when Culture, the album containing "Bad and Boujee",
was released on January 27, 2017.
We note that this model could be easily generalized to feature multiple subsequent jumps
by adding additional terms to the definition in Equation 3.1. Furthermore, let us note this
is an intentionally simple model. While pure jumps and exponential decay may apply to many
11
scenarios, sample paths with gradual growth or non-exponential decay are not represented by this
model. Additionally, other observed dynamics such as the weekly periodicity are not addressed.
While properly modeling these features presents an intriguing direction of future research, in this
work we will adhere to the simple model and use both it and its fit as tools to further analyze
this data. As we will see in Section 4, by also including the fit of the model in our analysis,
we are able to implicitly address dynamics seen in the data that are not included in the model.
We can also note that the model we have described is a continuous time stochastic process, yet
this data set is recorded over discrete time intervals. This is not an issue; we can easily align
the model and data as follows. Let ∆ be the length of a day as measured in the time units
upon which N (t) is defined. Then, we define Ni as the number of streams on the ith day, i.e.
∆(i−1) λ(t)dt). Using this
Ni = N (∆i) − N (∆(i − 1)) for i ∈ Z+. By consequence, Ni ∼ Pois((cid:82) ∆i
definition, we now the resulting maximum likelihood estimation procedure in Subsection 3.2.
3.2 Fitting the Model to Data
To fit the data, let us now describe the maximum likelihood estimate procedure for this stochastic
process model. For a given song, we let ni for i ∈ {1, . . . , T} be the number of streams received
on the song's ith day, where T ∈ Z+ is the total number of days observed. We will assume that
the time of the subsequent jump a is known and that it is a multiple of ∆. Then, the parameters
we want to estimate are the decay rates β0 and β1, the jump size coefficients θ0 and θ1, and the
baseline stream rate λ. For simplicity, we will denote this full parameter set as Π. Then, if these
parameters were known, we could express the probability of observing the song's full streaming
data sequence as
(cid:32)(cid:90) ∆i
(cid:33)ni
−(cid:82) ∆i
(cid:32) T(cid:91)
i=1
P
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Π
(cid:33)
T(cid:89)
i=1
=
{Ni = ni}
P (Ni = ni Π) =
1
ni!
∆(i−1)
λ(t)dt
e
∆(i−1) λ(t)dt,
where we have used the independent increments property of Poisson processes to separate the
probability of the full sequence into the product of individual observation probabilities. We can
likewise express the likelihood of the parameters L(Π) = L(β0, β1, θ0, θ1, λ) as a product of indi-
i=1 Li(Π) where Li(Π) = Li(β0, β1, θ0, θ1, λ) = P (Ni = ni Π).
Recalling the definition of λ(t) from Equation 3.1, we can see that
e−β0∆(i−1) − e−β0∆i(cid:17)
+ θ1
(cid:16)
e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)
,
vidual likelihoods, i.e. L(Π) =(cid:81)T
(cid:16)
(cid:90) ∆i
λ(t)dt = λ∆ + θ0
∆(i−1)
where (x)+ = max(x, 0) is the positive part of x. Following standard techniques we will leverage
the fact that the natural logarithm is a non-decreasing function and maximize the log-likelihood
instead of the likelihood. For L(Π) = log (L(Π)), we have
(cid:16)
(cid:16)
ni log
λ∆ + θ0
− log (ni!) − λ∆ − θ0
ni log
λ∆ + θ0
L(Π) =
=
(cid:32)
T(cid:88)
i=1
T(cid:88)
− T(cid:88)
i=1
+ θ1
(cid:16)
e−β0∆(i−1) − e−β0∆i(cid:17)
(cid:16)
e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)(cid:17)
e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)(cid:33)
(cid:16)
e−β0∆(i−1) − e−β0∆i(cid:17) − θ1
(cid:16)
e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)(cid:17)
e−β0∆(i−1) − e−β0∆i(cid:17)
(cid:16)
1 − e−β1(∆T−a)(cid:17)
(cid:16)
1 − e−β0∆T(cid:17) − θ1
(cid:16)
+ θ1
.
(cid:16)
log (ni!) − λ∆T − θ0
i=1
12
=
=
i=1
niθ1
Di
niθ0
Di
∆ie−β0∆i − ∆(i − 1)e−β0∆(i−1)(cid:17) − θ0∆T e−β0∆T ,
(cid:16)
(∆i − a)+e−β1(∆i−a)+ − (∆(i − 1) − a)+e−β1(∆(i−1)−a)+(cid:17) − θ1(∆T − a)e−β1(∆T−a),
(cid:16)
e−β0∆(i−1) − e−β0∆i(cid:17) −(cid:16)
1 − e−β0∆T(cid:17)
e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17) −(cid:16)
Then, the partial derivatives of the log-likelihood with respect to each of the parameters are
given by
∂L
∂β0
∂L
∂β1
∂L
∂θ0
∂L
∂θ1
∂L
∂λ
1 − e−β1(∆T−a)(cid:17)
T(cid:88)
T(cid:88)
T(cid:88)
T(cid:88)
T(cid:88)
− ∆T,
(cid:16)
(cid:16)
ni
Di
ni
Di
i=1
i=1
i=1
=
=
=
,
,
ni∆
Di
i=1
where Di = λ∆ + θ0(e−β0∆(i−1) − e−β0∆i) + θ1(e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+). Likewise, the
second derivatives are given by
∂2L
∂β2
0
∆2i2e−β0∆i − ∆2(i − 1)2e−β0∆(i−1)(cid:17)
niθ0
Di
(cid:16)
i=1
∆ie−β0∆i − ∆(i − 1)e−β0∆(i−1)(cid:17)2
,
(cid:16)(cid:0)(∆i − a)+(cid:1)2 e−β1(∆i−a)+ −(cid:0)(∆(i − 1) − a)+(cid:1)2 e−β1(∆(i−1)−a)+(cid:17)
niθ1
Di
i=1
(cid:16)
∂L
∂β1
niθ2
0
D2
i
= θ0∆2T 2e−β0∆T − T(cid:88)
− T(cid:88)
= θ1(∆T − a)2e−β1(∆T−a) − T(cid:88)
− T(cid:88)
= − T(cid:88)
= − T(cid:88)
∂λ2 = − T(cid:88)
∂2L
∂θ2
0
∂2L
∂θ2
1
∂2L
niθ2
1
D2
i
ni
D2
i
ni
D2
i
ni∆2
D2
i
i=1
i=1
i=1
i=1
,
i=1
(cid:16)
(∆i − a)+e−β1(∆i−a)+ − (∆(i − 1) − a)+e−β1(∆(i−1)−a)+(cid:17)2
e−β0∆(i−1) − e−β0∆i(cid:17)2
(cid:16)
(cid:16)
e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)2
,
,
,
and it can be observed that each of these is negative. Thus, deriving the maximum likelihood
estimate is a convex maximization problem and can be solved using the convex optimization
software of one's choosing, such as Grant and Boyd [14].
We can also note that in the special sub-case when the song's streaming decay rates are the
only quantities to be estimated and are furthermore assumed to be equal, i.e. β ≡ β0 = β1,
then one can leverage linear regression to produce a simple estimation technique. By taking
the logarithm of the daily streaming data, the resulting linear trend is then equal to the true
decay rate according to the non-stationary Poisson process model. Hence by the Gauss-Markov
theorem, the slope of the resulting trend line is the best linear unbiased estimate of the decay
13
rate β, see e.g. Chapter 14 of Barreto and Howland [6]. It is worth noting that this although
this special case of estimating β only may actually be quite informative, and this decay rate is
arguably the most relevant parameter in practical application. Because this parameter represents
the rate at which the song's streams decrease from day to day, β captures an inherent notion of
long-term popularity and longevity of the song, and these are significant drivers of its success
in terms of both commercial earnings and cultural relevance. For these reasons, the streaming
decay rate will be central to the model-based analysis we perform in Section 4, in which we find
insights for the songs contained in this data set.
4 Data Insights via the Stochastic Process Model
In this section, we apply the point process model that we have defined in Section 3 to the Spotify
Top 200 data set. Through fitting this model to the data, we are able to uncover relationships
between different songs in the Top 200. As a way of comparing songs, our analysis focuses on
the decay rate of the daily streaming count. We will use the assumption that there is a single
decay rate, i.e. β = β0 = β1. In the course of our analysis we find that this simple case still
delivers powerful insights. In Subsection 4.1 we inspect the fit of this parameter to the data
and investigate the strengths and weaknesses of the model. Then, in Subsection 4.2 we use both
the decay rate and its fit to group similar songs together through use of the k-means clustering
algorithm. In reviewing these clusters we find that the algorithm identifies songs with explainable
similarities, including connections that extend beyond the scope of this data set.
4.1 Evaluating the Fit of the Model
To begin our inspection of the decay rate parameter fit to each song in this data, let us first
look at how it relates to the rank of the song in the Top 200. In Figure 4.1, we have two scatter
plots comparing the decay rate and the highest rank the song reached in the charts. On the left
of Figure 4.1, we take the average of the parameters of all the songs that peaked at the given
rank, and on the right of Figure 4.1 we calculate the variance of the parameters across these
songs. In this chart the negative value of the decay rate parameter corresponds to true negative
decay, i.e. β > 0 in e−βt. Figure 4.1 shows that the middle ranks of 30 to 130 have the largest
decay rates on average. The top ten ranks and ranks 150-200 have mean rate parameter close
to 0. Interestingly, we also see that variance in rate parameter is greatest also for the middle
ranks and lower for the top ten ranks and the bottom 50 ranks. In the case of the bottom 50
positions, we can recall that Figure 2.4 showed us that these songs do not remain on the chart
for very long. Thus, there could be a missing data issue here as we are not able to observe the
decay of the songs streams over many days. Regardless, we are able to observe that the decay
rates of middle ranks are appear both larger and less stable in comparison to the decay of the
top ranked songs. This matches the intuition provided by Figure 2.4, as bigger hits are known
to last longer on the charts.
In addition to inspecting the fitted decay rates across the whole data set, it is important that
we also investigate the fit on individual songs and see if the model matches the data. As we will
now show, this simple model works relatively well for many songs; however, some characteristics
of certain songs cannot be captured by such simplicity. In particular, in some cases the decay
rate of the streams is significantly slower than an exponential function. This will be especially
apparent in the log-scale graph. It is worth noting that there are also songs that do not exhibit
this decay slow down behavior and appear to be well represented by exponential function.
Let us begin our individual song model inspection by reviewing examples of the latter. In
Figure 4.2, we plot the daily streaming data and the fit decay rates for three example songs,
14
Figure 4.1: Comparison of each song's estimated decay rate and the highest rank it achieved.
"Bank Account" by 21 Savage, "XO TOUR Llif3" by Lil Uzi Vert, and "rockstar" by Post Malone
feat. 21 Savage. On the top row of plots we compare the data and the model on a linear-scale
y-axis, and on the bottom row we plot the same curves in log-scale. In each of the figures, we
plot the exponential decay from the time of the song's final peak onwards. From reviewing these,
we can see that each estimated curve closely resembles the data from the Spotify Top 200.
Now in Figure 4.3 we plot the same comparisons in both linear- and log-scale for three more
songs, "Look What You Made Me Do" by Taylor Swift, "Mask Off" by Future, and "Passionfruit"
by Drake. As is particularly noticeable in the log-scale plots, the tails of these streaming data
examples are certainly heavier than the exponential curves shown. This shows one potential
pitfall of the simplicity of this model and of only considering the decay rate of the song within
it. For example for "Mask Off," it seems as if this data may simply be better fit by a function
with a tail heavier than e−βt. In the case of "Passionfruit," it appears that the streams may be
leveling off to an underlying baseline streaming rate, which can be modeled as the constant λ in
Equation 3.1. This raises the concern that it could be possible that the better fits in Figure 4.2
could simply be a result of having observed too few data points. However, both "XO TOUR
Llif3" and "Bank Account" have been observed as having stable decay rates for more than 400
days, before which each of the examples in Figure 4.3.
While seeing these less accurate estimates is certainly a prompt for the future development
of more sophisticated stochastic process models of streaming data, this need not be a barrier to
finding deeper insights from the simple exponential models. In fact, in Subsection 4.2 we find
that we actually use inaccuracy as a tool. By including a measure of the model fit with the decay
rate for use of a clustering algorithm, we are able to recognize interesting similarities between
songs.
4.2 Finding Similar Songs through k-Means Clustering Analysis
As our final analysis in this paper, we now apply the well-known k-means clustering algorithm
to the Spotify Top 200 data set. We base this clustering approach on the point process model
defined in Section 3. Specifically, the two quantities we use are the estimated decay rates and the
accuracies. We will use the simple estimation approach based on obtain the best linear unbiased
estimate via linear regression, as described at the end of Subsection 3.2, and thus we will take
15
Figure 4.2: Comparison of data and estimated model for three songs with visually good fit.
Figure 4.3: Comparison of data and estimated model for three songs with visually inaccurate fit.
the resulting R2 value as the measurement of the fit. Moreover, we estimate these exponential
decay rates through the full data and disregard and jumps beyond time 0. Because knowing
that an exponential curve doesn't nicely fit the data still tells us something about the data, we
actually use the potential over-simplicity of this exponential model as a feature. In this way,
this clustering procedure still yields insightful results despite the simplicity of the estimation
procedure.
It is also worth noting that the practical relevance of similarity among the songs' exponential
decay rates can be motivated from the context of Spotify's streaming service. We believe that
the similarity of streaming behaviors of two songs could be from similarity of audiences, i.e.
the same types of songs are listened to by the same groups of people. Because these fans may
exhibit the same listening habits across multiple songs, the recorded daily stream data may follow
similar patterns. As we will see in three example clusters produced by this algorithm shown in
Figures 4.4, 4.6, and 4.7, there are observable commonalities between these songs that transcend
the calculated β and R2 values used to group them.
16
Figure 4.4: A cluster containing major hit songs, including 5 Billboard #1 hits.
In our first example cluster, shown in Figure 4.4, we find nine songs that include five of the
twelve 2018 Billboard number one singles - "God's Plan," "Nice for What," "This is America,"
"Psycho," and "Sicko Mode." Fascinatingly, "Sicko Mode" wouldn't top the charts until three
months after this data set ended, a powerful connection identified by this clustering algorithm
and this model. It is also worth recalling that the Billboard Hot 100 rankings draw on much more
than just the Spotify streaming data, including radio play, physical sales, and digital sales. The
remaining four songs feature two of the most popular eventual singles from Drake's Scorpion,
"Mob Ties" and "Nonstop," a song from J. Cole that broke the Spotify opening day U.S. streams
record, "KOD," and the Kendrick Lamar and Rihanna hit, "LOYALTY." Thus, in this cluster
the algorithm has recognized songs of extreme popularity simply from the estimates of their
streaming decay rates and the overall empirical fit of those estimates, but not the actual daily
streaming counts themselves.
By comparison to the collection of mega-hits in Figure 4.4, Figure 4.5 contains a more modest
collection of songs. This cluster contains fifteen songs from five recent smash hit hip-hop albums
that weren't quite the records' top hits but were still generally popular. In this way, this group
can be thought of as the legacy cluster, as these songs are likely listened to because of the prestige
of the albums containing them and the larger singles neighboring them. To demonstrate this
point, five of these songs are from Travis Scott's Billboard topping ASTROWORLD, but that
album's number one single "Sicko Mode" isn't on this list; it is instead with the hits in Figure 4.4.
Since subsets of these songs were likely listened to in unison, Figure 4.5 motivates the idea of
the similar decay rates capturing similar groups of listeners. This idea is re-enforced by the fact
that all these songs share a genre, which again suggests a potential overlap in fans.
17
Figure 4.5: A cluster containing major hit songs, including 5 Billboard #1 hits.
Figure 4.6 contains what could be affectionately deemed the Christmas music cluster. Perhaps
most notable among these is Mariah Carey's classic "All I Want for Christmas Is You," which
is actually also a Spotify Top 200 number one hit and can be seen as brief blip in the middle of
Figure 2.5. These holidays songs all have an interesting behavior pattern. Unlike most songs,
they trend upwards as the user base feels increasingly festive, followed by an immediate crash
back down on December 26 once the listeners are taking down the tree. Hence, the estimated
exponential parameters for this group are actually for exponential growth rather than exponential
decay. The two exceptions to the yuletide theme of this group are each notable, and both would
18
Figure 4.6: A cluster containing primarily popular Christmas songs, as well as 2 notable outliers.
likely experience a steady decline in the weeks following the end of this data set that would
distinguish them from the holiday music. The first, "I Love It" by Kanye West and Lil Pump,
is in the early stages of a viral hit in this date range, being a surprise, unorthodox single that
became a top hit. The second, "Self Care," is a sadder story, as the artist Mac Miller died from
an overdose in September 2018. The activity seen in this data set was the song being revisited
by fans following his passing.
As a demonstration of the interpretative power of clustering using the measure of fit, Fig-
ure 4.7 can be seen as a collection of the late bloomers. This cluster captured several songs that
steadily accumulated hype until they became major hits, like "Bad and Boujee" by Migos feat.
Lil Uzi Vert, "Bank Account" by 21 Savage, "Bodak Yellow" by Cardi B, "Bounce Back" by Big
Sean, and "Caroline" by Amin´e, or experienced significant jumps long after their release, such as
"1-800-273-8255" by Logic feat. Alessia Cara and Khalid and "Fake Love" by Drake. As a side
note, it is worth pointing out that the large jump visible in the sample path for "1-800-273-8255"
came after Logic's August 27, 2017 MTV Video Music Awards show performance, motivating
public performances as another type of event that can drive new listens.
19
Figure 4.7: A cluster largely comprised of songs with steady and gradual initial growth.
5 Conclusion
In this work, we have analyzed the dynamics of the Spotify Top 200 rankings through data. We
have performed an exploratory investigation of the ranks, durations, and behaviors of the songs
contained in this list.
In doing so we have seen that the average number of daily streams is
power-law function of the song's rank, that the highest ranks are rarely achieved, and that the
more popular songs have a greater longevity than their lower ranked counterparts. Additionally,
we have seen a jump and decay structure to a song's daily stream count, in which jumps are often
caused by an external event bringing the song more attention. This exploration led us to define
a non-stationary point process model of a song receiving streams. This model is a time-varying
Poisson process with intensity designed to mimic the jumps and decays seen in the data. After
defining the model we described how to estimate its parameters using the streaming data. Once
we have fit this model to data, we used it to further analyze the rankings and identify similarities
between the songs seen in the Spotify Top 200. In particular, we have identified groups of related
songs through a k-means clustering approach that relies only on the estimated parameters and
measures of their empirical error. In examples of this cluster, we saw that this information was
enough to not only identify songs that achieved high levels of streaming on Spotify, but also to
recognize songs of similar success beyond just the Spotify platform, even when that was achieved
after the time range of this data set.
As an example application resulting from this work, artists, labels, and other strategic man-
agement groups could evaluate whether songs have stream count decay rates similar to other
historical hits as a way of determining which songs would be good candidates for the next single
20
off of an album. Upon this evaluation, the song could then be further promoted via an event such
as a music video release, which we have seen to be capable of creating a jump in daily streams. In
addition to applications of this work, there are also many opportunities for future research, both
empirical and theoretical. For example, one direction we are interested in pursuing is modeling
random jump sizes in the point process and determining how to estimate them on one sample
path when only a handful will be observed for each song. Another data-based direction would
be to study songs not on the Top 200 but rather on the long tail, thus requiring additional data.
This may be particularly relevant for local and/or independent music such as what is the subject
of recent research [24, 23, 4] and the associated local music recommendation service Localify2. As
predicted by Anderson [5], the total of these more niche offerings likely comprise a large portion
of the overall streaming consumption, and are thus important for artists, fans, and platforms
alike. For a final example of future research directions, we can note that this paper gives rise to a
new decision problem in operations research, in which one seeks to optimally time the release of
albums or music videos in support of a single's commercial success. This idea likely also extends
to remixes of the single. In this context it appears that Lil Nas X may have already perfected the
technique. Billie Eilish also recently used similar strategies, releasing a remix to "Bad Guy" with
Justin Bieber that helped propel her song to the number one spot. Hence we propose studying
the Old Town Road Problem, deriving an optimal external event strategy, and comparing it with
the observed techniques that led to the all-time longest streak atop the Billboard Hot 100.
References
[1] Spotify FAQ. https://artists.spotify.com/faq/stats. Accessed: 2019-09-05.
[2] Spotify's worldwide daily song ranking.
https://www.kaggle.com/edumucelli/
spotifys-worldwide-daily-song-ranking. Accessed: 2019-09-05.
[3] Spotify first quarter 2019 earnings.
https://newsroom.spotify.com/2019-04-29/
spotify-reports-first-quarter-2019-earnings/. Accessed: 2019-09-05.
[4] Daniel Akimchuk, Timothy Clerico, and Douglas Turnbull. Evaluating recommender system
algorithms for generating local music playlists. arXiv preprint arXiv:1907.08687, 2019.
[5] Chris Anderson. The long tail. Wired, October 2004.
[6] Humberto Barreto and Frank Howland.
Introductory econometrics: using Monte Carlo
simulation with Microsoft excel. Cambridge University Press, 2005.
[7] Tom Breihan. "Old Town Road" breaks record for most weeks at #1. Stereogum, July 2019.
[8] BuzzAngle Music. 2018 year-end report, January 2019.
[9] Daryl J Daley and David Vere-Jones. An introduction to the theory of point processes:
Volume I: Elementary Theory and Methods. Springer Science & Business Media, 2003.
[10] Angelos Dassios and Hongbiao Zhao. A dynamic contagion process. Advances in applied
probability, 43(3):814 -- 846, 2011.
[11] Andrew Daw and Jamol Pender. The Queue-Hawkes process: Ephemeral self-excitement.
arXiv preprint arXiv:1811.04282, 2019.
2See: https://www.localify.org/
21
[12] David Easley and Jon Kleinberg. Networks, Crowds, and Markets, volume 8. Cambridge
University Press Cambridge, 2010.
[13] Andrew Flanagan. Industry sets Friday as global record release day. Billboard, February
2015.
[14] Michael Grant and Stephen Boyd. Cvx: Matlab software for disciplined convex program-
ming.
[15] Aisha Hassan and Dan Kopf. The reason why your favorite pop songs are getting shorter.
Quartzy, October 2018.
[16] Alan G Hawkes. Spectra of some self-exciting and mutually exciting point processes.
Biometrika, 58(1):83 -- 90, 1971.
[17] Jillian Mapes. Against the extra long pop album. Pitchfork, December 2016.
[18] Sheldon Pearce. Considering the rise of the super short rap song. Pitchfork, March 2018.
[19] Marian-Andrei Rizoiu, Swapnil Mishra, Quyu Kong, Mark Carman, and Lexing Xie. SIR-
Hawkes: Linking epidemic models and Hawkes processes to model diffusions in finite pop-
ulations. In Proceedings of the 2018 World Wide Web Conference on World Wide Web,
pages 419 -- 428. International World Wide Web Conferences Steering Committee, 2018.
[20] Sheldon M Ross. Introduction to probability models. Academic press, 2014.
[21] Youngsoo Seol. Limit theorems for discrete hawkes processes. Statistics & Probability
Letters, 99:223 -- 229, 2015.
[22] Karl Sigman and Ward Whitt. Marked point processes in discrete time. Queueing Systems,
92(1-2):47 -- 81, 2019.
[23] Douglas Turnbull and Luke Waldner. Local music event recommendation with long tail
artists. arXiv preprint arXiv:1809.02277, 2018.
[24] Douglas R Turnbull, Justin A Zupnick, Kristofer B Stensland, Andrew R Horwitz, Alexan-
der J Wolf, Alexander E Spirgel, Stephen P Meyerhofer, and Thorsten Joachims. Using
personalized radio to enhance local music discovery. In CHI'14 Extended Abstracts on Hu-
man Factors in Computing Systems, pages 2023 -- 2028. ACM, 2014.
[25] Natalie Weiner. Donald Glover's Golden Globes shout-out spurs 243% increase in Spotify
streams for Migos' 'Bad and Boujee'. Billboard, January 2017.
22
|
1407.1425 | 4 | 1407 | 2015-01-27T11:34:49 | On the relationship between Gaussian stochastic blockmodels and label propagation algorithms | [
"cs.SI",
"physics.soc-ph"
] | The problem of community detection receives great attention in recent years. Many methods have been proposed to discover communities in networks. In this paper, we propose a Gaussian stochastic blockmodel that uses Gaussian distributions to fit weight of edges in networks for non-overlapping community detection. The maximum likelihood estimation of this model has the same objective function as general label propagation with node preference. The node preference of a specific vertex turns out to be a value proportional to the intra-community eigenvector centrality (the corresponding entry in principal eigenvector of the adjacency matrix of the subgraph inside that vertex's community) under maximum likelihood estimation. Additionally, the maximum likelihood estimation of a constrained version of our model is highly related to another extension of label propagation algorithm, namely, the label propagation algorithm under constraint. Experiments show that the proposed Gaussian stochastic blockmodel performs well on various benchmark networks. | cs.SI | cs |
On the relationship between Gaussian stochastic
blockmodels and label propagation algorithms
Junhao Zhang1‡, Tongfei Chen2§, Junfeng Hu1k
1 Key Laboratory of Computational Linguistics (Ministry of Education), Peking
University, Beijing, P. R. China
2 Center for Language and Speech Processing, Johns Hopkins University, Baltimore,
MD, USA
E-mail: [email protected], [email protected], [email protected]
Abstract. The problem of community detection receives great attention in recent
years. Many methods have been proposed to discover communities in networks. In this
paper, we propose a Gaussian stochastic blockmodel that uses Gaussian distributions
to fit weight of edges in networks for non-overlapping community detection. The
maximum likelihood estimation of this model has the same objective function as
general label propagation with node preference. The node preference of a specific
vertex turns out to be a value proportional to the intra-community eigenvector
centrality (the corresponding entry in principal eigenvector of the adjacency matrix of
the subgraph inside that vertex's community) under maximum likelihood estimation.
Additionally, the maximum likelihood estimation of a constrained version of our model
is highly related to another extension of label propagation algorithm, namely, the
label propagation algorithm under constraint. Experiments show that the proposed
Gaussian stochastic blockmodel performs well on various benchmark networks.
PACS numbers: 89.75.Hc, 02.50.-r
Keywords: random graphs, networks, clustering techniques, analysis of algorithms
1. Introduction
In complex networks, communities [1] are considered as groups of vertices whose intra-
connections are dense and inter-connections are sparse. Many real-world networks
contain community structures. Detection of communities in networks has been
developed a lot in recent years.
Since the proposal of modularity [2] as a quality function of a community
partition, many algorithms were proposed to maximize modularity. Meanwhile, label
propagation algorithms [3] are much simpler and more scalable for very large networks.
‡ Co-corresponding author.
§ Performed while studied at Peking University.
k Corresponding author.
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms2
Label propagation algorithm has many extensions, such as balanced label propagation
algorithm [4], label propagation under constraint [5] and label propagation with hop
attenuation and node preference [6, 7]. Barber and Clark [5] showed that modularity
can be viewed as a special case of label propagation under constraint. Liu and Murata
[8] introduced multi-step greedy agglomeration [9] to the label propagation approach
used by Barber and Clark [5], which helps to escape from poor local optimum. Leung
et al.
[6] first introduced hop attenuation and node preference to label propagation
algorithm. Subelj and Bajec [7] used a formulation similar to PageRank [10] inside each
community as the node preference and use the defensive diffusion and attenuation label
propagation algorithm to extract the cores of communities.
Recent years also see the popularity of stochastic blockmodels [11 -- 16] in both non-
overlapping and overlapping community detection. Stochastic blockmodels assume that
vertices in a network are partitioned into blocks, and edges of two vertices are sampled
from a distribution parameterized by block indicators of two vertices.
Stochastic
blockmodels are flexible and can not only handle community detection, but also group
vertices with similar behaviors, that is, vertices from one block have similar connectivity
patterns with vertices from another block. For community detection problem, it implies
dense intra-community connections and sparse inter-community connections.
Karrer and Newman [13] proposed degree-corrected stochastic blockmodel which
incorporates vertex degree into stochastic blockmodels and found that degree-corrected
stochastic blockmodels perform better than standard stochastic blockmodels in networks
with substantial heterogeneous degrees. Aicher et al. [17] and Aicher et al. [15] proposed
the weighted stochastic blockmodel to model weighted networks.
However, in community detection literature, there is little work on the nature of
label propagation algorithm and label propagation with node preference. Tib´ely et al.
[18] proposed that the objective function of label propagation algorithm [3] is equivalent
to a ferromagnetic Potts model. Barber and Clark [5] extended the objective function
to a constrained one. For label propagation with node preference [6, 7], the definition
of node preference is still heuristic. In this paper, we establish a connection between
stochastic blockmodels and label propagation and some of its extensions, so that new
node preference parameters are derived in a mathematically rigorous framework, namely,
through maximum likelihood estimation.
We propose the Gaussian stochastic blockmodel with node preference (GSBM-P)
for non-overlapping community detection. Our model can be viewed as a constrained
version of degree corrected version of the weighted stochastic blockmodel [17]. GSBM-
P uses Gaussian distributions to model the weight of edges with the same global
variance shared across all communities.
It is assumed that the expected weight of
edges between two different communities should be zero. GSBM-P assumes that the
weight of an edge inside a community is determined by the node preference of its
two vertices. The maximum likelihood estimation of GSBM-P turns out to have the
same objective function as general label propagation with node preference. The vector
whose entries are node preferences of vertices inside a community is proportional to the
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms3
L2-normalized principal eigenvector of the adjacency submatrix computed inside the
community. Additionally, the norm of this vector turns out to be the square root of the
principal eigenvalue of this adjacency submatrix. This node preference as a local metric
(i.e., a value proportional to intra-community eigenvector centrality [19]) has never
been proposed before. We show that the objective function of our model is equivalent
to the sum of the squares of the principal eigenvalues of the adjacency matrices of all
communities. Also, we show that the objective function of label propagation under
constraint [5] is a special case of the objective function of the maximum likelihood
estimation of a constrained version of our model.
A coordinate ascent algorithm is developed to optimize the objective function
of our model. We experimented on two real-world networks and also synthetic
networks, and illustrated that our method performs better than label propagation with
leading eigenvector of intra-community random walk matrix as node preference [7] and
the variational Bayes method for weighted stochastic blockmodel [15] in community
detection. Our method is also compared with label propagation algorithm (LPA) [3]
and order statistics local optimization method (OSLOM) [20]. In synthetic networks, our
method achieves a performance superior or comparable to that of LPA. In unweighted
synthetic networks, the performance of our method is close to that of OSLOM.
The rest of the paper is organized as follows: Section 2 reviews related work; Section
3 introduces our model and the maximum likelihood estimation of our model; Section
4 presents our experiments and the last section concludes this paper.
2. Related Work
2.1. Label Propagation Algorithm
Label propagation algorithm [3] seeks to discover communities by propagating vertices'
labels. It iteratively updates a vertex's label by choosing the label possessed most by
its neighbors. If we denote the label of vertex i as zi, then the update step of zi can be
formulated as
zi = arg max
z Xj6=i
Wijδzj z,
(1)
where W is the adjacency matrix, and δab = 1 iff a = b is the Kronecker delta function.
When the iteration process terminates, all vertices with the same labels are considered
as a community.
Tib´ely et al. [18], and also Barber and Clark [5] showed that the objective function
of label propagation algorithm can be formulated as
QLPA = Xi,j
Wijδzizj = Xz Xi,j
Wijδzizδzj z .
(2)
This objective function is the total weight of the intra-community edges. It is shown
that label propagation algorithm aims to maximize QLPA through a zero-temperature
kinetics. It can be seen that this objective function encourages large communities. Thus,
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms4
label propagation algorithm sometimes gets a trivial solution where all vertices are in
one community and the objective function reaches its maximum.
2.2. Label Propagation with Node Preference
Leung et al.
[6] introduced hop attenuation and node preference to label propagation
algorithm. We leave out the introduction of hop attenuation regularization which
prevents the formation of very large communities. They proposed a label update strategy
zi = arg max
z Xj6=i
f m
j Wijδzj z ,
(3)
where fj is the propagation strength (a.k.a. node preference) of node j, m is a parameter
which controls the influence of fj.
Subelj and Bajec [7] proposed the defensive diffusion and attenuation label
They define the
of node i in community zi as the probability of a random
propagation algorithm to accurately detect community cores.
propagation strength f m
i
walker inside the community labeled with zi visits vertex i, i.e.,
pzi
i = Xj∈N (i)
pzj
j
kzi
j
δzizj ,
(4)
where N(i) denotes the set of vertices which are the neighbors of vertex i, and kzi
j
denotes the total weight of edges which connect vertex j and vertices from community
zi. Note that this definition of node preference is leading eigenvector of random walk
matrix inside the community zi and can be easily extended to weighted networks. In the
following part of this paper, we shall call this value as intra-community RandomWalk
or local RandomWalk.
Then, defensive diffusion applies preference to the core of each community,
zi = arg max
z Xj6=i
pzj
j Wijδzj z .
(5)
However, the label propagation with intra-community RandomWalk as node
preference prefers small communities, and normally discovers much more communities
than what is expected.
Generally, the objective function that label propagation with node preference tries
to maximize can be formulated as
QLPA−P = Xz Xi,j
pipjWijδzizδzj z ,
(6)
where pi is the node preference associated with vertex i, and it can be node degree or
other centrality not depending on vertex's label.
We propose the Gaussian stochastic blockmodel with node preference (GSBM-
P), whose maximum likelihood estimation results to the same objective function as
general label propagation with node preference, where the node preference of a vertex is
proportional to local eigenvector centrality computed inside its community rather than
the local RandomWalk score. In other words, label propagation with intra-community
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms5
RandomWalk as node preference does not have this objective function since the objective
function may decrease once node preference is re-estimated. An alternative measure for
eigenvector centrality [19] in directed network is the authority score and hub score in
HITS [21]. In the field of ontology learning, He et al. [22] used an HITS based community
detection algorithm to produce a concept hierarchy.
In this paper, we focus on undirected networks, and the proportion of intra-
community eigenvector centrality is derived from maximum likelihood estimation.
2.3. Weighted Stochastic Blockmodel
[17] and Aicher et al.
Aicher et al.
[15] applied stochastic blockmodel to weighted
networks. For dense networks, they claimed that Gaussian distributions can be used to
generate the weights of the edges between each pair of vertices. That is,
Wij ∼ N (µzizj , σ2
zizj ) .
(7)
For sparse networks, they claimed that absent edges are different from edges with
zero weight. Therefore, they modelled the edge existence and edge weights separately.
Exponential family distribution such as Gaussian distribution is adopted only for
weighted edges. They further showed that degree-corrected stochastic blockmodel [13]
can be adopted to model the existence of edges in the following manner:
log P (Wz, p, θ, µ, σ)
= αXij
logP(Aijpipjθzi,zj ) + (1 − α) X(i,j)∈E
log N (Wijµzizj , σ2
zizj ) ,
(8)
where P denotes the distribution for modeling edge existence, Aij is 1 when vertex i
and j is connected and 0 otherwise, (i, j) ∈ E denotes a pair of linked vertices, pi is
the parameter associated with vertex i and pipjθzi,zj is the expectation of Aij, and α is
between 0 and 1. Note that the authors did not propose a degree-corrected version of
weighted stochastic blockmodel for modeling edge weights.
However, the maximum likelihood estimation of σ2
i,j will be zero if the weights of all
the edges between group i and group j are the same, which creates a degeneracy in the
likelihood calculation. Therefore, a Bayesian approach is adopted. Prior distributions
are introduced to all parameters and variable z as well.
We propose a Gaussian stochastic blockmodel that can be viewed as a constrained
version of degree-corrected version of weighted stochastic blockmodel. It assumes blocks
are assortative in the way that it explicitly assumes sparse inter-block connections, so
that it is more suitable for community detection.
3. Model
In our model, namely Gaussian stochastic blockmodel with node preference(GSBM-P),
it is assumed that the graph is generated by
• Assigning block indicators to each vertex;
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms6
• Then drawing edge weights from a Gaussian distribution for each edge (including
non-existing edges with weight equal to zero) between each pair of vertices.
The Gaussian distribution for the weight of the edge between each pair of vertices
is defined as follows:
Wij ∼ N (pipjδzizj , σ2) .
(9)
where pi is the node preference of vertex i, zi is the block indicator for vertex i, and σ2
is the variance of Gaussian distributions.
This model assumes that the expected value of the weights of inter-community
edges is 0; the expected value of the weights of the intra-community edges is a product
of the node preference of the two vertices associated with the edges.
Our model can be viewed as a constrained version of the degree corrected version
of weighted stochastic blockmodel(WSBM) proposed by Aicher et al. [17]. We extend
the WSBM [17] to be degree corrected when explaining edge weights, rather than
incorporate the degree corrected SBM [13] to explaining edge existence, which is
proposed in [15]. The degree correction should make our model fit better than WSBM
in networks with substantial heterogeneous degrees (or sum of linked edge weights).
Meanwhile, our model can be applied in assortative networks. By explicitly assuming
the connection between blocks should be sparse, our model can discover community
structures accurately.
3.1. The Maximum Likelihood Estimation of GSBM-P
In this section, we adopt the maximum likelihood estimation to fit our model, and show
its objective function is the same as general label propagation with node preference.
Since our model does not introduce priors over block indicators z, we treat the block
indicators as parameters, and use coordinate ascent method to estimate both the block
indicators and node preference p. The adopted coordinate ascent method estimates a
parameter to maximize the likelihood when fixing all other parameters.
The likelihood function of our model is
σ√2π
where pi is node preference of vertex i.
P (Wz, p, σ) = Yi,j
1
exp −(cid:16)Wij − pipjδzizj(cid:17)2
2σ2
,
(10)
Maximizing the likelihood function is equivalent to minimizing σ for Gaussian
models. Maximum likelihood estimation of σ2 yields
σ2 = Pi,j(cid:16)Wij − pipjδzi,zj(cid:17)2
n2
.
where n is the total number of vertices.
Minimizing σ2 is equivalent to maximizing the following objective function:
QGSBM−P = 2Xi,j
= 2Xz Xi,j
pipjWijδzizj −Xi,j
(pipjδzizj )2
pipjWijδzizδzj z −Xz Xi,j
(pipjδzizδzj z)2 .
(11)
(12)
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms7
The maximum-likelihood estimated value of pi can be expressed in the following
iterative updating manner:
p(t+1)
i
j Wijδzj zi
= Pj p(t)
j (cid:17)2
Pj(cid:16)p(t)
or in vector and matrix notation:
δzj zi
,
(13)
(14)
p(t+1)
z
=
Wzp(t)
z
p(t)
2 ,
(cid:13)(cid:13)(cid:13)
z (cid:13)(cid:13)(cid:13)
where pz is a vector whose entries consist of the node preferences of the vertices inside
community z; Wz is the adjacency matrix of community z, that is, Wz describes how
vertices inside community z connected to each other while ignores the links outside
community z.
Vector pz converges to the principal eigenvector of Wz. It can be shown that the
norm of pz is the square root of the principal eigenvalue of Wz, denoted as √λz. Thus,
these node preferences are the product of √λz and the L2-normalized local eigenvector
centrality computed inside the community z.
Noticing that for a specific community z,
pipjWijδzizδzj z = pT
z Wzpz = λ2
z ,
(pipjδzizδzj z)2 = λ2
z ,
Xi,j
Xi,j
the aforementioned objective function (Eq. (12)) can be expressed as follows:
(15)
(16)
(17)
QGSBM−P = Xz
λ2
z .
Therefore,
the maximum likelihood estimation of GSBM-P is equivalent to
maximizing the sum of the squares of the principal eigenvalues of the adjacency matrices
of all communities. Intuitively, a community z with higher λz is better intra-connected.
Thus, the maximum likelihood estimation of GSBM-P aims to find communities that
are densely intra-connected.
3.1.1. Relationship with Label Propagation Algorithm with node preference Rewriting
the objective function according to Eq. (15) and Eq. (16) yields
QGSBM−P = Xz Xi,j
pipjWijδzizδzj z ,
(18)
which is the same as the objective function of general label propagation with node
preference (i.e., Eq. (6)).
We describe the adopted coordinate ascent method here in detail. This method
optimizes the objective function in a similar way to label propagation algorithm.
Coordinate ascent method aims to maximize an objective function f (X), where X
is the collection of all parameters. Coordinate ascent method adjusts the value of one
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms8
parameter to maximize objective function while fixed all other parameters. Different
parameters are adjusted cyclically.
It is guaranteed that objective function is non-
decreasing during this process and the method converges to a local optimum where
objective function no longer increases.
To optimize the objective function of our model, our coordinate ascent method
labels of vertices) and node preference p as
treats both the block indicators (i.e.,
parameters. To adjust node preference, we prefer to adjust the node preference pz
of all vertices inside one community z, by approximating the product of √λz and the
L2-normalized local eigenvector centrality computed inside the community z. To adjust
label of one vertex given all other vertices' labels and p, the coordinate ascent method
updates label of vertex i as follows:
zi = arg max
z Xj6=i
pjWijδzj z ,
(19)
which is exactly the update rule of label propagation with node preference without
considering the hop attenuation regularization. Note that assigning a new label for
vertex i will not increase the objective function given all other vertices' labels and p.
The difference between our method and general label propagation with node preference
is that the node preference in Eq.
(13) is derived in a statistically-grounded way
rather than heuristically defined. The update rule has a clear explanation. Each
vertex has a similarity with each community, which is the weighted sum of linked edge
weights connected to this community, with more representative (higher local eigenvector
centrality) vertex in the community owning higher weight. Then, each vertex joins in
the most similar community. In this sense, the node preferences of vertices inside two
communities should be updated immediately when a vertex joins in a new community,
though it is not required by the coordinate ascent method.
The objective function in Eq.
(18) is non-decreasing during the process of
estimating labels and node preference of vertices. The coordinate ascent method is
terminated when no vertex changes label or the objective function no longer increases
after several iterations. The number of communities is determined as the number of
different labels in the converged state.
3.2. A Constrained Version of GSBM-P
In this section, we examine a constrained version of our model and show its relation to
label propagation under constraint. The constrained version assumes that each vertex
i inside the community z owns the same node preference õz, and hence is not degree
corrected. That is,
Wij ∼ N (µziδzizj , σ2) ,
(20)
where the expected edge weight between vertex i and j is µziδzizj or equivalently
√µzi√µzj δzizj . µzi is a parameter associated with each community. This simplified
model assumes that the expected value of the weights of the inter-community edges is
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms9
0; the expected value of the weights of the edges inside community z is a uniform value
µz.
The likelihood function of a graph under this constrained model is
P (Wz, µ, σ) = Yi,j
1
σ√2π
exp −(cid:16)Wij − µziδzizj(cid:17)2
2σ2
.
(21)
Maximizing the likelihood function is equivalent to minimizing σ for Gaussian
models. The maximum likelihood estimation of σ2 can be expressed as
σ2 = Pi,j(Wij − µziδzizj )2
n2
= −2Pi,j µziWijδzizj +Pi,j(µziδzizj )2
n2
+ const .
Hence, minimizing σ2 is equivalent to maximizing the following objective function:
Q = 2Xi,j
µziWijδzizj −Xi,j
(µziδzizj )2
= 2Xz Xi,j
µzWijδzizδzj z −Xz
µ2
zn2
z ,
(22)
(23)
where nz denotes the number of vertices inside community z.
In this constrained version of our model, if we specify µz = µ for all communities,
then this simplified quality function can be viewed as the objective function of label
propagation algorithm under constraint, since
Q = µ
2Xz Xi,j
Wijδzizδzj z − µXz
= µ 2QLPA − µXz
n2
z! ,
n2
z
(24)
where Pz n2
z is the penalty term, which is maximized when all vertices are in a
community, and prevents the large communities from growing. µ can be viewed as
a resolution parameter, which controls the community size.
In comparison with the first model of label propagation algorithm under constraint
[5] (a.k.a. constant Potts model [23]), leaving µ tunable makes two objective functions
equivalent. Therefore, the maximum likelihood estimation of the block indicators in the
constrained version of our model while leaving µz tunable results to an objective function
which is a generalization of the objective function of label propagation algorithm
proposed by Barber and Clark [5] with a penalty term 1
The constrained version of our model has its disadvantages, especially that the
expected weight of edges inside each community is equal. It may not fit well in real
networks. By incorporating node preference, the expected weight of edges may vary
according the the node preference assigned for each vertex. This renders our model
more expressive and robust against modelling complex real-world networks. We show
in next section that our proposed Gaussian stochastic blockmodel with node preference
performs well.
z.
2 Pz n2
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms10
4. Experiments
In this section, the coordinate ascent method for GSBM-P is tested on both real-
world networks and synthetic networks. We also compare it with label propagation
algorithm (LPA),
label propagation algorithm with intra-community RandomWalk
(LPA-P) as the node preference and OSLOM [20] on various synthetic networks, and
the variational Bayes method for weight stochastic blockmodel (WSBM) on weighted
synthetic networks.
Two real-world networks, namely the karate club [24] and political blogs [25] are
chosen as test data. For synthetic networks, unweighted benchmark networks proposed
by Lancichinetti et al. [26] and weighted benchmark networks proposed by Lancichinetti
and Fortunato [27] are chosen. Erdos-R´enyi random graphs [28] are chosen for checking
overfitting. Gaussian distribution is not suitable to fit binary data (unweighted
networks). However, in the literature, label propagation algorithms are often applied in
unweighted networks. Due to the same objective function as label propagation with node
preference and similar optimization method to label propagation with node preference,
we also test our coordinate ascent method for GSBM-P in unweighted networks and
show its good performance.
Normalized mutual information (NMI, a.k.a. symmetric uncertainty, introduced by
Witten and Frank [29]) is often adopted to reflect the similarity between the obtained
partition and the planted partition. However, as is shown in [30], NMI sometimes
has systematic bias in finite-size networks. This phenomena is also observed in our
experiments on both synthetic unweighted networks with no intra-community edge in
planted partitions and synthetic weighted networks with total intra-community edge
weights close to zero in planted partitions. Algorithms that are designed only to
find densely intra-connected communities can not find similar partitions to the planted
partitions on these networks. However, for LPA-P and the coordinate ascent method
for GSBM-P, the values of NMI are much larger than 0 between obtained partitions and
the planted partitions on these networks (the presentation of results is omitted).
Zhang [30] proposed relative normalized mutual information (rNMI) to fix this
systematic bias. rNMI is defined as follows:
rN M I (A, B) = N M I (A, B) − hN M I (A, C)i ,
(25)
where A is the planted partition, B is partition obtained by algorithm, C is a random
partition with the same group-size distribution with partition B, and hN M I (A, C)i
is the expected N M I (A, C) over different realizations of random partition C. In our
experiments, we observe that the value of rNMI is slightly smaller than zero for LPA-
P and the coordinate ascent method for GSBM-P on these benchmark networks with
no intra-community edge or with total intra-community edge weights close to zero in
planted partitions.
For synthetic networks, to reflect the similarity between the obtained partition
B and the planted partition A, we will use the ratio of relative normalized mutual
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms11
information (rrNMI) as defined below:
rrN M I (A, B) =
rN M I (A, B)
rN M I (A, A)
,
(26)
such that it is up-bounded by 1 and equals 1 when partition B is identical to partition
A. Note that rN M I (A, A) is not zero for all the planted partitions in our experiment,
such that this equation will not suffer from divide-by-zero problem. The expectation in
rNMI is estimated over 100 realizations of random partition C.
OSLOM [20] may produce overlapping communities. Both NMI and rrNMI can not
be directly applied. An adjusted NMI [31] is used to measure the similarity between
the obtained covering by OSLOM and the planted partition. The adjusted NMI equals
1 when obtained covering and planted partition are identical.
In all of the following experiments, LPA-P is terminated after 50 iterations. The
coordinate ascent method for GSBM-P starts from the initialization where each vertex
has its unique label. The iterative order of the vertices for the coordinate ascent method
is random, and the node preferences inside two communities are updated immediately
when a vertex moves from one community to another. Our method is terminated when
no vertex changes label or the objective function no longer increases. We observe that
the actual number of iterations of our method is generally less than 10 in tested networks.
The time complexity of our method should be O((d + td1C)n) in each iteration, where
d denotes the average degree, t denotes the average iterative times for computing intra-
community eigenvector centrality, d1 denotes the average intra-community degree, and
C denotes the average size of communities. In very large networks, the node preferences
can be updated everytime all vertices are traversed for saving time. Then, the time
complexity should be O(dn + td1n) in each iteration, which is scalable for very large
networks.
4.1. Empirical networks
Karate club data set [24] is a social network of friendships between 34 members of a
karate club at a U.S. university in the 1970s. The network has 34 nodes and 78 edges
with weight 1. In reality, the karate club finally splits into 2 groups. The true partition
of this network is known.
The coordinate ascent method for GSBM-P is run several times and the partition
with the highest quality function value is chosen.
Fig. 1 demonstrates the result of our method in the karate club network.
The result of our method is a more fine-grained partition of the true partition. In
fact, this result has a slightly higher quality function value than the true partition. Note
that modularity maximization method in [32] and the non-parametric Bayesian mixed
membership stochastic blockmodel [33] favor the partition with four communities. The
true partition is a local optimum of our method which is frequently reached.
We notice that the vertex 10 is misidentified by degree corrected stochastic
blockmodel in [13] and modularity maximization method in [32]. We verify that the
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms12
17
7
6
5
11
12
22
18
1
13
2
20
9
8
14
3
4
31
10
29
15
23
33
34
16
19
21
27
30
32
28
24
26
25
Figure 1. Partitions of karate club network by GSBM-P. The size of each vertex is
proportional to its degree and the color reflects the group membership.
Figure 2. Partition of political blogs network by GSBM-P. The size of each vertex is
proportional to its degree and the color reflects the group membership.
objective function value (i.e., Eq. (17) or Eq. (18)) of the true partition is higher than
that of the partition with misidentification of vertex 10. Thus GSBM-P performs better
in karate club network.
For GSBM-P, we observed that vertices with higher degree have generally higher
node preference inside one community, and in karate club network, the pair of vertices
with higher degree inside one community are more likely to be connected. It is the same
as expected by the model, which expects the weight of edge linked to pair of vertices
with higher node preference should be larger.
We then show how our method performs in a larger network. political blogs data set
[25] is a network of directed hyperlinks between political blogs whose largest connected
component contains 1222 nodes. In this paper, we use the undirected form. Fig. 2 shows
the result of our method in the larget connected component of political blog network.
GSBM-P discovers 9 communities with 7 tiny communities and 2 major
communities that are roughly two political tendencies. The normalized mutual
information of obtained partition is 0.678.
If we merge small communities to one of
the two major communities, normalized mutual information increases to 0.724. The
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms13
performance is very close to that of the degree corrected stochastic blockmodel [13]
with given cluster number.
4.2. Synthetic networks
4.2.1. Unweighted synthetic networks Since our model treats the block indicators as
parameters, the maximum likelihood estimation of the block indicators of vertices may
be bias especially when these vertices have very small degree. To check overfitting, the
coordinate ascent method for GSBM-P is tested on Erdos-R´enyi random graphs [28]
where no community structures exist. Analogous to [34], the network sizes are fixed to
1000 nodes, and the average degrees in all random graphs range from 10 to 100. Our
method is run 10 times on each random graph and the results with highest objective
function value are chosen. The number of discovered communities in each random graph
is illustrated in Fig. 3(a). It shows that the coordinate ascent method is not overfitting
when the average degree is not too small. In Erdos-R´enyi random graphs with network
size equal to 1000, our method begins to identify the whole network as a community
when the average degree is 40, though it fails in some generated Erdos-R´enyi random
graphs with average degree equal to 40.
We also show how number of communities found by our method varies with respect
to the network size of Erdos-R´enyi random graphs in Fig .3(b). It can be observed that
when the system size of Erdos-R´enyi random graphs increases, our method demands
larger average degree to find only one community in Erdos-R´enyi random graphs. It
implies that our method may overfit in networks with large communities when the intra-
community degree of vertices remains the same, in that it may not recognize planted
community as only one community. To deal with this situation, one can evaluate the
significance of obtained communities and merge the less significant communities into
other communities. This process will decrease the number of communities. One property
of our method and label propagation algorithms is that the number of communities will
not increase in the iterations. Thus, it is reasonable to apply our method again after
the mergence procedure.
Our method is also tested on resolution limit test benchmark networks [35].
Analogous to [36], the networks are composed by cliques with 4 vertices and each clique
is linked to the next clique with an edge to form a ring. Both of our method and label
propagation algorithm [3] are run 10 times on each network and the average number
of discovered communities is shown in Fig. 4. Each time, our method discovers the
correct communities. Hence, in Fig. 4, the red line covers the green dashed line which
represents the number of planted communities. Thus, our method tends not to suffer
from resolution limit. However, the blue error bars in Fig. 4 imply that LPA algorithm
is not stable. The average number of discovered communities of LPA is less than the
planted, because LPA sometimes identifies several cliques as one community.
We then test the algorithms in the unweighted benchmark networks proposed by
[26]. Experiments show that the coordinate ascent method for
Lancichinetti et al.
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms14
(a)
(b)
Figure 3. Overfitting checking on Erdos-R´enyi random graphs [28]. Each data point
is an average over 30 graphs. In (a), we show the discovered number of communities
with respect to the average degree. The number of vertices in each graph is fixed
to 1000. In (b), we show the discovered number of communities with respect to the
system size.
Figure 4. Resolution limit test on benchmark networks [35]. The networks are
composed by cliques with 4 vertices and each clique is linked to the next clique with
an edge to form a ring. We show the number of discovered communities in networks
composed by different number of cliques varying from 8 to 24. Each data point is an
average over 10 runs.
GSBM-P is superior to LPA in those networks, and achieves a similar performance to
OSLOM.
There are several parameters to generate the benchmark networks, including the
number of vertices n, average degree, maximum degree, the degree distribution, the
community size distribution, the range of community size C, and the ratio that a
vertex links to vertices outside its community (i.e., topological mixing parameter µt).
When the mixing parameter is smaller than 0.5, the communities in generated networks
are strong communities [37] where each vertex has more connections with vertices
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms15
inside its community than vertices outside the community. When topological mixing
parameter µt = 1 in benchmark networks, communities of planted partition have no
intra-community edges.
We set two kind of parameters with different range of community size according to
[34] while leaving the mixing parameter µt as the independent variable. We compare
GSBM-P with LPA-P and LPA. The ratio of relative normalized mutual information
(Eq.
(26)) between the obtained partition and planted partition is calculated. For
OSLOM, adjusted NMI [31] is calculated. Fig. 5 shows how the performance of these
algorithms vary according to the mixing parameter in two kind of networks.
(a)
(b)
Figure 5. Performance with respect to the mixing parameter µt
for different
algorithms on two unweighted test benchmarks [26]. We use ratio of relative normalized
mutual information (Eq. (26)) for LPA, LPA-P and GSBM-P. We use adjusted NMI
[31] for OSLOM. Each data point is an average over 30 networks generated by the
same parameters. In two subfigures, the size of networks is 1000, the average degree is
20, and the maximum degree is 50. In (a), the range of community size is C = [10, 50].
In (b), the range of community size is C = [20, 100].
From Fig. 5(a) and Fig. 5(b), it can be seen that the planted partition is an
optimum of our method when the mixing parameter µt is small. When mixing parameter
µt is small, coordinate ascent method for GSBM-P always converges to the optimum in
every run. Our method outperforms LPA. The label propagation approach applied in
LPA is very suitable for finding strong communities. However, as the mixing parameter
is larger than 0.5 (i.e., weak communities), LPA fails. The performance of LPA-P is not
satisfying.
We can not directly compare the performance of our coordinate ascent method for
GSBM-P with OSLOM since their performance are evaluated by different measures.
However, values of both measures equal one when the obtained partition or covering
is identical to planted partition. Fig. 5(a) shows that our coordinate ascent method
recovers planted partition in a similar range of topological mixing parameters to OSLOM
in networks with small communities. Fig. 5(b) shows that the performance of our
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms16
coordinate ascent method is close to that of OSLOM in networks with large communities.
We then show the corresponding average number of communities found by different
algorithms in Fig. 6. The average number of planted communities is also shown.
LPA discovers one community when topological mixing parameter µt equals or is larger
than 0.6 in benchmark networks with small communities, and equals or is larger than
0.5 in benchmark networks with large communities.
In benchmark networks with
small communities, our coordinate ascent method for GSBM-P discovers reasonable
number of communities in a similar range of topological mixing parameters to OSLOM.
However, in benchmark networks with large communities, our method discovers more
communities when µt equals or is larger than 0.55. As discussed above, it may improve
the performance of our method if mergence procedure is introduced.
(a)
(b)
Figure 6. Number of communities found with respect to the mixing parameter µt for
different algorithms on two unweighted test benchmarks [26]. Each data point is an
average over 30 networks generated by the same parameters. In two subfigures, the
size of networks is 1000, the average degree is 20, and the maximum degree is 50. In
(a), the range of community size is C = [10, 50]. In (b), the range of community size
is C = [20, 100].
We then show the running time of algorithms in Fig. 7. In Fig. 7, GSBM-P(alter)
represents the alternative coordinate ascent method for GSBM-P that only updates
node preferences everytime all vertices are traversed. Mixing parameter µt is set to
0.1, while parameters other than the number of vertices and community size are setting
according to [34]. In Fig. 7(a), the community sizes are fixed to range from 20 to 100,
and the number of vertices varies among the test networks. In Fig. 7(b), network sizes
are fixed to 3000, the community size varies. The community size in x axis represents
the average value, for instance, 390 in x axis represents the community sizes ranges from
370 to 410, and so forth.
It shows that the running time of our method is linear to network size and
community size. For very large networks with large communities, the alternative
coordinate ascent method can be applied.
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms17
(a)
(b)
Figure 7. Running time with respect to the network size and community size for
different algorithms on unweighted test benchmarks [26]. Each data point is an average
over 100 runs. In two subfigures, the average degree is 20 ,the maximum degree is 50
and the topological mixing parameter µt is 0.1. In (a), the range of community size is
C = [20, 100]. In (b), the size of networks is 3000.
4.2.2. Weighted synthetic networks We then test the algorithms in the weighted
benchmark networks proposed by Lancichinetti and Fortunato [27]. The weights of
edges are non-negative in these benchmark networks.
There are two more parameters in weighted benchmark networks than unweighted
benchmark networks, namely β which controls the power-law relation between the sum
of weights a vertex links to its neighbors and the vertex's degree, and the ratio of weights
a vertex links to vertices outside its community (i.e., mixing parameter µw).
We compare our method with LPA and the variational Bayes method for WSBM.
We set the parameter α in WSBM (see Eq. (8)) to 0.0 and 0.5, corresponding to pure
WSBM and WSBM with auxiliary degree correction respectively. Number of planted
communities is given for WSBM in all networks. We set two kind of parameters with
different topological mixing parameter while leaving the mixing parameter µw as the
independent variable. The network sizes are fixed to 150, the average degree is 15, and
the maximum degree is 30, and all other parameters are identical to that in [34]. The
results are illustrated in Fig. 8. For algorithms that have an objective function, each
point in Fig. 8 shows the average rrNMI over the results with highest objective function
values in 10 runs on each of 30 networks.
When µw is 1.0, communities in planted partition have total intra-community edge
weights close to zero. Both LPA and the coordinate ascent method for GSBM-P fail to
obtain partitions similar to the planted partition. WSBM can group vertices with similar
connectivity pattern, and do discover some communities with total intra-community
edge weights close to zero. Thus, rrNMI is much larger than 0 for WSBM when µw is
1.0.
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms18
(a)
(b)
Figure 8. Performance with respect to the mixing parameter µw for different
algorithms on two small weighted test benchmarks [27]. We use ratio of relative
normalized mutual information (Eq. (26)) for WSBM, LPA and GSBM-P. We use
adjusted NMI [31] for OSLOM. Each data point is an average over 30 networks
generated by same parameters. In (a) and (b), the size of networks is 150, the average
degree is 15, the maximum degree is 30, and the range of community size is C = [10, 20].
In (a), the topological mixing parameter µt is 0.5.
In (b), the topological mixing
parameter µt is 0.8.
The variational Bayes algorithm for WSBM is actually not efficient. For example,
it often reaches a poor local optimum. Only sometimes,
it reaches a better result
with higher marginal likelihood, which may not presents in 10 runs. Sometimes, the
variational Bayes algorithm even is not converged in 200 iterations. From Fig. 8,
WSBM fails to give a good partition even when mixing parameter µw is small, which
may due to the lack of degree correction for modeling edge weights. Moreover, the time
complexity of each iteration of naive variational Bayes algorithm for WSBM is O(mK 2),
where m denotes the total number of edges in networks and K denotes the number of
communities, which limits its application in very large networks. The coordinate ascent
method for GSBM-P performs much better, and is comparable to LPA. In Fig. 8(a),
when mixing parameter µw is small, it recovers the planted partition. For OSLOM, it is
sensible to topological mixing parameter µt. In figure 8(b), the performance of OSLOM
is unsatisfactory, and OSLOM identifies each vertex as a community when µw is larger
than 0.35. In figure 8(a), OSLOM returns same communities as planted communities
in some tested benchmark networks with small µw, but different communities in other
tested benchmark networks with small µw.
We show the performance of our method in weighted networks with 1000 vertices.
We set four kind of parameters with different range of community size and different
topological mixing parameter according to [34] while leaving the mixing parameter µw
as the independent variable. The results are illustrated in Fig. 9. Here we omit the
presentation of WSBM, because it takes too much time to run on these networks.
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms19
(a)
(b)
(c)
(d)
Figure 9. Performance with respect to the mixing parameter µw for different
algorithms on four weighted test benchmarks [27]. We use ratio of relative normalized
mutual information (Eq. (26)) for LPA, LPA-P and GSBM-P. We use adjusted NMI
[31] for OSLOM. Each data point is an average over 30 networks generated by same
parameters. In four subfigures, the size of networks is 1000, the average degree is 20,
and the maximum degree is 50. In (a), the range of community size is C = [10, 50]
and the topological mixing parameter µt is 0.5. In (b), the range of community size
is C = [20, 100] and the topological mixing parameter µt is 0.5. In (c), the range of
community size is C = [10, 50] and the topological mixing parameter µt is 0.8. In (d),
the range of community size is C = [20, 100] and the topological mixing parameter µt
is 0.8.
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms20
In all of the four groups of weighted benchmark networks, the coordinate ascent
method for GSBM-P recovers the planted partition(see Fig. 9(a)) or achieves the results
whose rrNMI are only slightly lower than that of LPA (see Fig. 9(b), Fig. 9(c) and
Fig. 9(d)). When mixing parameter µw is slightly larger, our method outperforms
LPA. In Fig. 9(c) and Fig. 9(d), LPA discovers much more communities than the
planted partition even when the mixing parameter µw is small.
It implies that the
communities are not well connected inside themselves. The performance of our method
is again comparable to LPA on those benchmark networks, while LPA-P is not satisfying.
OSLOM performs really well in benchmark networks when µt = 0.5, but again fails when
µt = 0.8.
5. Conclusions and Future Work
In this paper, we proposed the Gaussian stochastic blockmodel with node preference
(GSBM-P). The maximum likelihood estimation of GSBM-P is proved to be equivalent
to maximizing the objective function below:
QGSBM−P = Xz
λ2
z ,
where λz is the principal eigenvalue of the adjacency submatrix in community z.
We then proved that our coordinate ascent method optimizes our objective function
in a similar way to label propagation with node preference. We demonstrated that the
vector composed by node preferences of vertices inside community z is the product of
√λz and the intra-community eigenvector centrality, i.e. the L2-normalized dominant
eigenvector of the adjacency matrix inside the community.
Experiments showed that the coordinate ascent method for Gaussian stochastic
blockmodel with node preference worked well
It outperforms the
variational Bayes method for weighted stochastic blockmodel and label propagation with
intra-community RandomWalk as node preference in the aspect of community detection.
In unweighted networks, the coordinate ascent method for GSBM-P is superior to LPA,
and achieves similar performance to OSLOM. In weighted networks, the performance of
our method is comparable to LPA.
in most cases.
Subelj and Bajec [4] have proposed that the iterative order implicitly contains the
propagation strength. In the future, we may explore the suitable iterative order for our
coordinate ascent method. Moreover, coordinate ascent method is not the only way to
optimize our objective function. We may explore different optimization algorithms in
the future. We make two strong assumptions for our model, such that it is related to
label propagation algorithms. However, these assumptions may be strict. The first one is
that we fixed the expected edge weights between distinct communities to be zero. In the
future, we may try to leave this small expected inter-community edge weight as a tunable
parameter. The second one is that we treat the block indicators as parameters. Possible
future work also includes placing a prior on block indicators and adopts more advanced
approximation inference methods such as variational Expectation Maximization.
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms21
6. Acknowledgement
We thank Christopher Aicher for providing the implementation of weighted stochastic
blockmodel. We thank Andrea Lancichinetti, Filippo Radicchi, Jos´e Javier Ramasco and
Santo Fortunato for providing the implementation of order statistics local optimization
method. We thank Pan Zhang for providing the implementation of relative normalized
mutual information.
7. References
[1] Girvan M and Newman M E 2002 Proceedings of the National Academy of Sciences 99 7821 -- 7826
[2] Newman M E J and Girvan M 2004 Physical Review E 69 026113
[3] Raghavan U N, Albert R and Kumara S 2007 Physical Review E 76 036106
[4] Subelj L and Bajec M 2011 The European Physical Journal B-Condensed Matter and Complex
Systems 81 353 -- 362
[5] Barber M J and Clark J W 2009 Physical Review E 80 026129
[6] Leung I X, Hui P, Lio P and Crowcroft J 2009 Physical Review E 79 066107
[7] Subelj L and Bajec M 2011 Physical Review E 83 036103
[8] Liu X and Murata T 2010 Physica A: Statistical Mechanics and its Applications 389 1493 -- 1500
[9] Schuetz P and Caflisch A 2008 Physical Review E 77 046112
[10] Brin S and Page L 1998 Computer networks and ISDN systems 30 107 -- 117
[11] Holland P W, Laskey K B and Leinhardt S 1983 Social networks 5 109 -- 137
[12] Hofman J M and Wiggins C H 2008 Physical Review Letters 100 258701
[13] Karrer B and Newman M E 2011 Physical Review E 83 016107
[14] Airoldi E M, Blei D M, Fienberg S E and Xing E P 2008 Journal of Machine Learning Research
9 3
[15] Aicher C, Jacobs A Z and Clauset A 2014 arXiv preprint arXiv:1404.0431
[16] Gopalan P, Wang C and Blei D 2013 Modeling overlapping communities with node popularities
Advances in Neural Information Processing Systems pp 2850 -- 2858
[17] Aicher C, Jacobs A Z and Clauset A 2013 arXiv preprint arXiv:1305.5782
[18] Tib´ely G and Kert´esz J 2008 Physica A: Statistical Mechanics and its Applications 387 4982 -- 4984
[19] Bonacich P 1987 American journal of sociology 1170 -- 1182
[20] Lancichinetti A, Radicchi F, Ramasco J J and Fortunato S 2011 PloS one 6 e18961
[21] Kleinberg J M 1999 Journal of the ACM 46 604 -- 632
[22] He S, Zou X, Xiao L and Hu J 2014 Construction of diachronic ontologies from peoples daily of
fifty years Language Resources and Evaluation Conference pp 3258 -- 3263
[23] Traag V A, Van Dooren P and Nesterov Y 2011 Physical Review E 84 016114
[24] Zachary W 1977 Journal of anthropological research 33 452 -- 473
[25] Adamic L A and Glance N 2005 The political blogosphere and the 2004 us election: divided they
blog Proceedings of the 3rd international workshop on Link discovery (ACM) pp 36 -- 43
[26] Lancichinetti A, Fortunato S and Radicchi F 2008 Physical Review E 78 046110
[27] Lancichinetti A and Fortunato S 2009 Physical Review E 80 016118
[28] Erdos P and R´enyi A 1959 Publ. Math. Debrecen 6 290 -- 297
[29] Witten I H and Frank E 2005 Data Mining: Practical machine learning tools and techniques
(Morgan Kaufmann)
[30] Zhang P 2015 arXiv preprint arXiv:1501.03844
[31] Lancichinetti A, Fortunato S and Kert´esz J 2009 New Journal of Physics 11 033015
[32] Agarwal G and Kempe D 2008 The European Physical Journal B-Condensed Matter and Complex
Systems 66 409 -- 418
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms22
[33] Koutsourelakis P S and Eliassi-Rad T 2008 Finding mixed-memberships in social networks. AAAI
Spring Symposium: Social Information Processing pp 48 -- 53
[34] Lancichinetti A and Fortunato S 2009 Physical Review E 80 056117
[35] Fortunato S and Barthelemy M 2007 Proceedings of the National Academy of Sciences 104 36 -- 41
[36] Subelj L and Bajec M 2011 arXiv preprint arXiv:1110.2711
[37] Radicchi F, Castellano C, Cecconi F, Loreto V and Parisi D 2004 Proceedings of the National
Academy of Sciences 101 2658 -- 2663
|
1301.5809 | 3 | 1301 | 2013-02-18T13:56:21 | Producing a Unified Graph Representation from Multiple Social Network Views | [
"cs.SI",
"physics.soc-ph"
] | In many social networks, several different link relations will exist between the same set of users. Additionally, attribute or textual information will be associated with those users, such as demographic details or user-generated content. For many data analysis tasks, such as community finding and data visualisation, the provision of multiple heterogeneous types of user data makes the analysis process more complex. We propose an unsupervised method for integrating multiple data views to produce a single unified graph representation, based on the combination of the k-nearest neighbour sets for users derived from each view. These views can be either relation-based or feature-based. The proposed method is evaluated on a number of annotated multi-view Twitter datasets, where it is shown to support the discovery of the underlying community structure in the data. | cs.SI | cs |
Producing a Unified Graph Representation from
Multiple Social Network Views
Derek Greene and P´adraig Cunningham
School of Computer Science & Informatics, University College Dublin
{derek.greene,padraig.cunningham}@ucd.ie
Abstract. In many social networks, several different link relations will
exist between the same set of users. Additionally, attribute or textual
information will be associated with those users, such as demographic
details or user-generated content. For many data analysis tasks, such
as community finding and data visualisation, the provision of multiple
heterogeneous types of user data makes the analysis process more com-
plex. We propose an unsupervised method for integrating multiple data
views to produce a single unified graph representation, based on the
combination of the k-nearest neighbour sets for users derived from each
view. These views can be either relation-based or feature-based. The pro-
posed method is evaluated on a number of annotated multi-view Twitter
datasets, where it is shown to support the discovery of the underlying
community structure in the data.
1
Introduction
Social networks are often represented using multiple views or relations that share
all, or part of the same user set. In many cases, these views will consist of graphs
with heterogeneous edge types, where each type has different semantics, along
with different frequency or weight distributions [3]. For instance, in the case of
Twitter, we can characterise users by the accounts whom they follow (or who
follow them), the users whom they retweet (or who retweet them), the curated
lists to which they have been assigned, and so on. In bibliographic networks, we
can describe groups of researchers in terms of either their co-authorship relations
or co-citation links. Additionally, users in real-world social networks often have
associated attribute information, such as demographic details or user-generated
textual content (e.g. the content of a user’s tweets on Twitter; a collection of
abstracts for papers published by a researcher).
For many social network analysis tasks, it will be preferable to work with a
unified representation that summarises the information provided by all the data
views, rather than working separately on the individual views. A wide variety of
community finding algorithms have been proposed in the literature that assume
the existence of a single relation between nodes [5]. However, increasingly there is
interest in uncovering community structure from richer data sources that provide
multiple relations [12]. From a visualisation perspective, it is much easier to
interpret a graph with a single aggregated relation (as shown in Figs. 2-4), than
it is to interpret representations that include multiple different types of relations
(e.g. retweet, follows, mentions). In the task of user curation on social media
platforms, it is necessary to combine information from multiple views to produce
a definitive set of recommendations [9].
In Section 3, we propose a new method for integrating multiple data views to
provide a sparse, unified graph representation, which retains the most informa-
tive connections from the original views. The aggregation process is performed
at a local level, by combining the ranked neighbour sets for each individual user,
and then constructing an overall directed nearest neighbour graph from the lo-
cal neighbour sets. Unlike many alternative approaches, the views can be either
relation-based or feature-based, once a similarity or ranking measure is defined
on those views. The views can be incomplete (i.e. not all users are present in
each view), once there is a partial mapping between the views. Also, there is no
requirement to manually select parameters indicating the relative importance
of the different views, and no requirement for supervision in the form of la-
belled training examples. In Section 4, we describe evaluations on a collection
of annotated Twitter datasets, which show that the unified graphs facilitate the
identification of meaningful community structure from multi-view data. In Sec-
tion 5, we conclude with a discussion of extensions and further applications for
our proposed method.
2 Related Work
A range of techniques have been described for clustering across multiple feature-
based views. Bickel & Scheffer [2] introduced multi-view versions of the tradi-
tional k-Means and EM clustering algorithms, which operate by interleaving
the optimisation processes for the different views. Zhou & Burges [14] proposed
a spectral clustering approach for application to multiple graphs sharing the
same set of nodes, based on a mixture of Markov chains defined on the different
views. The relative importance of each graph is defined by a manually-specified
parameter. Greene & Cunningham [8] proposed a “late integration” strategy
for clustering heterogeneous data sources, based on the concept of cumulative
voting in unsupervised ensembles. The strategy was applied to bibliographic
data, consisting of co-citation relations and paper abstracts represented using a
bag-of-words model. More recently, Liu et al. [11] proposed a joint non-negative
matrix factorisation algorithm, which applies an iterative update procedure to
find a consensus between the input matrices. The influence of each view on the
outcome is determined by a user-specified set of regularisation parameters.
In the context of network analysis, the direct integration of multiple re-
lation types can prove difficult, if the relations in the different views are not
comparable, or if the relations in one view are considerably more sparse than
another [12]. Cai et al. [3] emphasised the importance of mining heterogeneous
relations in social networks to identify hidden groups. The authors proposed a
regression-based technique to find the optimal linear combination of a number of
different weighted relation matrices, relying on a set of input examples that have
been assigned community labels. Based on the combined relations, the authors
then applied a spectral clustering algorithm to produce disjoint communities.
Recently, Gollini & Murphy [6] proposed an extension of existing latent space
models for jointly modelling information from multiple network link relations
on a given set of nodes. To fit the model, the authors use a variational Bayes
inference approach, supporting the analysis of up to thousands of nodes.
While most community finding algorithms assume the existence of only one
kind of relation, Tang et al. [12] focused on the problem of finding groups of
related users in “multi-dimensional networks”. The authors described a range of
alternative strategies, including modularity-based community finding applied to
the average interaction network among a group of users, a “feature integration”
strategy where structural features from different views are mapped into the same
compatible space, and a strategy based on an ensemble of clusterings generated
on different views. These alternatives were evaluated on synthetic data and a
dataset of YouTube users represented via five network views, where the feature
integration strategy was shown to be most effective.
3 Methods
We now propose a method to produce a unified network representation from
either feature-based or relational views on a set of social network users. Specifi-
cally, we propose the application of SVD rank aggregation to a matrix encoding
multiple nearest neighbour sets for each user. This form of rank aggregation has
been previously used in identifying anomalous behaviour [13], and for recom-
mending users in list curation [9]. The resulting aggregated per-user rankings
are then combined to form a global graph covering all users. This sparse graph
represents a unified summarisation of the strongest connections between users
across all views.
3.1 Neighbour Set Identification
The input to the aggregation process is a dataset of users {u1 , . . . , un}, along with
l different views, each representing some or all of the n users. These views may
be relation-based or feature-based. The only requirement is that some measure
of similarity is provided for each view – either a metric or non-metric measure
can be used. The only parameter required for the aggregation process is a value
for the number of nearest neighbours k . This value controls the sparsity of the
output graph – a lower value of k will result in a less dense graph. The first
phase of the aggregation process is as follows, for each user ui :
1. For each view j = 1 to l, compute a similarity vector vij between ui and all
other users present in that view, using the similarity measure provided for
the view.
2. From the values in vij , produce a rank vector of all other (n− 1) users relative
to ui , denoted rij . In cases where not all users are present in view j , missing
(a) view 1
(b) view 2
(c) view 3
(d) aggregated
Fig. 1. Example of the proposed aggregation method, involving six users and three
views. Graphs (a)-(c) show the ranked neighbour sets for the user u1 for k = 3. By
combining the ranks from these neighbourhoods, we produce the aggregated neighbour
set {u2 , u3 , u4 } for u1 , as shown in (d).
users are assigned a rank of (n(cid:48)
j + 1), where n(cid:48)
j is the number of users present
in the view.
3. Stack all l rank vectors as columns, to form the (n − 1) × l rank matrix Ri ,
and normalise the columns of this matrix to unit length.
T
4. Compute the SVD of R
i , and extract the first left singular vector. Arrange
the entries in this vector in descending order, to produce a ranking of all
other (n − 1) users. Then select the k highest ranked users as the neighbour
set of ui .
A simple example illustrating the method is shown in Fig. 1. The procedure can
be readily parallelised by processing multiple users simultaneously. In addition,
the time required for the aggregation process can be reduced considerably by
computing the truncated SVD of the rank matrices. While many alternative
rank aggregation techniques exist that could be used in conjunction with our
method (e.g. [10]), we choose SVD ranking for computational reasons.
3.2 Unified Graph Construction
Once the k-nearest neighbour sets have been identified for all n users, we use
this information to build a global graph representation of the dataset. A natural
approach to combine the sets is to construct the corresponding asymmetric k-
nearest-neighbour graph. Specifically, we construct a directed unweighted graph,
where each node is a user and an edge exists from node i to j , if uj is contained
in the neighbour set of ui . This process yields a sparse, unified graph encod-
ing the connectivity information derived from all original views in the dataset,
representing all users that were present in one or more of those views.
Note that, since the neighbour relations produced using the above method
are not necessarily symmetric, it can be the case that an edge exists from ui
to uj , but not from uj to ui . In applications where directed graphs are not
appropriate (e.g. for certain community finding algorithms), we can readily build
an undirected mutual nearest neighbour graph based on shared neighbours [7].
u1u2u3u4132u1u2u4u5312u1u2u313u62u1u2u3u4u51u6324 Evaluation
We now examine the degree to which the aggregation method proposed in Sec-
tion 3 preserves the most informative underlying associations between users in
the original views, as determined by ground truth community assignments.
4.1 Datasets
For our evaluation, we collected five new Twitter datasets, for which sets of
manually-curated ground truth communities are available.
footbal l : A collection of 248 English Premier League football players and clubs
active on Twitter. The disjoint ground truth communities correspond to the
20 individual clubs in the league.
olympics : A dataset of 464 users1 , covering athletes and organisations that
were involved in the London 2012 Summer Olympics. The disjoint ground
truth communities correspond to 28 different sports.
politics-ie : A collection of Irish politicians and political organisations, assigned
to seven disjoint ground truth groups, according to their affiliation.
politics-uk : 419 Members of Parliament (MPs) in the United Kingdom. The
ground truth consists of five groups, corresponding to political parties.
rugby : A collection of 854 international Rugby Union players, clubs, and or-
ganisations currently active on Twitter. The ground truth consists of over-
lapping communities corresponding to 15 countries. In the case of players,
these user accounts can potentially be assigned to both their home nation
and the nation in which they play club rugby.
Summary statistics for the five datasets are provided in Table 1. Pre-processed
versions of these datasets are available online2 .
Table 1. Summary of Twitter datasets used in our evaluations, including total number
of users, tweets, user lists, and the number of associated ground truth communities.
Dataset
footbal l
olympics
politics-ie
politics-uk
rugby
# Users # Tweets # User Lists # Communities
20
7,814
351,300
248
464
725,662
4,942
28
7
1,047
267,488
348
5
3,614
539,592
419
854
1,166,379
5,900
15
For each dataset, we constructed a heterogeneous collection of nine network-
and content-based views, containing some or all of the complete set of Twitter
1 A subset of a Twitter user list originally curated by The Telegraph in 2012:
https://twitter.com/Telegraph2012/london2012
2 See http://mlg.ucd.ie/networks
users for that dataset. In all cases, cosine similarity is applied to the represen-
tation to produce the pairwise similarities used in the aggregation process. For
a more detailed explanation of the representations listed below, consult [9].
1. tweet content: User content profiles, constructed from the concatenation of
the 500 most recently-posted tweets for each user.
2. list text: List content profiles, constructed from the concatenation of both
the names and the descriptions of the 500 Twitter lists to which each user
has most recently been assigned.
3. follows: From the unweighted directed follower graph, construct binary user
profile vectors based on the users whom they follow (i.e. out-going links).
4. followed-by: From the unweighted directed follower graph, construct binary
user profile vectors based on the users that follow them (i.e. incoming links).
A pair of users are deemed to be similar if they are frequently “co-followed”
by the same users.
5. mentions: From the weighted directed mention graph, construct user profile
vectors based on the users whom they mention.
6. mentioned-by: From the weighted directed mention graph, construct binary
user profile vectors based on the users that mention them. A pair of users
are deemed to be similar if they are frequently “co-mentioned” by the same
users.
7. retweets: From the weighted directed retweet graph, construct user profile
vectors based on the users whom they retweet.
8. retweeted-by: From the weighted directed retweet graph, construct user
profile vectors based on the users that retweet them. Users are deemed to
be similar if they are frequently “co-retweeted” by the same users.
9. co-listed: Based on Twitter user list memberships, construct an unweighted
bipartite graph, such that an edge between a list and a user indicates that
the list contains the specified user. A pair of users are deemed to be similar
if they are frequently linked to the same lists. Again, we only consider the
500 lists to which each user has been assigned most recently assigned.
4.2 Evaluation Measures
Ding & He [4] formalised the concept of k-nearest-neighbour consistency for
clustering. That is, for any item in a cluster, its k-nearest neighbours should also
be assigned to the same cluster. Motivated by this work, given a ground truth set
of user communities, we evaluate the degree to which alternative views preserve
the k-nearest-neighbour consistency of those communities. A representation of
the data that corresponds well to the ground truth will have a high level of
consistency, while a representation that does not preserve the structure of the
ground truth will yield a low level of consistency.
For a single user ui and view, we can compute the user consistency as the
fraction of that user’s k nearest neighbours in that view that are assigned to the
same ground truth community. In the case of overlapping ground truth commu-
nities, we generalise by counting the fraction of neighbours that are assigned to
at least one community also containing ui . For a complete dataset, we compute
the micro-average consistency as the simple average of all n user consistency
scores. As with traditional micro-averaged classification accuracy, this will tend
to reflect performance on larger communities, where community sizes are un-
balanced. Therefore, we also compute the macro-average consistency as follows:
for each ground truth community, we calculate the average user consistency for
users assigned to that community; an overall score for the dataset is calculated
as the simple average of all community scores. Thus, in the macro measure, both
small and larger ground truth communities are weighted equally.
4.3 Discussion
When we apply our proposed approach to the five Twitter datasets, a visual
inspection of the output (based on force-directed layouts produced using Gephi
[1]) highlights the sparsity of the unified graphs. In a number of cases we see al-
most entirely disconnected components, where users assigned to the same ground
truth communities are densely-connected, while there is little connectivity be-
tween those communities. This is particularly clear in the case of the two political
datasets. For instance, in Fig. 2 we see that, for the unified graph at k = 5, there
Fig. 2. Unified graph constructed from nine views of the politics-uk dataset (k = 5).
Users are coloured and labelled based on a ground truth, corresponding to five different
political groupings.
LabourConservativeLiberal DemocratSNPOtheris a clear separation between the various political groupings, with only a handful
of long-range inter-community links in the graph. Given that we can see the sepa-
ration clearly by visual inspection alone, any reasonable single-mode community
finding algorithm should be able to identify this grouping.
It is interesting to note that our approach also supports the discovery of
sub-communities relative to the ground truth, which had not been identified
manually. In Fig. 2, we observe that the community for the Labour Party contains
a smaller sub-community of users. On inspecting these accounts, it is apparent
that they correspond to Labour Party MPs based in Scotland. Fig. 3 shows that
the aggregated approach clearly divides the data in the footbal l dataset according
to the different Premier League clubs. The small number of weak ties between
clubs almost all indicate players who have recently been transferred or loaned
between clubs, leading to some conflicting information, particularly in the cases
of their less recent tweet content and user list assignments.
Fig. 3. Unified graph constructed from nine views of the footbal l dataset (k = 5).
Groups of users are coloured and labelled based on a ground truth, corresponding to
20 English Premier League clubs.
WiganReadingFulhamWest BromArsenalChelseaEvertonSouthamptonStokeLiverpoolNewcastleMan CityWest HamNorwichSwanseaSpursMan UtdAston VillaSunderlandA more complex picture is visible in the case of the rugby dataset in Fig. 4.
The presence of overlapping nodes generally leads to a higher level of connectivity
between communities. Again we see strong evidence for sub-communities within
the ground truth communities – in particular we see sub-groups corresponding
to individual clubs based in England, Ireland, Scotland, and Australia. Also,
we see that certain nodes lying between communities correspond to players who
have recently transferred between clubs located in different countries. Overall,
we observed similar patterns of clustering behaviour across all the datasets, for
a wide range of k values.
Fig. 4. Unified graph constructed from nine views of the rugby dataset (k = 5). Users
are coloured and labelled based on a ground truth, corresponding to 15 different coun-
tries. Users assigned to multiple communities are coloured in grey.
IrelandEnglandNewZealandScotlandAustraliaFranceWalesItalySouthAfricaArgentinaTo quantitatively analyse the effectiveness of our method, we calculated
micro-average and macro-average consistency scores, for neighbourhood sizes
k ∈ [2, 15]. We then compared the scores afforded by the k-nearest neighbours
for the individual views with those achieved by the unified graph. Fig. 5 shows
the micro-average consistency scores for the nine individual views, plus the ag-
(a) footbal l
(b) olympics
(c) politics-ie
(d) politics-uk
(e) rugby
Fig. 5. Comparison of micro-average consistency scores for k ∈ [2, 15], calculated on
nine individual views and the resulting unified graph, across five Twitter datasets.
0.000.100.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.800.850.900.951.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweetsgregated representation. In four of the five datasets, the unified graph provides
a higher level of consistency among neighbours than any of the individual views.
It is only in the case of the politics-uk dataset that the co-listed view out-
performs the aggregated approach. Here it appears that there is a high number
of carefully-curated user lists on Twitter corresponding to UK political party
(a) footbal l
(b) olympics
(c) politics-ie
(d) politics-uk
(e) rugby
Fig. 6. Comparison of macro-average consistency scores for k ∈ [2, 15], calculated on
nine individual views and the resulting unified graph, across five Twitter datasets.
0.000.100.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.600.650.700.750.800.850.900.95 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweetsmemberships, while the aggregation method is somewhat affected by the poor
quality of information provided by tweet content. In Fig. 6, the macro-average
consistency scores for experiments on the five datasets are shown. We see simi-
lar trends for the datasets as in Fig. 5, with the aggregation method performing
well, even in the presence of unbalanced ground truth community sizes, such
as in the politics-ie and olympics datasets. Again, it is only in the case of the
politics-uk dataset where an individual view achieves higher scores.
One key observation that can be made from the above results is that no
single individual view out-performs all others on every dataset. So while, for
example, user lists are highly-informative in the case of the politics-uk dataset,
user list information proves far less useful for identifying distinct political group-
ings in the case of the politics-ie dataset. In general, we will typically not know
a priori which individual view is most informative for a given dataset. This will
prove problematic for multi-view analysis methods that require the relative im-
portance of each view to be specified as an input parameter. In contrast, our
proposed method does not require the manual prioritisation or weighting of the
constituent views, and performed robustly across all datasets in our experiments.
5 Conclusions
We have demonstrated that we can use a form of rank aggregation applied to
nearest neighbour sets to construct a single unified graph from multiple hetero-
geneous data views. Evaluations on a number of annotated Twitter datasets have
shown that the unified graphs can preserve and highlight the underlying com-
munity structure in the data. We suggest that this procedure will prove useful as
a pre-processing step prior to other network analysis tasks, such as community
finding, visualisation, and user recommendation.
In our current model, each user in the aggregated graph has at most k out-
going edges. In future work, we plan to examine the adaptive selection of k
on a per-user basis, to allow for hub users with many connections, or outlying
users with little connectivity in any of the data views. We also plan to expand
our evaluations to include the use of unified graphs in conjunction with existing
community finding algorithms. Our method also has potential applications in
cross-network analysis, to support the combination of partial views from multi-
ple social media platforms, such as Twitter and Facebook.
Acknow ledgments. This research was supported by Science Foundation Ireland
Grant 08/SRC/I1407 (Clique: Graph and Network Analysis Cluster).
References
1. M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for
exploring and manipulating networks. In Proc. 3rd International Conference on
Weblogs and Social Media (ICWSM’09), pages 361–362. AAAI, 2009.
2. S. Bickel and T. Scheffer. Multi-view clustering. In Proc. 4th IEEE International
Conference on Data Mining (ICDM’04), pages 19–26, 2004.
3. D. Cai, Z. Shao, X. He, X. Yan, and J. Han. Mining hidden community in hetero-
geneous social networks. In Proc. 3rd International Workshop on Link Discovery,
pages 58–65, 2005.
4. C. Ding and X. He. K-nearest-neighbor consistency in data clustering: Incorpo-
rating local information into global optimization. In Proc. ACM Symposium on
Applied Computing (SAC’04), pages 584–589, 2004.
5. S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75–174,
2010.
6. I. Gollini and T. Brendan Murphy. Joint Modelling of Multiple Network Views.
ArXiv e-prints, Jan. 2013.
7. K. Gowda and G. Krishnan. Agglomerative clustering using the concept of mutual
nearest neighbourhood. Pattern Recognition, 10(2):105–112, 1978.
8. D. Greene and P. Cunningham. Multi-view clustering for mining heterogeneous
social network data. In Workshop on Information Retrieval over Social Networks,
31st European Conference on Information Retrieval (ECIR’09), 2009.
9. D. Greene, G. Sheridan, B. Smyth, and P. Cunningham. Aggregating Content
and Network Information to Curate Twitter User Lists. In Proc. 4th ACM RecSys
Workshop on Recommender Systems & The Social Web, 2012.
10. A. Klementiev, D. Roth, and K. Small. An unsupervised learning algorithm
for rank aggregation.
In Proc. 18th European Conference on Machine Learning
(ECML’07), pages 616–623, 2007.
11. J. Liu, C. Wang, J. Gao, and J. Han. Multi-view clustering via joint nonnegative
matrix factorization. In Proc. SIAM Data Mining Conf. (SDM’13), 2013.
12. L. Tang, X. Wang, and H. Liu. Community detection via heterogeneous interaction
analysis. Data Mining and Know ledge Discovery, 25(1):1–33, 2012.
13. G. Wu, D. Greene, and P. Cunningham. Merging multiple criteria to identify
suspicious reviews. In Proc. 4th ACM Conference on Recommender Systems (Rec-
Sys’10), pages 241–244. ACM, 2010.
14. D. Zhou and C. Burges. Spectral clustering and transductive learning with multiple
views. In Proc. 24th International Conference on Machine Learning, pages 1159–
1166. ACM, 2007.
|
Subsets and Splits